Master of Science in Cybersecurity

Online or Hybrid

Flexible options

Finish in 13 months

Average completion time

240K+ Alumni Worldwide

Become a member of NU’s global community

Home » Programs » Master of Science in Cybersecurity

Master of Science in Cybersecurity

Degree:

Master of Science in Cybersecurity Degree

Application:

$0 application fee. No essays/exams.

If you can envision yourself helping to ensure the security, confidentiality, integrity, authenticity, control, availability, and utility of the world’s computing and information systems infrastructure, National University’s MS in Cybersecurity program will give you the technical and managerial skills you need to achieve your career aspirations.

In this rigorous online curriculum, we challenge our students to design, build and implement the computing and systems that address the major issues our society is wrestling with. It’s a professionally focused degree for those who endeavor to help secure the world’s computer and information systems infrastructure.

Degree Requirements

All students who seek to enroll in the MS Cybersecurity (MS CYB) program must interview with the Faculty Advisor prior to enrolling in the first course of the program.

National University awards credit in quarter units, with each academic year divided into four 12-week quarters. 

Each quarter is made up of three 4-week classes, with one class per month. Under the current policy, 4.5 units of credit are awarded for courses.

To obtain the Master of Science in Cybersecurity, students must complete 58.5 graduate units. A total of 13.5 quarter units of graduate credit may be granted for equivalent graduate work completed at another regionally accredited institution, as it applies to this degree, and provided the units were not used in earning another advanced degree. All students must complete the nine core requirements and choose an area of specialization.

Please refer to the graduate admissions requirements for specific information regarding application and evaluation. To Reach out to speak with an admissions counselor for additional course requirements and elective options.

Students must select one area of specialization.

Core Requirements

9 Courses

4.5 Quarter Units

Examines the fundamental concepts of cybersecurity and the associated technology. Includes securing the environment, security technologies in the environment, security threats, and security responses. Ethical and legal aspects of cybersecurity are also examined.

4.5 Quarter Units

Prerequisite: CYB 600 with a minimum grade of B.

An introduction to the tools and techniques utilized in cyber defense and offensive cyber operations. Use of technical tools will be demonstrated in virtual lab environments.

4.5 Quarter Units

Prerequisite: CYB 601

Analysis and evaluation of threat modeling and cyber threat intelligence to reduce risk and enhance organizational Cybersecurity posture. Development and use of threat models to identify threats to systems and applications. Methods for collecting and utilizing threat intelligence to identify organizational threats are also covered.

4.5 Quarter Units

Prerequisite: CYB 602

Concepts covered include a comprehensive wireless and mobile security overview including the design, planning, installation, and maintenance of wireless network security infrastructures. Emphasis is placed on information warfare countermeasures relative to government, military, terrorist and rogue, and private enterprise demographics.

4.5 Quarter Units

Prerequisite: CYB 604

An introduction to the concepts of network security monitoring and incident response. Students will conduct an analysis and evaluation of network security monitoring tools and techniques. Students will examine the methods for conducting incident response.

4.5 Quarter Units

Prerequisite: CYB 606

An introduction to the concepts of cloud computing. This course will examine the security implications of operating in a cloud computing environment. Tools and techniques to implement DevSec ops will be introduced.

4.5 Quarter Units

Prerequisite: CYB 608 and completion of one specialization area.

A Master’s level project dealing with a student’s area of specialization in the Cyber Security and Information Assurance program. The students will create an original project with practical applications using cybersecurity policy, regulatory, and testing frameworks. The project will integrate the concepts of cyber security and information assurance taught throughout the program. Project management techniques and collaboration will be emphasized along with the ethical and legal aspects of the project. Grading is H, S, U only.

4.5 Quarter Units

Prerequisite: CYB 699A

Master’s level project dealing with a student’s area of specialization in the Cyber Security and Information Assurance program. The students will create an original project with practical applications using cybersecurity policy, regulatory, and testing frameworks. Project management technqiues and collaboration will be emphasized along with the ethical and legal aspects of the project. Grading is H, S or U only.

