Become a cybersecurity leader of today ... and tomorrow.
Team sits around a table reviewing laptop and tablets
Team sits around a table reviewing laptop and tablets
Become a cybersecurity leader of today ... and tomorrow.

Cybersecurity Master’s Program Curriculum at Katz

Not all cybersecurity classes are created equal. We've designed our online Master of Science in Cybersecurity curriculum to train you in foundational technical knowledge and to empower you to apply it from a position of leadership.

In the cybersecurity courses offered online at the Katz School of Science and Health, you’ll learn the latest authoritative strategies for assessing and mitigating cyber threats, best practices for designing secure systems architecture, digital forensics methods, and much more. In addition, you’ll graduate prepared to immediately apply this knowledge with context and learnings from the current events that influence our faculty’s lesson plans.

Explore the curriculum for our competitive cybersecurity master’s program below. All cybersecurity courses online are worth 3 credits unless otherwise specified.

Discover Your Next Step
Download a program brochure.

By clicking "Get Program Brochure,” I agree to provide the contact information listed above for the purpose of receiving communications regarding educational programs and opportunities.
Yeshiva katz PDS

Download the Program Brochure

Are you looking to start your career in the vital field of cybersecurity? Earn your master’s degree online with Yeshiva University. Our online Master of Science (MS) in Cybersecurity, offered through the Katz School of Science and Health, prepares you for the technical and business aspects of cybersecurity.

Complete the form to download a program brochure for Yeshiva University’s online MS in Cybersecurity program. Get more details about the program, including information on the program structure, curriculum, benefits and application requirements.

Required Courses

CYB-5000 Cybersecurity Foundations

This course will prepare students for in-depth study and competency building in cybersecurity. Through hands-on work in understanding and applying cybersecurity frameworks and guidelines, students will explore general concepts, current standards and practices, and terminology that will be used throughout the cybersecurity master’s program. Students will be introduced to the most common cybersecurity functions, current and emerging cyber threats, challenges, and solutions. The course will engage students in basic solutions design and applying techniques, using current case studies to introduce them to the operational factors, both non-technical and technical, that address exposures and responses to cyber threats.

CYB-5100 Architecture of Secure Operating Systems, Applications, and Devices

As innovations involving sensing technology, robotics, and the Internet of Things are more frequently deployed in organizations, on vehicles or around the home, businesses and personal safety can be highly dependent on the secure architecture of technology. Students will learn key concepts about technology access control design, fault and tamper resistance, testing, and common criteria used to determine if technology solutions are robust enough to withstand attacks such as tampering, denial of service, and unauthorized access.

CYB-5200 Network, Data, and Communications Security

Having a solid defense-in-depth strategy for architecting and operating networked technology provides organizations with operational resilience from cyberattacks and data breaches. Students will learn key concepts about security architecture, network segmentation, defense in-depth, encryption technologies, and backup/replication sites, including cloud-based servers and services.

CYB-5300 Risk Management

This course in the cybersecurity master’s program takes a multi-disciplinary approach to the study of risk governance and cybersecurity. Students will learn how to analyze, assess, control, and manage cybersecurity risks from the individual to the operational level. They will develop practical knowledge, analytical skills, and mathematical methods for calculating risk, as well as more artistic skills required to make decisions about which risks to control, and how to control them.

CYB-5400 Cybersecurity Audit, Assessment and Training

This course will teach students how to assess and evaluate cybersecurity risks, conduct computer security audits, and test preparedness and response levels in the current technology environment. The course will explore standard evaluation and testing methodologies currently used across industries to identify and address cybersecurity threats. Students will also study current cyber policies and guidance used in both the private and public sectors and their implementation.

TMG-5500 Leading Technology Organizations

Successful leaders require more than technical knowledge and skills: they must be able to identify and prioritize strategic challenges and opportunities and champion initiatives to address them. Students will master strategies for building short- and long-term plans, developing a culture of productivity and excellence, leading high performing teams, strengthening organizational communication, leading change management initiatives, and enabling the leadership potential of others. Additional topics may include individual and group behaviors, interpersonal relationships, and organizational structure and design. Importantly, students will learn the science behind strategic leadership in agile, high-performing, technology organizations.

CYB-7992 E-Discovery, Digital Evidence, and Computer Forensics

Electronic discovery has become a critical component of all major litigations as the key evidence increasingly consists of e-mail and electronic documents. Adding a critical legal element to the cybersecurity master’s program, this course will teach students the law of e-discovery, and practical best practices to provide exposure to the technology behind it all. The focus will be on making the student competent as to the legal obligations of e-discovery.

Elective Courses

Choose two courses from the following:

CYB-TBD Security Operations and Incident Response

This course covers the set of processes, procedures and solutions that are employed by information security teams responsible for monitoring and analyzing an organization's security posture on an ongoing basis. Students will learn about the critical importance of the Security Operations Center (SOC), how to identify indicators of compromise, and how to detect, respond, and prevent cybersecurity attacks and privacy/security incidents. They will also learn how to leverage security analytics and applicable threat intelligence.

CYB-5601 Cybercrime, Cyberwar, and Threat Actors

This course examines the motivations and capabilities of various cybercrime actors ranging from script kiddies to state-sponsored Advanced Persistent Threats (APTs), and the role the dark web and cryptocurrencies play in facilitating and financing cybercrime. Using some of the most notorious cases of cybercrime, cyber espionage, and military cyber operations, students will research investigative, defensive, law enforcement, and regulatory actions and their implications on the present and future of cybersecurity.

CYB-5600 Emerging Cybersecurity Threats

This course covers the different techniques used by professional threat researchers for gathering intelligence and analyzing threat data. Students will learn to perform their own threat research on emerging threats in a number of different industries, identify new and innovative tactics used by threat actors, and develop strategies to prevent and detect these new attack vectors.

CYB-6400 Internship

This course consists of an applied (off-campus) internship experience supervised by a staff person at the internship site and overseen by a faculty advisor. The internship site must be approved by the program director, and the overall duration of student work must be no less than 150 hours (based on a 3-credit course). At the start of the internship, the student and the faculty advisor will jointly develop specific learning objectives tailored to the nature of the internship. Over the course of the internship, students will be required to submit weekly reflections, and at the end of the internship, students write a final paper that represents the culmination of the work performed.

Capstone Course

CYB-6500 Capstone

In this course, students integrate the skills developed throughout the cybersecurity master’s program into a comprehensive body of knowledge and provide tangible evidence of these competencies. The Capstone project has four components: 1.) a brief proposal and project schedule; 2.) the main project deliverable; 3.) a final presentation; and 4.) a reflection on the student’s cybersecurity management skills and competencies, with some depth in one or two areas of the profession and grounded in a particular real-world context.
Admissions Dates and Deadlines
Jun
16
Priority Application Deadline
June 16, 2022
Fall 2022 Term
Aug
22
Application Deadline
August 22, 2022
Fall 2022 Term
Questions? Let’s Connect.