
Resource Articles
Message from the President: COVID-19
Learn to outsmart ruthless cyberattackers and protect organizations and individuals from today’s most dangerous threats.
From ransomware to phishing schemes, cyberattacks are one of the greatest hazards to information infrastructure in the digital age. Get the rigorous, real-world training you need to monitor, detect, and manage cyberthreats with Walden’s MS in Cybersecurity program. A cybersecurity master’s degree focuses on cybersecurity technology and its practical application in the context of business information and real-world problems.
Learn from courses developed with input from today’s employers: Explore real-life case studies and hands-on exercises to tackle complex cybersecurity challenges.
Master specialized business, compliance, and management principles along with the technical skills needed to compete for desirable cybersecurity jobs.
Be immersed in authentic cyberthreat simulations and work with your classmates to decrypt data sets and thwart cyberattacks.
With our support services, you’re never alone in pursuit of your MS in Cybersecurity degree. Walden has your back from day one.
Receive a 20% tuition reduction for the life of the program if you reside in the U.S. and start this program on May 10, 2021. Contact one of our Enrollment Specialists to learn more.
Get Started NowCourse Code | Title | Credits |
---|---|---|
CSEC 6005 |
The Global Technology EnvironmentStudents in this course are provided a critical "state-of-the-art" breadth-first review of the domain of information technology (IT). Designed to provide students with a wide-ranging introduction to topics such as software engineering, cybersecurity, and big data analytics, students completing the course have a comprehensive global view of the current IT landscape in the context of both commercial and noncommercial enterprises. The class blends both theory and practice to provide a solid foundation for future study. Students study the relationship between technological change, society and the law, and the powerful role that computers and computer professionals play in a technological society. |
(3 sem. cr.) |
CSEC 6215 |
Security Risk ManagementThreats to information security (IS) are becoming more sophisticated. Laws and regulations impose strict (cyber) security risk management requirements on all enterprises to prevent, or at least limit, the potential of cyberattacks. Course content is directed at providing a deep understanding of the mechanisms and techniques that can be used to identify and mitigate against security risk. Students in this course are provided with the theoretical and practical knowledge to deliver a formal, systematic, and in-depth approach to the application of the concepts, techniques, methods, approaches, and processes of (cyber) security risk management in a pragmatic manner and in the context of enterprises of all kinds. |
(3 sem. cr.) |
CSEC 6210 |
Cloud ComputingCloud computing has attained great commercial significance in recent years. As companies seek to drive down the capital (and recurrent) costs of doing business, using cloud computing to reduce expenditure by outsourcing aspects of the organizations' IT infrastructure to external, web-accessible systems has become a critical goal. In this course, students study the key concepts, theories, techniques, and practices that underpin cloud computing, including the main abstraction, component and deployment models that characterize cloud computing. Students have the opportunity to critically appreciate issues and problems, as well as cutting-edge solutions, pertaining to cloud computing. |
(3 sem. cr.) |
CSEC 6175 |
Software Testing and Quality AssuranceStudents in this course are provided a general overview of software engineering in the context of testing and quality assurance, both of which are important facets of modern software engineering that have technical, financial, and ethical implications for organizations. Students explore focused topics, such as testing methods; developing tests at the unit, integration, and systems level; techniques for stress testing; complexity and test metrics; quality management standards; and configuration management. Students have the opportunity to develop a critical awareness and comprehensive understanding of software testing and quality assurance, and the capability to create successful testing and quality assurance processes to support the needs of modern software engineering projects. |
(3 sem. cr.) |
CSEC 6190 |
Foundations of Intelligent SystemsStudents in this course are introduced to the concepts of artificial intelligence and emergent areas of intelligent systems. Students have the opportunity to gain a critical understanding of knowledge representation, reasoning, machine learning, and evolutionary techniques. Students are presented with real-world problems and have the opportunity to apply "intelligent" techniques to provide solutions to these problems. |
(3 sem. cr.) |
CSEC 6670 |
Security Engineering and ComplianceStudents in this course are provided with insight into information security principles, security policy models/protocols, industry standards for security compliance, and risk assessment. Students have the opportunity to acquire a critical understanding of how to use information security techniques to solve practical security problems. The course also allows students to acquire skills for designing/implementing security infrastructure and writing security/incident response polices. The course features practical, extensive, hands-on project work so that students are ready to apply their gained knowledge in the workplace. |
(3 sem. cr.) |
CSEC 6735 |