4.5 Quarter Units

Prerequisite: CYB 699B with a minimum grade of S. Students to successfully complete CYB 699B

Master’s level project dealing with a student’s area of specialization in the Cyber Security and Information Assurance program. The students will create an original project with practical applications using cybersecurity policy, regulatory, and testing frameworks. Project management techniques and collaboration will be emphasized along with the ethical and legal aspects of the project. Project results will be presented to a panel for review. Grading is by H, S or U only.

Specialization in Enterprise Cybersecurity Management

4 Courses

This specialization requires 18 graduate units at National University.

4.5 Quarter Units

Prerequisite: CYB 607

This class focuses on the legal and regulatory requirements, ethical issues, basic methodology and technical tools to conduct cybersecurity audits and assessments. Students will explore the frameworks, tools, and techniques to conduct a cybersecurity assessment.

4.5 Quarter Units

Prerequisite: CYB 608

Students will explore the development of cybersecurity policy for commercial and government organizations. The legal and regulatory requirements for cybersecurity policy development will be examined.

4.5 Quarter Units

Prerequisite: CYB 612

An examination of the functions and processes to implement and monitor cybersecurity controls across an organization. An exploration of commercial and government compliance requirements.

4.5 Quarter Units

Prerequisite: CYB 613

An examination of the methods and frameworks for implementing and managing an enterprise cybersecurity program. Students will explore various frameworks and tools to develop and manage a cybersecurity program that supports an organization’s mission.

Specialization in Ethical Hacking & Pen Testing

4 Courses

4.5 Quarter Units

Prerequisite: CYB 607

This class focuses on the legal and regulatory requirements, ethical issues, basic methodology and technical tools to conduct cybersecurity audits and assessments. Students will explore the frameworks, tools, and techniques to conduct a cybersecurity assessment.

4.5 Quarter Units

Prerequisite: CYB 608

Students will apply principles of penetration testing to identify and exploit vulnerabilities in networked and cloud based information systems and make recommendations for mitigation.

4.5 Quarter Units

Prerequisite: CYB 632

Red Teaming, or Alternative Analysis, is the practice of viewing a problem from an adversarial or competitor’s perspective. The objective of Red Teams is to enhance decision making, practices of secured system protection applicable by establishing countermeasures of defense. Students will learn to employ actively open-minded/problem solving and unbiased thinking to conduct red team assessments.

4.5 Quarter Units

Prerequisite: CYB 633

Students will analyze and utilize advanced penetration testing tools and techniques. Web application attack tools and techniques will be examined.

Specialization in Digital Forensics and Incident Response

4 Courses

4.5 Quarter Units

Prerequisite: CYB 607

Develop advanced skills in threat hunting and incident response to promptly and effectively identify and mitigate threats. Learn the threat hunting cycle and techniques for proactive, reactive, and continuous hunting. Utilize tools like SIEMs, EDRs, and threat intelligence feeds for real-time threat identification and response. Gain practical knowledge applicable to real-world scenarios.

4.5 Quarter Units

Prerequisite: CYB 640

An introduction to the field of digital investigations, including the techniques, tools, and methodologies used to investigate cybercrime and other digital incidents. Students will learn how to collect, preserve, and analyze digital evidence from a variety of sources, including computers, mobile devices, and the cloud. The course will also cover the latest trends in digital investigations, such as the use of artificial intelligence and machine learning. In addition, the course explores the legal and ethical considerations involved in digital investigations, including the use of digital evidence in criminal and civil cases, and the rules of evidence in digital investigations.

4.5 Quarter Units

Prerequisite: CYB 641

Gain in-depth understanding of cloud forensics and incident response, focusing on techniques, tools, and methodologies for investigating and responding to security incidents in cloud environments. Explore challenges and considerations specific to cloud computing. Covers the entire investigation process, including evidence collection, analysis, and incident response activities.

4.5 Quarter Units

Prerequisite: CYB 642

Gain a comprehensive understanding of network forensics and its techniques, tools, and methodologies for investigating cyber incidents on network infrastructure. Learn principles of network traffic analysis, intrusion detection, and network-based attacks. Explore legal and ethical considerations. By the end of the course, be able to conduct effective investigations, gather evidence, and present findings.

Specialization in Cloud Security

4 Courses

4.5 Quarter Units

Prerequisite: CYB 607

An examination into the critical aspects of risk management in cloud computing environments. The curriculum addresses both theoretical and practical aspects of risk management in the cloud. Students will explore the challenges, methodologies, and best practices associated with managing risk when using cloud computing environments. Various frameworks and risk management for zero trust environments will be covered in this class.

