Skip to Content

Shape a Rewarding Future With an Online Master’s in Cybersecurity

In the blink of an eye, a cyberattack can cause catastrophic damage to an organization’s operations, finances, and reputation. Walden’s hands-on MS in Cybersecurity program empowers you to gain actionable skills that can help you protect your organization from threats and become a sought-after cyber expert.

Our online master’s in cybersecurity program focuses on cybersecurity technology and its practical application within business information systems. Through interactive experiences that include immersive threat simulations, you’ll prepare for the cybersecurity challenges of today—and those of tomorrow.

A master’s degree in cybersecurity online can prepare students to lead information assurance and cybersecurity initiatives within their organization.

Gain In-Demand Skills

Walden engages deeply with today’s top IT employers to understand the latest requirements in specific technical disciplines.

Practice in Real Time

Through proactive secure coding, you’ll encounter cybersecurity scenarios and data sets you can hack and/or decrypt.

Work With White Hat Hacker Teams

Join a Walden cyber team to solve complex threat simulations, with the opportunity to participate in national competitions.

Make a Social Impact

Learn to address cybersecurity challenges in an ethical way and make a positive difference for organizations and society.

Program Savings

Receive up to a $3,000 grant if you reside in the U.S. and start this program on September 6, 2021. Contact one of our Enrollment Specialists to learn more.

Get Started Now
Opportunities for cybersecurity experts are abundant—and growing. Find yours with a cybersecurity master’s degree from Walden. Although cyberspace is your domain, you’re never learning alone. We have field-experienced faculty and exceptional student support services to ensure your success every step of the way.


Completion Requirements

  • 30 semester credits
    • Core courses (30 sem. cr.) 


Course Code Title Credits
CSEC 6005

The Global Technology Environment

Students in this course are provided a critical "state-of-the-art" breadth-first review of the domain of information technology (IT). Designed to provide students with a wide-ranging introduction to topics such as software engineering, cybersecurity, and big data analytics, students completing the course have a comprehensive global view of the current IT landscape in the context of both commercial and noncommercial enterprises. The class blends both theory and practice to provide a solid foundation for future study. Students study the relationship between technological change, society and the law, and the powerful role that computers and computer professionals play in a technological society.

(3 sem. cr.)
CSEC 6215

Security Risk Management

Threats to information security (IS) are becoming more sophisticated. Laws and regulations impose strict (cyber) security risk management requirements on all enterprises to prevent, or at least limit, the potential of cyberattacks. Course content is directed at providing a deep understanding of the mechanisms and techniques that can be used to identify and mitigate against security risk. Students in this course are provided with the theoretical and practical knowledge to deliver a formal, systematic, and in-depth approach to the application of the concepts, techniques, methods, approaches, and processes of (cyber) security risk management in a pragmatic manner and in the context of enterprises of all kinds.

(3 sem. cr.)
CSEC 6210

Cloud Computing

Cloud computing has attained great commercial significance in recent years. As companies seek to drive down the capital (and recurrent) costs of doing business, using cloud computing to reduce expenditure by outsourcing aspects of the organizations' IT infrastructure to external, web-accessible systems has become a critical goal. In this course, students study the key concepts, theories, techniques, and practices that underpin cloud computing, including the main abstraction, component and deployment models that characterize cloud computing. Students have the opportunity to critically appreciate issues and problems, as well as cutting-edge solutions, pertaining to cloud computing.

(3 sem. cr.)
CSEC 6175

Software Testing and Quality Assurance

Students in this course are provided a general overview of software engineering in the context of testing and quality assurance, both of which are important facets of modern software engineering that have technical, financial, and ethical implications for organizations. Students explore focused topics, such as testing methods; developing tests at the unit, integration, and systems level; techniques for stress testing; complexity and test metrics; quality management standards; and configuration management. Students have the opportunity to develop a critical awareness and comprehensive understanding of software testing and quality assurance, and the capability to create successful testing and quality assurance processes to support the needs of modern software engineering projects.

(3 sem. cr.)
CSEC 6190

Foundations of Intelligent Systems

Students in this course are introduced to the concepts of artificial intelligence and emergent areas of intelligent systems. Students have the opportunity to gain a critical understanding of knowledge representation, reasoning, machine learning, and evolutionary techniques. Students are presented with real-world problems and have the opportunity to apply "intelligent" techniques to provide solutions to these problems.

(3 sem. cr.)
CSEC 6670

Security Engineering and Compliance

Students in this course are provided with insight into information security principles, security policy models/protocols, industry standards for security compliance, and risk assessment. Students have the opportunity to acquire a critical understanding of how to use information security techniques to solve practical security problems. The course also allows students to acquire skills for designing/implementing security infrastructure and writing security/incident response polices. The course features practical, extensive, hands-on project work so that students are ready to apply their gained knowledge in the workplace.

(3 sem. cr.)
CSEC 6735

Applied Cryptography

In this course students are provided with insight into cryptographic algorithms and protocols. Students have the opportunity to acquire a critical understanding of how to use cryptographic algorithms and protocols to solve practical security problems (confidentiality, integrity, authenticity, and so on). Students also have the opportunity to acquire a systematic understanding concerning open source tools to build secure applications and knowledge of how best to apply such tools.

