
MANAGEMENT
Applications to the Master of Science in Cybersecurity program are reviewed on a rolling basis; apply at any time! However, priority is given to applications that are received by these deadlines:
To be eligible for admission to the MS in Cybersecurity program you must complete the general requirements and prerequisites listed below.
Admission to the program requires an undergraduate degree in computer science or equivalent education breakdown. Applicants with a baccalaureate degree in a related field may be able to meet prerequisites with equivalent work experience in computer science and will be considered for conditional admission.
The review committee looks for courses in and comprehensive understanding of the following areas:
Operating Systems
Networks
Software Engineering
Please view the Work Experience Questions for Applicants to see if your work experience will satisfy some or all of the required prerequisites.
Set up an appointment with your enrollment specialist to learn how you can take advantage of the MS in Cybersecurity program.
Sujeith Ordonez, M.A.
Senior Outreach & Recruitment Specialist
±¬ÁÏÉçÇø Extended Learning
(760) 750-8454
The cybersecurity master’s degree program is eligible for financial aid.
Visit the funding page or call 760-750-4850 to learn more about your funding options. Active-duty military, veterans and their dependents should visit the military services page or call 760-750-8705.
Federal VA educational benefits can be used for this program (not eligible for Cal Vet fee waiver).
Complete the Master of Science in Cybersecurity in five semesters, thanks to guaranteed class availability that ensures no delays in your educational journey. The program consists of 38 units, priced at $875 per unit.
Semester | Units | Subtotal* |
---|---|---|
Fall Semester 1 | 9 | $7,875 |
Spring Semester 1 | 9 | $7,875 |
Summer Semester | 3 | $2,625 |
Fall Semester 2 | 9 | $7,875 |
Spring Semester 2 | 8 | $7,000 |
Total | 38 | $33,250 |
This program has a set schedule of courses that you are expected to follow as part of your cohort. You can view all course descriptions on the .
Fall Semester 1
Reviews cybersecurity in today’s world. Uses case studies to analyze the broad impact of cybersecurity. Explores cybersecurity-related issues in the areas of technology, privacy, and law. Uses current and historical cybersecurity events to provide context for and application of fundamental cybersecurity concepts such as confidentiality, integrity, availability, threat, vulnerability, and controls.
Units: 2
An overview of the current security of most commercial operating systems and examines the fundamental concerns of security in modern operating systems. Analysis of the operating systems model for computer system security criteria as it pertains to overall system vulnerability is covered. Based upon the security requirements and general architecture of secure operating systems publically available security enhanced operating systems are examined and evaluated.
Units: 3
Overviews the fundamental principles and components of information systems. Introduces the concepts and topics of Information Technology Security and Risk Management at the organizational level. Studies incentives and the requirements for information security, the integration of security into the systems design process, and life cycle of information security management.
Units: 2
Overview of the key topics in organizational behaviors and leadership seeking to explain people’s behavior and experiences in various types of organizations, as well as how to effectively lead people to accomplish shared goals. Explores how research and knowledge of these topics can be applied in managing information systems and security related projects specifically, and in organizations more generally. Issues in contractual negotiations and effective communication inside organizations will also be addressed.
Units: 2
Spring Semester 1
Theoretical and practical aspects of security in computer networks, including wired and wireless networks. Subjects include: fundamental techniques and protocols used to insure secure communications, common attacks and defenses, and vulnerability assessment of network systems. Application and operationalization of network security technologies and techniques.
Prerequisite(s): MATH 503.
Units: 3
Examines variety of quantitative models, including financial, economic and business models, to analyze real managerial problems for technology assessment and investment that affect all types of institutions. Introduces the concept of risk and risk management and discusses up-to-date methods for both qualitative and quantitative risk analysis. Focuses on training future information technology or security managers to make better risk decisions.
Prerequisite(s): MGMT 521 and MIS 522.
Units: 3
Fundamentals of protecting confidentiality, integrity, and availability of information in computer systems. Covers the fundamentals of cryptographic concepts and methods. Several encryption/decryption algorithms will be discussed. Includes an introduction to the mathematics behind cryptography, cryptographic algorithms including classical methods, symmetric key systems, public key systems, hash functions, digital signatures and certificates, cryptanalysis and attacks, and access control including authentication and authorization.
Units: 3
Summer Semester 1
Covers the fundamentals of developing business rationales for information security (assurance) governance. Studies the development and implementation of IT strategies to integrate assurance functions to improve security, and ensure the preservation of the organization and its ability to continue to operate. Offers a comprehensive view of information security policies in business context and the psychology of implementation. Provides insight into governance, privacy, regulator mandates, business incentives, legal issues.
Prerequisite(s): MGMT 521 and MIS 522
Units: 3
Fall Semester 2
Introduction to the development of secure software during all phases of the software development life cycle. An emphasis is placed upon the secure code implementation and the most common pitfalls and security bugs found in programming languages. Risk assessments, threat modeling and secure code analysis of existing systems are also considered one of the primary topics. Hands-on exercises will be required in laboratory sessions.
Units: 4
Introduction to the latest penetration testing techniques. Covers pre-engagement interactions, intelligence gathering, threat modeling, vulnerability analysis, exploitation, post-exploitation, and reporting in penetration testing. Methodologies for web applications will be covered, including choosing the best techniques and tools for security situations. Three hours of lecture and three hours of laboratory.
Units: 4
Provides tools and a focused pathway to develop and complete their Semester in Residence Project.
Units: 1
Spring Semester 2
Focuses on investigating threats against computers and network systems. Covers principles and techniques of intrusion detection such as network traffic analysis, packet analysis, application protocol layer for common protocols and log analysis. Evaluates the use of intrusion detection tools and services.
Units: 4
Provides industry experience in the Cybersecurity field under the guidance of a graduate committee consisting of a faculty member, an industry representative and the Program Director. Leads to establishing/accomplishing goals, communicating work/project progress, acquiring broad organizational insight and demonstrating core competencies required for the degree. Culminates in a written project document and an oral presentation to fellow students, faculty and industry representatives.
Units: 4