Cybersecurity, M.S.
Graduate Degree
Take the Next Step
At Marshall University, we believe in the power of education to transform lives - we see it happen all the time. So, create your Marshall Moment. We're ready when you are.
bison
Program Overview

In today’s world, cyber security is key to almost every business and organization. Professionals in computer and information security defend digital information on computers and their servers, mobile devices, networks and other electronic systems from cybercrime and attack. They have a wide range of responsibilities with different roles in government, industry and other organizations. On the job, they are expected to safeguard an organization’s data, computers and networks, as well as creating security plans and monitoring activities. If a breach occurs, they’re responsible for identifying the problem and finding a solution quickly. It requires well-trained professionals skilled in network security, information security and application security to help organizations remain safe from the risk of digital attacks, and we at Marshall University in Huntington, West Virginia, prepare our students well for these challenges.

How Will You Meet the Moment?
bison
Request Info
  • Find out which of our academic programs is right for you.
  • Meet some of our current students and hear about their favorite Marshall moments.
  • Receive invitations to special events for future students.
  • Get help with the application and enrollment process.
Loading...
bison
Featured Courses
CYBR 510 - Intro to Cyber Security
This course provides an overview of the cybersecurity field, the basic foundations of the current technology and its impacts along with the predominant threat components and remediation.
CYBR 620 - Cyberwarfare
The course covers both offensive and defensive techniques pertaining to cybersecurity from techniques to find vulnerabilities and analyze the likelihood of an attack to developing solutions to secure cyber infrastructure.
CS 625 - AI Principles & Methods
Study of machine learning and statistical pattern recognition algorithms and their application to data mining, bioinformatics, speech recognition, natural language processing, robotic control, autonomous navigation, text and web data processing.
A link and text are required to display the button.
bison
Program Highlights
On-Demand

Cyber security has moved to the forefront for organizations and governmental agencies with high demand, and in an ever changing technological environment the need for cyber security experts will continue to grow.

Well Compensated

Cyber security professionals are among the most highly paid, post a 9% salary premium over other IT jobs. A security software engineer receives an average annual salary of $233,333, while a chief security officer brings in an annual salary of $225,000.

Incentives for Higher Ed

The drastic skill gap between cyber security job requirements and the level of skills of fresh bachelor of science graduates has led the government and private sector to offer financial incentives for those looking to pursue a degree in cyber security, such as the National Science Foundation Scholarship for Service (SFS), the Information Assurance Scholarship Program (IASP) and more.

bison
Career Opportunities
Cyber security is a national priority, and the is a severe talent shortage in the cyber security field. Analysts have estimated 1.5 million cyber security job openings in 2019. If you have been considering entering the field or advancing your career within the computing industry, this is the field of choice While the opportunities and job openings in the cyber security field are high, you need to be highly educated to maximize the benefits of this opportunity and to land highly paid jobs. A recent report shows that 84% of cyber security postings require at least a bachelor’s degree and 23% require at least a master’s. A master’s degree in cyber security is valuable, as many employers seek a combination of both experience and education.
  • Information Security Analyst
  • Security Specialist
  • Cryptographer
  • Security Administrator/Manager
  • Security Architect
  • Security Consultant
Take the Next Step