Master of Science in Cybersecurity
Master of Science in Cybersecurity Overview
In a vastly connected world, there is a critical need to secure the systems supporting the world’s information infrastructure. With the rising threat of cybercrime, the need for IT professionals with advanced knowledge and education is rapidly growing. That’s where you come in.
The Master of Science in Cybersecurity program is designed to prepare students for leadership in information technology security. The cybersecurity master’s degree program is focused on providing you with the knowledge and skills to apply the principles and concepts related to the development and management of secure information systems and technology at the enterprise and individual levels, locally and globally.
The cybersecurity master’s is designed for IT professionals, executives, and baccalaureate degree graduates who realize the necessity of delivering value to customers through secure information technology systems. The degree provides you with theoretical, practical, and applied skills in computer-based information systems and the technologies that support them, as well as a broad perspective of the business and management environments in which information system technologies play a strategic role. You could earn your master’s degree in cybersecurity in less than 16 months through our accelerated, year-round schedule!
Choose from two Cybersecurity concentrations: Cyber Operations OR Cybersecurity Policy.
- Learn how to secure critical infrastructure such that exists in enterprise networks, power distribution, transportation, finance, and water treatment facilities
- Learn how to enhance the local, regional, and national security posture of our nation through the technologies, techniques, and labs used in cyber operations
- Experience real-world case studies and practice with globally accessible hands-on security lab equipment designed to teach and re-enforce the configuration of secure infrastructure
- Participate in local, regional, and/or national activities and events designed to promote policy and practice that strengthen the cybersecurity community as a whole
- Learn through curriculum designed to prepare you for advanced cybersecurity certification examinations such as Certified Ethical Hacker (CEH), Certified Information Systems Security
- Professional (CISSP), Systems Administration and Network Security (SANS), and Chief Information Security Officer (C:CISO)
- Use virtualization and storage technologies that provide hands-on experience with cybersecurity tools, techniques, methodologies, and practices
The Master of Science in Cybersecurity is delivered on campus or online. Components of the on campus program may be delivered online in a hybrid model.
The National Security Agency and the Department of Homeland Security have designated ECPI University as a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE) for the Bachelor of Science in Computer and Information Science: Cyber and Network Security major, Cybersecurity Track through academic year 2023. Designation Letter can be viewed here.
It’s no secret that Cyber and Network Security is one of today’s hottest careers. Learn more about the opportunities for growth in this field in Atlanta, GA here!
21 semester credit hours
Course ID Course Name Credits MSCS501 -OR- IS630 Cybersecurity Synopsis -OR- Information Security Policy and Practice 3 MSCS513 Human and Ethical Aspects of Cybersecurity 3 MSCS521 Security Architecture & Design 3 MSCS615 -OR- IS640 Cloud Security -OR- Cloud Computing and Virtualization 3 MSCS624 Network Security and Intrusion Detection 3 MSCS654 Wireless and Mobile Security 3 MSCS680 Virtualization Security 3
0 semester credit hours
Course ID Course Name Credits COR090 Career Orientation Seminar 0
Cyber Operations Concentration
12 semester credit hours
Course ID Course Name Credits MSCS633 Applied Cryptography and Data Protection 3 MSCS635 Advanced Networking 3 MSCS637 Advanced Ethical Hacking 3 MSCS639 Cyber Forensics 3
Cybersecurity Policy Concentration
12 semester credit hours
Course ID Course Name Credits MSCS641 Information Risk Management 3 MSCS643 Cybersecurity Governance and Compliance 3 MSCS645 Cybersecurity Strategies (Prevention and Protection) 3 MSCS647 Compliance and Audit 3
3 semester credit hours
Course ID Course Name Credits MSCS633 Applied Cryptography and Data Protection 3 MSCS635 Advanced Networking 3 MSCS637 Advanced Ethical Hacking 3 MSCS639 Cyber Forensics 3 MSCS640 Cyber Forensics II 3 MSCS641 Information Risk Management 3 MSCS643 Cybersecurity Governance and Compliance 3 MSCS645 Cybersecurity Strategies (Prevention and Protection) 3 MSCS647 Compliance and Audit 3
The externships are non-credit and must be approved by the program director. Students must maintain full-time graduate study and commit to 20-40 hours a week, including time required to check-in with the externship mentor. The externship courses are pass/fail and students must pass the externship course to be able to stay in the externship program.
Course ID Course Name Credits EXT550 Externship I 0 EXT600 Externship II 0 EXT650 Externship III 0
MSCS Externship Track
- To be successful in the IT field today, the industry requires that graduates have a degree, certifications, and work experience. The Externship Track for MSCS is intended for students with limited or no in-field work experience. The Program Director determines whether a student's education is best served through the Externship Track. If that is determined to be the case, then the Externship Track is considered Required for Graduation from the MSCS program.
- No additional credit is earned. Each externship in the track must be approved by the faculty course manager in advance of participation. Externship are pass/fail.
