Data is everywhere, and companies need cyber security experts to protect it. With our Master of Science in Cybersecurity, you’ll gain a deeper understanding of cybersecurity and operations at an enterprise level. And you’ll take just one 6-week course at a time, so you can balance work and life on the path to your degree.
Design enterprise elements using cybersecurity standards and tactics
Navigate ethical and privacy protocols in enterprise cybersecurity
Manage cybersecurity risks using frameworks and policies
This course delivers core concepts in cybersecurity related to protecting an organization. Students learn topics in threat intelligence and detection, techniques for identifying vulnerabilities within an organization's infrastructure, network and data analysis, incident response and the prevention of future attacks.
This course covers topics in secure software design, the Software Development Life Cycle (SDLC). Students learn how to follow secure coding practices and analyze code for security risks before testing and validating the security of their design. Students also learn concepts in deployment, operations and maintenance of secure software.
This course provides students with an overview of the concepts related to securing a cloud environment. Students learn the design principles and requirements involved in securing a cloud or hybrid enterprise while adhering to policies, frameworks and regulations necessary to maintain resilient structures. Other topics include risk management, risk assessment, software security, and business continuity planning.
This course provides instruction in advanced topics in network security. Students learn how to protect a network from vulnerabilities including designing a network with security in mind, selecting the proper technologies, implementing security policies and touches on the human factors associated with network security. Additional topics include physical security, disaster recovery and digital forensics.
This course explores the role of the security manager who develops and manages an information security program with a deep understanding of the relationship between IS programs and the broader business goals and objectives. Topics include but are not limited to, security governance, incident management, and risk management and compliance. This course is aligned to the ISACA Certified Information Security Manager (CISM®) learning domains.
This course covers a range of moral, social and ethical considerations in the realm of cyberspace. Students learn concepts in privacy, governance, censorship, and intellectual property by exploring the impact of technology on morals and ethics from a societal approach.
This course introduces concepts in security operations such as security principles, network security, cloud security and incident response. Students will learn about Security Operations Center (SOC) operations and procedures and how these relate to an incident response plan.
The course includes advanced concepts in programming for students who already have a background in one or more programming languages. Students will work on real-world scenarios in networking, database programming and security to support the cybersecurity infrastructure within an organization.
This course covers principles and practices in cryptography exploring more in-depth concepts in network security and secure communication. Students will work in a variety of algorithms and how concepts like public key infrastructure, hash functions and encryption methods help to secure an organization.
This course provides students with a holistic view of threat intelligence, including not only the types of attacks but methods to determine motivation and goals behind a variety of attacks, data collection and analysis, and how to plan a threat intelligence program. Students learn the entire threat analysis process and how to create effective threat intelligence reports.
This course will cover how to determine the best security measures based on different types of organizations. Students will learn how to meet the security requirements of an organization including network design, storage, applications and security controls as well as other technologies to build or maintain a resilient enterprise architecture.
This course will teach students the appropriate methods and how to select the best tools for conducting a security assessment. Students will learn concepts in implementing incident response plans and recovery procedures and revisit how risk management is impacted by business and industry influences.
Specialize your Master of Science in Cybersecurity by choosing electives that align with CompTIA and EC Council certifications in the following areas:
Careers & Outcomes
What can you do with a Master of Science in Cybersecurity?
An MSCYB can prepare you to be a:
Network Security Analyst
Information Security Analyst
Data Processing Manager
Information Security Manager
Application Development Director
According to the Bureau of Labor Statistics. job growth for information security analysts is projected to be much faster than average between 2019 and 2029.
BLS projections are not specific to University of Phoenix students or graduates.
Paying for school
Cost per credit
Keep the same fixed, affordable tuition from start to finish of your degree program, even if it takes longer than you planned. That’s our promise: no matter what surprises life brings, you can count on us.
Save time and money on your degree
Credit transfer made easy Graduate faster by transferring in prior eligible credits from another accredited institution.
University of Phoenix is accredited by the Higher Learning Commission (HLC), hlcommission.org. Since 1978, University of Phoenix has been continually accredited by the Higher Learning Commission and its predecessor.
Average years of industry experience
Chief Technology Officers
As a faculty member, I'm on your team. I'm your coach and your cheerleader."