Cybersecurity

Online Master of Science in Cybersecurity

Education and Training in Cybersecurity Intelligence, Forensics and Cyber Operations

Utica College's online M.S. in Cybersecurity trains students to proactively address ever-changing attack and infiltration techniques. A leader in economic crime programs for more than 20 years, Utica designed the program in response to calls from cybersecurity professionals for a graduate-level program that combines state-of-the-art practices in intelligence, forensics and cyber operations.

The program offers three specializations targeted to students with different interests in this field:

  • :: Intelligence: Designed for professionals interested in cyber intelligence and counterintelligence, cyber counterterrorism and cyber counter sabotage. The curriculum covers analysis of global and national cybersecurity policies, the study and protection of critical infrastructures, as well as operations involving cyber threats and defense.
  • :: Computer Forensics: Designed for students interested in collecting and preparing evidence of computer crimes such as fraud, child pornography and cyber espionage. The curriculum emphasizes a comprehensive understanding of the forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence.
  • :: Cyber Operations: Designed for students who wish to protect and defend organizations from cyber attacks. Students gain the critical knowledge needed through a hands-on, lab-oriented curriculum that includes an in-depth examination of cyber tactics, techniques, procedures and more.

The Master's in Cybersecurity program utilizes a flexible, online format with faculty-directed study and an on-campus residency. Learn more about the benefits of the residency here.

A Degree Program for the 21st Century

Utica College has been designated a National Center of Academic Excellence in Cyber Defense Education (CAE-CD) by the National Security Agency (NSA) and Department of Homeland Security (DHS). The College has also been designated an Academic Center of Excellence (ACE) by the EC-Council, one of the premier certifying bodies in the field of cybersecurity. Students are eligible for discounted rates on exams for EC-Council industry certifications such as Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI), Network Security Administrator (ENSA), and Certified Security Analyst (ECSA).

The online M.S. in Cybersecurity offers students advanced knowledge and hands-on experience in intelligence, critical infrastructures, and investigative principles as they relate to cybercrime, including:

  • :: An understanding of the major concepts in cybersecurity, computer forensics, cyber intelligence
  • :: Training in critical thinking and decision making skills as they specifically relate to attacks on national critical infrastructures
  • :: The application of cyber technology to field operations
  • :: Ethics as applied to cybersecurity operations and policy
  • :: A practical knowledge of cybercrime investigations, including methods of maintaining the integrity of cyber evidence

View this video of our faculty describing what makes our MS in Cybersecurity program unique.

MS in Cybersecurity vs MPS in Cyber Policy or MBA?

Utica College is on the forefront of cybersecurity education, offering four master’s degree programs specifically related to information security and computer crimes. You may be asking, “Should I get a Master of Science in Cybersecurity or a Master of Professional Studies in Cyber Policy and Risk Analysis or maybe an MBA? What are the differences? Are the learning outcomes, work experience, requirements, length of time to complete and career paths similar?” While these three degrees each focus on cybersecurity, the differences are clear when you view the three programs side-by-side:

MS Cybersecurity

MPS Cyber Policy

MBA in Cybersecurity or Cyber Policy

Requirements to Begin

Bachelor’s degree, GPA 3.0 minimum;

Bachelor’s degree, GPA 3.0 minimum

Bachelor’s degree, GPA 3.0 minimum

Pre Requisites

Foundational computer software or networking courses available

Foundational computer software or networking courses available

Modules

Work Experience Recommended

(not required)

Network or software administrator experience

No technical background or experience required

2 years minimum

Requirements to Complete

30 credit hours

30 credit hours

30 credit hours

Residency Required?

Yes, four-day on campus residency after the 1st year

None

None

Time to Complete

18-20 months

Approx. 2 years

Approx. 2 years

Specializations

Cyber Operations, Computer Forensics, Cyber Intelligence

Cyber Policy,

Cyber Data Fusion and Analysis

Cybersecurity, Cyber Policy

Learning Outcomes

Hands On, Technical, practical and forensic in nature. Focuses on tools, methods, and techniques to detect and combat malware, risk and cyber attacks.

Supervisory, analytical and comprehensive in nature. Focuses on foundational concepts to understand risk, global issues, public policy and data management.

Business Management, accounting, economics, finance, ethics, globalization, marketing, statistics, and operations functions applied to problem analysis and decision making within the Cybersecurity or Cyber Policy arena.

