• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Cybersecurity Guide

  • Bootcamps
    • CISSP
    • CCNA
    • CEH
    • Comptia+
  • PROGRAMS BY STATE
    • Alabama
    • Alaska
    • Arizona
    • Arkansas
    • California
    • Colorado
    • Connecticut
    • Delaware
    • Florida
    • Georgia
    • Hawaii
    • Idaho
    • Illinois
    • Indiana
    • Iowa
    • Kansas
    • Kentucky
    • Louisiana
    • Maine
    • Maryland
    • Massachusetts
    • Michigan
    • Minnesota
    • Mississippi
    • Missouri
    • Montana
    • Nebraska
    • Nevada
    • New Hampshire
    • New Jersey
    • New Mexico
    • New York
    • North Carolina
    • North Dakota
    • Ohio
    • Oklahoma
    • Oregon
    • Pennsylvania
    • Rhode Island
    • South Carolina
    • South Dakota
    • Tennessee
    • Texas
    • Utah
    • Vermont
    • Virginia
    • Washington
    • Washington, DC
    • Wisconsin
    • West Virginia
    • Wyoming
  • CERTIFICATIONS
    • Certified Information Systems Auditor (CISA)
    • Certified Ethical Hacker (CEH)
    • Certified Information Security Systems Professional (CISSP)
    • Certified Information Security Manager (CISM)
    • Digital Forensics Certifications
    • Security+
    • CompTIA Advanced Security Practitioner (CASP+)
    • Certified Network Defender (CND)
    • OSCP
    • CRISC
    • Pen Testing
    • CTIA
    • Cryptography
    • Malware Analyst
  • DEGREES
    • associate’s in cybersecurity
    • bachelor’s in cybersecurity
    • master’s in cybersecurity
    • cybersecurity analytics degree
    • Computer science with cybersecurity emphasis
    • MBA in cybersecurity
    • phd in cybersecurity
    • cybersecurity law degree
    • master’s in information security
    • Cybersecurity engineering master’s
  • ONLINE PROGRAMS
    • Online Certificate in Cybersecurity
    • online bachelor’s in cybersecurity
    • online IT degree
    • online master’s in cybersecurity
    • Online master’s in information security
    • online phd in cybersecurity
  • CAREER GUIDES
    • Security Engineer
    • Chief Information Security Officer
    • Security Analyst
    • Computer Forensics
    • Security Consultant
    • Digital Forensics
    • Cryptographer
    • Security Administrator
    • Penetration Tester
    • Security Software Developer
    • Security Specialist
    • Security Code Auditor
    • Security Architect
    • Malware Analyst
    • Data Protection Officer
    • Cybercrime Investigator
    • Cryptanalyst
    • Security Incident Responder
    • Chief Privacy Officer
    • Risk Manager
    • Network Administrator
    • Business InfoSec Officer
    • Information Security Manager
  • Experts
  • RESOURCE CENTER
    • Job Guide
    • Veteran’s Guide
    • Women’s Guide
    • Certification Guide
    • Internship Guide
    • Security Clearance Guide
    • Ethical Hacker Guide
    • Coding for Cybersecurity Guide
    • Cybersecurity 101
    • Student Guide to Internet Safety
    • Scholarship Guide
    • Cybersecurity Math Guide
    • Small Business Guide
    • COVID-19 Guide
    • Cybersecurity for K-12 students
    • Career Networking Guide
    • What is a Cyber Range?
    • Code Like a Hacker
    • Reacting to a Cyber Incident
    • Introduction to Cyber Defense
    • Cybersecurity Courses Online
    • Recommended Reading
    • Cybersecurity Jobs Report
    • Phishing Attacks
    • Cybersecurity Responsibility
    • How to Get Into Cybersecurity
    • Cyberwarfare
    • Cybersecurity Insurance
    • Job Interview Prep
    • Readiness Economy
  • Industries
    • Financial Sector
    • Insurance Sector
    • Healthcare Sector
    • Environmental Sector
    • Energy Sector
    • Government Sector
    • Transportation Sector
    • Food and Ag Sector

A planning guide for a master’s degree in cybersecurity

Written by Dr. Christine Izuakor – Last updated: December 29, 2022

A cybersecurity master’s degree is a useful tool for people looking to either specialize in a particular aspect of the profession, or for analysts and engineers already working in the field who are looking to get more training on leadership or management.

