Master of Science in Cybersecurity
Online or Hybrid
Flexible options
Finish in 13 months
Average completion time
240K+ Alumni Worldwide
Become a member of NU’s global community
Take the first step in your National University Journey
Master of Science in Cybersecurity
Degree:
Master of Science in Cybersecurity Degree
Application:
$0 application fee. No essays/exams.
If you can envision yourself helping to ensure the security, confidentiality, integrity, authenticity, control, availability, and utility of the world’s computing and information systems infrastructure, National University’s MS in Cybersecurity program will give you the technical and managerial skills you need to achieve your career aspirations.
In this rigorous online curriculum, we challenge our students to design, build and implement the computing and systems that address the major issues our society is wrestling with. It’s a professionally focused degree for those who endeavor to help secure the world’s computer and information systems infrastructure.
Degree Requirements
All students who seek to enroll in the MS Cybersecurity (MS CYB) program must interview with the Faculty Advisor prior to enrolling in the first course of the program.
National University awards credit in quarter units, with each academic year divided into four 12-week quarters.
Each quarter is made up of three 4-week classes, with one class per month. Under the current policy, 4.5 units of credit are awarded for courses.
To obtain the Master of Science in Cybersecurity, students must complete 58.5 graduate units. A total of 13.5 quarter units of graduate credit may be granted for equivalent graduate work completed at another regionally accredited institution, as it applies to this degree, and provided the units were not used in earning another advanced degree. All students must complete the nine core requirements and choose an area of specialization.
Please refer to the graduate admissions requirements for specific information regarding application and evaluation. To Reach out to speak with an admissions counselor for additional course requirements and elective options.
Students must select one area of specialization.
Core Requirements
9 Courses
Cybersecurity Technology
4.5 Quarter Units
Examines the fundamental concepts of cybersecurity and the associated technology. Includes securing the environment, security technologies in the environment, security threats, and security responses. Ethical and legal aspects of cybersecurity are also examined.
Cyber Sec. Toolkit Utilization
4.5 Quarter Units
Prerequisite: CYB 600 with a minimum grade of B.
An introduction to the tools and techniques utilized in cyber defense and offensive cyber operations. Use of technical tools will be demonstrated in virtual lab environments.
Threat Modeling & Intel
4.5 Quarter Units
Prerequisite: CYB 601
Analysis and evaluation of threat modeling and cyber threat intelligence to reduce risk and enhance organizational Cybersecurity posture. Development and use of threat models to identify threats to systems and applications. Methods for collecting and utilizing threat intelligence to identify organizational threats are also covered.
Wireless and Mobile Security
4.5 Quarter Units
Prerequisite: CYB 602
Concepts covered include a comprehensive wireless and mobile security overview including the design, planning, installation, and maintenance of wireless network security infrastructures. Emphasis is placed on information warfare countermeasures relative to government, military, terrorist and rogue, and private enterprise demographics.
NetSec Monitoring and IR
4.5 Quarter Units
Prerequisite: CYB 604
An introduction to the concepts of network security monitoring and incident response. Students will conduct an analysis and evaluation of network security monitoring tools and techniques. Students will examine the methods for conducting incident response.
Cloud Security
4.5 Quarter Units
Prerequisite: CYB 606
An introduction to the concepts of cloud computing. This course will examine the security implications of operating in a cloud computing environment. Tools and techniques to implement DevSec ops will be introduced.
Cyber Security Project I
4.5 Quarter Units
Prerequisite: CYB 608 and completion of one specialization area.
A Master’s level project dealing with a student’s area of specialization in the Cyber Security and Information Assurance program. The students will create an original project with practical applications using cybersecurity policy, regulatory, and testing frameworks. The project will integrate the concepts of cyber security and information assurance taught throughout the program. Project management techniques and collaboration will be emphasized along with the ethical and legal aspects of the project. Grading is H, S, U only.
Cyber Security Project II
4.5 Quarter Units
Prerequisite: CYB 699A
Master’s level project dealing with a student’s area of specialization in the Cyber Security and Information Assurance program. The students will create an original project with practical applications using cybersecurity policy, regulatory, and testing frameworks. Project management technqiues and collaboration will be emphasized along with the ethical and legal aspects of the project. Grading is H, S or U only.