- Externships at the graduate level are work experiences (both paid/unpaid) that may include consultancy-type projects and/or applied research that solves problems. The externship track prepares students with job application skills (COR 090 Career Orientation Seminar), provides practice in a virtual environment (EXT 550 Externship I), and enables the student to perform in-field in a real job environment (EXT 600 Externship II and EXT 650 Externship III). Students apply what they have learned in class to the job (EXT 600 and EXT 650).
- Externships are work experiences designed to apply the material learned in class. The externship track is open to international and domestic students. Students must maintain full-time graduate study while participating in the externship. Students will be assigned a mentor throughout the externship. The program consists of up to three semesters of externship.
- Students must consult with their PDSO or DSO for clarification on the process and the requirements of USCIS and SEVP relative to the externship.
For International students, the externships are Curricular Practical Training (CPT). Regulations for CPT are as follows:
- CPT is integral to your major and the experience must be part of your program of study.
- When you enroll at the graduate level, your designated school official (DSO) may authorize CPT during your first semester if your program requires this type of experience. Ask your DSO for details.
- Your DSO will provide you a new Form I-20, "Certificate of Eligibility of Nonimmigrant Student Status," that shows that the DSO has approved you for this employment.
- You can work on CPT either full-time or part-time.
- CPT requires a signed cooperative agreement or a letter from your employer.
- If you have 12 months or more of full-time CPT, you are ineligible for OPT, but part-time CPT is fine and will not stop you from doing OPT.
- Program Description
This degree program is primarily based on the National Security Agency and the Department of Homeland Security program requirements for designation as a Center of Academic Excellence in Information Assurance/Cyber Defense.
The curriculum builds on a foundation of communication and problem solving, theoretical and applied understanding of advanced technical concepts and policies, as well as technical hardware and software components used throughout information systems. Your understanding and practical knowledge of network security will be enhanced with research opportunities providing a particular emphasis on technologies, techniques, and operations related to specialized Cybersecurity (e.g., collection, exploitation, and response). These technologies, techniques, and operations are critical to business, intelligence, government, manufacturing, and law enforcement in order to effectively monitor, defend, and minimize the attack surface of information system networks.
- Possible Career Track
Graduates of an advanced CIS degree program have many career options, often finding career paths that lead them into IT management positions. They may manage complex IT projects, design secure computer systems using the most current information technologies, and develop innovative hardware and software system architectures. They may develop test plans and ensure their correct application. Graduates also may work as network architects or administrators who design secure computer networks, including wireless networks. Graduates of the M.S. in Information Systems degree program will be able to work in a wide variety of positions in business, industry, and government venues.
Possible job titles for an M.S. Cyber Security graduate include:
- Cyber Security Analyst
- Penetration Tester
- Data Center or Network Security Administrator
- Information Systems Security Engineer
- Risk Assessment and Vulnerability Analysis Manager
- Information Security Engineer
With significant, successful work experience in the field, management opportunities could be available to the graduate.
This degree program is based on the National Security Agency and the Department of Homeland Security program requirements for designation as a Center of Academic Excellence in Information Assurance/Cyber Defense. The curriculum builds on a foundation of communication and problem solving, theoretical and applied understanding of basic technical concepts, protocols, and software/hardware components of information systems technologies. Students enhance their understanding and practical knowledge of network security and research providing a particular emphasis on technologies and techniques related to specialized Cybersecurity (e.g., collection, exploitation, and response). These technologies and techniques are critical to intelligence, military and law enforcement organizations authorized to perform these specialized operations. A capstone project is required.
Upon successful completion of this degree program, graduates should be able to:
- Summarize cybersecurity fundamentals and how they are interrelated and employed to achieve desired solutions and to effect mitigation strategies.
- Analyze security and operational effects on structured network communications in wired and wireless environments.
- Select and securely implement large-scale distributed cloud systems.
- Evaluate classes of possible threats, consequences associated with each threat, and determine what actions can be taken to mitigate the threat.
- Relate the legal issues governing cyber operations and the use of related tools, techniques, technology and data.
- Evaluate user behavioral and ethical impacts of various securities on the implementation of and perception of security mechanisms.
- Devise a defensive network architecture employing multiple layers of protection using technology appropriate for secure network.
- Analyze security implications of data center virtualization and storage technologies.
- Evaluate various applied cryptography solutions and key management systems.
The Cyber Operations concentration focuses on the analysis, design, deployment, and monitoring of cyber technologies and techniques necessary to maintain the security posture of an organization. Graduates will have the skills to ensure operational continuity of large-scale organizations.
Upon successful completion of this degree program, the graduate should be able to:
- Apply advanced knowledge of cyber operations to manage information assurance and threat mitigation at the enterprise level.
The Cybersecurity Policy concentration prepares graduates for the analysis, development, and enforcement of policies and procedures that contribute to the security of an organization’s system with the focus on people, processes, and technology. The course work focuses on the legal and regulatory factors that must be considered in administering cybersecurity policy.
Upon successful completion of this degree program, graduates should be able to:
- Develop security policies to ensure compliance and manage risk in information security across a wide range of domains.
- Program Guide
- Download Program Guide (2.31 MB)