Master’s in Cybersecurity Degree

Master of Science in Cybersecurity

Offered By: College of Engineering and Technology

Advance Your Tech Career With an MS in Cybersecurity

In a world driven by modern technology, safeguarding sensitive information and digital assets is of paramount importance. The Master of Science in Cybersecurity program at Grand Canyon University is designed to teach you how to combat the threat of cyber-attacks. Offered by the College of Engineering and Technology, you will be taught the factors that influence and jeopardize cybersecurity. This comprehensive program trains you to safeguard systems, data, processes and people through the use of white hat practices.

If you find digital forensics, penetration testing, vulnerability assessment and exploitation techniques interesting, this program may be a good option for you. This cybersecurity master’s degree can help equip you with the specialized skills and knowledge to tackle the evolving landscape of cyber threats, cyber-warfare and cyber-defense issues.

$169,510

Median annual wage for computer and information systems managers in 2023.1

Get More Information

Loading Form

GCU understands the need for flexible learning paths. With courses offered online, you have the ability to earn your degree while continuing to meet your current obligations. Our online learning platform can enable you to collaborate with and learn from your peers while being in the comfort of your own home.

GCU recognizes the needs of working professionals and individuals who seek face-to-face learning experiences. Our on-campus programs are tailored to suit these in-person preferences. Through hands-on experience in practical scenarios, you will study how to implement security measures that defend against a wide array of cyber risks.

Graduate-Level Cybersecurity Course Topics

During this program, you will study core competencies that can help you serve as an industry leader. Knowledgeable faculty will teach you the advanced technical skills to defend organizations from cyber-attacks, while also focusing on enhancing your abilities in threat detection, risk assessment, leadership qualities and critical thinking abilities.

Graduate-level cybersecurity courses delve into a diverse range of advanced topics designed to equip you with a comprehensive understanding of the field's complexities, such as:

  • Advanced network security
  • Cyber threat intelligence
  • Digital forensics
  • Ethical hacking and penetration testing
  • Security governance and compliance

The Christian worldview and ethical decision-making within the digital realm are given special focus. This on-campus or online master’s in cybersecurity educates students on the Hackers with Halos™ methodology. Hackers with Halos™ is an approach that embraces Christian ethics and principles and applies them to white-hat computer applications.

This degree culminates with a capstone course: Cybersecurity Program Development. Capstone projects allow you to apply your program knowledge through practical projects that demonstrate your acquired skills at the end of your studies. MS in Cybersecurity students will be asked to develop a full cybersecurity program, taking any ethical or legal challenges into consideration.

Careers for Graduates With a Master of Science in Cybersecurity

GCU’s Master of Science in Cybersecurity can provide advanced, hands-on learning experiences that can prepare you to pursue potentially challenging, high-tech careers. This cybersecurity program imparts the following learning objectives and core competencies:

  • Risk assessment, countermeasures, security policies and frameworks
  • Ideologies of cyber-crime, identification of attack vectors and impact analysis of failed security measures
  • Policy perspectives on security design
  • Protection of intellectual property through encryption, hardware security and layered security defense strategies

By playing a pivotal role in ensuring the security of sensitive information and digital infrastructure, graduates of this program can make contributions across industries like technology, finance, healthcare and government, opening doors to diverse job opportunities, such as:

  • Computer and information systems manager
  • Information security analyst
  • Computer network support specialist
  • Computer network architect
  • Database administrator
  • Database architect
  • Network and computer systems administrator

If you are interested in pursuing a Master of Science in Cybersecurity but hold an undergraduate degree in an unrelated field, one viable option is to apply for a certificate in cybersecurity before proceeding with the MS in Cybersecurity degree. Additionally, some students may opt for a bridge program in information technology management or a bridge in computer science that can offer a seamless transition, providing the foundational knowledge needed to advance in a graduate program. Students interested in changing careers can use the certificate and bridge programs to acquire the necessary foundational knowledge that can help you prepare for this graduate program.

Earn Your MS in Cybersecurity From an Accredited University

Elevate your expertise and career prospects in the field of cybersecurity by pursuing your Master of Science from our accredited university. Our program can offer an education that is from a recognized and reputable university that may lead to diverse opportunities in this field.

Master’s in Cybersecurity Degree FAQs

Discover solutions to frequently asked questions regarding our MS in Cybersecurity program. Whether you're seeking insights into degree requirements, online course formats, or future career possibilities, you can find key information covered here.

