±¬ÁÏÉçÇø

Your  Account:
cybersecurity

Online MS in Cybersecurity
Program Details

Application Deadlines

Applications to the Master of Science in Cybersecurity program are reviewed on a rolling basis; apply at any time! However, priority is given to applications that are received by these deadlines: 

  • Fall 2025: July 23, 2025

APPLY NOW

Admission Requirements

To be eligible for admission to the MS in Cybersecurity program you must complete the general requirements and prerequisites listed below. 

  • General Requirements
    • Bachelor’s degree in computer science or equivalent education background 
    • GPA of 2.5 for last degree completed or last 60 semester units 
    • GPA of at least 3.0 in upper-division computer science courses 
    • One official transcript from each academic institution attended 
    • A personal statement describing reasons for pursuing the program 
    • Résumé or curriculum vitae 
    • Two letters of recommendation 
    • No GRE required to apply 
    • Must reside in an approved state 
  • Prerequisite Courses

    Admission to the program requires an undergraduate degree in computer science or equivalent education breakdown. Applicants with a baccalaureate degree in a related field may be able to meet prerequisites with equivalent work experience in computer science and will be considered for conditional admission. 

     The review committee looks for courses in and comprehensive understanding of the following areas: 

     Operating Systems 

    • Overall understanding of operating system design 
    • Familiarity with the topics of process coordination and scheduling, interface devices, memory and device management 

     Networks 

    • Overall understanding of communication network design 
    • Familiarity with the general topics of network architectures and protocols 

    Software Engineering 

    • Overall understanding of programming paradigms and programming constructs in object-oriented languages such as C++ 
    • Knowledge of the important features and concerns of programming languages in common use today 
    • Practical understanding of the basic principles and applications of software engineering, including process models and objected oriented analysis 

     Please view the Work Experience Questions for Applicants to see if your work experience will satisfy some or all of the required prerequisites. 

  • Residency Requirement
    To be considered for admission to this online program, you must reside in an approved state.

Connect with a Specialist

Set up an appointment with your enrollment specialist to learn how you can take advantage of the MS in Cybersecurity program.

Sujeith Ordonez

Sujeith Ordonez, M.A.
Senior Outreach & Recruitment Specialist
±¬ÁÏÉçÇø Extended Learning
(760) 750-8454

 

cyber professional

Funding Options

The cybersecurity master’s degree program is eligible for financial aid. 

Visit the funding page or call 760-750-4850 to learn more about your funding options. Active-duty military, veterans and their dependents should visit the military services page or call 760-750-8705. 

Federal VA educational benefits can be used for this program (not eligible for Cal Vet fee waiver). 



FUNDING OPTIONS

Program Costs

Complete the Master of Science in Cybersecurity in five semesters, thanks to guaranteed class availability that ensures no delays in your educational journey. The program consists of 38 units, priced at $875 per unit.

Invest In Your Future: A Breakdown of Your Educational Journey's Cost 
Semester Units Subtotal*
Fall Semester 1 9 $7,875 
Spring Semester 1 9 $7,875 
Summer Semester 3 $2,625 
Fall Semester 2 9 $7,875 
Spring Semester 2 8 $7,000 
Total 38 $33,250 

*Not all university semester fees are included in this table—see the comprehensive breakdown of Extended Learning fees. Semester tuition subtotals are based on a sample program sequence. All quoted tuition rates are based on previous academic years and are subject to change without advance notice.

Courses

This program has a set schedule of courses that you are expected to follow as part of your cohort. You can view all course descriptions on the . 

Year One

Fall Semester 1

  • MCS 500: Intro to Cybersecurity (2)

    Reviews cybersecurity in today’s world. Uses case studies to analyze the broad impact of cybersecurity. Explores cybersecurity-related issues in the areas of technology, privacy, and law. Uses current and historical cybersecurity events to provide context for and application of fundamental cybersecurity concepts such as confidentiality, integrity, availability, threat, vulnerability, and controls.

    Units: 2

  • MCS 511: Secure Features in Operating System (3)

    An overview of the current security of most commercial operating systems and examines the fundamental concerns of security in modern operating systems. Analysis of the operating systems model for computer system security criteria as it pertains to overall system vulnerability is covered. Based upon the security requirements and general architecture of secure operating systems publically available security enhanced operating systems are examined and evaluated.

