Master of Science in Cyber Security
Program Core Courses
This course is designed to prepare students for the graduate learning experience at Grand Canyon University. Students have opportunities to develop and strengthen the skills necessary to succeed as graduate students in the College of Science, Engineering, and Technology. Emphasis is placed on utilizing the tools for graduate success.
With a brief introduction to cybercrime and cybersecurity, this course will provide students with an overview of the various attacks and the countermeasures organizations can use to defend themselves. Exploring concepts such as defense-in-depth, layered security, vulnerability assessments, risk management, governance and compliance, and encryption; students will become familiar with prevention and protection theories, best practices, and strategies to securing corporate data (intellectual property). This course will conclude with an exploration of the various hacker psychologies and the differences between black-hat, grey-hat, and white-hat (Hackers with Halos) hackers. Prerequisite: UNV-507.
This course introduces enterprise infrastructure design; including hardware, software, policies, and business processes. Emphasis is placed on integrating security solutions and theories in alignment with business objectives to achieve sustainability, reliability, and availability while deterring threats from cyber-attacks. This course also introduces students to the NIST Cybersecurity Framework, providing a foundation to formulating a strategy for cybersecurity program design. Prerequisite: CYB-505.
This course examines the tools and technologies used to secure an organization’s intellectual property. Students will consider encryption, hardware security, software vulnerabilities, remote access technologies, and layered security defense strategies in the development of secure architectures. A technology-focused course, students will provide effective solutions around firewalls, networking, server security, database and website protocols, and VPN configurations. Prerequisite: CYB-505.
This course expands on the technology-focused course of CYB-525, and introduces a policy perspective on security design. Students will consider cyber security frameworks, policies, cyber law, regulations, and standards in the configuration, development, and design of an enterprise policy infrastructure. In addition, students will examine the impact of policy implementation on enterprise systems and personnel management. Prerequisite: CYB-525.
This intensive hands-on course will provide with students the experience of working with various cybersecurity technologies and techniques that hackers and malicious actors use to scan, identify, and exploit vulnerabilities in an organization. Students will also formulate strategies of protection from such threats by identifying risks, countermeasures, security policies, frameworks, and best practices to align and enhance an organization’s security posture through the development of a risk management plan. Prerequisites: CYB-515 and CYB-525.
This course explores the human and enterprise aspects of cybersecurity management. From information security awareness to strategic planning; students will begin with the examination of the ideologies behind cybercrime, where attacks come from and why, followed by implementation techniques to best align cybersecurity applications with business objectives. This course provides a look at the strategies security professionals use to identify the attack vectors and plan accordingly to secure information systems using various industry compliances, regulations, and standards to design and implement cost effective controls, policies, and training to implement defense-in-depth techniques. This course ends with an impact analysis of when security measures fail, which includes legal elements and liability and ethical issues relating to forensic investigations. Prerequisite: CYB-535.
This course reinforces the significance, use, and deployment of security frameworks from a small-to-medium sized business (SMB) perspective to increase visibility, reduce risk from malicious activity, improve security posture, and enhance infrastructure to secure a company’s intellectual property. Using various controls, policies, best practices, and implementation guides, students will establish a security framework for an organization that secures and aligns with an appropriate regulation (e.g., PCI DSS, HIPAA, SOX, GLBA). Prerequisite: CYB-630.
This course culminates the entire program by requiring students to develop a comprehensive cybersecurity program. Evaluating the legal and ethical challenges; incorporating the policies, frameworks, and methodologies; and identifying the hardware, software, and application requirements to secure an organization’s intellectual property, customer data, and resources. Students will apply managerial and leadership skills to develop and communicate an effective cybersecurity program. Prerequisite: CYB-650.
* Please note that this list may contain programs that are not presently offered as program availability may vary depending on class size, enrollment and other contributing factors. If you are interested in a program listed herein please first contact your University Counselor for the most current information regarding availability of the program.
* The Department of Education defines how an institution must calculate a program's On-Time Completion rate for federal disclosure purposes. The On-Time Completion rate is based on a program's published required number of months to complete all degree requirements as provided in the institution's catalog. Completion statistics are updated every January and are based on the cohort of students who started the program in the same year and then graduated within the published program length.Online and Evening program disclosures
* Please refer to the Academic Catalog for more information. Program subject to change.