Cyber Security Project III
4.5 Quarter Units
Prerequisite: CYB 699B with a minimum grade of S. Students to successfully complete CYB 699B
Master’s level project dealing with a student’s area of specialization in the Cyber Security and Information Assurance program. The students will create an original project with practical applications using cybersecurity policy, regulatory, and testing frameworks. Project management techniques and collaboration will be emphasized along with the ethical and legal aspects of the project. Project results will be presented to a panel for review. Grading is by H, S or U only.
Specialization in Enterprise Cybersecurity Management
4 Courses
This specialization requires 18 graduate units at National University.
CyberSec Audit and Assessment
4.5 Quarter Units
Prerequisite: CYB 607
This class focuses on the legal and regulatory requirements, ethical issues, basic methodology and technical tools to conduct cybersecurity audits and assessments. Students will explore the frameworks, tools, and techniques to conduct a cybersecurity assessment.
Cybersecurity Policy
4.5 Quarter Units
Prerequisite: CYB 608
Students will explore the development of cybersecurity policy for commercial and government organizations. The legal and regulatory requirements for cybersecurity policy development will be examined.
Governance in Cybersecurity
4.5 Quarter Units
Prerequisite: CYB 612
An examination of the functions and processes to implement and monitor cybersecurity controls across an organization. An exploration of commercial and government compliance requirements.
CybSec Program Management
4.5 Quarter Units
Prerequisite: CYB 613
An examination of the methods and frameworks for implementing and managing an enterprise cybersecurity program. Students will explore various frameworks and tools to develop and manage a cybersecurity program that supports an organization’s mission.
Specialization in Ethical Hacking & Pen Testing
4 Courses
CyberSec Audit and Assessment
4.5 Quarter Units
Prerequisite: CYB 607
This class focuses on the legal and regulatory requirements, ethical issues, basic methodology and technical tools to conduct cybersecurity audits and assessments. Students will explore the frameworks, tools, and techniques to conduct a cybersecurity assessment.
Ethical Hacking
4.5 Quarter Units
Prerequisite: CYB 608
Students will apply principles of penetration testing to identify and exploit vulnerabilities in networked and cloud based information systems and make recommendations for mitigation.
Red Teaming
4.5 Quarter Units
Prerequisite: CYB 632
Red Teaming, or Alternative Analysis, is the practice of viewing a problem from an adversarial or competitor’s perspective. The objective of Red Teams is to enhance decision making, practices of secured system protection applicable by establishing countermeasures of defense. Students will learn to employ actively open-minded/problem solving and unbiased thinking to conduct red team assessments.
Advanced Penetration Testing
4.5 Quarter Units
Prerequisite: CYB 633
Students will analyze and utilize advanced penetration testing tools and techniques. Web application attack tools and techniques will be examined.
Specialization in Digital Forensics and Incident Response
4 Courses
Threat Hunting and IR
4.5 Quarter Units
Prerequisite: CYB 607
Develop advanced skills in threat hunting and incident response to promptly and effectively identify and mitigate threats. Learn the threat hunting cycle and techniques for proactive, reactive, and continuous hunting. Utilize tools like SIEMs, EDRs, and threat intelligence feeds for real-time threat identification and response. Gain practical knowledge applicable to real-world scenarios.
Digital Investigations
4.5 Quarter Units
Prerequisite: CYB 640
An introduction to the field of digital investigations, including the techniques, tools, and methodologies used to investigate cybercrime and other digital incidents. Students will learn how to collect, preserve, and analyze digital evidence from a variety of sources, including computers, mobile devices, and the cloud. The course will also cover the latest trends in digital investigations, such as the use of artificial intelligence and machine learning. In addition, the course explores the legal and ethical considerations involved in digital investigations, including the use of digital evidence in criminal and civil cases, and the rules of evidence in digital investigations.
