Program Details

Master of Science in Cyber Security

Offered By: College of Science, Engineering, & Technology
Next Start Date:
Program Now Enrolling
Total Program Credits & Course Length:
Total Program Credits: 34
Online: 8 weeks
Transfer Credits:
Up to 12 credits or 1/3 of the program
Program Tuition Rate:
Online: $489 per credit. [More Info]

Overview

Secure, Protect and Manage a Virtual Environment

Grand Canyon University’s Master of Science in Cyber Security degree program offers the opportunity for students skilled in technology and security-based fields to move into a specialized career in cyber security. As one of the few cybersecurity programs in the nation, GCU’s master’s program trains students to use current, open source and advanced techniques in digital forensics, penetration testing, vulnerability assessment and exploitation techniques –along with other software and applications –to protect an organization’s systems, data, processes and people.

Students focus on various areas of cybersecurity, while gaining the tools to understand and protect against the enemy in cyber warfare and cyber defense activities. These areas include exploring policies, cyber law, national and international ramifications and ethical considerations.

This masters in cybersecurity program is designed for security engineers and architects, IT professionals, chief information security officers (CISO) and those who desire to deepen understanding in their security-based role to increase efficiency and ensure regulations are in place. These individuals will learn to assess, measure, apply and communicate solutions for effective management of infrastructures, IT departments and data centers.

Career changers or those who have a bachelor’s degree in an unrelated field may first earn their Bridge (Master of Science in Cyber Security). This bridge program provides the foundational learning and cybersecurity framework for advancing toward graduate-level skills development in this master’s program.

Degree Outcomes

Elevate Your Skills in IT and Security

Graduates from this online masters in cybersecurity program will possess the ability to apply the Hackers-with-Halos™ methodology, which enables them to build and become a part of a vast network of highly skilled professionals and white-hat penetration testers in the field who operate from a Christian worldview. Prepared to serve as industry leaders, graduates are equipped to apply technical skills and hands-on experience with real-world data for remote-access server maintenance, updates, modifications and security. Acquired skills also include the ability to analyze vulnerabilities, conduct assessments and secure both physical and virtual environments from potential threats.

What You Will Learn

Beyond Theoretical Learning, Intensive Hands-On Experiences

Students can expect to engage in the following course topics:

  • Enterprise Security Infrastructure Design
  • Technology Implementation of Security Solutions
  • Penetration Testing and Risk Management
  • Enterprise Cyber Law and Compliance Strategies
  • Innovation in Security Frameworks

The masters in cybersecurity program concludes with the culminating course Cybersecurity Program Development, which exposes students to the legal and ethical challenges, policies, frameworks and methodologies for building an effective comprehensive cyber security program. Through this hands-on experience, students learn to manage and lead in identifying hardware, software and application requirements for the security of intellectual property, customer data and resources of an organization.

Career Outcomes

Play an Invaluable Role in an Organization's Security

Potential career opportunities with a cyber security degree include corporate information security officer (CISO), corporate security officer (CSO), director of security, senior security engineer/architect, security manager, senior security application developer and information security analyst. These cybersecurity roles are industry-broad as graduates are well-prepared to work in all industries, such as health care, finance and government.

Course List

The programs offered at Grand Canyon University may vary by content and course length. You are currently viewing the program version available in Arizona. In order to view the specific course content and credit length available for your state, please contact a counselor at 1-855-GCU-LOPE or click here to request more information.
Major:
34 credits
Total Degree Requirements:
34 credits

Program Core Courses

Course Description

This course is designed to prepare students for the graduate learning experience at Grand Canyon University. Students have opportunities to develop and strengthen the skills necessary to succeed as graduate students in the College of Science, Engineering, and Technology. Emphasis is placed on utilizing the tools for graduate success.

Course Description

With a brief introduction to cybercrime and cybersecurity, this course will provide students with an overview of the various attacks and the countermeasures organizations can use to defend themselves. Exploring concepts such as defense-in-depth, layered security, vulnerability assessments, risk management, governance and compliance, and encryption; students will become familiar with prevention and protection theories, best practices, and strategies to securing corporate data (intellectual property). This course will conclude with an exploration of the various hacker psychologies and the differences between black-hat, grey-hat, and white-hat (Hackers with Halos) hackers. Prerequisite: UNV-507.