In this guide
  • Master’s process
  • Requirements
  • Career outlook
  • List of schools

The University of San Diego, for example, offers a master’s degree in cybersecurity operations and leadership. Other programs and degrees focused on cybersecurity business and management also exist at a wide variety of schools. 

Ad
cybersecurityguide.org is an advertising-supported site. Clicking in this box will show you programs related to your search from schools that compensate us. This compensation does not influence our school rankings, resource guides, or other information published on this site.
Featured Cybersecurity Masters

School NameProgram More Info
UC Berkeley School of InformationOnline MS in Cybersecurity | No GRE/GMAT Required website
University of Maryland Global CampusOnline Master's in Cybersecurity website
Southern New Hampshire UniversityOnline MS in Cybersecurity website
Syracuse UniversityOnline MS in Cybersecurity | Complete in 15 Months website
Georgia TechOnline MS in Cybersecurity | Tuition under $10k website
Purdue University GlobalOnline MS in Cybersecurity Management website

One growing trend in the master’s of cybersecurity domain is that more and more graduate degrees in cybersecurity are offered by name-brand institutions, but they are offered in online versions, or hybrid versions that require some minimal campus time and then students complete coursework remotely.

Cybersecurity master’s degree overview

Obtaining a master’s degree can help candidates prepare to build a rewarding career in the cybersecurity industry. There are various degrees available depending on the desired career path.

These degrees can be organized in two categories — technical and managerial.

Technical master’s degrees often focus on the tactical elements of cybersecurity including topics like cybersecurity operations, encryption, penetration testing, and more.

While managerial degrees tend to focus more on topics like governance, risk, and compliance. There are also programs that are more generalized and cover a healthy balance of both managerial and technical concepts. Some examples of this include:

Technical example: National University has a master’s degree program that allows students to specialize in ethical hacking and penetration testing. The curriculum is designed to be hands-on and covers everything from computer networks and operating systems to penetration testing and digital forensics. Due to its technical nature, the program is filled with labs and research projects.

Managerial example: DePaul University in Chicago offers a Master’s in Cybersecurity with a concentration in Governance, Risk Management, and Compliance. The curriculum covers everything from IT auditing and InfoSec management to policies for information assurance and legal responsibilities of information technology. While the program does cover some technical elements as well, the majority of the focus is placed on overall security governance and management.

Another great example is the Masters in Cybersecurity Management and Policy from the University of Maryland. The course work covers topics like Communicating, Problem Solving, and Leading in Cybersecurity, Risk Management and Organizational Resilience, Cybersecurity Governance, Program Development, and more.

Hybrid example: the University of Houston offers a Master’s in Cybersecurity that covers a broad range of technical and managerial topics. The program covers everything from technical topics like secure enterprise computing and cryptography to managerial topics like cybersecurity risk analysis.

Cybersecurity master’s degree admissions process at a glance

  1. Research and reputation: The first step in deciding on the right cybersecurity master’s degree program is to do research into all of the options available. This includes making lists of the kinds of programs available, intern/mentorship/career services available, scholarship opportunities, admission requirements, online versus campus-based…the list goes on. The good news is that this guide is a good place to get started with that research.Another tip is to pay attention to the credentials and certifications of the program you are interested in. Some programs receive what’s called a Center of Academic Excellence in Cybersecurity designation. This means that sponsors like the Department of Homeland Security and the National Security Agency have considered and endorsed the programs for committing to reducing vulnerability in national information infrastructure through higher education and research.
  2. Exams: One element of the cybersecurity graduate degree process that takes some pre-planning and preparation is completing the required admission tests such as the GRE or GMAT. Many graduation programs (but certainly not all) require some form of test score as part of the admission process. During the research phase, it’s a good idea to make a note of which schools require test scores and the preferred test format. Additionally, part of the planning process should also include enough time to do test prep either as part of a structured program or through individual study.
  3. Apply: Make a note of each school’s admission process, paying attention to programs with rolling admissions or if there are firm deadlines. Some schools use common applications, while others require specialized admission requirements. Most often, students are expected to compile the GRE/GMAT test scores, letters of recommendation, and transcripts showing successful completion of undergraduate work, including any of the prerequisite courses in science, math, or technology.
  4. Plan: After completing the application requirements, it’s really important that prospective cybersecurity master’s degree students plan ahead to ensure a successful graduate school experience. Among the items that require planning are financial aid/scholarships and live/work arrangements.
  5. Network: One of the biggest advantages of attending a professional graduate degree program is that it helps students to rapidly and effectively build a professional network that can have a significant return on investment over the course of a career. So, it’s really important that networking and career guidance is a significant part of any kind of cybersecurity master’s degree program. Important things to look out for when researching different graduate programs are the availability of career counselors, hosted networking or career-related events, and access to events such as conferences or company-hosted gatherings.

