Team sits around a table reviewing laptop and tablets
Team sits around a table reviewing laptop and tablets
Loading...
Get Program Details
Download a program brochure.
Why are you interested in earning an MS in Cybersecurity?
Who is this brochure for?
By clicking “Get Brochure,” I agree to provide the contact information listed above for the purpose of receiving communications regarding educational programs and opportunities.
Thank you for your submission!
Oops, something went wrong.

Online MS in Cybersecurity Curriculum

Not all cybersecurity classes are created equal. We have designed our online MS in Cybersecurity curriculum to train you in foundational technical knowledge and to empower you to apply it from a position of leadership.

In the cybersecurity courses offered online at the Katz School of Science and Health, you’ll learn the latest authoritative strategies for assessing and mitigating cyber threats, best practices for designing secure systems architecture, digital forensics methods and much more. And you’ll graduate prepared to apply this knowledge in a technical role or as the manager of a team of cybersecurity personnel.

Explore our professionally driven cybersecurity curriculum below. All courses are worth 3 credits unless otherwise specified.

Required Courses

CYB-5000 Cybersecurity Foundations

This course will prepare students for in-depth study and competency building in cybersecurity. Through hands-on work in understanding and applying cybersecurity frameworks and guidelines, students will explore general concepts, current standards and practices, and terminology. Students will be introduced to the most common cybersecurity functions, current and emerging cyber threats, challenges and solutions. The course will engage students in basic solutions design and applying techniques, using current case studies to introduce them to the operational factors, both non-technical and technical, that address exposures and responses to cyber threats.

CYB-5100 Architecture of Secure Operating Systems, Applications and Devices

As innovations involving sensing technology, robotics and the Internet of Things are more frequently deployed in organizations, on vehicles or around the home, businesses and personal safety can be highly dependent on the secure architecture of technology. Students will learn key concepts about technology access control design, fault and tamper resistance, testing, and common criteria used to determine if technology solutions are robust enough to withstand attacks such as tampering, denial of service and unauthorized access.

CYB-5200 Network, Data and Communications Security

Having a solid defense-in-depth strategy for architecting and operating networked technology provides organizations with operational resilience from cyberattacks and data breaches. Students will learn key concepts about security architecture, network segmentation, defense in-depth, encryption technologies, and backup/replication sites, including cloud-based servers and services.

CYB-5300 Risk Management

This course takes a multi-disciplinary approach to the study of risk governance and cybersecurity. Students will learn how to analyze, assess, control and manage cybersecurity risks from the individual to the operational level. They will develop practical knowledge, analytical skills and mathematical methods for calculating risk, as well as more artistic skills required to make decisions about which risks to control, and how to control them.

CYB-5400 Cybersecurity Audit, Assessment and Training

This course will teach students how to assess and evaluate cybersecurity risks, conduct computer security audits, and test preparedness and response levels in the current technology environment. The course will explore standard evaluation and testing methodologies currently used across industries to identify and address cybersecurity threats. Students will also study current cyber policies and guidance used in both the private and public sectors and their implementation.

TMG-5500 Leading Technology Organizations

Successful leaders require more than technical knowledge and skills: they must be able to identify and prioritize strategic challenges and opportunities and champion initiatives to address them. Students will master strategies for building short- and long-term plans, developing a culture of productivity and excellence, leading high performing teams, strengthening organizational communication, leading change management initiatives, and enabling the leadership potential of others. Additional topics may include individual and group behaviors, interpersonal relationships, and organizational structure and design. Importantly, students will learn the science behind strategic leadership in agile, high-performing, technology organizations.

CYB-7992 E-Discovery, Digital Evidence and Computer Forensics

Electronic discovery has become a critical component of all major litigations as the key evidence increasingly consists of e-mail and electronic documents. This course will teach students the law of e-discovery, and practical best practices to provide exposure to the technology behind it all. The focus will be on making the student competent as to the legal obligations of e-discovery.

Elective Courses

Choose two courses from the following:

CYB-TBD Security Operations and Incident Response

This course covers the set of processes, procedures and solutions that are employed by information security teams responsible for monitoring and analyzing an organization's security posture on an ongoing basis. Students will learn about the critical importance of the Security Operations Center (SOC), how to identify indicators of compromise, and how to detect, respond and prevent cybersecurity attacks and privacy/security incidents. They will also learn how to leverage security analytics and applicable threat intelligence.

CYB-5601 Cybercrime, Cyberwar and Threat Actors

This course examines the motivations and capabilities of various cybercrime actors ranging from script kiddies to state-sponsored Advanced Persistent Threats (APTs), and the role the dark web and cryptocurrencies play in facilitating and financing cybercrime. Using some of the most notorious cases of cybercrime, cyber espionage and military cyber operations, students will research investigative, defensive, law enforcement and regulatory actions and their implications on the present and future of cybersecurity.

CYB-5600 Emerging Cybersecurity Threats

This course covers the different techniques used by professional threat researchers for gathering intelligence and analyzing threat data. Students will learn to perform their own threat research on emerging threats in a number of different industries, identify new and innovative tactics used by threat actors, and develop strategies to prevent and detect these new attack vectors.

CYB-6400 Internship

This course consists of an applied (off-campus) internship experience supervised by a staff person at the internship site and overseen by a faculty advisor. The internship site must be approved by the program director, and the overall duration of student work must be no less than 150 hours (based on a 3-credit course). At the start of the internship, the student and the faculty advisor will jointly develop specific learning objectives tailored to the nature of the internship. Over the course of the internship, students will be required to submit weekly reflections, and at the end of the internship, students write a final paper that represents the culmination of the work performed.

Capstone Course

CYB-6500 Capstone

In this course, students integrate the skills developed in previous classes into a comprehensive body of knowledge, and provide tangible evidence of these competencies. The Capstone project has four components: 1.) a brief proposal and project schedule; 2.) the main project deliverable; 3.) a final presentation; and 4.) a reflection on the student’s cybersecurity management skills and competencies, with some depth in one or two areas of the profession and grounded in a particular real-world context.

Admissions Dates and Deadlines

Oct
25
Priority Application Deadline
October 25, 2021
Spring 2022 Term
Jan
10
Application Deadline
January 10, 2022
Spring 2022 Term
Jan
18
Next Start
January 18, 2022
Spring 2022 Term
Questions? Let’s Connect.