Cybersecurity Concentration, Computer Science, MS

Master's
100% Online through Graduate, Online, and Continuing Education
Computer Science
Older male student on laptop in classroom

In Short

The Cybersecurity concentration will provide you with the necessary skills and knowledge in keeping computer systems and electronic data safe.

We've got you covered
What will I do?
  • Develop the necessary skills and knowledge to pursue careers in the field of cybersecurity such as network security, ethical hacking, digital forensics, and other related areas.
  • Gain an in-depth, cross-disciplinary training experience by taking courses offered by computer science department.
  • Be in high demand as a professional in computer and cybersecurity, the Department of Labor projects 33% job growth in this field from 2023 to 2033, much faster than the average for all occupations.

There are over 450K cybersecurity job openings across the United States*
With more than 450,000 jobs available across the country, your job is out there -- and we can help you obtain the skills you'll need to get hired for it!

The job growth outlook for information security analysts through 2033 is 33%, with 59,100 new jobs in the field. This comes with a median annual wage of $124,910. **

Request Information

Program Overview

The Cybersecurity concentration offers students the opportunity to develop the necessary skills and knowledge to pursue careers in the field of cybersecurity such as network security, ethical hacking, digital forensics, and other related areas.

Apply Now

This concentration will serve those who are interested in pursuing a masters in computer science with a career goal in cybersecurity area, e.g. Information Security Analyst, Security Engineer, Cybersecurity Administrator, or Information security Specialist. Or those who are currently working in computer and/ or IT industry and would like to pursue career in cybersecurity area or increase the competitiveness in their workplaces.

It will teach you to identify threats to networks, including sniffing and spoofing, and explain techniques for ensuring network security, including encryption, authentication, firewalls, and intrusion detection. You will be able to analyze data to detect attacks, communicate security concerns effectively. You will understand cybercrimes and have the tools to recover and/or repair stolen or damaged data files.

You will be required to take the following 4 courses besides the existing 6 required core courses for a Master's in Computer Science: 

  • CSC 7150 Introduction to Cybersecurity 
  • CSC 8025 Computer and Network Security 
  • CSC 8026 Ethical Hacking 
  • CSC 8027 Digital Forensics 

Total Credits

33 credits


Time Frame

While you can complete the program in as few as two years, you have six years to complete the program.

Register for classes

*Source: "Cybersecurity Supply/Demand Heat Map," CyberSeek.
**View the Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook Information Security Analysts (visited 7/24/25).

Requirements and Curriculum

Course Catalog

Two-Year Course Rotation

  • Understand the fundamentals of the cyber-security domain and related issues
  • Identify and define key knowledge areas of cybersecurity
  • Identify cyber threats, assess risks, design and implement security solutions
  • Explain concepts related to applied cryptography, including plain text, cipher-text, symmetric cryptography, asymmetric cryptography, digital signature, message authentication code, hash functions, and modes of encryption operations
  • Describe some classical encryption/decryption techniques
  • Understand the basic principles and distinct uses of public-key cryptosystems
  • Implement some modern encryption/ decryption algorithms such as DES, AES, RSA, and etc.
  • Explain the concepts of malicious code, including viruses, Trojan horses, and worms
  • Describe threats to networks, including sniffing and spoofing, and explain techniques for ensuring network security, including encryption, authentication, firewalls, and intrusion detection
  • Analyze data to detect attacks, communicate security concerns effectively
  • Understand cybercrimes and the tools used to recover and/ or repair stolen or damaged data files
  • Understand the concept of Windows, Linux, Macintosh File Systems, forensics tools, the identification, preservation, collection, examination, analysis, and presentation of evidence
  • Learn to explore the vulnerabilities in various systems and operate the industry-leading tools and framework to perform penetration testing on different target systems
  • Stay updated on emerging cyber threats, all while applying critical thinking and problem-solving skills to protect sensitive information and systems within an organization
  • Information Security Analyst
  • Security Engineer
  • Cybersecurity Administrator
  • Information security Specialist

Applicants must provide:

  • An official transcript of a bachelor's degree from a regionally accredited institution. While no specific academic background is required for admission, preference is given to applicants with undergraduate majors in computer science, mathematics, engineering or a related field of study
  • Professional resume
  • Official transcripts of graduate level course work from a regionally accredited institution (if applicable)
  • Graduate application and fee

International applicants must abide by special deadlines and may be required to submit additional items which can be found on the International Admissions page.

If you're an international applicant, you may be required to demonstrate English language proficiency and complete a transcript credential evaluation. For the most up-to-date information on applying and deadlines, please visit International Admissions

Still have questions? We're here to help!

We know you're busy, so we've given you a few different options to conveniently get the answers you need. You can…

Connect with us

Visit and subscribe to our SGOCE Blog