Cybersecurity master’s degree admission requirements

In the past, many master’s degree programs in cybersecurity were designed for people with a cybersecurity background, or at least, with a technical background that might include computer science or math.

Because demand has consistently increased and there is a need to develop cybersecurity professionals on a larger scale, programs are opening their requirements up to allow for more career transitions and upskilling from other domains. Increasingly, cybersecurity master’s degree programs are expanding to try to be inclusive of students that might have an undergraduate degree outside of a computer-related technical discipline.

The NYU Tandon School of Engineering, for example, provides an alternative track to applying for their cybersecurity master’s degree that entails taking a course called Cybersecurity Bridge Program, or taking other preparatory courses before entering the master’s program. This can be a game changer for many professionals looking to transition into the cybersecurity industry.

While program structures and content tend to vary, the admissions requirements for these programs often have a lot in common. Most programs require a detailed application and fee, personal statement, GRE or equivalent test scores, letters of recommendation, transcripts, and more. Some programs also require students to have a GPA above 3.0 for their undergraduate degree in a technical discipline. While, again, the requirements can vary across schools and programs, these are some common elements that should be expected in most applications.

Part-time cybersecurity master’s degree programs

A growing trend in the cybersecurity master’s degree program offerings is flexibility. Increasingly, there are more part-time professional graduate degree programs available including by tier-one schools such as Harvard and Berkeley.

Another significant development in the cybersecurity master’s degree program space is that programs are offering both traditional campus-based degree programs as well as online cybersecurity master’s degree programs, which creates a number of different options for prospective students.

This flexibility of campus-based, online, any hybrid programs means the pursing a master’s degree in cybersecurity is possible for working professionals, students with family commitments, and for people who are not located close to the program they are interested in pursuing.

Example cybersecurity master’s degree coursework

So what kinds of courses make up a cybersecurity master’s degree program? Most degree programs blend a combination of very technical cybersecurity topics with courses aligned with management and leadership roles.

“Right now, the job market in cybersecurity is out of control. It’s unbelievable how great the demand is, but the student feedback I get when they do interviews is employers want to know, ‘What projects did you work on?’ Because everyone’s done coursework.”

— Drew Hamilton, professor and director of the Center for Cyber Innovation at Mississippi State.

Popular technical course examples

Digital Forensics: “This course focuses on digital forensics, which combines computer science technology, legal and professional guidance, and investigation skills to investigate crime that is committed using digital technology. It is an area of expertise that is constantly challenged by rapidly evolving technology and new innovative criminal methods used to commit crime.” – Middlesex University Network Security: “This course begins by covering attacks and threats in computer networks, including network mapping, port scanning, sniffing, DoS, DDoS, reflection attacks, attacks on DNS and leveraging P2P deployments for attacks. The course continues with cryptography topics most relevant to secure networking protocols. Topics covered are block ciphers, stream ciphers, public key cryptography, RSA, Diffie Hellman, certification authorities, digital signatures and message integrity. After surveying basic cryptographic techniques, the course examines several secure networking protocols, including PGP, SSL, IPsec and wireless security protocols. The course examines operational security, including firewalls and intrusion-detection systems. Students read recent research papers on network security and participate in an important lab component that includes packet sniffing, network mapping, firewalls, SSL and IPsec.” – New York University Penetration Testing: “This course provides students with the skills to perform penetration testing to determine whether a system is vulnerable and to suggest countermeasures to the system owner. Penetration testing or ethical hacking involves testing computer systems, networks or web applications for security vulnerabilities which a hacker could potentially exploit.  This course provides students with practical experience attempting to break into computer systems for the purpose of stress testing and discovering weaknesses. Students will be using a list of exploits which they are expected to successfully exercise on a series of target systems provided.” – University of Southern Queensland