The duration to complete a master's in cybersecurity varies based on the program structure, your course load and whether you study full-time or part-time. Fill out the form on this page to speak to a university counselor to better understand how long it takes to earn your cybersecurity master’s degree. With up to 12 transfer credits, it may be possible to complete the program in less time.

If you're motivated to enhance your education and bolster your career opportunities, pursuing a master's in cybersecurity online or in-person can be a valuable choice. The U.S. Bureau of Labor Statistics Occupational Outlook Handbook estimates job growth for information security analysts to increase by about 32% from 2022 to 2032, faster than average, accounting for an estimated increase of 53,200 jobs in the field.2

This cybersecurity program is offered fully online for students who need maximum flexibility, as well as on campus for those who prefer to learn in person. The online master’s in cybersecurity can provide you with the flexibility to pursue graduate school as a path to potentially reach your professional goals.

Graduates of the on-campus and online master’s in cybersecurity degree may position themselves to pursue a career as an information technology manager who plans, coordinates and directs the security of an organization’s network. According to the U.S. Bureau of Labor Statistics, the median annual wage for computer and information systems managers was $169,510 in May 2023.1 Among many others, graduates may also position themselves to seek employment as an information security analyst. As of May 2023, information security analysts have a median annual wage of $120,360, according to the U.S. Bureau of Labor Statistics.3

Ready to take the next step in securing your future? Explore how our MS in Cybersecurity program can empower you to work toward elevating your career in the realm of cybersecurity by joining us today.

1 The earnings referenced were reported by the U.S. Bureau of Labor Statistics (“BLS”), Computer and Information Systems Managers as of May 2023, retrieved on May 20, 2024. Due to COVID-19, data from 2020 to 2023 may be atypical compared to prior years. The pandemic may also impact the predicted future workforce outcomes indicated by the BLS. BLS calculates the median using salaries of workers from across the country with varying levels of education and experience and does not reflect the earnings of GCU graduates as Computer and Information Systems Managers. It does not reflect earnings of workers in one city or region of the country. It also does not reflect a typical entry-level salary. Median income is the statistical midpoint for the range of salaries in a specific occupation. It represents what you would earn if you were paid more money than half the workers in an occupation, and less than half the workers in an occupation. It may give you a basis to estimate what you might earn at some point if you enter this career. You may also wish to compare median salaries if you are considering more than one career path. Grand Canyon University can make no guarantees on individual graduates’ salaries as the employer the graduate chooses to apply to, and accept employment from, determines salary not only based on education, but also individual characteristics and skills and fit to that organization (among other categories) against a pool of candidates.

2 COVID-19 has adversely affected the global economy and data from 2020 and 2021 may be atypical compared to prior years. The pandemic may impact the predicted future workforce outcomes indicated by the U.S. Bureau of Labor Statistics as well. Accordingly, data shown is effective September 2022, which can be found here: U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Information Security Analysts, retrieved on May 20, 2024.

3 The earnings referenced were reported by the U.S. Bureau of Labor Statistics (“BLS”), Information Security Analysts as of May 2023, retrieved on May 20, 2024. Due to COVID-19, data from 2020 to 2023 may be atypical compared to prior years. The pandemic may also impact the predicted future workforce outcomes indicated by the BLS. BLS calculates the median using salaries of workers from across the country with varying levels of education and experience and does not reflect the earnings of GCU graduates as Information Security Analysts. It does not reflect earnings of workers in one city or region of the country. It also does not reflect a typical entry-level salary. Median income is the statistical midpoint for the range of salaries in a specific occupation. It represents what you would earn if you were paid more money than half the workers in an occupation, and less than half the workers in an occupation. It may give you a basis to estimate what you might earn at some point if you enter this career. You may also wish to compare median salaries if you are considering more than one career path. Grand Canyon University can make no guarantees on individual graduates’ salaries as the employer the graduate chooses to apply to, and accept employment from, determines salary not only based on education, but also individual characteristics and skills and fit to that organization (among other categories) against a pool of candidates.

TOTAL CREDITS & COURSE LENGTH:
Total Credits: 34
Online: 8 weeks
[More Info]
TRANSFER CREDITS:
Up to 12 credits or 1/3 of the total program requirements in transfer (whichever is less)
TUITION RATE:

Course List

Major:
34 credits
Degree Requirements:
34 credits

Core Courses

Course Description

This course is designed to prepare students for the graduate learning experience at Grand Canyon University. Students have opportunities to develop and strengthen the skills necessary to succeed as graduate students in the College of Engineering and Technology and the College of Natural Sciences. Emphasis is placed on utilizing the tools for graduate success.