Cloud Forensics and IR
4.5 Quarter Units
Prerequisite: CYB 641
Gain in-depth understanding of cloud forensics and incident response, focusing on techniques, tools, and methodologies for investigating and responding to security incidents in cloud environments. Explore challenges and considerations specific to cloud computing. Covers the entire investigation process, including evidence collection, analysis, and incident response activities.
Network Forensics
4.5 Quarter Units
Prerequisite: CYB 642
Gain a comprehensive understanding of network forensics and its techniques, tools, and methodologies for investigating cyber incidents on network infrastructure. Learn principles of network traffic analysis, intrusion detection, and network-based attacks. Explore legal and ethical considerations. By the end of the course, be able to conduct effective investigations, gather evidence, and present findings.
Specialization in Cloud Security
4 Courses
Risk Mgmnt in Cloud Computing
4.5 Quarter Units
Prerequisite: CYB 607
An examination into the critical aspects of risk management in cloud computing environments. The curriculum addresses both theoretical and practical aspects of risk management in the cloud. Students will explore the challenges, methodologies, and best practices associated with managing risk when using cloud computing environments. Various frameworks and risk management for zero trust environments will be covered in this class.
Cloud Security Architecture
4.5 Quarter Units
Prerequisite: CYB 650
Explore secure cloud architecture design and implementation, covering principles of cloud security, zero trust architecture, and vulnerabilities in cloud service models. Learn to design secure architectures for cloud environments that offer comprehensive protection against threats.
Introduction to DevSecOps
4.5 Quarter Units
Prerequisite: CYB 651
Learn DevSecOps principles and practices for secure and resilient applications. Emphasis on integrating security within the DevOps framework, emphasizing collaboration, automation, and continuous improvement.
Cloud Computing Assessments
4.5 Quarter Units
Prerequisite: CYB 652
Explore methods and techniques for assessing security in cloud environments, focusing on unique challenges, evaluating security controls, and identifying potential risks and vulnerabilities.
Specializations
Master of Science in Cybersecurity, Enterprise Cybersecurity Management
The Enterprise Cybersecurity Management specialization focuses on programmatic management and governance skills for organizational cybersecurity. In addition to foundational knowledge and tools for securing network, cloud and wireless systems, you’ll learn to assess and manage the vulnerabilities and protections of these IT environments. This specialization focuses on larger organizations (often in government) that have codified standards, policies, and practices for their information systems.
Master of Science in Cybersecurity, Ethical Hacking and Pen Testing
The Ethical Hacking & Pen Testing specialization focuses on testing enterprise systems by probing network and information security components with simulated attacks. These exercises and simulations prepare professionals for: developing rules of engagement, preparing cybersecurity tool kits, discovering and exploiting system vulnerabilities, ethically conducting penetration tests, and preparing penetration test documentation. Red-Teaming practices and Red vs. Blue team exercises will be executed and assessed as an important part of the coursework.
Master of Science in Cybersecurity, Digital Forensics
The specialization of Digital Forensics provides a greater focus on investigation and analysis of computers and networks. Students will be able to examine digital summaries of indications, investigations of digital forensics and preserve digital evidence.
Master of Science in Cybersecurity, Cloud Security
The specialization in Cloud Security prepares students to effectively secure cloud environments. The specialization focuses on risk management, secure cloud architecture, DevSecOps, and cloud computing assessments. Students learn to formulate risk management strategies, design secure cloud architectures, integrate security practices into DevOps, and conduct security assessments in cloud environments. Legal, regulatory, and compliance considerations are also covered. The program equips students with the knowledge and skills to address cloud security challenges, communicate security concepts, and implement continuous monitoring and improvement practices. Graduates are prepared to meet the increasing demand for cloud security professionals in various industries.
Career Outlook
National University students are encouraged to joint our Cyber Team Nucl3@r. The cyber team apply the knowledge and skills they gain in class by competing in challenging cyber competitions like the Western Regional Collegiate Cyber Defense Competition, Collegiate Pentest Competition, National Cyber League, and Cyberforce Competition. These competitions also allow students to demonstrate their skills to potential employers.
