PROGRAM OVERVIEW Direct the fight against cybercrime and data theft.
As data breaches dominate daily headlines, experts who know how to defend sensitive data are in high demand. Utica College’s Master of Science in Cybersecurity online program equips you with the skills and know-how to lead cybersecurity efforts in business, government agencies, or investigative units.
Learn More Today
Complete the form to learn more about this program.
Earn $150,000+ on the Front Lines of Data Security
As a leader in economic crime programs for more than 25 years, Utica designed the online master’s in cybersecurity program to combine state-of-the-art practices in intelligence, forensics, and cyber operations.
This 30-credit program offers a carefully created curriculum that will give you the technical ability to protect sensitive systems from the criminals determined to corrupt them while providing soft skills like critical thinking, ethics, and decision-making vital to success in the field. The M.S. in Cybersecurity degree also features seven career-focused specializations to enhance your skill set.
Specialization options include:
- Computer Forensics
- Cyber Operations
- Cyber Policy
- Data Analytics
- Electronic Crime
- Malware Analysis
You’ll also participate in a two-day online virtual residency during which you’ll interact with your professors and classmates and work together in a truly immersive experience. Equipped with this sought-after skill set and real-world knowledge, you’ll graduate prepared to lead in the field of cybersecurity in less than two years.
Earn a Nationally Recognized Cybersecurity Degree
The National Security Agency and the Department of Homeland Security have designated Utica College as a National Center of Academic Excellence in Cyber Defense Education (CAE-CD) through the academic year 2024.
Our cybersecurity programs have also been recognized for their excellence by the Department of Defense Cyber Crime Center (DC3). Learn more about why Utica College is your best choice for your online master’s in cybersecurity.
Certification: Lead Investigations in Cryptocurrency Fraud and Theft
Through a unique partnership with CipherTrace — a leading cryptocurrency intelligence company — you can become a CipherTrace Certified Examiner (CTCE) and learn how to analyze and trace funds lost in cryptocurrency fraud and theft. You’ll use the same tools and get the same CTCE training as regulators and law enforcement members around the world do in becoming expert cryptocurrency financial investigators.
Once certified, you’ll be able to complete an active investigation at CipherTrace and write the case report, giving you direct, hands-on experience and demonstrating an incredibly valuable skill set to employers.
Prepare for In-Demand Cybersecurity Careers
The top 10 percent of Information Security Analysts earned more than $158,860 in 2019, with the number of job opportunities expected to grow 32 percent through 2028.1
With your online master’s in cybersecurity, you’ll be ready to join the top tier of this workforce and earn more while making an impact on data security.
Cybersecurity is always evolving. Working IT security professionals who have theoretical and foundational knowledge from the online master’s in cybersecurity program and practical network and security skills have an advantage in the field over those without both.
Cybersecurity professionals must stay up-to-date on vulnerabilities, exploits, and incoming attacks. Job responsibilities might also include:
- Serving as the primary point-of-contact for all management and technical areas in response to zero-day attacks.
- Deploying internetworking technologies such as firewalls, intrusion detection systems, intrusion prevention systems, and virtual private networks (VPNs) to improve the organization’s external security posture.
- Collaborating with the program and technical leadership team to evaluate staffing requirements for current and emerging projects.
- Sustaining mission-critical and business-critical requirements, managing ad hoc triage and response teams internally and on coordinated inter-department or inter-agency cyber threat responses.
- Developing and maintaining complex and risk-adjusted project schedules and complete detailed variance analyses.
Curriculum: Take the Next Step Toward Certification
The master’s in cybersecurity online program gives you advanced knowledge and hands-on experience in intelligence, critical infrastructures, and investigative principles as they relate to cybercrime.
Master the technical skills you’ll need on the job and prepare for industry certifications like CompTIA A+ and Security+. Because Utica is a CompTIA academic partner, you’ll also receive a discount on certain exams.Explore Courses
As a student, you’ll choose one of seven specializations. Each is designed to provide the most up-to-date knowledge and skill sets so you can hit the ground running in the industry segment of your choice.
Debating Between Two or More Specializations?
Use our compare programs feature to see differences and similarities easily and find the right option for your career goals.
M.S. in Cybersecurity: Computer Forensics
Pursue your passion for collecting and preparing evidence for computer crimes such as fraud, child pornography and cyber espionage with courses that emphasize a comprehensive understanding of the forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence.
Taking the next step in your cybersecurity career with Utica College is simple. Previous cybersecurity work experience is recommended but not required. To apply, you’ll need:
- Completed application
- Bachelor’s degree with a minimum GPA of 3.0
- Two letters of recommendation
- Transcripts from all previous colleges and universities attended
- Personal statement
Don’t have a bachelor’s degree? Consider Utica’s B.S. in Cybersecurity program.Get Started
Tuition and Financial Aid
This 30-credit program costs $895 per credit hour. Utica College is dedicated to making an advanced education accessible and affordable and offers many avenues for financial aid.Learn More
Faculty: Experts From the Front Lines
You’ll benefit from the years of hands-on experience each faculty member in our master’s in cybersecurity online program brings to class.
