{"id":10366,"date":"2018-12-13T15:00:41","date_gmt":"2018-12-13T20:00:41","guid":{"rendered":"http:\/\/www.marshall.edu\/cecs\/?page_id=10366"},"modified":"2025-04-17T15:05:20","modified_gmt":"2025-04-17T20:05:20","slug":"m-s-in-cybersecurity","status":"publish","type":"page","link":"https:\/\/www.marshall.edu\/cecs\/m-s-in-cybersecurity\/","title":{"rendered":"Cybersecurity, M.S."},"content":{"rendered":"<div class=\"w-full xl:container mx-auto px-6\">&nbsp;<\/p>\n<div class=\"px-6  bg-green-light border-green border rounded-md mb-6 last:mb-0 first:mt-0 mt-6 first:mb-8\"><div class=\"flex\"><div class=\"mt-5 shrink-0\"><svg data-slot=\"icon\" class=\" h-5 w-5 fill-green-dark\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><path d=\"M18 5a2 2 0 0 1 2 2v8.526a2 2 0 0 0 .212.897l1.068 2.127a1 1 0 0 1-.9 1.45H3.62a1 1 0 0 1-.9-1.45l1.068-2.127A2 2 0 0 0 4 15.526V7a2 2 0 0 1 2-2z\"\/><path d=\"M20.054 15.987H3.946\"\/><\/svg><\/div><div class=\"ml-5\"><div class=\"font-semibold uppercase text-green-darker mt-4 mb-2 lg:text-xl\" role=\"heading\" aria-level=\"2\"><\/div><div class=\"mt-2 mb-4 text-green-darker\">Marshall University offers the Cybersecurity, M.S. fully online. Learn more about <a class=\"text-brown hover:text-brown-dark\"href=\"\/online-learning\/\">online learning<\/a> at Marshall.<\/div><\/div><\/div><\/div>\n<h2>Program Description<\/h2>\n<p>The Master of Science in Cybersecurity program provides students with the knowledge, skills, and professional practices needed for careers in the cybersecurity fields. The program also prepares students who desire to pursue further graduate work that leads to a Ph.D. degree. The curriculum covers several advanced topics in cybersecurity, such as; advanced cryptography, cybersecurity policy, cyber risk and vulnerability, cyber operation, wireless network security, web\/mobile security, software security, security in Internet of Things (IoT), etc. These courses will be taught using the very latest, state-of-the-art security tools and technologies.<\/p>\n<p>Marshall University is a designated National Centers of Academic Excellence in Cybersecurity (NCAE-CD). To learn more about NCAE designation, please visit: <a href=\"https:\/\/caecommunity.org\">https:\/\/caecommunity.org<\/a><\/p>\n<p><a href=\"https:\/\/caecommunity.org\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-15471\" src=\"http:\/\/www.marshall.edu\/cecs\/files\/CAEC-Seal.png\" alt=\"\" width=\"215\" height=\"218\" srcset=\"https:\/\/www.marshall.edu\/cecs\/files\/CAEC-Seal.png 493w, https:\/\/www.marshall.edu\/cecs\/files\/CAEC-Seal-296x300.png 296w\" sizes=\"auto, (max-width: 215px) 100vw, 215px\" \/><\/a><\/p>\n<h3>Why Master Degree in Cybersecurity?<\/h3>\n<p>Cyber security is a national priority and there is a severe talent shortage in cybersecurity area with a negative unemployment rate and analysts are estimating that there will be 1.5 million cyber security job openings by 2019. If you have been considering entering the field or advancing your career within the computing industry, this is the field of choice. While the opportunities and job openings in the cyber security field are high, you need to be highly educated to maximize the benefits of this opportunity and to land highly paid jobs. Recent report shows that 84% of cybersecurity postings require at least a bachelor\u2019s degree and 23% require at least a master\u2019s. Although obtaining an advanced degree requires a significant investment of both time and money, M.S. in Cybersecurity is the degree that may well be worth since many employers seek a combination of both experience and education. Here are several reasons you should consider a master\u2019s degree in cybersecurity:<\/p>\n<ul>\n<li>High Salary<\/li>\n<\/ul>\n<p>Cyber security professionals are among the most highly paid, posting a 9% salary premium over other IT jobs in general. A security software engineer receives an average annual salary of $233,333, while a chief security officer brings in an annual salary of $225,000.<\/p>\n<ul>\n<li>Job Security<\/li>\n<\/ul>\n<p>Cyber security has moved to the forefront as organizations and governmental agencies with high demand and this job will not disappear as long as we are using computers.<\/p>\n<ul>\n<li>Incentive for Higher Education<\/li>\n<\/ul>\n<p>The drastic skill gap between cybersecurity job requirement and the level of skills of fresh B.S. graduates has led the government and private sector to offer financial incentives for those looking to pursue a degree in cybersecurity such as the National Science Foundation Scholarship for Service (SFS), the Information Assurance Scholarship Program (IASP), etc.<\/p>\n<h3>Why Choose the Cybersecurity Graduate Degree at Marshall University?