4.5 Quarter Units

Prerequisite: CYB 650

Explore secure cloud architecture design and implementation, covering principles of cloud security, zero trust architecture, and vulnerabilities in cloud service models. Learn to design secure architectures for cloud environments that offer comprehensive protection against threats.

4.5 Quarter Units

Prerequisite: CYB 651

Learn DevSecOps principles and practices for secure and resilient applications. Emphasis on integrating security within the DevOps framework, emphasizing collaboration, automation, and continuous improvement.

4.5 Quarter Units

Prerequisite: CYB 652

Explore methods and techniques for assessing security in cloud environments, focusing on unique challenges, evaluating security controls, and identifying potential risks and vulnerabilities.

Master of Science in Cybersecurity, Enterprise Cybersecurity Management

The Enterprise Cybersecurity Management specialization focuses on programmatic management and governance skills for organizational cybersecurity. In addition to foundational knowledge and tools for securing network, cloud and wireless systems, you’ll learn to assess and manage the vulnerabilities and protections of these IT environments. This specialization focuses on larger organizations (often in government) that have codified standards, policies, and practices for their information systems.

Learn More

Master of Science in Cybersecurity, Ethical Hacking and Pen Testing

The Ethical Hacking & Pen Testing specialization focuses on testing enterprise systems by probing network and information security components with simulated attacks. These exercises and simulations prepare professionals for: developing rules of engagement, preparing cybersecurity tool kits, discovering and exploiting system vulnerabilities, ethically conducting penetration tests, and preparing penetration test documentation. Red-Teaming practices and Red vs. Blue team exercises will be executed and assessed as an important part of the coursework.

Learn More

Master of Science in Cybersecurity, Digital Forensics

The specialization of Digital Forensics provides a greater focus on investigation and analysis of computers and networks. Students will be able to examine digital summaries of indications, investigations of digital forensics and preserve digital evidence.

Learn More

Master of Science in Cybersecurity, Cloud Security

The specialization in Cloud Security prepares students to effectively secure cloud environments. The specialization focuses on risk management, secure cloud architecture, DevSecOps, and cloud computing assessments. Students learn to formulate risk management strategies, design secure cloud architectures, integrate security practices into DevOps, and conduct security assessments in cloud environments. Legal, regulatory, and compliance considerations are also covered. The program equips students with the knowledge and skills to address cloud security challenges, communicate security concepts, and implement continuous monitoring and improvement practices. Graduates are prepared to meet the increasing demand for cloud security professionals in various industries.

Learn More

Career Outlook

National University students are encouraged to joint our Cyber Team Nucl3@r. The cyber team apply the knowledge and skills they gain in class by competing in challenging cyber competitions like the Western Regional Collegiate Cyber Defense CompetitionCollegiate Pentest CompetitionNational Cyber League, and Cyberforce Competition. These competitions also allow students to demonstrate their skills to potential employers.

  • Top Jobs in this field
  • Median Salary (USA)
  • JOB Openings (USA)
  • General and Operations Managers
  • $100,934 avg. salary (USA)
  • 373,566 job openings (past yr.) past year
Plan, direct, or coordinate the operations of public or private sector organizations, overseeing multiple departments or locations. Duties and responsibilities include formulating policies, managing daily operations, and planning the use of materials and human resources, but are too diverse and general in nature to be classified in any one functional area of management or administration, such as personnel, purchasing, or administrative services. Usually manage through subordinate supervisors. Excludes First-Line Supervisors.
Median Salary:
$100,934 annual +110% above US average
Job Openings:
373,566 past year
Salary Range:
  • Low
    $46,104
  • Medium
    $100,934
  • High
    $231,855

Most desired skills

  1. Operations Management
  2. Marketing
  3. Merchandising
  4. Finance
  5. Project Management
  6. Inventory Management
  7. Profit And Loss (P&L) Management