(3 sem. cr.)
CSEC 6270

Cyber Forensics

In this course students are provided with knowledge and systematic understanding of the practice of extracting evidence from computers and digital storage media. Students are provided with the knowledge whereby they can identify, extract, document, interpret, and preserve computer media as digital evidence, as well as how to analyze the root cause of security breaches. Course content covers issues such as crypto-literacy, data hiding, and hostile code.

(3 sem. cr.)
CSEC 6255

Cybercrime Prevention and Protection

Combatting cybercrime requires a deep understanding of the mechanisms and techniques that can be used to prevent or at least mitigate against it. In this course students consider the motivations for cybercrime and have the opportunity to develop a comprehensive understanding of the tools that can be used to prevent it, including the deployment of cybercrime prevention strategies. Students build an "ethical hacking" environment with which they can experiment. In addition, the course is directed at providing students with hands-on knowledge of cybercrime prevention for application in the workplace.

(3 sem. cr.)
CSEC 6635

Secure Coding

In this course students are provided with an understanding of secure software development practices. Students have the opportunity to gain an understanding of how to integrate security into the application/software development process. Students also have the opportunity to study some of the techniques for writing secure code, language-based security models, and isolation techniques to protect data.

(3 sem. cr.)

Tuition and Fees

Curriculum Component Requirements Cost amount
Tuition 30 semester credit hours $880 per semester hour $26,400
Technology Fee Per semester $210 $1,050


*Tuition reflects the minimum time to completion. Time to completion varies by student, depending on individual progress and credits transferred, if applicable. Tuition and time to complete may be reduced if transfer credits are accepted, or if you receive grants, scholarships or other tuition reductions. Walden may accept up to 15 transfer credits. For a personalized estimate of the number of your transfer credits that Walden would accept, call an Enrollment Specialist at 855-646-5286.

Tuition and fees are subject to change. Books and materials are not included and may cost between $1,000 to $1,400.


Many Walden degree-seeking students—67%—receive some form of financial aid.* Create a customized plan that makes sense for you.

*Source: Walden University’s Office of Financial Aid. Data reports as of 2018.

Find Ways to Save

Program Savings

Receive up to a $3,000 grant if you reside in the U.S. and start this program on September 6, 2021. Contact one of our Enrollment Specialists to learn more.

Get Started Now

Admission Requirements

To be considered for this master’s program, you must have a technical bachelor’s degree or at least one year of relevant professional experience in information technology and meet the general admission requirements. All graduate programs in the School of Technology and Applied Science require the submission of a résumé. Proficiency in at least one modern programming language is highly recommended but not required. All applicants must submit a completed online application and transcripts. More information for international applicants.

Build Your Expertise in Cyber Operations

In our online master’s in cybersecurity program, you’ll develop a strong foundation in information systems and cyberattack detection and remediation. Gain hands-on experience with industry-leading tools and their practical application in various settings and threat scenarios. Explore groundbreaking advances in cyber forensics, cybercrime prevention, and secure coding as you build the confidence to lead critical information security initiatives and cross-functional teams.

Meet Your Academic Team – Online Master’s in Cybersecurity

  • Gary Griffith

    Gary Griffith

    Academic Coordinator

    Prior to joining the faculty at Walden University, Dr. Griffith worked in the field of information systems and technology for more than 30 years. He led the research that enabled Walden to be designated as an NSA | DHS National Center of Academic Excellence in Cyber Defense Education in 2014.

  • Robert Duhainy

    Robert Duhainy

    Core Faculty

    Dr. Duhainy has more than 24 years of experience in designing and implementing wireless and cellular networks and 27 years in technology and computer security. His research work includes the use of software agents to safeguard computer networks from attack.

  • Albanie Bolton

    Albanie Bolton

    Contributing Faculty

    Dr. Bolton has worked on the software systems engineering branch team as a software test and verification engineer at the NASA Marshall Space Flight Center (MSFC) in Alabama for nearly 12 years. Her research interests include improving the usability of products/applications for various populations.

Learning Outcomes

Graduates of Walden’s cybersecurity master’s online program will be prepared to:

  • Evaluate emerging technical developments that apply to cybersecurity.
  • Evaluate the role of cybersecurity elements within the context of the modern workplace.
  • Examine cryptography elements for practical application in both commercial and non-commercial settings.
  • Critique cybersecurity strategies that can be deployed to prevent cybercrime.
  • Examine computer forensics elements for their practical usage in both commercial and non-commercial organizations.
  • Evaluate management processes that can be deployed to prevent or limit potential cyber-attacks in the workplace.

Career Outlook

Business and government organizations need highly trained security engineers to protect their networks and sensitive data from cyberattackers. According to the Bureau of Labor Statistics (BLS), jobs for information security analysts are expected to grow 31% by 2029—much faster than average.1

That’s good news for driven IT professionals like you. A cybersecurity master’s degree can prepare you to meet the demand for skilled talent and lead large-scale information security initiatives.

An MS in Cybersecurity degree can prepare you to pursue career options such as:2

  • Cybersecurity engineer
  • Cybersecurity analyst
  • Cybersecurity manager or administrator
  • Vulnerability analyst or penetration tester

An MS in Cybersecurity degree can prepare you to work in settings such as:

  • Government
  • Financial institutions
  • Education
  • Nonprofit organizations

Career options may require additional experience, training, or other factors beyond the successful completion of this degree program.

You May Also Be Interested In


Have a Question?

Chat with a MS in Cybersecurity Enrollment Specialist.

Chat Now