Popular managerial course examples

Information System Security Risk Analysis: “This course focuses on the organizational issues of risk analysis in the legal context of the Internet. Organizational problems involving reliability, safety, security, privacy, and human well-being are addressed.” – University of Houston Foundations of Cybersecurity Management: “In this course, students apply the principles of cybersecurity management, analyze and draft cybersecurity policies; create practical approaches to risk analysis; practice techniques to prevent intrusions and attacks that threaten organizational data; and participate in exercises in cryptography, ethical hacking, and crisis management.” – University of Maryland Communicating, Problem Solving, and Leading in Cybersecurity : “In the course, the focus is on gaining and improving skills in communication and problem solving. Students explore the field of cybersecurity by developing connections to their career aspirations, creating a professional social network presence, and using critical thinking to inform decisions. Students learn to improve and refine their skills in communication, critical thinking, quantitative reasoning, and team leadership. Students hone professional writing and oral communication skills to produce effective presentations and become proficient with current technology.” – University of Maryland

How much is tuition for a cybersecurity master’s program?

The cost of a cybersecurity master’s degree can vary widely based on a number of factors.

Online, campus-based, and hybrid style cybersecurity master’s degree programs exist. Some campus-based programs might be more expensive in terms of fees and other associated costs, but they also might provide opportunities such as career services or other kinds of coaching and mentoring that are important variables to factor into the cost-benefit analysis of a graduate degree.  According to the Education Data Organization, master’s degrees range between a cost of $30,000 and $120,000, while the average price tag is just under $70,000. The final costs are reliant upon a few variables such as in-state vs. out-of-state tuition, school brand and reputation, location, and more. Programs, on average, require around 30 credit hours for the completion of a master’s degree.

Career outlook for master’s in cybersecurity degree holders

The job market for well-trained and experienced cybersecurity professionals continues to grow and is forecasted to grow well into the next decade. In fact, there are worries by companies and large organizations that they can’t find enough talented people to fill all of the cybersecurity positions that exist or will exist.

So, in some ways, a master’s degree in cybersecurity could be a worthwhile investment for mid-career professionals, or for people looking to transfer into the cybersecurity field, because according to all of the projected data, job opportunities will be available. Earning a master’s degree in cybersecurity set candidates apart in many ways, including the following:

  • More well-rounded professional: Most professionals historically got into the industry, self-taught or without training. Gaining advanced formal education in cybersecurity allows professionals to learn and apply knowledge at a faster pace than prior professionals.
  • Better compensation: Generally, higher education can lead to higher compensation and offers. For example, the average computer science-related master’s degree holder makes on average 32 percent more than those who hold a bachelor’s degree, according to the Bureau of Labor Statistics. 
  • Stand out in a competitive job market: Just because there is a high demand for cyber professionals doesn’t mean it’s not a competitive space. A master’s degree can help candidates stand out amongst the competition by showing a true dedication to the industry and advanced knowledge. 

So, what kind of job can you get with a master’s in cybersecurity?

Chief security officer In the context of a cybersecurity role, a chief security officer’s role is to provide guidance and strategy to a company or organization’s executive team about the computer, network, and data security best practices. The day-to-day scope of a chief security officer will vary widely depending on the business models, organization size, and industry of operation.

Information manager An information manager often designs and manages information systems within a company or organization. This role can take the form of a hands-on tactician or of more strategic supervisor depending on the needs of the company or organization. Information managers might work on hardware, network, or data infrastructure depending on the scope and business practices of the employing organization.

Security architect A security architect is responsible for undertaking a comprehensive threat assessment of a business or organization. Once the threat inventory is complete, a security architect designs and develops the necessary technologies and operating procedures to insulate against attack vectors.  Check out additional cybersecurity careers and roles spanning both technical and non-technical domains, covered in our career guides including:

  • How to get into cybersecurity
  • Job interview prep guide
  • Cybersecurity career networking guide
  • Internship guide
  • Job guide
  • Security clearance guide

FAQs about cybersecurity master’s programs

Why pursue a master’s in cybersecurity?

A few reasons to pursue a master’s degree in job security include job security, diverse career opportunities, competitive compensation, impactful work, and more.

What are the requirements to apply for a master’s in cybersecurity?

Requirements vary between programs; however, it’s common for a master’s degree to require an application, personal statement, exam scores (e.g., GRE), transcripts, and more. Some programs require that you have an undergraduate degree in a technical domain; however many institutions are loosening these requirements to be more inclusive.

What to look for in a cybersecurity master’s program?