- Top Jobs in this field
- Median Salary (USA)
- JOB Openings (USA)
- General and Operations Managers
- $100,934 avg. salary (USA)
- 373,566 job openings (past yr.) past year
Most desired skills
- Operations Management
- Marketing
- Merchandising
- Finance
- Project Management
- Inventory Management
- Profit And Loss (P&L) Management
Top companies hiring for this role
- Unclassified
- CVS Health
- AutoZone
- Buckle
- Walmart
- Enterprise Rent-A-Car
- Menards
- Compliance Officers
- $75,549 avg. salary (USA)
- 38,710 job openings (past yr.) past year
Most desired skills
- Auditing
- Regulatory Compliance
- Project Management
- Risk Analysis
- Risk Management
- Finance
- Accounting
Top companies hiring for this role
- Unclassified
- Humana
- Citigroup
- Wells Fargo
- Wahve Holdings
- Elevance Health
- Amentum
- Computer Systems Analysts
- $103,314 avg. salary (USA)
- 45,565 job openings (past yr.) past year
Most desired skills
- Systems Analysis
- Computer Science
- Project Management
- Business Requirements
- Business Process
- Business Systems Analysis
- SQL (Programming Language)
Top companies hiring for this role
- Unclassified
- Deloitte
- Intermountain Health
- Prime Therapeutics
- Accenture
- GovCIO
- Marriott International
- Computer Network Architects
- $129,315 avg. salary (USA)
- 13,281 job openings (past yr.) past year
Most desired skills
- Network Engineering
- Network Routing
- Automation
- Computer Science
- Firewall
- Network Switches
- Wide Area Networks
Top companies hiring for this role
- Unclassified
- Leidos
- Amazon
- Marriott International
- Lumen Technologies
- TEKsystems
- Acosta Group
- Blockchain Engineers
- $102,519 avg. salary (USA)
- 44,821 job openings (past yr.) past year
Most desired skills
- Blockchain
- Rust (Programming Language)
- Cryptography
- Computer Science
- Smart Contracts
- JavaScript (Programming Language)
- Scalability
Top companies hiring for this role
- Unclassified
- Cliffpoint Limited
- Ernst & Young
- Circle – Financial Services
- Fidelity Investments
- Mastercard
- Deloitte
- Computer Systems Engineers/Architects
- $102,519 avg. salary (USA)
- 44,821 job openings (past yr.) past year
Most desired skills
- Systems Engineering
- Computer Science
- Python (Programming Language)
- Automation
- Amazon Web Services
- Microsoft Azure
- Agile Methodology
Top companies hiring for this role
- Unclassified
- Amazon
- Raytheon Technologies
- Ford
- Northrop Grumman
- Leidos
- Apple
- Digital Forensics Analysts
- $102,519 avg. salary (USA)
- 44,821 job openings (past yr.) past year
Most desired skills
- Cyber Threat Intelligence
- Cyber Security
- Incident Response
- Vulnerability
- Computer Science
- Intelligence Analysis
- Security Information And Event Management (SIEM)
Top companies hiring for this role
- Unclassified
- Johnson & Johnson
- KPMG
- Booz Allen Hamilton
- SAIC
- Leidos
- Chemours
- Document Management Specialists
- $102,519 avg. salary (USA)
- 44,821 job openings (past yr.) past year
Most desired skills
- Auditing
- Document Control
- Data Entry
- Document Management
- Workflow Management
- Document Management Systems
- Project Management
Top companies hiring for this role
- Unclassified
- Contact Government Services
- Citizant
- Symplr
- One Call Medical
- Epiq
- Accuity
- GIS Technicians
- $102,519 avg. salary (USA)
- 44,821 job openings (past yr.) past year
Most desired skills
- Geographic Information Systems
- ArcGIS (GIS Software)
- Python (Programming Language)
- Computer Science
- SQL (Programming Language)
- Project Management
- Spatial Data Infrastructures
Top companies hiring for this role
- Unclassified
- Esri
- CDM Smith
- Leidos
- Stantec
- WSP Global
- AECOM
- Information Security Engineers
- $102,519 avg. salary (USA)
- 44,821 job openings (past yr.) past year
Most desired skills
- Cyber Security
- Computer Science
- Vulnerability
- Auditing
- Automation
- Python (Programming Language)
- Firewall
Top companies hiring for this role
- Unclassified
- Marriott International
- Amazon
- Deloitte
- Leidos
- Johnson & Johnson
- Booz Allen Hamilton
- Information Technology Project Managers
- $102,519 avg. salary (USA)
- 44,821 job openings (past yr.) past year
Most desired skills
- Project Management
- Agile Methodology
- Scrum (Software Development)
- Computer Science
