Master of Science in Cybersecurity

About Program

The Master of Science in Cybersecurity at ESU is intended to provide students with up-to-date knowledge and skills in cybersecurity and privacy. It gives hands-on experience in cyber threat prevention and detection tactics, as well as reacting to and recovering from cyber-attacks. Program graduates will be employable by corporations and governments with important information assets that need to be protected from increasingly sophisticated cyber-attacks.

Why study for a master’s degree in cybersecurity at ESU?

Cybersecurity is a rapidly growing field on a worldwide scale. Cybersecurity, often known as information technology security, is the protection of any computer system against harm or loss caused by unauthorized access. Security may include programs, data, networks, and computers—any sector that relies on computers needs it. As a result, we can identify five reasons why students choose our master’s degree program in cybersecurity.

First, as an industry, cybersecurity has a bright future. With the sector’s low unemployment rate and many nations having a labor shortage, a cybersecurity specialist should never be jobless for a long time. Furthermore, the salary is above average, which is a wonderful benefit. Overall, it is a good career option.

Second, our Master of Science in Cybersecurity program is intended to provide students with the most up-to-date information and skills in cybersecurity and privacy. Graduates will be employable by corporations and governments with important information assets that need to be protected from increasingly sophisticated cyber-attacks.

Third, a master’s degree may be an effective tool for job advancement. Many individuals, however, do not have the time or money to return to full-time university education. Our curriculum is entirely online, allowing students to get an advanced degree in cybersecurity without attending a university campus. Students might benefit from studying at home.

Fourth, the expense of a higher education degree has continued to rise in recent years. Most degrees cost more than $30,000, particularly in IT and management; however, the curriculum at ESU costs less than $3600.

Finally, ESU’s master’s degree in cybersecurity requires candidates to have a bachelor’s degree in any field, not necessarily in information technology. The rationale for this is that students take required foundation courses such as Python programming, operating systems, and computer networks as part of their master’s studies.

For the reasons stated above, ESU’s Master of Science in Cybersecurity is ideal for you. Upon completing this program, you will have gained a deep understanding and developed expertise about IT security in preparation for a career in this quickly evolving field. With state-of-the-art technical knowledge, intellectual know-how, management capabilities, and hands-on practical skills, be assured that you will succeed in meeting the cybersecurity challenges faced by modern organizations. The Master of Science in Cybersecurity degree program combines real-world engagement, cybersecurity theories, and hands-on experiences to provide a robust educational foundation for high-level application and provision of cybersecurity solutions.

Careers

Graduates will be equipped with the required skills to pursue careers as

  • Chief Information Security Officers
  • Cybersecurity Analysts/Specialists
  • Information Security Crime Investigators/Forensics Experts
  • Computer Security Incident Responders
  • Security Analysts
  • Risk Managers/Analysts
  • Forensic Computer Analysts
  • Information Security Analysts
  • Penetration Testers
  • IT Security Consultants

 

Program Learning Outcomes

Upon completion of the Master of Science in Cybersecurity program, students will have learned to:

  • Analyze and resolve security issues in networks and computer systems to secure an IT infrastructure;
  • Design, develop, test, and evaluate secure software;
  • Develop policies and procedures to manage enterprise security risks;
  • Evaluate and communicate the human role in security systems with an emphasis on ethics, social engineering vulnerabilities, and training;
  • Interpret and investigate security incidents forensically;
  • Explain concepts and arguments associated with cybersecurity; and
  • Evaluate an organization’s capability in protecting its information infrastructure

 

Teaching Methodology

The following courses’ contents will be delivered through a mix of online lectures, discussions, case-based conversations, and virtual labs. A case is a detailed presentation of real-world security challenges that outline a group of difficulties and need a plan of action. The case approach offers a practical foundation for the learning process. Its effectiveness depends on student preparedness and active participation in class discussions.

The prescribed textbooks and associated resources will be the major source of information and reference for each course. Lecturers prepare supplementary materials such as lecture notes and slides.

Degree Requirements

To graduate with a master’s degree in cybersecurity, students must complete a minimum of 35 credit hours. It is students’ responsibility to be informed of current requirements and consult frequently with their advisors on their progress toward completion.

The following table shows the courses that students will take every semester.

Students can choose elective courses from the following table. Note that not every course in this table will be available in every semester.

 

Course

Credit Hours

Prerequisite

Prerequisite Core Term (courses for non-IT-background students)

CYB510   

Operating Systems  

3

 

CYB530  

Computer Networks  

3

 

CYB550    

Programming Foundations in Python

3

 

Term 1

CYB670 

Cybersecurity Fundamentals  

3

 

CYB690

Cybersecurity Laws and Policies  

3

 

CYB615 

Network Programming  

3

 

Term 2

CYB770     

IT Forensics

3

CYB670

CYB650     

Introduction to Cryptography

3

CYB670

CYB630     

Network Security  

3

CYB670

 

Elective 1  

3

 

Term 3

CYB610     

Secure Operating Systems  

3

CYB670

CYB740     

Penetration Testing and Ethical Hacking  

3

CYB670

CYB700

Practical Training

1

 
 

Elective 2  

3

 

Students can choose elective courses from the following table. Note that not every course in this table 

will be available in every term. 

Elective Courses

Prerequisite

CYB720        

Blockchain  

CYB670

CYB620        

Database Management System and Security  

CYB670

CYB780        

Embedded System Security

CYB670

CYB710        

Secure Programming  

CYB615

CYB760        

Cloud Computing and Security  

CYB670

CYB750        

Advanced Cryptography  

CYB650, CYB670

CYB790        

Internet of Things Systems, Security, and the Cloud (IoTSSC)         

CYB670

CYB660        

Wireless Network Security  

CYB670

MGM510     

Risk Management   

 

PMG506      

Foundations of Project Management   

 
Fees
$1200 for each term.