Master of Science in Cybersecurity Management
The 🌐 icon appears in the title of traditional courses that are also available as a set of module courses.
Description and Outcomes
The Master of Science in Cybersecurity Management will prepare graduates for leadership roles directing and protecting critical information infrastructures. You will learn to develop, implement, evaluate, and update the cybersecurity policies and practices that allow an organization to effectively respond to the dynamic cybersecurity landscape. Graduates will be adept in the management of information continuity, asset classification and control, compliance management, and the secure administration of IT infrastructure, as well as incident response.
The Master of Science in Cybersecurity Management program consists of a minimum of 60 quarter credit hours. Upon successful completion of the program, you will be awarded a master of science degree.
- Theory and Principles: Evaluate theories, principles, and best practices related to the evolving global cybersecurity landscape by assessing and reviewing recent strategies.
- Industry Research: Demonstrate the scholastic maturity to develop research topics and projects based on underlying cybersecurity principles learned throughout the program.
- Critical Thinking: Recommend appropriate cybersecurity theories and frameworks to stakeholders to evaluate, mitigate, and manage ongoing risks, threats, and vulnerabilities in contexts of uncertainty.
- Decision Analysis: Analyze data using accepted best practices for the purpose of synthesizing an effective and ethical cybersecurity solution.
In addition to the discipline-specific outcomes, professional competencies are integrated throughout your academic program. You can review the professional competencies associated with your academic program in the Professional Competencies section of this Catalog.
Accelerated Master of Science in Cybersecurity Management Option
If you are a graduate of the University's Bachelor of Science in Analytics, Bachelor of Science in Cloud Computing and Solutions, Bachelor of Science in Cybersecurity, or Bachelor of Science in Information Technology, are granted admission to the Master of Science in Cybersecurity Management, and meet the requirements for the accelerated Master of Science in Cybersecurity Management option, you may have up to three courses waived to matriculate into a shortened program.
In order to qualify for the graduate course waivers, you must meet the following criteria:
- Complete your bachelor’s degree with a minimum cumulative GPA of 3.2.
- Obtain a grade of “B” or above in each undergraduate course required for graduate course waiver (defined below).
|Waived Graduate Course||Undergraduate Courses Required for Graduate Course Waiver|
|IT537||IT277, IT279, and IT410|
|IT542||IT262 and IT395|
|IT550||IT316 and IT411|
- Students entering the Master of Science in Cybersecurity Management program should already possess an in-depth knowledge of computer systems and networking technology, good mathematical and communication skills, and familiarity with Internet and wireless applications. Required information technology (IT) skillsets should be equivalent to a Bachelor of Science in Information Technology (BSIT), a Master of Science in Information Technology (MSIT), or similar degree, or an appropriate combination of IT professional certifications and experience.
- You are required to take and pass IT513 🌐 Writing and Critical Thinking for the IT Professional in your first term.
- You may enroll in no more than one course per term for your first three terms. After completing your third term, you may enroll in two courses per term if your cumulative GPA is 3.5 or higher. Exceptions to this policy require the approval of the Dean of the School of Business and Information Technology or a designee.
- If, for any reason, you are required to complete additional capstone hours during your program, you may complete them during the normal course of study or you may contact your Student Advisor to secure an extension. IT596 IT Graduate Capstone Extension Course is taken after IT595 Master's Capstone in Cybersecurity Management and is for the specific purpose of providing a means for capstone project or thesis completion. Approval of the Dean or the Department Chair is required for enrollment in IT596 IT Graduate Capstone Extension Course. If an extension is granted, the University will not charge tuition for the extension course; however, you will be required to pay the normal resource fee.
Certification, State Board, and National Board Exams
Certain state certification and licensure boards have specific educational requirements for programs to lead to a license or nongovernmental certification that is a precondition for employment in a recognized occupation.
Unless otherwise specified, Purdue Global's programs are not designed to meet any specific state’s licensure or certification requirements. If certain licensed occupations, vocations, or professions are not explicitly listed, Purdue Global has not reviewed the licensure or certification requirements of those occupations, vocations, or professions, nor intended the program to meet such requirements. Licensure-track programs may limit enrollment to students in certain states; please see Purdue Global’s Program Availability Information to determine enrollment eligibility.
You are responsible for understanding the requirements of optional certification exams. Such requirements may change during the course of your program. You are not automatically certified in any way upon program completion. Although certain programs are designed to prepare you to take various optional certification exams, Purdue Global cannot guarantee you will be eligible to take these exams or become certified. Your eligibility may depend on your work experience, completion of education and/or degree requirements, not having a criminal record, meeting other certification requirements, or the program or the University itself having appropriate accreditation or licensure.
The 🌐 icon appears in the title of traditional courses that are also available as a set of module courses. Module course availability may be limited to certain academic calendars. See Course Types for information about module courses.
|IN505||Security for Analytics||4|
|IT513||🌐 Writing and Critical Thinking for the IT Professional||4|
|IT527||🌐 Foundations in Data Analytics||4|
|IT528||🌐 Quantitative Risk Analysis||4|
|IT537||🌐 Introduction to Cybersecurity||4|
|IT540||🌐 Management of Information Security||4|
|IT542||🌐 Ethical Hacking and Network Defense||4|
|IT543||🌐 Cryptography Concepts and Techniques||4|
|IT544||Platforms, Applications, and Data Security||4|
|IT545||Wireless, Mobile, and Cloud Security||4|
|IT550||🌐 Computer Forensics and Investigations||4|
|IT590||🌐 Legal and Ethical Issues in IT||4|
|IT591||IT Security Auditing and Assessments||4|
|IT592||Financial Decision-Making in IT and Security||4|
|IT595||Master's Capstone in Cybersecurity Management||4|
|Total Core Requirements||60|