Programs
Master of Science in Cybersecurity Degree 100% Online
Master of Science in Cybersecurity Online Degree Program Overview
If you work in Cyber and Network Security, you know how quickly your profession is growing. CSO reports the average breach costs approximately $3.5 million in 2017, with a 27 percent probability that a U.S. company will experience a breach in the next 24 months.
That’s why employers are scrambling to hire Cybersecurity professionals.
According to the U.S. Bureau of Labor Statistics, employment of computer and information systems security managers is projected to grow by 44,200 people between 2016 and 2026.
If you’re a cybersecurity professional and you want to give yourself a competitive edge, consider earning an Online Master of Science in Cybersecurity at ECPI University. Our 100 percent online program allows you to continue working as you prepare to enter management. It’s designed to help you acquire the knowledge and skills needed to manage secure information systems and technology at the enterprise and individual levels, locally and globally.
So, if you’re an IT professional who is ready to up your game, this online program can provide you with a broad perspective of the business and management environments in which information system technologies play a strategic role. And with ECPI University’s year-round schedule, you could earn your 100% Online Master of Science in Cybersecurity in less than 16 months!
Choose from two Online Cybersecurity concentrations: Cyber Operations OR Cybersecurity Policy.
Learn About and Experience:
- Secure critical infrastructure within enterprise networks, power distribution, transportation, finance, and water treatment facilities
- Enhancing the local, regional, and national security posture of the nation through the technologies, techniques, and labs used in cyber operations
- Real-world case studies and practice with globally accessible hands-on security lab equipment designed to teach and reinforce the configuration of secure infrastructure
- Local, regional, and/or national activities and events designed to promote policy and practice that strengthen the cybersecurity community as a whole
- Through curriculum designed to prepare you for advanced cybersecurity certification examinations such as Certified Ethical Hacker (CEH), Certified Information Systems Security, Professional (CISSP), Systems Administration and Network Security (SANS), and Chief Information Security Officer (CISO)
- Virtualization and storage technologies that provide hands-on experience with cybersecurity tools, techniques, methodologies, and practices
It’s no secret that Cyber and Network Security is one of today’s hottest careers. Learn more about the opportunities for growth in this field in Atlanta, GA here!
This degree program is primarily based on the National Security Agency and the Department of Homeland Security program requirements for designation as a Center of Academic Excellence in Information Assurance/Cyber Defense.
The curriculum builds on a foundation of communication and problem solving, theoretical and applied understanding of advanced technical concepts and policies, as well as technical hardware and software components used throughout information systems. Your understanding and practical knowledge of network security will be enhanced with research opportunities providing a particular emphasis on technologies, techniques, and operations related to specialized Cybersecurity (e.g., collection, exploitation, and response). These technologies, techniques, and operations are critical to business, intelligence, government, manufacturing, and law enforcement in order to effectively monitor, defend, and minimize the attack surface of information system networks.
Graduates of an advanced CIS degree program have many career options, often finding career paths that lead them into IT management positions. They may manage complex IT projects, design secure computer systems using the most current information technologies, and develop innovative hardware and software system architectures. They may develop test plans and ensure their correct application. Graduates also may work as network architects or administrators who design secure computer networks, including wireless networks. Graduates of the M.S. in Information Systems degree program will be able to work in a wide variety of positions in business, industry, and government venues.
Possible job titles for an M.S. Cyber Security graduate include:
- Cyber Security Analyst
- Penetration Tester
- Data Center or Network Security Administrator
- Information Systems Security Engineer
- Risk Assessment and Vulnerability Analysis Manager
- Information Security Engineer
With significant, successful work experience in the field, management opportunities could be available to the graduate.
