Master of Science in Cybersecurity Management online

This unique, specialized program prepares you for a successful career in one of the world’s fastest-growing industries: cybersecurity management.

Apply by: 12/14/20
Start Class: 1/19/21

Program Overview

$15,990* Total Tuition
As few as 12 - 18 months Program Duration
30 Credit Hours

Become an in-demand professional with the valuable skill sets you will acquire in the Master of Science in Cybersecurity Management online program. You will graduate equipped with skill sets in cybersecurity governance, policy and planning, risk management, business continuity and more. Collaborate to work in the area of information technology and security. This degree can also complement your existing career by adding collaborative information technology and security expertise to your professional strengths.

An advantage of our innovative program is that you do not need an extensive background in IT or cybersecurity to get started. Murray State faculty follow the technology industry closely to continuously assess and determine how to best develop your abilities, beginning with the basics.

A Top-Tier University

Recognized as a "Top Tier" university in academic quality for 29 consecutive years by U.S. News & World Report (2020)

As a graduate of this online program, you will be able to:

  • Become a member of ISACA® and have access to mentors, networking opportunities, and additional training and credentials
  • Understand the infrastructures and architecture of networks, data communications, and hardware/software components to business needs
  • Work with industry partners to examine security operations, management, governance, risk and compliance
  • Discover the root cause of security breaches and lead forensic investigations
  • Become a member of ISACA® and have access to mentors, networking opportunities, and additional training and credentials
  • Understand the infrastructures and architecture of networks, data communications, and hardware/software components to business needs
  • Work with industry partners to examine security operations, management, governance, risk and compliance
  • Discover the root cause of security breaches and lead forensic investigations

This program prepares you to lead cybersecurity within your existing field (e.g., healthcare, finance, law enforcement, small business) or for roles such as:

  • Chief Information Security Officer
  • Information Security Manager
  • Information Systems Security Officer
  • Information Security Officer
  • IT Auditor
  • Chief Information Security Officer
  • Information Security Manager
  • Information Systems Security Officer
  • Information Security Officer
  • IT Auditor

Have questions or need more information about our online programs?

Also available

Murray State offers a variety of online master’s degrees. Check out all of our MBA, MPA and MS online degree programs.

Tuition

The MS Cybersecurity Management online program offers affordable, pay-by-the-course tuition. All fees are included.

Tuition breakdown:

$533 Per Credit Hour
$15,990* Total Tuition
Program Per Credit Hour Per Course Per Program
MS – Cybersecurity Management $533 $1,599 $15,990*

*Proposed rate subject to approval by the Murray State University Board of Regents and the Kentucky Council on Postsecondary Education.

Calendar

Murray State University online programs are delivered in an accelerated format ideal for working professionals, conveniently featuring multiple start dates each year.

Now enrolling:

12/14/20 Next Application Deadline
1/19/21 Start Classes
TermStart DateApplication DeadlineDocument DeadlineRegistration DeadlineTuition DeadlineLast Class Day
Spring 11/19/2112/14/201/4/211/7/211/7/213/5/21
Spring 23/15/212/19/212/26/213/2/213/2/214/30/21
Summer 15/10/214/26/214/30/215/6/215/6/216/18/21
Summer 26/21/216/9/216/15/216/17/216/17/217/30/21
Ready to take the next step toward earning your degree online from Murray State?

Admissions

At Murray State University, we’ve streamlined the admission process to help you get started quickly and easily. Please read the requirements for the MS Cybersecurity Management online, including where to send your transcripts.

The requirements include:

Online application accepted on a rolling basis
Undergraduate degree from an accredited institution
Transcripts from all colleges and universities previously attended
GMAT waiver available for qualified applicants

For admission to this MS Cybersecurity Management online program, you must meet one of the following sets of requirements:

  • Master's degree in a relevant field or doctoral-level degree from an accredited institution
  • Bachelor’s degree from an accredited institution with:
    • 3.25 undergraduate GPA
    • 3.0 GPA and two years of full-time relevant work experience
    • 2.75 GPA and four years of full-time relevant work experience
    • 2.5 GPA and a minimum GMAT score of 430 along with a minimum quantitative subscore of 32 or a minimum GRE total score of 288 along with a minimum quantitative subscore of 147

Note: For domestic applicants with below a 2.5 undergraduate GPA who have the necessary exam score, and whose case includes exceptional circumstances, the admissions committee may conduct a candidate review on a case-by-case basis. In such exceptional cases, the admissions committee will review whether a candidate has significant high-level work experience or qualifications and at least five years since earning a bachelor’s degree.