<\/h3>\n<p>The M.S. in Cybersecurity program at Marshall University is designed to prepare professionals in technical sector with or without cybersecurity background to fill the fast growing jobs in cybersecurity as well as serving the need of the important continual study in a field where life-long learning is paramount.<\/p>\n<p>The curriculum covers the advanced topics in cybersecurity such as advanced cryptography, cybersecurity policy, cyber risk and vulnerability, cyber risk and operation, wireless network security, web\/mobile security, software security, security in Internet of Things (IoT), and more by using the state-of-the-art security tools and technologies.<\/p>\n<p>The program also prepares students who desire to pursue further graduate work leading to a Ph.D. degree.<\/p>\n<h3>What Careers in the Cybersecurity?<\/h3>\n<p>Professionals in Computer and Information Security have a wide range of responsibilities with different roles in government organizations and industries including banks, retailers, etc. On the job, you are expected to safeguard an organization\u2019s data, computers, networks, create security plans and monitor activities. If a breach occurs, you\u2019ll be responsible for identifying the problem and finding a solution quickly.<\/p>\n<p>\u2013 Security Specialist, Cryptographer, Security Administrator\/Manager, Incident Res-ponder, Penetration Tester, Security Architect, Security Consultant, etc.<br \/>\n<!-- here --><div><div class=\"courseleaf_admissions mt-8\">\n\n<h2>Admission Requirements and Transfer Criteria<\/h2> <p>Applicants should follow the admissions process stated in the graduate catalog or the graduate admissions web site. Minimum requirements for admission is a four-year bachelor\u2019s degree with a GPA of 2.75 or higher out of 4.0 in Cybersecurity or computer science related programs.<\/p> <p>Whether a student meets the above requirements will be determined by the chair or designee of the Department of Computer Sciences and Electrical Engineering, based on the information provided in the admission application and transcripts. Applicants with a four-year bachelor\u2019s degree in a major other than a cybersecurity or computer science related program may be admitted to the program with a condition of successful completion of the following three bridge courses with a grade of <em>B<\/em> or above in the first two semesters of the program:<\/p> <ul> \t<li>Data Structures and Algorithms (<span class=\"sc_courseinline\"><span class=\"code_bubble\" data-code-bubble=\"CS 210\">CS\u00a0210<\/span> Data Structures and Algorithms<\/span>)<\/li>  \t<li>lnternetworking (<span class=\"sc_courseinline\"><span class=\"code_bubble\" data-code-bubble=\"CS 320\">CS\u00a0320<\/span> Internetworking<\/span>)<\/li>  \t<li>Statistics (<span class=\"sc_courseinline\"><span class=\"code_bubble\" data-code-bubble=\"STA 225\">STA\u00a0225<\/span> Introductory Statistics (CT)<\/span>\u00a0or <span class=\"sc_courseinline\"><span class=\"code_bubble\" data-code-bubble=\"STA 345\">STA\u00a0345<\/span> Applied Prob and Stat<\/span>)<\/li>  <\/ul>  <p>Foreign nationals must provide proof of English proficiency with a minimum score of 6.5 in IELTS or 80 on the TOEFL IBT (or 550 paper-based) and must have met all other admission criteria prior to registering for the first semester of courses.<\/p>\n\n<\/div><\/div><\/p>\n<h2>M.S. Degree Requirements<\/h2>\n<p>The M.S. degree requires 30 credit hours of graduate work. At least 15 credit hours should be taken from 600-level courses.<\/p>\n<ul>\n<li>\n<h3>Core Required (9 CR)<\/h3>\n<\/li>\n<\/ul>\n<div class=\"large-table\">\n<table class=\"table table-striped table-bordered table-wrapped\">\n<tbody>\n<tr>\n<td>CFS 630<\/td>\n<td>Cyber Threat Intelligence<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CFS 665<\/td>\n<td>Cybersecurity of IOT and Industrial Control Systems<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CYBR 510<\/td>\n<td>Introduction to Cyber Security<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<ul>\n<li>\n<h3>Concentration (12 CR)<\/h3>\n<\/li>\n<\/ul>\n<h4><em>Cyber Defense<\/em><\/h4>\n<p>Pick 4 out of the following:<\/p>\n<div class=\"large-table\">\n<table class=\"table table-striped table-bordered table-wrapped\">\n<tbody>\n<tr>\n<td>CFS 520<\/td>\n<td>Incident Response<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CFS 650<\/td>\n<td>Advanced Cyber Defense<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CYBR 500<\/td>\n<td>Computer Security Design<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CYBR 535<\/td>\n<td>Cyber Risk<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CYBR 542<\/td>\n<td>Cyber Operations<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CYBR 615<\/td>\n<td>Cybersecurity Vulnerability Assessment<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CYBR 620<\/td>\n<td>Cyberwarfare<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CYBR 