Top companies hiring for this role

  • Unclassified
  • CVS Health
  • AutoZone
  • Buckle
  • Walmart
  • Enterprise Rent-A-Car
  • Menards
  • Compliance Officers
  • $75,549 avg. salary (USA)
  • 38,710 job openings (past yr.) past year
Examine, evaluate, and investigate eligibility for or conformity with laws and regulations governing contract compliance of licenses and permits, and perform other compliance and enforcement inspection and analysis activities not classified elsewhere.
Median Salary:
$75,549 annual +57% above US average
Job Openings:
38,710 past year
Salary Range:
  • Low
    $43,596
  • Medium
    $75,549
  • High
    $124,563

Most desired skills

  1. Auditing
  2. Regulatory Compliance
  3. Project Management
  4. Risk Analysis
  5. Risk Management
  6. Finance
  7. Accounting

Top companies hiring for this role

  • Unclassified
  • Humana
  • Citigroup
  • Wells Fargo
  • Wahve Holdings
  • Elevance Health
  • Amentum
  • Computer Systems Analysts
  • $103,314 avg. salary (USA)
  • 45,565 job openings (past yr.) past year
Analyze science, engineering, business, and other data processing problems to develop and implement solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions, improve existing computer systems, and review computer system capabilities, workflow, and schedule limitations. May analyze or recommend commercially available software.
Median Salary:
$103,314 annual +114% above US average
Job Openings:
45,565 past year
Salary Range:
  • Low
    $62,011
  • Medium
    $103,314
  • High
    $169,962

Most desired skills

  1. Systems Analysis
  2. Computer Science
  3. Project Management
  4. Business Requirements
  5. Business Process
  6. Business Systems Analysis
  7. SQL (Programming Language)

Top companies hiring for this role

  • Unclassified
  • Deloitte
  • Intermountain Health
  • Prime Therapeutics
  • Accenture
  • GovCIO
  • Marriott International
  • Computer Network Architects
  • $129,315 avg. salary (USA)
  • 13,281 job openings (past yr.) past year
Design and implement computer and information networks, such as local area networks (LAN), wide area networks (WAN), intranets, extranets, and other data communications networks. Perform network modeling, analysis, and planning, including analysis of capacity needs for network infrastructures. May also design network and computer security measures. May research and recommend network and data communications hardware and software.
Median Salary:
$129,315 annual +169% above US average
Job Openings:
13,281 past year
Salary Range:
  • Low
    $77,509
  • Medium
    $129,315
  • High
    $195,430

Most desired skills

  1. Network Engineering
  2. Network Routing
  3. Automation
  4. Computer Science
  5. Firewall
  6. Network Switches
  7. Wide Area Networks

Top companies hiring for this role

  • Unclassified
  • Leidos
  • Amazon
  • Marriott International
  • Lumen Technologies
  • TEKsystems
  • Acosta Group
  • Blockchain Engineers
  • $102,519 avg. salary (USA)
  • 44,821 job openings (past yr.) past year
Maintain and support distributed and decentralized blockchain-based networks or block-chain applications such as cryptocurrency exchange, payment processing, document sharing, and digital voting. Design and deploy secure block-chain design patterns and solutions over geographically distributed networks using advanced technologies. May assist with infrastructure setup and testing for application transparency and security.
Median Salary:
$102,519 annual +113% above US average
Job Openings:
44,821 past year
Salary Range:
  • Low
    $47,902
  • Medium
    $102,519
  • High
    $176,442

Most desired skills

  1. Blockchain
  2. Rust (Programming Language)
  3. Cryptography
  4. Computer Science
  5. Smart Contracts
  6. JavaScript (Programming Language)
  7. Scalability

Top companies hiring for this role

  • Unclassified
  • Cliffpoint Limited
  • Ernst & Young
  • Circle – Financial Services
  • Fidelity Investments
  • Mastercard
  • Deloitte
  • Computer Systems Engineers/Architects
  • $102,519 avg. salary (USA)
  • 44,821 job openings (past yr.) past year
Design and develop solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions.
Median Salary:
$102,519 annual +113% above US average
Job Openings:
44,821 past year
Salary Range:
  • Low
    $47,902
  • Medium
    $102,519
  • High
    $176,442

Most desired skills

  1. Systems Engineering
  2. Computer Science
  3. Python (Programming Language)
  4. Automation
  5. Amazon Web Services
  6. Microsoft Azure
  7. Agile Methodology