Career Path

High-level professional jobs in public and private sectors, Government, Military, Consulting, Academics.

High-level policy-making, risk analysis, and compliance jobs in public and private sectors, Government.

Management / Leadership responsible for Cyber-related teams in public and private sectors.

Next-Level Exams and Certification Paths

CompTIA A+, Security+ or Network+; (ISC)2 CISSP, CCSP or CCFP; ISACA Cybersecurity Fundamentals Certificate; Cisco Cybersecurity Specialist, CCNA, CCNP or CCIE, EC Council

None

None

Industries Affected by Cybercrime and Security Breaches

According to PwC’s 2015 Global State of Information Security® Survey, 42.8 million incoming attacks were detected and reported over the 2-year survey period. That’s the equivalent of 117,339 per day, every day. As highlighted in the report, “As incidents continue to proliferate across the globe, it’s becoming clear that cyber risks will never be completely eliminated.”

This astonishing trend pervades the following industries, making the need for qualified cybersecurity professionals in what the report calls “today’s interconnected business ecosystem” to help protect each organization’s valuable assets and relevant threats – internal incidents, breaches caused by third-party accesses, and compromises caused by insufficient employee training and awareness programs.

  • :: Automotive
  • :: Oil & Gas
  • :: Financial Services
  • :: Power & Utilities
  • :: Healthcare
  • :: Public Sector
  • :: Industrial Products
  • :: Retail & Consumer
  • :: Defense
  • :: Technology

Working in the Real World of Cybersecurity

Experienced security professionals will attest that the most effective cybersecurity specialists have both an education and hands-on work experience as a network or software administrator, whether it’s Unix, Wintel, web, application or otherwise. Because cybersecurity is ever-changing, working IT security professionals who have both theoretical and foundational knowledge learned in the Master’s of Cybersecurity program and practical network and security skills can fare better in the field than those who have just one or the other. Security professionals must constantly stay abreast of vulnerabilities, exploits and incoming attacks. Once out in the field, cybersecurity master’s program graduates may be tasked with real-world responsibilities exemplified below:

  • :: Serve as the primary point-of-contact for all management and technical areas in response to zero-day attacks
  • :: Deploy internetworking technologies such as firewalls, intrusion detection systems, intrusion prevention systems, and Virtual Private Networks (VPNs) to improve the external security posture of the organization
  • :: Collaborate with the program and technical leadership team to evaluate staffing require for current and emerging projects
  • :: Sustain mission-critical and business-critical requirements, managing ad hoc triage and response teams both internally and on coordinated inter-department or inter-agency cyber threat responses
  • :: Develop and maintain complex and risk-adjusted project schedules and complete detailed variance analyses

Other programs you may be interested in

Utica College also offers Bachelor’s and Certificate programs in Cybersecurity.

Tools, Tips and Other Resources

Students may wish to explore new careers or expand their current knowledge base in counter intelligence, defense, homeland security, law enforcement, and computer forensics.

Our Resource Center offers a few interesting tools for managing productivity while pursuing your online education, plus resources in articles, student blogs, videos, industry links, and press releases to increase your Cybersecurity industry knowledge and assist you as you pursue your cybersecurity education goals.

Industry Partnerships

Utica College is proud to partner with several leading organizations to offer networking opportunities, discounts on Industry Certifications test prep and exams, and other benefits.

One such relationship is with CompTIA – the voice of Information Technology, an IT association that validates technical skills in the areas of networking, server, security, and technology PC repair and support. CompTIA offers IT certification series that test different knowledge standards, from entry-level to expert. Through the Utica College partnership, MS in Cybersecurity students are eligible for generous discounts on the CompTIA A+, Security+, Network+ certification exams.

Build your skills in this vital field with Utica College's Online Master's in Cybersecurity degreeRequest More Information or call us today at 315.732.2640 or toll-free at 866.295.3106.

*CSIS Center for Strategic and International Studies. In the Crossfire: Critical Infrastructure in the Age of Cyber War. Washington, D.C. http://csis.org/multimedia/audio-crossfire-critical-infrastructure-age-cyber-war

Our suite of programs in Economic Crime and Justice Studies is formally recognized by the International Association of Law Enforcement Intelligence Analysts (IALEIA) and we are an academic member of the organization.



  • National Center of Academic Excellence in Cyber Defense Education (CAE CD)