- Continuous Improvement Process
- Change Management
- JIRA
Top companies hiring for this role
- Unclassified
- Deloitte
- Accenture
- Marriott International
- PricewaterhouseCoopers
- Johnson & Johnson
- Humana
- Penetration Testers
- $102,519 avg. salary (USA)
- 44,821 job openings (past yr.) past year
Most desired skills
- Vulnerability
- Penetration Testing
- Cyber Security
- Computer Science
- Vulnerability Management
- Vulnerability Assessments
- Python (Programming Language)
Top companies hiring for this role
- Marriott International
- Unclassified
- Leidos
- Raytheon Technologies
- Deloitte
- Lumen Technologies
- Nelnet
- Web Administrators
- $102,519 avg. salary (USA)
- 44,821 job openings (past yr.) past year
Most desired skills
- HyperText Markup Language (HTML)
- Search Engine Optimization
- Web Development
- Cascading Style Sheets (CSS)
- Marketing
- Computer Science
- JavaScript (Programming Language)
Top companies hiring for this role
- Unclassified
- GovCIO
- Deloitte
- Cube Hub
- Volunteermatch
- Guidehouse
- Leidos
Program Learning Outcomes
Learn the key skills to help you excel in your field of study.
- Devise a mitigation plan against both external and internal vulnerabilities to enterprise computer infrastructures and sensitive digital assets
- Analyze and evaluate multiple risk assessment methods and strategies
- Compare and contrast the legal and ethical aspects of cybersecurity at the federal, state, and international level
- Assess and summarize the legal and ethical requirements of a cybersecurity professional
- Integrate project management skills to produce a cybersecurity solution
- Evaluate the results of a security assessment to assess the security status of a network or computer system
- Conduct in-depth research into a specific CSIA topic, including finding and integrating relevant research results of others
- Integrate systems-level infrastructure thinking into CSIA problem identification and resolution and effectively communicate the solution
Our four-week courses and online options work with your schedule to get the most out of our MS in Cybersecurity program. You could start as early as next month!
Admissions
Transfer Students Welcome
Enrolling in a university is a big decision. That’s why our dedicated admissions team is here to guide you through the admissions process and help you find the right program for you and your career goals.
To that end, we’ve simplified and streamlined our application process, so you can get enrolled in your program right away. Because we accept and review applications year round, you can begin class as soon as next month, depending on your program and location of choice.
Learn more about undergraduate, graduate, military, and international student admissions, plus admissions information for transfer students. You can also learn more about our tuition rates and financial aid opportunities.
To speak with our admissions team, call (855) 355-6288 or request information and an advisor will contact you shortly. If you’re ready to apply, simply start your application today.
Scholarships and Financial Aid
National University is dedicated to making higher education affordable, as well as accessible. Through NU scholarship offerings, eligible students are able to reduce the financial burden of college, start classes sooner, and finish their programs faster while focusing on achieving their goals.
Accreditations
The Western Association of Schools and Colleges (WASC) accredits public and private schools, colleges, and universities in the U.S.
The National Security Agency (NSA) has designated National University as a National Center of Academic Excellence (NCAE) in Cyber Defense (CAE-CD) through 2028. More information on the National Center of Academic Excellence (NCAE) in Cybersecurity program can be found here: https://www.nsa.gov/Academics/Centers-of-Academic-Excellence/
In the top 10 for graduating students in the MS in Cybersecurity program among online nonprofit 4-yr private universities.
Why National University?
We’re proud to be a Veteran-founded, San Diego-based nonprofit. Since 1971, our mission has been to provide accessible, achievable higher education to adult learners.
Today, we educate students from across the U.S. and around the globe, with over 240,000 alumni worldwide.
