The Master's degree in Cybersecurity is obtained by completing the program's 36 credit hour course requirements (12 courses, each worth 3 credit hours). Of these credit hours, 21 are core courses and 15 are elective courses. Students must complete both core and concentration elective course credit requirements for the Master's degree.
To qualify for the graduate degree, students must meet the following minimum requirements:
Minimum Course Success Grade: B- (CGPA 3.00)
Total Required Credits: 36
Additionally:
Students enrolled in the graduate program must maintain a minimum cumulative GPA of 3.0 on a 4.00 scale and must receive at least a 2.7 (B-) in all courses.
The Maximum Time Frame (MTF) established for the completion of the master's program is 54 credit hours.
A graduate student may transfer a maximum of 9 credit hours earned at accredited institutions.
To be able to define privacy, legal, and ethical issues related to information security; to understand that these issues can lead to critical technological security vulnerabilities in a company's digital data and resources.
To understand the necessary computer network engineering and security principles for software and hardware components, including both wireless and wired technologies and cryptographic methods.
To be able to carry out technological decision-making and problem-solving processes by applying data collection and analysis principles in information systems and security controls to ensure the confidentiality, integrity, and accessibility of the digital infrastructure.
To be able to communicate effectively verbally and in writing with technical and non-technical stakeholders about information security issues and solutions; to develop and implement a reliable cyber incident response plan.
To evaluate the technical knowledge and skills related to various globally recognized professional technology certifications in the industry such as CompTIA Security+, ISC CISSP, ISACA CISM, and CompTIA PenTest+.
To be able to apply knowledge, skills, and competencies in information technology and management in the field of cybersecurity to benefit organizations such as federal, state and local governments, non-profit organizations, and industries by protecting digital resources and infrastructures in research and projects.
To understand the role of responsible citizenship in the legitimate use of technology and digital data.