Course Description

This course introduces enterprise infrastructure design; including hardware, software, policies, and business processes. Emphasis is placed on integrating security solutions and theories in alignment with business objectives to achieve sustainability, reliability, and availability while deterring threats from cyber-attacks. This course also introduces students to the NIST Cybersecurity Framework, providing a foundation to formulating a strategy for cybersecurity program design. Prerequisite: CYB-505.

Course Description

This course examines the tools and technologies used to secure an organization’s intellectual property. Students will consider encryption, hardware security, software vulnerabilities, remote access technologies, and layered security defense strategies in the development of secure architectures. A technology-focused course, students will provide effective solutions around firewalls, networking, server security, database and website protocols, and VPN configurations. Prerequisite: CYB-505.

Course Description

This course expands on the technology-focused course of MCY-525, and introduces a policy perspective on security design. Students will consider cyber security frameworks, policies, cyber law, regulations, and standards in the configuration, development, and design of an enterprise policy infrastructure. In addition, students will examine the impact of policy implementation on enterprise systems and personnel management. Prerequisite: CYB-525.

Course Description

This intensive hands-on course will provide with students with the experience of working with various cybersecurity technologies and techniques that hackers and malicious actors use to scan, identify, and exploit vulnerabilities in an organization. Students will also formulate strategies of protection from such threats by identifying risks, countermeasures, security policies, frameworks, and best practices to align and enhance an organization’s security posture through the development of a risk management plan. Prerequisites: CYB-515 and CYB-525.

Course Description

This course explores the human and enterprise aspects of cybersecurity management. From information security awareness to strategic planning; students will begin with the examination of the ideologies behind cybercrime, where attacks come from and why, followed by implementation techniques to best align cybersecurity applications with business objectives. This course provides a look at the strategies security professionals use to identify the attack vectors and plan accordingly to secure information systems using various industry compliances, regulations, and standards to design and implement cost effective controls, policies, and training to implement defense-in-depth techniques. This course ends with an impact analysis of when security measures fail, which includes legal elements and liability and ethical issues relating to forensic investigations. Prerequisite: CYB-535.

Course Description

This course reinforces the significance, use, and deployment of security frameworks from a small-to-medium sized business (SMB) perspective to increase visibility, reduce risk from malicious activity, improve security posture, and enhance infrastructure to secure a company’s intellectual property. Using various controls, policies, best practices, and implementation guides, students will establish a security framework for an organization that secures and aligns with an appropriate regulation (e.g., PCI DSS, HIPAA, SOX, GLBA). Prerequisite: CYB-630.

Course Description

This course culminates the entire program by requiring students to develop a comprehensive cybersecurity program. Evaluating the legal and ethical challenges; incorporating the policies, frameworks, and methodologies; and identifying the hardware, software, and application requirements to secure an organization’s intellectual property, customer data, and resources. Students will apply managerial and leadership skills to develop and communicate an effective cybersecurity program. Prerequisite: CYB-650.

Program Locations

Online

Online

Pursue a next-generation education with an online degree from Grand Canyon University. Earn your degree with convenience and flexibility with online courses that let you study anytime, anywhere. GCU offers the most experienced leadership in delivering online degree programs. Full-time faculty members and fully trained adjunct instructors, equipped with strong academic backgrounds and practical experience in their fields, support you every step of the way. Designed with the career-oriented professional in mind, our online classes provide an intimate environment that stimulates engaging and challenging discussions. Choose from programs across our distinct colleges, in high-demand employment areas. Classes begin frequently.
Evening

Evening

Grand Canyon University’s evening programs cater to the demands of working professionals who prefer an in-person learning environment. Our night classes meet just once per week and offer the interaction and discussion of a typical college classroom. Night classes are designed for a specific number of students, providing a warm and nurturing environment that supports an engaging experience. In an evening cohort, you will progress through your degree program with the same career-minded classmates, providing an opportunity to network and forge relationships that go beyond the classroom. Classes begin frequently at various locations, including our main campus.

* The Department of Education defines how an institution must calculate a program's On-Time Completion rate for federal disclosure purposes. The On-Time Completion rate is based on a program’s published required number of months to complete all degree requirements as provided in the institution’s catalog. Completion statistics are updated every January and are based on the cohort of students who graduated between 7/1 – 6/30 of the preceding year. The On-Time Completion rate is determined by the number of students in the cohort who completed the program within the published program length divided by the number of students in the cohort who graduated.



* Please refer to the Academic Catalog for more information. Program subject to change.