“The MS Cybersecurity program was an awesome technical experience! It was great to get actual real-world experience for the skills you are learning, as well as the key business components that relate to the such as project management, presentation, and teamwork.”
Jonathan Race,
Class of 2018, Founding Cyber Team Captain
What makes a degree
with National University unique?
Free Tutoring Sessions
Access personalized tutoring sessions at no cost — empowering your learning.
Online
Flexibility meets quality education with our online learning option.
24/7 Support
Get assistance anytime, anywhere with our round-the-clock support services.
Military Friendly
Committed to serving those who serve — diverse resources and support for veterans and family. Military and Veteran Admissions.
Mentoring Network
Individual student and alumni career guidance, professional development opportunities, and customized career support.
Transfer Students Welcome
NU makes it easy to get your degree, even if you started it with another university. Learn more about transferring to NU.
Accelerate Your Career With NU
At National University, you’re part of a family. As a student, you’ll have the support of staff, faculty members, students, and alumni who will be there with you every step of the way, cheering you on as you pursue your goals.
Our network of 240,000 alumni is a large global community that provides our graduates with the professional connections to get a leg up in your new career.
FAQs
A master’s in cybersecurity degree opens doors in a variety of industries, including finance and insurance, manufacturing, information services, health care, administrative support services, and scientific and technical services. Whether you’re looking to change your career path or start your career in IT, the skills you gain in National University’s Master of Science in Cybersecurity can give you the edge you need to stand out in the job market.
Cybersecurity is a field that’s rapidly expanding and in need of professionals with up-to-date knowledge and skills. For example, employment of information security analysts is projected to grow 33 percent from 2020 to 2030, which is dramatically faster than the average for all occupations, according to the Bureau of Labor Statistics. It can also be a lucrative career move, with a median annual wage of $102,600 and the top 10 percent earning more than $165,920.*
Employers in the cybersecurity field are looking for workers with skills in communications, management, operations, leadership, infrastructure, information technology, innovation, integration, and research. With this master’s degree from National University, you’ll be prepared to seek a variety of roles in cybersecurity, including:**
- Information Systems Security Manager
- Director of Information Security
- Network Engineer
- Systems Administrator
- Systems Engineer
- Cybersecurity Engineer
- Cybersecurity Analyst
- Cybersecurity Consultant
- Penetration & Vulnerability Tester
- IT Auditor
- Cybersecurity Architect
To learn more about career opportunities in the field of cybersecurity, read our post: Is a Cybersecurity Degree Worth It?
*SOURCE: https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
**SOURCE: Emsi Labor Analyst- Report. Emsi research company homepage at https://www.economicmodeling.com/company/ (Report viewed: May 3, 2022). DISCLAIMER: The data provided is for Informational purposes only. Emsi data and analysis utilizes government sources to provide insights on industries, demographics, employers, in-demand skills, and more to align academic programs with labor market opportunities. Cited projections may not reflect local or short-term economic or job conditions and do not guarantee actual job growth. Current and prospective students should use this data with other available economic data to inform their educational decisions.
The field of cybersecurity is robust and offers numerous pathways to difference-making careers. To provide the industry with highly skilled professionals on the cutting edge of the market’s current and expected needs, National University’s MS in Cybersecurity offers two career-focused specializations:
Ethical Hacking and Pen Testing – In this specialization, you’ll focus on ethical hacking and penetration (Pen) testing where you will probe network and information system security components by conducting simulated attacks on systems. It’s designed to provide you with the unique applications involved in Cybersecurity and Information Assurance (CSIA). You’ll also learn how to develop rules of engagement, prepare a toolkit, discover and exploit system vulnerabilities, ethically conduct a penetration test, and prepare penetration test documentation.
Enterprise Cybersecurity Management – The specialization in Enterprise Cybersecurity Management provides study in the professional domain of cybersecurity that focuses on the programmatic management and governance of cybersecurity for organization. This arena particularly involves larger organizations, often in government, that have codified standards, policies, and practices for this field.
Additional Resources
Program Disclosure
Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.
Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.
NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.
All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.
National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.
Back to top