When searching for a cybersecurity master’s program, one should look for alignment between your interests and passion, the curriculum, and what’s desired by employers. You can get insight into this by talking to mentors, viewing current job postings for requirements, and more. You can also consider the reputation and quality of the school by doing research online, connecting with alumni, and/or checking for program certifications such as the Center of Academic Excellence in Cybersecurity designation. 

Do I need a related undergraduate degree to apply to a cybersecurity master’s program?

While requirements vary from program to program, you often do not need a cybersecurity-related undergraduate degree in order to pursue a master’s degree in cybersecurity.

How much will I make if I get a master’s in cybersecurity?

Earning depends on a variety of factors, including education, experience, industry, and more. According to Payscale, on average entry-level positions start at $63,2365 and rise up to $112,984 with growing experience. In addition, the United States Bureau of Labor Statistics reported that cybersecurity analysts, for example, earn a median hourly rate of $50, which is more than double the national average.

A complete listing of master’s in cybersecurity programs

Ad
cybersecurityguide.org is an advertising-supported site. Clicking in this box will show you programs related to your search from schools that compensate us. This compensation does not influence our school rankings, resource guides, or other information published on this site.
Featured Cybersecurity Masters

School NameProgram More Info
UC Berkeley School of InformationOnline MS in Cybersecurity | No GRE/GMAT Required website
University of Maryland Global CampusOnline Master's in Cybersecurity website
Southern New Hampshire UniversityOnline MS in Cybersecurity website
Syracuse UniversityOnline MS in Cybersecurity | Complete in 15 Months website
Georgia TechOnline MS in Cybersecurity | Tuition under $10k website
Purdue University GlobalOnline MS in Cybersecurity Management website

The guide below is dedicated to providing the most comprehensive guide possible for students interested in pursuing a master’s degree in cybersecurity. Please note that this is not a system of rankings, instead, it is provided as an up-to-date list of the available cybersecurity master’s programs. 