680<\/td>\n<td>Research in Cybersecurity*<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>*(may only be counted if the thesis option is chosen)<\/p>\n<\/div>\n<h4><em>Cyber Forensics<\/em><\/h4>\n<p>Pick 4 out of the following:<\/p>\n<div class=\"large-table\">\n<table class=\"table table-striped table-bordered table-wrapped\">\n<tbody>\n<tr>\n<td>CFS 500<\/td>\n<td>Intro to Digital Forensics<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CFS 520<\/td>\n<td>Incident Response<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CFS 567<\/td>\n<td>Mobile Device Forensics<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CFS 640<\/td>\n<td>Advanced Cyber Forensics<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CFS 662<\/td>\n<td>Network Forensics<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CYBR 615<\/td>\n<td>Cybersecurity Vulnerability Assessment<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CYBR 620<\/td>\n<td>Cyberwarfare<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CYBR 680<\/td>\n<td>Research in Cybersecurity*<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>*(may only be counted if the thesis option is chosen)<\/p>\n<\/div>\n<h4><em>Cyber Management <\/em><\/h4>\n<p>Pick 4 out of the following:<\/p>\n<div class=\"large-table\">\n<table class=\"table table-bordered table-striped table-wrapped\">\n<tbody>\n<tr>\n<td>CYBR 530<\/td>\n<td>Cybersecurity Policies and Management<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CYBR 535<\/td>\n<td>Cyber Risk<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CYBR 542<\/td>\n<td>Cyber Operations<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>EM 660<\/td>\n<td>Project Management<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>EM675<\/td>\n<td>Engineering Economics<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<tr>\n<td>CYBR 680<\/td>\n<td>Research in Cybersecurity*<\/td>\n<td>3 CR<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>*(may only be counted if the thesis option is chosen)<\/p>\n<\/div>\n<ul>\n<li>\n<h3>Electives (9 CR)<\/h3>\n<\/li>\n<\/ul>\n<p><strong><u>9 hours of the following courses that are not in the core or concentration<\/u><\/strong><\/p>\n<div class=\"&quot;large-table\">\n<p>Any 500 or 600 level CFS courses<\/p>\n<p>Any 500 or 600-level CYBR courses<\/p>\n<p>Any 500 or 600 level CS course<\/p>\n<table class=\"table table-bordered table-striped table-wrapped\">\n<tbody>\n<tr>\n<td>CYBR 681<\/td>\n<td>Thesis*<\/td>\n<\/tr>\n<tr>\n<td>MIS 600<\/td>\n<td>Management Information Systems<\/td>\n<\/tr>\n<tr>\n<td>MIS 647<\/td>\n<td>IT Disaster Planning and Recovery<\/td>\n<\/tr>\n<tr>\n<td>EM 660<\/td>\n<td>Project Management<\/td>\n<\/tr>\n<tr>\n<td>EM 675<\/td>\n<td>Engineering Economics<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Other graduate courses as approved by the advisor<br \/>\n*(may only be counted if the thesis option is chosen and CYBR 680 is also taken)<\/p>\n<\/div>\n<h2>Plan of Study<\/h2>\n<p>This is a link to a typical two-year study plan for a full-time (9 credit hours a semester) student:<\/p>\n<p><a href=\"https:\/\/catalog.marshall.edu\/graduate\/programs-az\/engineering-computer-sciences\/cybersecurity-ms\/#planofstudytext\">https:\/\/catalog.marshall.edu\/graduate\/programs-az\/engineering-computer-sciences\/cybersecurity-ms\/#planofstudytext<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Program Description The Master of Science in Cybersecurity program provides students with the knowledge, skills, and professional practices needed for careers in the cybersecurity fields. The program also prepares students who desire to pursue further graduate work that leads to a Ph.D. degree. The curriculum covers several advanced topics in cybersecurity, such as; advanced [&hellip;]<\/p>\n","protected":false},"author":203,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-legacy.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-10366","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.marshall.edu\/cecs\/wp-json\/wp\/v2\/pages\/10366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marshall.edu\/cecs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.marshall.edu\/cecs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.marshall.edu\/cecs\/wp-json\/wp\/v2\/users\/203"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marshall.edu\/cecs\/wp-json\/wp\/v2\/comments?post=10366"}],"version-history":[{"count":34,"href":"https:\/\/www.marshall.edu\/cecs\/wp-json\/wp\/v2\/pages\/10366\/revisions"}],"predecessor-version":[{"id":15542,"href":"https:\/\/www.marshall.edu\/cecs\/wp-json\/wp\/v2\/pages\/10366\/revisions\/15542"}],"wp:attachment":[{"href":"https:\/\/www.marshall.edu\/cecs\/wp-json\/wp\/v2\/media?parent=10366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}