Skip to main section

Online Master of Science Cybersecurity

PROGRAM AT A GLANCE

school

10 master's courses

11 weeks long

monetization_on

$ 2490

Cost per course

watch_later

Flexible learning

Online and in-person programs at select campuses, subject to availability

Why earn a degree in cybersecurity from Strayer?

Through our Master of Science in cybersecurity program, you’ll learn advanced technologies and strategies to investigate cybersecurity events or crimes and minimize their impact on information technology systems.

Winter classes start January 6
Program details

The MS in cybersecurity program overview

With the Master of Science in cybersecurity program from Strayer, you’ll gain experience defending against cyberattacks and learn to wield technology used by hackers to beat them at their own game.

Is an MS in cybersecurity good to have? It depends on what you learn.

  • Conceptualize secure information technology systems.
  • Provide the support, administration and maintenance to ensure effective, efficient information technology system performance and security.
  • Lead, manage and promote policies that help organizations securely conduct work.
  • Identify, analyze and mitigate threats to information technology systems.
  • Investigate cybersecurity events or crimes related to information technology systems, networks and digital evidence. 

Class size varies based on course objectives and the teaching demands of the subject matter.

How long does it take to get an MS in cybersecurity?

  • There are 10 11-week courses in this program.
  • How many courses you take at a time will determine how long the overall program will be.
  • Strayer University credits are expressed in quarter hours.
  • One quarter hour of credit is granted for the successful completion of 10 contact hours per course.
  • The standard requirement for one course is for students to spend 10 to 14 hours in weekly work, including in- and out-of-classroom work. The Strayer course design uses this requirement to meet applicable regulatory standards.

Features of Strayer's MS in cybersecurity program

decorative

Designed around industry certifications

Get on the path to earning MSISA certifications in ISC2 SSCP and EC-Council CHFI with coursework designed around certification exams.

decorative

Meets national security standards

The MSISA program, updated to align with standards set by the National Initiative for Cybersecurity Education (NICE), led by the National Institute of Standards and Technology (NIST) in the U.S. Department of Commerce, is focused on cybersecurity education, training and workforce development. 

decorative

Recognized by the National Security Agency

The MSISA program helps you gain key skills and knowledge certified by experts in the field and important to today’s employers. MSISA is validated by the National Security Agency (NSA).

Accredited online university

Strayer University has distinct accreditations and affiliations that attest to our academic quality. We’re committed to meeting quality standards, so you can earn a diploma you’re proud to display. View the ACBSP student achievement information.

Estimate the cost of your degree

How much does an MS in Cybersecurity cost?

The cost of an MS in Cybersecurity depends on a number of factors, including the price per course, the purchase of textbooks, and the scholarships and financial aid available to you. Read on for a breakdown of the costs, as well as money-saving opportunities associated with the program.

Estimate the cost of your degree

How much does an MS in Cybersecurity cost?

The cost of an MS in Cybersecurity depends on a number of factors, including the price per course, the purchase of textbooks, and the scholarships and financial aid available to you. Read on for a breakdown of the costs, as well as money-saving opportunities associated with the program.

Expected Graduation

...

Approximate Total

...

Step 1 of 3
0
0

*Student is required to take two courses per quarter during disbursement period

PREPARING YOUR RESULTS

*Student is required to take two courses per quarter during disbursement period

Time commitment

Calculate the approximate time commitment of your degree.

Course load ... courses/term
Classroom time ... hours/week
Terms per year ... terms
Terms to graduation ... terms

Cost analysis

Calculate the approximate cost of your degree

Tuition ...
Books ...
Fees ...
No-cost gen ed $0
Transfer credits ...
$5K scholarship $0
$4K scholarship $0
Graduation Fund $0
Approximate total ...
false
Are you a Strayer graduate?
masters
How much does an MS in Cybersecurity cost?
10
M-MSIA
M-MSIA
5000
4000

Program cost breakdown

The MS in Cybersecurity program consists of 10 courses, with the price of $2,490 per course. There are additional fees for textbooks and supplies, a $65 technology fee each term and a one-time $150 degree conferral fee. Earn a Master of Science in Cybersecurity, a STEM degree program, for under $25,000 in tuition. Additional fees, eligibility rules and restrictions apply.

Transfer credits

Courses from another institution may be eligible for transfer credits to Strayer, which can help reduce the number of courses you need to graduate and your overall tuition. You can transfer up to four classes toward your master’s degree. The Strayer transfer credit page has more information as well as a tool to estimate how many transfer credits you may be able to apply to your Strayer degree program.

Students enrolled in the Master of Business Administration in North Carolina or Pennsylvania may transfer up to four classes

Scholarships and financial aid

There are a number of financial aid options worth exploring on our financial aid page. To apply for federal aid, prospective students should fill out the Free Application for Federal Student Aid (FAFSA) form. Stafford loans are available for graduate study. These are direct unsubsidized loans, not based on financial need. Unlike subsidized loans, Stafford loan interest will accrue while in the program. Making interest payments while in school will help reduce the amount of principal that would otherwise build up, reducing your end cost.