Top companies hiring for this role

  • Unclassified
  • Amazon
  • Raytheon Technologies
  • Ford
  • Northrop Grumman
  • Leidos
  • Apple
  • Digital Forensics Analysts
  • $102,519 avg. salary (USA)
  • 44,821 job openings (past yr.) past year
Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.
Median Salary:
$102,519 annual +113% above US average
Job Openings:
44,821 past year
Salary Range:
  • Low
    $47,902
  • Medium
    $102,519
  • High
    $176,442

Most desired skills

  1. Cyber Threat Intelligence
  2. Cyber Security
  3. Incident Response
  4. Vulnerability
  5. Computer Science
  6. Intelligence Analysis
  7. Security Information And Event Management (SIEM)

Top companies hiring for this role

  • Unclassified
  • Johnson & Johnson
  • Booz Allen Hamilton
  • KPMG
  • SAIC
  • Leidos
  • Chemours
  • Document Management Specialists
  • $102,519 avg. salary (USA)
  • 44,821 job openings (past yr.) past year
Implement and administer enterprise-wide document management systems and related procedures that allow organizations to capture, store, retrieve, share, and destroy electronic records and documents.
Median Salary:
$102,519 annual +113% above US average
Job Openings:
44,821 past year
Salary Range:
  • Low
    $47,902
  • Medium
    $102,519
  • High
    $176,442

Most desired skills

  1. Auditing
  2. Document Control
  3. Data Entry
  4. Document Management
  5. Workflow Management
  6. Document Management Systems
  7. Project Management

Top companies hiring for this role

  • Unclassified
  • Contact Government Services
  • Citizant
  • Symplr
  • One Call Medical
  • Epiq
  • Accuity
  • GIS Technicians
  • $102,519 avg. salary (USA)
  • 44,821 job openings (past yr.) past year
Assist scientists or related professionals in building, maintaining, modifying, or using geographic information systems (GIS) databases. May also perform some custom application development or provide user support.
Median Salary:
$102,519 annual +113% above US average
Job Openings:
44,821 past year
Salary Range:
  • Low
    $47,902
  • Medium
    $102,519
  • High
    $176,442

Most desired skills

  1. Geographic Information Systems
  2. ArcGIS (GIS Software)
  3. Python (Programming Language)
  4. Computer Science
  5. SQL (Programming Language)
  6. Project Management
  7. Spatial Data Infrastructures

Top companies hiring for this role

  • Unclassified
  • Esri
  • CDM Smith
  • Leidos
  • Stantec
  • WSP Global
  • AECOM
  • Information Security Engineers
  • $102,519 avg. salary (USA)
  • 44,821 job openings (past yr.) past year
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
Median Salary:
$102,519 annual +113% above US average
Job Openings:
44,821 past year
Salary Range:
  • Low
    $47,902
  • Medium
    $102,519
  • High
    $176,442

Most desired skills

  1. Cyber Security
  2. Computer Science
  3. Vulnerability
  4. Auditing
  5. Automation
  6. Python (Programming Language)
  7. Firewall

Top companies hiring for this role

  • Unclassified
  • Marriott International
  • Amazon
  • Deloitte
  • Leidos
  • Johnson & Johnson
  • Booz Allen Hamilton
  • Information Technology Project Managers
  • $102,519 avg. salary (USA)
  • 44,821 job openings (past yr.) past year
Plan, initiate, and manage information technology (IT) projects. Lead and guide the work of technical staff. Serve as liaison between business and technical aspects of projects. Plan project stages and assess business implications for each stage. Monitor progress to assure deadlines, standards, and cost targets are met.
Median Salary:
$102,519 annual +113% above US average
Job Openings:
44,821 past year
Salary Range:
  • Low
    $47,902
  • Medium
    $102,519
  • High
    $176,442

Most desired skills

  1. Project Management
  2. Agile Methodology
  3. Scrum (Software Development)
  4. Computer Science
  5. Continuous Improvement Process
  6. Change Management
  7. JIRA