    Units: 3

  • MIS 522: Information Systems and Security Management (2)

    Overviews the fundamental principles and components of information systems. Introduces the concepts and topics of Information Technology Security and Risk Management at the organizational level. Studies incentives and the requirements for information security, the integration of security into the systems design process, and life cycle of information security management.

    Units: 2

  • MGMT 521: Organizational Behavior and Leadership for Security Management (2)

    Overview of the key topics in organizational behaviors and leadership seeking to explain people’s behavior and experiences in various types of organizations, as well as how to effectively lead people to accomplish shared goals. Explores how research and knowledge of these topics can be applied in managing information systems and security related projects specifically, and in organizations more generally. Issues in contractual negotiations and effective communication inside organizations will also be addressed.

    Units: 2


Spring Semester 1

  • MCS 510: Security in Computer Networks (3)

    Theoretical and practical aspects of security in computer networks, including wired and wireless networks.  Subjects include: fundamental techniques and protocols used to insure secure communications, common attacks and defenses, and vulnerability assessment of network systems.  Application and operationalization of network security technologies and techniques.

    Prerequisite(s): MATH 503.

    Units: 3

  • MIS 622: Technology Assessment and Security Risk Management (3)

    Examines variety of quantitative models, including financial, economic and business models, to analyze real managerial problems for technology assessment and investment that affect all types of institutions. Introduces the concept of risk and risk management and discusses up-to-date methods for both qualitative and quantitative risk analysis. Focuses on training future information technology or security managers to make better risk decisions.

    Prerequisite(s): MGMT 521 and MIS 522.

    Units: 3

  • MATH 503: Cryptography (3)

    Fundamentals of protecting confidentiality, integrity, and availability of information in computer systems. Covers the fundamentals of cryptographic concepts and methods. Several encryption/decryption algorithms will be discussed. Includes an introduction to the mathematics behind cryptography, cryptographic algorithms including classical methods, symmetric key systems, public key systems, hash functions, digital signatures and certificates, cryptanalysis and attacks, and access control including authentication and authorization.

    Units: 3


Summer Semester 1

  • MIS 621: Information Security Governance (3)

    Covers the fundamentals of developing business rationales for information security (assurance) governance. Studies the development and implementation of IT strategies to integrate assurance functions to improve security, and ensure the preservation of the organization and its ability to continue to operate. Offers a comprehensive view of information security policies in business context and the psychology of implementation. Provides insight into governance, privacy, regulator mandates, business incentives, legal issues.

    Prerequisite(s): MGMT 521 and MIS 522

    Units: 3


Year Two

Fall Semester 2

  • MCS 512: Development of Secure Software (4)

    Introduction to the development of secure software during all phases of the software development life cycle. An emphasis is placed upon the secure code implementation and the most common pitfalls and security bugs found in programming languages. Risk assessments, threat modeling and secure code analysis of existing systems are also considered one of the primary topics. Hands-on exercises will be required in laboratory sessions.

    Units: 4

  • MCS 610: Offensive Security and Penetration Testing (4)

    Introduction to the latest penetration testing techniques. Covers pre-engagement interactions, intelligence gathering, threat modeling, vulnerability analysis, exploitation, post-exploitation, and reporting in penetration testing. Methodologies for web applications will be covered, including choosing the best techniques and tools for security situations. Three hours of lecture and three hours of laboratory.

    Units: 4

  • MCS 680A: Semester-in-Residence Project Writing Workshop (1)

    Provides tools and a focused pathway to develop and complete their Semester in Residence Project. 

    Units: 1


Spring Semester 2

  • MCS 611: Intrusion Detection and Incident Response (4)

    Focuses on investigating threats against computers and network systems.  Covers principles and techniques of intrusion detection such as network traffic analysis, packet analysis, application protocol layer for common protocols and log analysis.  Evaluates the use of intrusion detection tools and services.

    Units: 4

  • MCS 680B: Internship/Semester-in-Residence Project (4)

    Provides industry experience in the Cybersecurity field under the guidance of a graduate committee consisting of a faculty member, an industry representative and the Program Director. Leads to establishing/accomplishing goals, communicating work/project progress, acquiring broad organizational insight and demonstrating core competencies required for the degree. Culminates in a written project document and an oral presentation to fellow students, faculty and industry representatives.

    Units: 4


 

Take a Step Toward Cybersecurity Leadership

APPLY NOW