Applied CryptographyIn this course students are provided with insight into cryptographic algorithms and protocols. Students have the opportunity to acquire a critical understanding of how to use cryptographic algorithms and protocols to solve practical security problems (confidentiality, integrity, authenticity, and so on). Students also have the opportunity to acquire a systematic understanding concerning open source tools to build secure applications and knowledge of how best to apply such tools. |
(3 sem. cr.) |
CSEC 6270 |
Cyber ForensicsIn this course students are provided with knowledge and systematic understanding of the practice of extracting evidence from computers and digital storage media. Students are provided with the knowledge whereby they can identify, extract, document, interpret, and preserve computer media as digital evidence, as well as how to analyze the root cause of security breaches. Course content covers issues such as crypto-literacy, data hiding, and hostile code. |
(3 sem. cr.) |
CSEC 6255 |
Cybercrime Prevention and ProtectionCombatting cybercrime requires a deep understanding of the mechanisms and techniques that can be used to prevent or at least mitigate against it. In this course students consider the motivations for cybercrime and have the opportunity to develop a comprehensive understanding of the tools that can be used to prevent it, including the deployment of cybercrime prevention strategies. Students build an "ethical hacking" environment with which they can experiment. In addition, the course is directed at providing students with hands-on knowledge of cybercrime prevention for application in the workplace. |
(3 sem. cr.) |
CSEC 6635 |
Secure CodingIn this course students are provided with an understanding of secure software development practices. Students have the opportunity to gain an understanding of how to integrate security into the application/software development process. Students also have the opportunity to study some of the techniques for writing secure code, language-based security models, and isolation techniques to protect data. |
(3 sem. cr.) |
VIEW ALL COURSES |
Curriculum Component | Requirements | Cost | amount |
---|---|---|---|
Tuition | 30 semester credit hours | $880 per semester hour | $26,400 |
Technology Fee | Per semester | $210 | $1,050 |
$27,450* |
*Tuition reflects the minimum time to completion. Time to completion varies by student, depending on individual progress and credits transferred, if applicable. Tuition and time to complete may be reduced if transfer credits are accepted, or if you receive grants, scholarships or other tuition reductions. Walden may accept up to 15 transfer credits. For a personalized estimate of the number of your transfer credits that Walden would accept, call an Enrollment Specialist at 855-646-5286.
Tuition and fees are subject to change. Books and materials are not included and may cost between $1,000 to $1,400.
Many Walden degree-seeking students—67%—receive some form of financial aid.* Create a customized plan that makes sense for you.
*Source: Walden University’s Office of Financial Aid. Data reports as of 2018.
Find Ways to SaveReceive a 20% tuition reduction for the life of the program if you reside in the U.S. and start this program on May 10, 2021. Contact one of our Enrollment Specialists to learn more.
Get Started NowTo be considered for this master’s program, you must have a technical bachelor’s degree or at least one year of relevant professional experience in information technology and meet the general admission requirements. All graduate programs in the School of Technology and Applied Science require the submission of a résumé. Proficiency in at least one modern programming language is highly recommended but not required. All applicants must submit a completed online application and transcripts. More information for international applicants.
In Walden’s MS in Cybersecurity program, you’ll develop a strong foundation in software engineering, big data analytics, and security risk management. Gain hands-on experience with industry-leading tools and their practical application in various settings and threat scenarios. Explore groundbreaking advances in cyber forensics, cybercrime prevention, and secure coding as you build the confidence to lead critical cybersecurity initiatives and cross-functional teams.
Graduates of Walden’s cybersecurity master’s online program will be prepared to:
From phishing schemes to cryptojacking, cybercrimes are rising at an alarming rate. Business and government organizations need more trained professionals to protect their networks and sensitive information from ruthless attackers.
According to the Bureau of Labor Statistics, jobs for information security analysts are expected to grow by 31% by 2029—much faster than average.2 The Center for Cyber Safety and Education projects a global shortage of 1.8 million information security workers by 2022.3
That’s good news for driven IT professionals like you. A master’s degree in cybersecurity from Walden can prepare you to meet the demand for skilled talent and lead large-scale information security initiatives. Forge ahead at your organization or seize new opportunities to move your career forward.
An online cybersecurity master’s degree from Walden can position you for a number of career roles, including:
Career options may require additional experience, training, or other factors beyond the successful completion of this online master’s in cybersecurity degree program.
An MS in Cybersecurity could potentially lead to higher earnings. According to the Bureau of Labor Statistics (BLS), the median annual wage for information security analysts was $99,730 in May 2018, with median salaries in the top industries ranging from $96,190 to $103,510.2
Fill out the form and we will contact you to provide information about furthering your education.