Official transcripts, test scores and other documents should be sent from issuing institutions to:

Email address: [email protected]

Mail address:

Graduate Admissions
Murray State University
B2 Sparks Hall
Murray, KY 42071

Questions? Call 866-906-0541

Courses

For the MS Cybersecurity Management online, you must complete 24 credit hours of core courses and six credit hours of electives.

Duration: 7 weeks
Credit Hours: 3
A study of data communication, network infrastructure, transmission technologies, and hardware/software components that support modern business communications. Designed to provide students with the technical foundation to manage and secure contemporary data networks.
Duration: 7 weeks
Credit Hours: 3
A study of modern computer, network, and information system security. This course provides an overview of security challenges and mitigation controls in the information system environment. Topics include network intrusion prevention and detection, incident response, malicious software (malware), public key encryption, message authentication, and privacy issues.
Duration: 7 weeks
Credit Hours: 3
Law, policy and regulation as they affect telecommunications technologies and telecommunications business strategies. Emphasis will be placed on an examination of the FCC, the Telecommunications Act of 1996, and the telecommunications business environment, including licensing, privacy, security, divestiture and antitrust.
Duration: 7 weeks
Credit Hours: 3
Course designed to provide an in-depth understanding of key ideas, practices, issues, concepts, artifacts, practices, frameworks, and theories of project management in the context of IT, telecommunications, and cybersecurity. Special emphasis is put on understanding of how projects align with the overall strategy of an organization and how well-planned projects can help an organization achieve positive results in relation to operations, competitive advantage, and security.
Duration: 7 weeks
Credit Hours: 3
Information security program management focuses on the managerial aspects of information security. Functional areas covered are governance, risk, and compliance (GRC), personnel and external relationships, program assessment and metrics, enterprise-wide information security awareness and training programs, and the processes and procedures for information systems compliance audit.
Duration: 7 weeks
Credit Hours: 3
Information security risk management is the application of risk management techniques to business information technology systems to reduce the risk, threats, and vulnerabilities. Using an industry standard risk management framework, conduct an information technology risk assessment using both qualitative and quantitative methodologies, develop risk management policies and reports, create risk management mitigation plan, and define risk management mitigation security measurements and baselining.
Duration: 7 weeks
Credit Hours: 3
Incident response is an organization's response and management of a security incident such as breach, cyberattack effect. Learn intelligence collection, threat hunting, cybersecurity situational awareness, principles of forensic investigations, root cause analysis, and development and execution of policy in response to human and non-human incidents.
Duration: 7 weeks
Credit Hours: 3
An experiential learning capstone course culminating graduate course work into a Cybersecurity Management proposed solution. Students will collaborate with industry partners to review, develop, or assess information security program operation, management, projects, or governance, risk management, or compliance policies. Major emphasis in the proposed cybersecurity solution is on identifying goals, objectives and metrics, along with the ability to specify, design, operate, manage and implement a comprehensive cybersecurity program. Oral communication skills are required for presentation of proposed cybersecurity solution.
Students must take two electives from the following
Duration: 7 weeks
Credit Hours: 3
Business analytics refers to the techniques and practices of statistical data analyses useful to business organizations. This course covers the fundamental concepts of data analysis, and intermediary concepts such as predictive analysis and prescriptive analysis. The analytical techniques covered include visualization, regression, forecasting, simulation, optimization and risk analysis. Students get to learn and use advanced spreadsheet functions and visualization tools to analyze business data.
Duration: 7 weeks
Credit Hours: 3
Course provides the student with a comprehensive introduction to databases, the technical skills required to plan, implement and maintain a databases using appropriate software. A significant part of the course will be spent on development of Structured Query Language (SQL) queries and processes to extract (E) data from multiple sources, transform (T) data as needed and the loading (L) of the same into data warehouses (ETL).
Duration: 7 weeks
Credit Hours: 3
Course provides a conceptual overview of data mining techniques that are used to discover patterns, to predict trends, and to classify observations. In addition, the course includes hands-on practice using modern analytic software and analysis of contemporary business case studies.

Need More Info?

Submit the form below, and a representative will contact you to answer your questions.

Or call 866-906-0541

Or call 866-906-0541

Ready to Begin?

Start your application today!

Need more info?

Submit the form below, and a representative will contact you to answer your questions.

Or call 866-906-0541

Ready to begin?

Start your application today!
Call 866-906-0541 866-906-0541
for help with any questions you may have.