Program Requirements
Course ID | Course Name | Credits |
---|---|---|
MSCS501 -OR- IS630 | Cybersecurity Synopsis -OR- Information Security Policy and Practice | 3 |
MSCS513 | Human and Ethical Aspects of Cybersecurity | 3 |
MSCS521 | Security Architecture & Design | 3 |
MSCS615 -OR- IS640 | Cloud Security -OR- Cloud Computing and Virtualization | 3 |
MSCS624 | Network Security and Intrusion Detection | 3 |
MSCS654 | Wireless and Mobile Security | 3 |
MSCS680 | Virtualization Security | 3 |
Course ID | Course Name | Credits |
---|---|---|
COR090 | Career Orientation Seminar | 0 |
Course ID | Course Name | Credits |
---|---|---|
MSCS633 | Applied Cryptography and Data Protection | 3 |
MSCS635 | Advanced Networking | 3 |
MSCS637 | Advanced Ethical Hacking | 3 |
MSCS639 | Cyber Forensics | 3 |
Course ID | Course Name | Credits |
---|---|---|
MSCS641 | Information Risk Management | 3 |
MSCS643 | Cybersecurity Governance and Compliance | 3 |
MSCS645 | Cybersecurity Strategies (Prevention and Protection) | 3 |
MSCS647 | Compliance and Audit | 3 |
Course ID | Course Name | Credits |
---|---|---|
MSCS633 | Applied Cryptography and Data Protection | 3 |
MSCS635 | Advanced Networking | 3 |
MSCS637 | Advanced Ethical Hacking | 3 |
MSCS639 | Cyber Forensics | 3 |
MSCS640 | Cyber Forensics II | 3 |
MSCS641 | Information Risk Management | 3 |
MSCS643 | Cybersecurity Governance and Compliance | 3 |
MSCS645 | Cybersecurity Strategies (Prevention and Protection) | 3 |
MSCS647 | Compliance and Audit | 3 |
Course ID | Course Name | Credits |
---|---|---|
EXT550 | Externship I | 0 |
EXT600 | Externship II | 0 |
EXT650 | Externship III | 0 |
This degree program is based on the National Security Agency and the Department of Homeland Security program requirements for designation as a Center of Academic Excellence in Information Assurance/Cyber Defense. The curriculum builds on a foundation of communication and problem solving, theoretical and applied understanding of basic technical concepts, protocols, and software/hardware components of information systems technologies. Students enhance their understanding and practical knowledge of network security and research providing a particular emphasis on technologies and techniques related to specialized Cybersecurity (e.g., collection, exploitation, and response). These technologies and techniques are critical to intelligence, military and law enforcement organizations authorized to perform these specialized operations. A capstone project is required.
Upon successful completion of this degree program, graduates should be able to:
- Summarize cybersecurity fundamentals and how they are interrelated and employed to achieve desired solutions and to effect mitigation strategies.
- Analyze security and operational effects on structured network communications in wired and wireless environments.
- Select and securely implement large-scale distributed cloud systems.
- Evaluate classes of possible threats, consequences associated with each threat, and determine what actions can be taken to mitigate the threat.
- Relate the legal issues governing cyber operations and the use of related tools, techniques, technology and data.
- Evaluate user behavioral and ethical impacts of various securities on the implementation of and perception of security mechanisms.
- Devise a defensive network architecture employing multiple layers of protection using technology appropriate for secure network.
- Analyze security implications of data center virtualization and storage technologies.
- Evaluate various applied cryptography solutions and key management systems.
Cyber Operations
The Cyber Operations concentration focuses on the analysis, design, deployment, and monitoring of cyber technologies and techniques necessary to maintain the security posture of an organization. Graduates will have the skills to ensure operational continuity of large-scale organizations.
Upon successful completion of this degree program, the graduate should be able to:
- Apply advanced knowledge of cyber operations to manage information assurance and threat mitigation at the enterprise level.
Cybersecurity Policy
The Cybersecurity Policy concentration prepares graduates for the analysis, development, and enforcement of policies and procedures that contribute to the security of an organization’s system with the focus on people, processes, and technology. The course work focuses on the legal and regulatory factors that must be considered in administering cybersecurity policy.
Upon successful completion of this degree program, graduates should be able to:
- Develop security policies to ensure compliance and manage risk in information security across a wide range of domains.
Click above to experience an actual online class in real time.