Prepare to Reach Your Cybersecurity Career Goals

Your expertise is in high demand.

The world is powered by interconnected systems. Our financial markets, governments, utility grids, transportation networks and healthcare networks are all vulnerable to cyberattacks.

As threats such as phishing, ransomware, zero-day exploitation, Business Email Compromise (BEC) scams, cyberespionage and more continue to expand, the need and opportunities for cybersecurity experts—the protectors against these dangers—continue to grow.

According to the FBI, the cost of reported cybercrime in the United States increased by 22% in 2023 to more than $12.5 billion.1 Cybersecurity Ventures, the world’s leading researcher for the global cyber economy, expects the current vacancy in 3.5 million cybersecurity positions to hold steady through 2025.2

What’s keeping people from getting hired into cybersecurity positions?
Inadequate training, certifications or skill sets.3

Build your successful career on the right education.

With the online MS in Cybersecurity from the Katz School of Science and Health, you can look forward to a lucrative cybersecurity career, protecting critical infrastructures and shielding the communities and people who are most important to you.

Explore the Program

The online MS program has given me the knowledge I need to make a significant contribution to any organization's cybersecurity program. It focuses on the defensive strategies necessary to run an effective program and to protect against adversaries.
— Aaron M., MS in Cybersecurity ’24 candidate

Cybersecurity Salary: How Much Can You Make?

As you clarify your goals in this dynamic field and choose your cybersecurity career path, consider the median total pay offered for these positions:

Cybersecurity Analyst4
Cybersecurity Engineer5
Senior Cloud Security Analyst6
Senior Penetration Tester7
Senior Network Architect8
Chief Information Security Officer (CISO)9

Strengthen Your Professional Edge

Led by industry practitioners who teach from their own experience, the online MS in Cybersecurity courses heighten your expertise and help you become a standout hiring choice.

As a student, you’ll prepare to add these important credentials to your CV:

  • Certified Information Systems Security Professional (CISSP)
  • Certified Ethical Hacker (CEH)
  • Certified Information Security Manager (CISM)
  • ISACA-CRISC certifications

According to the educational technology company Skillsoft, CISM and CISSP credentials can help you get hired into positions with median starting salaries of $150,000 and higher.10

Certified Information Systems Security Professional, ISC2 Certification

Certified Information Security Manager, An ISACA Certification

Certified in Risk and Information Systems Control, An ISACA Certification

The Rich Variety in Cybersecurity Careers

Cybersecurity experts are essential in protecting data privacy and ensuring compliance with regulations such as the Health Insurance Portability and Accountability Act (HIPAA), the California Consumer Privacy Act (CCPA) and the European Union’s General Data Protection Regulation (GDPR).

In a field as diverse as cybersecurity, opportunities abound for skilled professionals with varied abilities and perspectives—from the technically minded to designers, teachers, consultants, risk-management experts, corporate veterans and more. With the right qualifications and an avid desire to keep learning, you can build a cybersecurity career that aligns seamlessly with your interests and strengths. Explore these possibilities:

Instructor in dress shirt and lanyard gesturing at screen projection

Cybersecurity Instructor

Use your outstanding communication skills to teach adult students the techniques and technical knowledge needed to protect networks against cyberattacks. Help them develop the necessary strategies and skills to keep their organizations safe from threats. As a lifelong learner, you’ll regularly update your knowledge about the latest hacking techniques and vulnerabilities in computer systems. Working in academia or a corporate training environment, you’ll develop curricula, create learning materials and assess your students’ progress and skills.

Man and woman in lanyards looking at laptop in a server room

Security Architect

With a thorough understanding of your organization’s technology and information systems, you’ll lead a team of experts in creating complex security structures to keep your computer systems safe. You’ll research and design all security features for IT projects, use cryptography to protect data, and provide guidance and leadership on cybersecurity policy. Your proficiency at communication and collaboration will serve you well as you partner with business leaders to create implementation plans and inform your CISO about possible threats.

Man in glasses and dress shirt looking intently at computer screen


As a cryptographer, your confidential work will protect people, businesses and organizations by creating (and decoding) algorithms and ciphers that encrypt data. You’ll develop and test techniques, implement new and updated encryption solutions and analyze existing systems to find their weaknesses. Build a thriving career in government, for example, securing military data and protecting national security; in healthcare, protecting electronic medical records and personal health information; or in finance, encrypting bank records, e-commerce activity and credit/debit card information.

Hidden image
This program will give me the opportunity to apply for careers I would not be eligible for without it.
— Jose D., MS in Cybersecurity ’24 candidate

Empowering Women in Cybersecurity

Women comprise 49% of the American workforce but hold only 25% of the jobs in cybersecurity.11, 12 Female representation in the industry is expected to reach 35% by 2031.12

At Fortune 500 companies, only 17% of the chief information security officers—85 out of 500—are women.12

Together, we can increase these numbers.

Changing the Landscape

The Katz School honors its strong commitment to supporting and empowering women as they claim positions of leadership in the cybersecurity industry, becoming inspirational role models for the next generation. The online MS in Cybersecurity program is led and taught by experienced female professors—practitioners who have created their own paths in cybersecurity and beyond.

Nicole Becher
Nicole Becher
Course Author
Sivan Tehila
Sivan Tehila
Program Director
Discover Your Next Step
Download a program brochure.

By clicking "Get Program Brochure" and submitting this form, I agree to receive text messages, emails and other communication regarding educational programs and opportunities, and to be contacted by Yeshiva University and Everspring, its authorized representative. Message and data rates may apply. Message frequency varies. Reply HELP for help and STOP to cancel. View our privacy policy and disclosures.
Yeshiva Katz PDS Thumbnail

Download the Program Brochure

Are you looking to start your career in the vital field of cybersecurity? Earn your master’s degree online with Yeshiva University from any background, no technical experience needed. The online Master of Science (MS) in Cybersecurity, offered through the Katz School of Science and Health at YU, prepares you for the technical and business aspects of cybersecurity.

Complete the form to download a brochure and get more details about the program, including information on the program structure, curriculum, benefits and application requirements.

Cybersecurity Master’s Degree: What’s it Worth to You?

With all of these opportunities, is a master’s degree worth it? As in other industries, the best and most efficient path toward a successful cybersecurity career is to earn the strongest qualifications. A master’s degree sets you apart from the crowd.

“While cybersecurity professionals have multiple ways to enter the industry, earning a master’s degree is a charted path to take to land high starting salaries in the field. Graduates from top-ranked cybersecurity programs can expect to make six-figure starting salaries between $100,000 and $200,000.”13
—Fortune Education

Every Industry Needs Cybersecurity Expertise

Heart with EKG line running horizontally across it


Coin with dollar sign

Banking and Finance

Desktop computer screen displaying shopping cart

Retail and E-commerce

Illuminated lightbulb

Energy and Utilities

Desktop screen with HTML closing tag in the middle

Information Technology

Outline of graduate wearing cap and gown


Government building with three pillars

Government and Defense

Manufacturing gear


Admissions Dates and Deadlines
Priority Application Deadline
June 14, 2024
Fall 2024 Term
Application Deadline
August 23, 2024
Fall 2024 Term
Term Start
September 3, 2024
Fall 2024 Term