Best Cybersecurity Masters Programs

School Location Link to Program Website
Air Force Institute of Technology Wright-Patterson AFB, Ohio Master of Science degree with a major in Cyber Operations
Arizona State University Tempe, Arizona M.S. in Computer Science – Cybersecurity
Auburn University at Montgomery Montgomery, Alabama Master of Science in Computer Information Systems & Cybersecurity
Boston College Chestnut Hill, Massachusetts Master of Science in Cybersecurity Policy and Governance
Boston University Boston, Massachusetts Master of Science in Criminal Justice with Concentration in Cybercrime Investigation & Cybersecurity
Boston University Boston, Massachusetts MS in Computer Science with Specialization in Cyber Security
Brown University Providence, Rhode Island Executive Master in Cybersecurity (EMCS)
California State Polytechnic University – Pomona Pomona, California Master of Science in Computer Science – Cyber Security Career Focus
California State University – Dominguez Hills Carson, California Master of Science in Cyber Security (MSCY)
California State University – San Bernardino San Bernardino, California Master of Science – National Security Studies – Cybersecurity Concentration
California State University – San Bernardino San Bernardino, California Master of Public Administration – Cyber Security Concentration
California State University – San Bernardino San Bernardino, California Master of Business Administration – Cybersecurity Focus
Citadel Military College of South Carolina Charleston, South Carolina Master of Science in Computer and Information Sciences – Cybersecurity Specialization
Clemson University Clemson, South Carolina Master of Science in Computer Engineering – Cybersecurity
College of Charleston Charleston, South Carolina Master of Science in Computer and Information Sciences – Cybersecurity Specialization
Columbus State University Columbus, Georgia Master of Science in Computer and Information Sciences – Cybersecurity Specialization
CUNY John Jay College of Criminal Justice New York, New York Cybersecurity Management (MS)
Embry – Riddle Aeronautical University Daytona Beach, Florida Master of Science in Cybersecurity Engineering
Fairleigh Dickinson University Madison, New Jersey M.S. in Cybersecurity and Information Assurance
Florida International University Miami, Florida Master of Science in Information Systems – Cybersecurity Track
Florida State University Tallahassee, Florida Master of Science in Computer Science – Cybersecurity Major
Friends University Wichita, Kansas Master of Science in Cyber Security
George Mason University Fairfax, Virginia MS in Digital Forensics (DFOR)
George Washington University Washington, District Of Columbia BA/BS in Computer Science / MS in Cybersecurity in Computer Science
George Washington University Washington, District Of Columbia Master of Science in Cybersecurity in Computer Science
Georgia Institute of Technology Atlanta, Georgia Master of Science in Cybersecurity
Harrisburg University of Science and Technology Harrisburg, Pennsylvania Master of Science in Computer Information Sciences – Cyber Security
Hood College Frederick, Maryland Master of Science in Cybersecurity
Illinois Institute of Technology Chicago, Illinois Master of Cyber Forensics and Security Program
Marquette University Milwaukee, Wisconsin Master of Science in Computing: Information Assurance and Cyber Defense
Marymount University Arlington, Virginia Master of Science in Information Technology – Cybersecurity Concentration
Michigan Technological University Houghton, Michigan Master of Science in Cybersecurity
Mississippi State University Mississippi State, Mississippi M.S. in Cyber Security and Operations
Missouri State University – Springfield Springfield, Missouri Master’s in Cybersecurity
Morgan State University Baltimore, Maryland Master of Engineering in Cyber Engineering
New Jersey Institute of Technology Newark, New Jersey Master of Science in Cyber Security and Privacy (MS CSP)
North Carolina A&T State University Greensboro, North Carolina Master of Science in Computer Science – Cyber Security
Northeastern University Boston, Massachusetts Master of Science in Cybersecurity
Oakland University Rochester Hills, Michigan Master of Science in Cyber Security
Oklahoma Christian University Oklahoma City, Oklahoma MSCS with Cybersecurity
Pace University NYC and Westchester, New York Master of Science in Cyber Security
Pennsylvania State University – Main Campus University Park, Pennsylvania MS in Information Systems and Technology – Cybersecurity Focus
Roosevelt University Chicago, Illinois Master’s in Cyber Security and Information Assurance (MS)
Rutgers University New Brunswick, New Jersey Master of Business & Science – Cybersecurity Concentration
Sacred Heart University Fairfield, Connecticut MS – Cybersecurity
Saint Peter’s University Jersey City, New Jersey Masters of Science in Cyber Security
St. Bonaventure University St. Bonaventure, New York Early Assurance BS/MS Cybersecurity
St. Bonaventure University St. Bonaventure, New York Early Assurance BS/MS Cybersecurity
St. Mary’s University San Antonio, Texas Master of Science in Cybersecurity
Stephen F. Austin State University Nacogdoches, Texas Master of Science Degree in Cyber Security
Temple University Philadelphia, Pennsylvania Professional Science Master’s in Cyber Defense and Information Assurance
Texas A&M University – College Station College Station, Texas Master of Engineering in Engineering – Cybersecurity specialization
The University of Tennessee Knoxville, Tennessee Master of Science in Computer Engineering – Cybersecurity
The University of Tennessee Knoxville, Tennessee Master of Science in Computer Science – Cybersecurity
The University of Texas at San Antonio San Antonio, Texas Master of Science Degree in Information Technology – Cyber Security Concentration
University of Advancing Technology Tempe, Arizona Master of Science in Cyber Security
University of Alabama at Birmingham Birmingham, Alabama M.S. in Cyber Security
University of Alabama in Huntsville Huntsville, Alabama Master of Science in Cybersecurity
University of Arizona Tucson, Arizona AZSecure Cybersecurity Fellowship Program (MS-MIS)
University of Baltimore Baltimore, Maryland M.S. in Cybersecurity Management
University of Baltimore Baltimore, Maryland M.S. in Forensic Science–Cyber Investigations
University of Bridgeport Bridgeport, Connecticut M.S. in Technology Management – Information and Cyber Security Management Concentration
University of Central Missouri Warrensburg, Missouri Master of Science in Cybersecurity and Information Assurance
University of Colorado Boulder Boulder, Colorado Master of Science in Technology, Cybersecurity and Policy
University of Delaware Newark, Delaware Master of Science in Cybersecurity
University of Denver Denver, Colorado MS Cybersecurity
University of Detroit Mercy Detroit, Michigan Master of Science in Information Assurance Major in Cybersecurity
University of Illinois at Urbana – Champaign Champaign, Illinois Master of Science in Electrical and Computer Engineering – Illinois Cyber Security Scholars Program
University of Kansas Lawrence, Kansas Master of Science in Information Technology – Cyber Security Focus
University of Maryland – Baltimore County Baltimore, Maryland Master in Professional Studies: Cybersecurity
University of Maryland – College Park College Park, Maryland Master of Engineering in Cybersecurity
University of Missouri-Saint Louis Saint Louis, Missouri Master of Science (M.S) in Cybersecurity
University of Nebraska at Omaha Omaha, Nebraska Master of Science in Cybersecurity
University of Nevada, Las Vegas Las Vegas, Nevada Master of Science – Cybersecurity
University of New Haven West Haven, Connecticut Master of Science in Cybersecurity and Networks
University of North Texas Denton, Texas Masters in Cybersecurity
University of San Diego San Diego, California Master of Science in Cyber Security Engineering
University of the Pacific Stockton, California Master of Science in Cybersecurity
University of Tulsa Tulsa, Oklahoma Master of Science in Cyber Security
University of Toledo Toledo, Ohio Master’s Programs in Cyber Security
University of Washington – Bothell Campus Bothell, Washington Master of Science in Cyber Security Engineering
University of Washington – Tacoma Campus Tacoma, Washington Master in Cybersecurity and Leadership (MCL)
Utah Valley University Orem, Utah Master of Science in Cybersecurity
Valparaiso University Valparaiso, Indiana Master’s Degree in Cybersecurity
Virginia Tech Blacksburg, Virginia MS and PhD in Computer Science with Cybersecurity Track
Virginia Tech Blacksburg, Virginia MEng, MS, and PhD in Computer Engineering with Cybersecurity Track
Washington University in St Louis Saint Louis, Missouri Master’s in Cyber Security Management
Webster University Saint Louis, Missouri Master of Science (MS) in Cybersecurity
Wright State University Celina, Ohio Master of Science in Cyber Security
Yeshiva University New York, New York Master of Science in Cybersecurity