Top companies hiring for this role

  • Unclassified
  • Deloitte
  • Accenture
  • PricewaterhouseCoopers
  • Marriott International
  • Johnson & Johnson
  • Amazon
  • Penetration Testers
  • $102,519 avg. salary (USA)
  • 44,821 job openings (past yr.) past year
Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.
Median Salary:
$102,519 annual +113% above US average
Job Openings:
44,821 past year
Salary Range:
  • Low
    $47,902
  • Medium
    $102,519
  • High
    $176,442

Most desired skills

  1. Vulnerability
  2. Penetration Testing
  3. Cyber Security
  4. Computer Science
  5. Vulnerability Management
  6. Vulnerability Assessments
  7. Python (Programming Language)

Top companies hiring for this role

  • Marriott International
  • Unclassified
  • Leidos
  • Raytheon Technologies
  • Deloitte
  • Lumen Technologies
  • Nelnet
  • Web Administrators
  • $102,519 avg. salary (USA)
  • 44,821 job openings (past yr.) past year
Manage web environment design, deployment, development and maintenance activities. Perform testing and quality assurance of web sites and web applications.
Median Salary:
$102,519 annual +113% above US average
Job Openings:
44,821 past year
Salary Range:
  • Low
    $47,902
  • Medium
    $102,519
  • High
    $176,442

Most desired skills

  1. HyperText Markup Language (HTML)
  2. Search Engine Optimization
  3. Web Development
  4. Cascading Style Sheets (CSS)
  5. Marketing
  6. Computer Science
  7. JavaScript (Programming Language)

Top companies hiring for this role

  • Unclassified
  • GovCIO
  • Deloitte
  • Cube Hub
  • Volunteermatch
  • Guidehouse
  • Leidos

Program Learning Outcomes

Learn the key skills to help you excel in your field of study.

  • Devise a mitigation plan against both external and internal vulnerabilities to enterprise computer infrastructures and sensitive digital assets
  • Analyze and evaluate multiple risk assessment methods and strategies
  • Compare and contrast the legal and ethical aspects of cybersecurity at the federal, state, and international level
  • Assess and summarize the legal and ethical requirements of a cybersecurity professional
  • Integrate project management skills to produce a cybersecurity solution
  • Evaluate the results of a security assessment to assess the security status of a network or computer system
  • Conduct in-depth research into a specific CSIA topic, including finding and integrating relevant research results of others
  • Integrate systems-level infrastructure thinking into CSIA problem identification and resolution and effectively communicate the solution

Our four-week courses and online options work with your schedule to get the most out of our MS in Cybersecurity program. You could start as early as next month!

woman smiling at man taking notes

Admissions

Transfer Students Welcome

More about transferring to NU.

Enrolling in a university is a big decision. That’s why our dedicated admissions team is here to guide you through the admissions process and help you find the right program for you and your career goals.

To that end, we’ve simplified and streamlined our application process, so you can get enrolled in your program right away. Because we accept and review applications year round, you can begin class as soon as next month, depending on your program and location of choice.

Learn more about undergraduate, graduate, military, and international student admissions, plus admissions information for transfer students. You can also learn more about our tuition rates and financial aid opportunities.

To speak with our admissions team, call (855) 355-6288 or request information and an advisor will contact you shortly. If you’re ready to apply, simply start your application today.

woman smiling at man taking notes

Scholarships and Financial Aid

National University is dedicated to making higher education affordable, as well as accessible. Through NU scholarship offerings, eligible students are able to reduce the financial burden of college, start classes sooner, and finish their programs faster while focusing on achieving their goals.

Accreditations

WASC Senior College and University Commission logo

The Western Association of Schools and Colleges (WASC) accredits public and private schools, colleges, and universities in the U.S.

National Center of Academic Excellence (NCAE) in Cybersecurity icon

The National Security Agency (NSA) has designated National University as a National Center of Academic Excellence (NCAE) in Cyber Defense (CAE-CD) through 2028. More information on the National Center of Academic Excellence (NCAE) in Cybersecurity program can be found here: https://www.nsa.gov/Academics/Centers-of-Academic-Excellence/

graduate icon

In the top 10 for graduating students in the MS in Cybersecurity program among online nonprofit 4-yr private universities.

woman with toddler smiling

Why National University?

We’re proud to be a Veteran-founded, San Diego-based nonprofit. Since 1971, our mission has been to provide accessible, achievable higher education to adult learners.

