Help protect and defend businesses and individuals against malicious cyberattacks when you complete our online Master of Science in Cybersecurity. Faculty with extensive global experience will teach both the technical and soft skills required of today's cybersecurity professionals.
- 100% online coursework. Study when and where it suits you.
- Become proficient in cloud security, machine learning & AI, secure software design, networking, data mining, penetration testing, and more.
- Work with active cybersecurity professionals and leverage real data via cloud-based labs to tackle cybersecurity challenges.
- Learn to design, implement and assess security solutions that address the security, risk and compliance requirements of today’s digital businesses.
- Improve your soft skills, such as critical thinking, adaptability, and the ability to communicate security threats and vulnerabilities effectively to senior stakeholders.
- No GRE/GMAT or application fee is required, and choose from six start terms per year.
A degree tailored to your experience.
Looking to transition from another industry to cybersecurity? Get up to speed on system analysis, enterprise networks, and ethical hacking with our foundation courses. Alternatively, if you have an IT background or computer science degree, round out your degree with our available electives.
To provide students with a fundamental understanding of cybersecurity and an in-depth understanding of penetration testing and ethical hacking. This course will include intelligence gathering, assessment of software vulnerabilities and weaknesses, cross platform penetration testing, learning ethical hacking requirements, and data protection.
This course will expand on previous cybersecurity courses and introduce business and enterprise topics. This will be done through analysis of real-world business examples of cyberattacks and the needs businesses have in the areas of cybersecurity. This course will emphasize real-world developmental practices and aim to improve students' ability to work in a professional cybersecurity environment.
This course will give an in-depth look into the world of cybercrime and digital evidence. Throughout this course, students will use industry tools to perform forensic analysis of crimes to learn about how to prevent, detect, and respond to cyber-crime, cyber-terrorism, and cyber-predators. This course aims to both inform students of the types of crimes that exist as well as ways to catch those responsible even through virtual anonymity.
This course provides a practical explanation of both the principles and practice of cloud security by describing the cloud security architecture and exploring the guiding security design principles from the threat and CIA model viewpoint. In order to gain a thorough understanding of the design and development of secure cloud services we will examine industry standards and applied technologies for delivering and managing secure cloud-based services specially Google Cloud Platform (GCP). This course also covers protection and isolation of physical and logical infrastructures, identity management, access control, monitoring and auditing processes. Students also learn mitigation techniques for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.
Upon successful completion of this course, students will be able to apply a variety of learning algorithms and machine learning applications for enabling intelligent cybersecurity strategies. Having been equipped with machine learning fundamentals, the students can apply learning algorithms and train machines for face recognition, new generation of anti-viruses, vulnerability management, network security, authentication, anomaly detection, biometrics in cyber threats, etc.
Following a number of high-profile security breaches, your organisation has recognised the importance of developing a cybersecurity strategy. Stakeholders and management have asked you to present at the next board meeting. They've only allocated thirty minutes so they want you to record a presentation which clearly outlines the threats and risk to your organisation and your plan to address them. They also want you to explain how you plan to respond in the event of a data breach.