Primary Sidebar

  • BOOTCAMPS
    • CISSP
    • CCNA
    • CEH
    • CompTIA Security+
    • Azure
    • CISM
  • CERTIFICATIONS
    • CISA
    • CEH
    • CISSP
    • CISM
    • Security+
    • CASP+
    • CND
    • Forensics
    • OSCP
    • CRISC
    • Pen Testing
    • CTIA
    • Cryptography
    • Malware Analyst
  • CAREERS
    • Security Engineer
    • Chief Information Security Officer
    • Security Analyst
    • Computer Forensics
    • Security Consultant
    • Digital Forensics
    • Cryptographer
    • Security Administrator
    • Penetration Tester
    • Security Software Developer
    • Security Specialist
    • Security Code Auditor
    • Security Architect
    • Malware Analyst
    • Data Protection Officer
    • Cybercrime Investigator
    • Cryptanalyst
    • Security Incident Responder
    • Chief Privacy Officer
    • Risk Manager
    • Network Administrator
    • Business InfoSec Officer
    • Information Security Manager
    • Cyber Operations Specialist
  • RESOURCE CENTER
    • Centers for Academic Excellence
    • Job Guide
    • Veteran’s Guide
    • Women’s Guide
    • Internship Guide
    • Security Clearance Guide
    • Ethical Hacker Guide
    • Coding for Cybersecurity Guide
    • Cybersecurity 101
    • Student Guide to Internet Safety
    • Scholarship Guide
    • Cybersecurity Math Guide
    • Small Business Guide
    • COVID-19 Guide
    • Cybersecurity for K-12 Students
    • Career Networking Guide
    • What is a Cyber Range?
    • Code Like a Hacker
    • Reacting to a Cyber Incident
    • Introduction to Cyber Defense
    • Cybersecurity Courses Online
    • Recommended Reading
    • Cybersecurity Jobs Report
    • Phishing Attacks
    • Cybersecurity Responsibility
    • How to Get Into Cybersecurity
    • Cyberwarfare
    • Cybersecurity Insurance
    • Job Interview Prep
    • Readiness Economy
    • Is Cyber a Good Career?
    • What is CyberCorps?
  • INDUSTRIES
    • Financial Sector
    • Insurance Sector
    • Healthcare Sector
    • Environmental Sector
    • Energy Sector
    • Government Sector
    • Transportation Sector
    • Food and Agriculture Sector
Cybersecurity Guide
  • Home
  • Campus Programs
  • About Us
  • Popular Careers
  • Online Programs
  • Terms of Use
  • Resources
  • Programs By State
  • Privacy Policy

Copyright © 2022 · Cybersecurity Guide · All Rights Reserved