M.S. Cybersecurity

Masters of Cybersecurity Online

As the complexity of enterprise systems and critical IT infrastructure continues to grow, there is emerging demand for highly skilled information-security specialists and sophisticated practitioners in cybersecurity well versed in the science of protecting vital computer networks and electronic infrastructures from attack. These information security professionals require proficiency in a variety of current and emerging technologies — computer and network security, digital forensics, cryptography, web security, biometrics, compliance & legal issues, software security, mobile security, and cloud computing security.

This program satisfies the dual needs of preparing graduates to (1) fill the need for information security and assurance professionals to work in a wide variety of capacities to protect the information systems of different types of organizations, and to support the nation’s information infrastructure and (2) conducting advanced research and in information security and assurance. Students develop core competencies in operating systems and networks. They focus on the technical aspects of information security, examining ways to provide secure information processing systems by utilizing operating systems security; distributed secure system architectures; database security; software applications security; security policies; applications security; network and distributed systems security; cryptography; and security protocols.

As a Cybersecurity graduate student at Saint Leo University, you will:

 

  • Fill the need for information security and assurance professionals to work in a wide variety of capacities to protect the information systems of different types of organizations, and to support the nation’s information infrastructure.
  • Conduct advanced research and in information security and assurance.
  • Students develop core competencies in operating systems and networks. They focus on the technical aspects of information security, examining ways to provide secure information processing systems by utilizing operating systems security; distributed secure system architectures; database security; software applications security; security policies; applications security; network and distributed systems security; cryptography; and security protocols.

 

The curriculum for the MS Cybersecurity degree is aligned with the core curriculum for graduate information assurance degrees set forth by the National Security Agency (NSA). The curriculum is also designed to align with the knowledge units covered in many industry recognized professional certifications in information security, such as Security+, CISSP, SSCP, CSSLP, and CISM.

The MS Cybersecurity degree prepares its graduates for career-track jobs in the emerging cybersecurity, information assurance/security fields. Students will be educated in the technical aspects of cyber security systems, and will be prepared to assume responsibility for the management, operation and oversight of these systems. Graduates will be actively recruited by federal, state and local governments, private sector and academia.


Degree Requirements

CYBERSECURITY COURSES (36 credits)

  • Course
  • Course Name
  • Credits
  • COM 504 Cybersecurity Compliance and Legal Issues 3

    This course provides an in-depth examination of the law dealing with computers and the Internet. Topics will include such issues as US and international jurisdiction, computer security, intellectual property, electronic commerce, information privacy, freedom of expression, and cyber-crime. Included are detailed analyses of significant legal case studies plus review of applicable federal and state legislation as applied to compliance of standards such as those found in HIPPA, Sarbanes Oxley, FISMA, Data Breach Disclosure Laws, as well as selected international standards.

    Prerequisites: COM 203 or equivalent undergraduate course in Computer Systems

  • COM 506 Database Security 3

    Most database systems contain sensitive information that need to be protected from unauthorized disclosure and modification while providing availability to the legitimate users. This course will focus on issues related to the design and implementation of secure databases.

    Prerequisites: COM 203 or equivalent undergraduate course in Computer Systems

  • COM 508 Software Security 3

    This course will examine why today's software is vulnerable to attack, and various vulnerabilities that are common in software systems and applications. The proper design techniques and best practices for developing new applications that are inherently secure will be discussed. Upon completion of this course, students will understand secure software concepts, methodologies and implementation of the software development lifecycle, while addressing software security through proactive design.

    Prerequisites: COM 204 or equivalent computer programming language course

  • COM 510 Management of Information Security 3

    Information security is an essential part of any business plan, and managers need to be aware of the principles and methodology of managing information security. This course provides an in-depth view of the management of information security for government, corporations, and other institutions. Students will develop information security plans for sample organizations.

  • COM 512 Cybersecurity Risk Management 3

    This course addresses the topic of risk management and how risk, threats, and vulnerabilities impact information systems. It includes an in-depth examination on how to assess and manage risk based on defining an acceptable level of risk for information systems. The course will incorporate cases in risk analysis derived from state and law enforcement agencies. Students will learn how to use a risk analysis matrix for performing both quantitative and qualitative risk analysis.

    Prerequisites: COM 510

  • COM 514 Cloud Computing Security 3

    The goal of this course is to introduce students to the principles, foundations, and applications of cloud computing. This paradigm presents significant technology trends to reshape information technology processes and the IT marketplace. In this course the different types of features, standards, services, and security issues in cloud computing will be discussed.

    Prerequisites: COM 510

  • COM 520 Systems Security Risk Management 3

    Securing the systems that run our computers is the key to ensuring that our essential information remains safe and available. This course provides a foundation in systems security principles, disaster recovery principles and planning, and the importance of incident response planning and execution to minimize downtime. A computer system with appropriate software will be required.

    Prerequisites: COM 510

  • COM 530 Network Security Management 3

    Global and local networks provide capabilities for businesses and individuals that have become essential in the success of the world economy. Defending these systems against attacks is imperative. This course provides a solid foundation in the fundamentals of network security and some hands-on experience in network security. A computer system with appropriate software will be required.

    Prerequisites: COM 510

  • COM 545 Web Security Management 3

    Access to the World Wide Web and Internet for multiple purposes is one of the major components of most business operations. Many businesses also use the same protocols and processes to provide internal communications. Security of these assets is imperative for a successful business. This course provides the concepts and procedures of assessing and managing security for Web activities.

    Prerequisites: COM 510

  • COM 546 Ethical Hacking 3

    This course provides an in-depth understanding of how to effectively protect computer networks. Students will learn the tools and penetration testing methodologies used by ethical hackers. In addition, the course provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Students will learn updated computer security resources that describe new vulnerabilities and innovative methods to protect networks.

    Prerequisites: COM 520, COM 530

  • COM 548 Advanced Networking and Protocols 3

    This course covers the study of the modern networking protocols, including the TCP/IP protocol suite, addressing, IPv6, routing, security. This course will explore in detail the layers of the OSI reference model: link, network, transport, and application layers. Also, a thorough examination of the next Generation IP (IPv6, ICMPv6) will be covered.

    Prerequisites: COM 520, COM 530

  • COM 590 Strategic Planning for Information Security 3

    This course describes and demonstrates the application of information security forecasting methods, their implementation within organizations, and the development of a competitive strategic plan.

    Prerequisites: COM 520, COM 530

Electives (0 Credits)

Total Credits 36