Today, we educate students from across the U.S. and around the globe, with over 240,000 alumni worldwide.

headshot of Francisco, class of 2016

“The MS Cybersecurity program was an awesome technical experience! It was great to get actual real-world experience for the skills you are learning, as well as the key business components that relate to the such as project management, presentation, and teamwork.”

Jonathan Race,

Class of 2018, Founding Cyber Team Captain

What makes a degree
with National University unique?

Free Tutoring Sessions

Access personalized tutoring sessions at no cost — empowering your learning.

Online

Flexibility meets quality education with our online learning option.

24/7 Support

Get assistance anytime, anywhere with our round-the-clock support services.

Military Friendly

Committed to serving those who serve — diverse resources and support for veterans and family. Military and Veteran Admissions.

Mentoring Network

Individual student and alumni career guidance, professional development opportunities, and customized career support.

Transfer Students Welcome

NU makes it easy to get your degree, even if you started it with another university. Learn more about transferring to NU.

Accelerate Your Career With NU

At National University, you’re part of a family. As a student, you’ll have the support of staff, faculty members, students, and alumni who will be there with you every step of the way, cheering you on as you pursue your goals.

Our network of 240,000 alumni is a large global community that provides our graduates with the professional connections to get a leg up in your new career.

man and woman in graduation cap and gown smiling among other graduating students

FAQs

A master’s in cybersecurity degree opens doors in a variety of industries, including finance and insurance, manufacturing, information services, health care, administrative support services, and scientific and technical services. Whether you’re looking to change your career path or start your career in IT, the skills you gain in National University’s Master of Science in Cybersecurity can give you the edge you need to stand out in the job market.

Cybersecurity is a field that’s rapidly expanding and in need of professionals with up-to-date knowledge and skills. For example, employment of information security analysts is projected to grow 33 percent from 2020 to 2030, which is dramatically faster than the average for all occupations, according to the Bureau of Labor Statistics. It can also be a lucrative career move, with a median annual wage of $102,600 and the top 10 percent earning more than $165,920.*

Employers in the cybersecurity field are looking for workers with skills in communications, management, operations, leadership, infrastructure, information technology, innovation, integration, and research. With this master’s degree from National University, you’ll be prepared to seek a variety of roles in cybersecurity, including:**

  • Information Systems Security Manager
  • Director of Information Security
  • Network Engineer
  • Systems Administrator
  • Systems Engineer
  • Cybersecurity Engineer
  • Cybersecurity Analyst
  • Cybersecurity Consultant
  • Penetration & Vulnerability Tester
  • IT Auditor
  • Cybersecurity Architect

To learn more about career opportunities in the field of cybersecurity, read our post: Is a Cybersecurity Degree Worth It?

*SOURCE: https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm

**SOURCE: Emsi Labor Analyst- Report. Emsi research company homepage at https://www.economicmodeling.com/company/ (Report viewed: May 3, 2022). DISCLAIMER: The data provided is for Informational purposes only. Emsi data and analysis utilizes government sources to provide insights on industries, demographics, employers, in-demand skills, and more to align academic programs with labor market opportunities. Cited projections may not reflect local or short-term economic or job conditions and do not guarantee actual job growth. Current and prospective students should use this data with other available economic data to inform their educational decisions.

The field of cybersecurity is robust and offers numerous pathways to difference-making careers. To provide the industry with highly skilled professionals on the cutting edge of the market’s current and expected needs, National University’s MS in Cybersecurity offers two career-focused specializations:

Ethical Hacking and Pen Testing â€“ In this specialization, you’ll focus on ethical hacking and penetration (Pen) testing where you will probe network and information system security components by conducting simulated attacks on systems. It’s designed to provide you with the unique applications involved in Cybersecurity and Information Assurance (CSIA). You’ll also learn how to develop rules of engagement, prepare a toolkit, discover and exploit system vulnerabilities, ethically conduct a penetration test, and prepare penetration test documentation.

Enterprise Cybersecurity Management â€“ The specialization in Enterprise Cybersecurity Management provides study in the professional domain of cybersecurity that focuses on the programmatic management and governance of cybersecurity for organization. This arena particularly involves larger organizations, often in government, that have codified standards, policies, and practices for this field.

Program Disclosure

Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.

Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.

NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.

All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.

National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.

Back to top