There are also scholarships and private loans available for Strayer students.

More than 500 organizations invest in their employees by partnering with Strayer University to offer access to tuition savings and other educational benefits. If your employer is a corporate partner, you may qualify for programs that can help you discover career pathways in your field.

Private loans

Non-federal loans may pay the difference between the cost of attendance and the total of loans and grants received from other tuition assistance programs. The terms and conditions of federal loans are often more favorable than private loans and should be considered before exploring private loans.

Military tuition assistance

Scholarships are offered to eligible students currently serving in the military, as well as military spouses. Strayer is also approved by Veterans Affairs to accept and process veteran education benefits. Learn more about the Strayer University active military assistance program here.

Veteran benefits

In addition to participating fully in the Yellow Ribbon Program, Strayer is approved by Veterans Affairs to accept and process veteran education benefits. Student veterans can receive transfer credit for military training and life experiences.

What coursework do you need to earn an MS in Cybersecurity?

Designed around standards set by the National Initiative for Cybersecurity Education (NICE) framework, our MS in Cybersecurity curriculum covers leading-edge techniques to help you assess and recommend safeguards to protect an organization’s information assets. You’ll explore real-world information assurance case studies and advanced technologies, then experience actual cyberthreats in lab settings. View all courses.

Sample courses

Online
CIS 512 - Advanced Computer Architecture

This course examines the structure and operation of digital computers in the context of providing data and infrastructure security. Emphasis will be placed on strategies to select, deploy, integrate and administer modern computing environments to support the organization's overall security posture. Topics include hardware components of modern computing environments and their deployment in compliance with applicable cybersecurity laws and policies.

Online
CIS 534 - Advanced Network Security Design

This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.

Online
CIS 560 - Security Access and Control Strategies

This course presents typical cyber operations including access and control, where ethical dilemmas arise and provides tools for legal and ethical decision making. Topics include various stages of a cyber operation, U.S. regulations and ethical implications of granting access and control. Students will explore the authorities, roles and steps associated with ethical cyber operations.

Online
CIS 562 - Computer Forensics Planning

This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab, investigating computer and cybercrime, tools, techniques and methods used to perform forensic investigations and concepts for collecting, analyzing, recovering and preserving forensic evidence. 

Online
CIS 565 - Cryptography

This course covers cryptography from historical, applied, and theoretical perspectives. Topics include symmetric and asymmetric encryption techniques that include classical and modern algorithms. This course explores the framework and practice of using cryptography in securing information in organizational settings.

Online
CIS 598 - Graduate Information Assurance Capstone

In this integrative capstone course, students will examine and solve real-world cybersecurity problems and apply associated techniques to create practical solutions. The course takes an integrative, senior security officer approach to address the policy, risk and control opportunities within cyberspace and IT environments.

What can you do with an MS in Cybersecurity?

Your education can help you pursue your professional and personal goals. While Strayer cannot guarantee that a graduate will secure any specific career outcome, such as a job title, promotion or salary increase, we encourage you to explore the potential impact you can have in the cybersecurity field.

Versatile skills for your future

The cybersecurity program can provide the skills to help you defend against cyberattacks.

In addition, students who complete this concentration will be prepared to:

  • Conduct risk assessments and carry out tests on data processing systems to ensure data processing tasks and security measures function properly.
  • Control access to data files and monitor their use to protect information in computer files.
  • Create strategies to protect computer files from accidental or unauthorized changes, destruction or disclosure, and to address emergency data processing requirements.
  • Develop new applications, ideas, connections, systems or products.
  • Document policies, procedures and tests for computer security and emergency measures.
  • Educate users about security to enhance system security and optimize server and network efficiency.
  • Evaluate relevant information to help you determine whether events or processes follow laws, regulations or standards.
  • Examine computer security protocol violations and talk to those who violated them to help prevent future occurrences of the violations.
  • Review and stay up to date on computer virus reports to determine when to update virus protection systems.
  • Set up firewalls and encode data transmissions to hide sensitive information while it's being sent and to block malicious digital transfers.
  • Speak with users to address matters like computer data access needs, security breaches and programming adjustments.
  • Update computer security files to include new software, fix mistakes or adjust individual access permissions.

86

of Strayer master's alumni agree that Strayer was the right choice for earning their degree.

Strayer Alumni Survey, 2023

MS in Cybersecurity admission requirements

Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university. 

decorative

A completed application and enrollment agreement, as applicable

decorative

Proof of a completed baccalaureate degree from an accredited college or university with a cumulative GPA of 2.50 out of 4.0

decorative

Official copies of transcripts from all other colleges or universities attended

decorative

A valid, current and legible government-issued photo identification

Learn more about the admission process at Strayer.

Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.

Transferring to Strayer from another university?

Some or all of the credits you’ve earned may be transferable.

International master’s students

We welcome international students.

Campus locations

Come to a campus near you for guidance and support. You’ll have access to helpful resources, a supportive community and plenty of spaces to learn and grow.

Ready to take the next step?

Your admissions officer is here to guide you through every step of the process, from completing your application to choosing your concentration.