Course Description

With a brief introduction to cybercrime and cybersecurity, this course will provide students with an overview of the various attacks and the countermeasures organizations can use to defend themselves. Exploring concepts such as defense-in-depth, layered security, vulnerability assessments, risk management, governance and compliance, and encryption; students will become familiar with prevention and protection theories, best practices, and strategies to securing corporate data (intellectual property). This course will conclude with an exploration of the various hacker psychologies and the differences between black-hat, grey-hat, and white-hat (Hackers with Halos) hackers. Prerequisite: UNV-504 or UNV-507 or enrollment in certificate program.

Course Description

This course introduces enterprise infrastructure design; including hardware, software, policies, and business processes. Emphasis is placed on integrating security solutions and theories in alignment with business objectives to achieve sustainability, reliability, and availability while deterring threats from cyber-attacks. This course also introduces students to the NIST Cybersecurity Framework, providing a foundation to formulating a strategy for cybersecurity program design. Prerequisite: CYB-505.

Course Description

This course examines the tools and technologies used to secure an organization’s intellectual property. Students will consider encryption, hardware security, software vulnerabilities, remote access technologies, and layered security defense strategies in the development of secure architectures. A technology-focused course, students will provide effective solutions around firewalls, networking, server security, database and website protocols, and VPN configurations. Prerequisites: CYB-505 and CYB-515.

Course Description

This course introduces a policy perspective on security design. Students will consider cybersecurity frameworks, policies, cyber law, regulations, and standards in the configuration, development, and design of an enterprise policy infrastructure. In addition, students will examine the impact of policy implementation on enterprise systems and personnel management. Prerequisite: CYB-515.

Course Description

This intensive hands-on course will provide with students the experience of working with various cybersecurity technologies and techniques that hackers and malicious actors use to scan, identify, and exploit vulnerabilities in an organization. Students will also formulate strategies of protection from such threats by identifying risks, countermeasures, security policies, frameworks, and best practices to align and enhance an organization’s security posture through the development of a risk management plan. Prerequisites: CYB-515 and CYB-525.

Course Description

This course explores the human and enterprise aspects of cybersecurity management. From information security awareness to strategic planning; students will begin with the examination of the ideologies behind cybercrime, where attacks come from and why, followed by implementation techniques to best align cybersecurity applications with business objectives. This course provides a look at the strategies security professionals use to identify the attack vectors and plan accordingly to secure information systems using various industry compliances, regulations, and standards to design and implement cost effective controls, policies, and training to implement defense-in-depth techniques. This course ends with an impact analysis of when security measures fail, which includes legal elements and liability and ethical issues relating to forensic investigations. Prerequisite: CYB-535.

Course Description

This course reinforces the significance, use, and deployment of security frameworks from a small-to-medium sized business (SMB) perspective to increase visibility, reduce risk from malicious activity, improve security posture, and enhance infrastructure to secure a company’s intellectual property. Using various controls, policies, best practices, and implementation guides, students will establish a security framework for an organization that secures and aligns with an appropriate regulation (e.g., PCI DSS, HIPAA, SOX, GLBA). Prerequisites: CYB-535 and CYB-630.

Course Description

This course culminates the entire program by requiring students to develop a comprehensive cybersecurity program. Evaluating the legal and ethical challenges; incorporating the policies, frameworks, and methodologies; and identifying the hardware, software, and application requirements to secure an organization’s intellectual property, customer data, and resources. Students will apply managerial and leadership skills to develop and communicate an effective cybersecurity program. Prerequisites: CYB-610, CYB-630, and CYB-650.

  • GCU cannot and will not promise job placement, a job, graduate school placement, transfer of GCU program credits to another institution, promotion, salary, or salary increase. Please see the Career Services Policy in the University Policy Handbook.
  • Please note that this list may contain programs and courses not presently offered, as availability may vary depending on class size, enrollment and other contributing factors. If you are interested in a program or course listed herein please first contact your University Counselor for the most current information regarding availability.
  • Please refer to the Academic Catalog for more information. Programs or courses subject to change

Locations

GCU Online Student


Pursue a next-generation education with an online degree from Grand Canyon University. Earn your degree with convenience and flexibility with online courses that let you study anytime, anywhere.

GCU Evening Student


Grand Canyon University’s evening programs cater to the demands of working professionals who prefer an in-person learning environment. Our night classes meet just once per week and offer the interaction and discussion of a typical college classroom.