Our instructors have diverse backgrounds throughout the cybersecurity industry, and many are still engaged in the field. The faculty of this program is made up of experts in intelligence, counter-terrorism, information assurance, and forensics.
Stephanie R. Nesbitt, J.D., MBA
Dean, School of Business and Justice Studies/Associate Professor Risk Management & Insurance
Stephanie R. Nesbitt, J.D., MBA, has more than 20 years of experience working in the risk management and insurance industry. She is licensed to practice law in the State of New York and is a former Wiley Faculty Fellow.
Nesbitt’s research is in the development and effective teaching of business education programs and legal issues in cybersecurity. Prior to joining Utica College, she was the risk manager and associate counsel for Faxton-St. Luke’s Healthcare.
Nesbitt has been a featured speaker at several national, statewide and regional industry conferences on topics such as insurance cost allocation methods, the impact of risk management on healthcare quality, individual and team accountability to improve healthcare quality, and HIPAA and patient privacy.
She also holds a third-degree black belt in karate and is an avid runner.
Honors and Distinctions
- J.D. from University at Buffalo School of Law
- MBA from Syracuse University
- B.A. in Speech Communication from Ithaca College
- Member of the New York State Bar Association and Academy of Management
- Nesbitt, Stephanie, R., Matthew D. Marmet, Tracy M. Balduzzi, and Rick Fenner. The Impact of Behavioral Engagement on Outcomes in Graduate Business Blended Learning Environments. The BRC Academy Journal of Education 7, no. 1 (2018): 79–99. http://dx.doi.org/10.15239/j.brcacadje.2018.07.01.ja04
- Norrie, J. and Nesbitt, S. (2016). Into the Cyber Breach Go U.S. Government Regulators. Frontline Safety and Security, 11(4), 30–33. http://security.frontline.online/article/2016/4/5721-FTC-and-Cybersecurity-Oversight
Leonard Popyack, Ph.D.
Professor of Practice, Cybersecurity
Leonard Popyack, Ph.D., joined the Utica College faculty in 2010.
Popyack has extensive experience in offensive and defensive information assurance research (INFOSEC), focused on response, steganography and data hiding methods, mobile code protection, data mining, and intrusion forecasting systems. He was one of the first government research scientists in the United States to study offensive information warfare, and he brings this unique expertise to his students.
On top of his research, Popyack has more than 20 years of active engagement experience in cybersecurity. In 1999, he gathered a group of highly talented personnel to develop next-generation cyber operations tools. In 2001, he cofounded Assured Information Security, Inc., to deliver cyber operations technology.
After leaving Assured Information Security, Inc., in 2009, Popyack concentrated on teaching and research and helped develop Utica College’s cybersecurity courses, which have been recognized for their excellence by the Federal Bureau of Investigation, the National Security Agency, and the Department of Homeland Security.
Between 2013 and 2014, Popyack was the Interim Executive Director of Cyber Research Institute, Inc. He’s currently President of Anjolen Inc., an organization based in New York that provides expertise in cybersecurity, compliance, and cyber forensic services.
Honors and Distinctions
- Senior member, Institute of Electrical and Electronics Engineers
- Ph.D. in Electrical Engineering from Binghamton University
- M.S. in Electrical Engineering from Binghamton University
- B.S. in Electrical Engineering from SUNY Polytechnic Institute
- A.A.S. in Electrical Engineering and Computer Science from Jamestown Community College
- Jamestown Community College Distinguished Alumnus Award Winner (2005)
- Air Force Research Laboratory Commanders Cup Team Award for Wireless Information Assurance (2002)
- Air Force Research Laboratory Information Directorate Basic Research Award (2000)
- Leader of the Madison-Oneida Amateur Radio Volunteer Examination Team
- Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., & Szczypiorski, K. (2017). Computer network security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, proceedings. Cham, Switzerland: Springer.
- Bay, J., Dussault, H., Spink, B., & Jones, L. (2015). Report of the Office of the Secretary of Defense Cyber Community of Interest Task Force on Demonstration Programs for Self-Defensible Cyber Systems. DOD peer reviewed, U.S. Air Force limited distribution publication, 55 pages.
- Popyack, L. (May 2014). Workshop on Cybersecurity Hard Problems. CSIAC Journal of Cyber Security & Information Systems.
- Gorodetski, V. I., Skormin, V. A., & Popyack, L. J. (2001). Information assurance in computer networks: Methods, models, and architectures for network security: International workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001: Proceedings (Vol. 2052). Berlin: Springer
Frequently Asked Questions
Advancing your life and career with an online master’s in cybersecurity degree comes with lots of questions, and we want to ensure your search for answers is effortless. If you have a question we haven’t covered, call (866) 295-3106 to speak with an enrollment counselor.
The M.S. in Cybersecurity program is designed to be completed in less than two years by taking two classes per 16-week semester. Through 30 credit hours, you’ll develop both a foundational understanding of cybersecurity principles, ethics, and critical thinking related to cybersecurity, and specialize in any of seven areas: Cyber Intelligence, Cyber Forensics, Malware Analysis, Electronic Crime, Cyber Operations, Cyber Policy, and Data Analytics.
The National Security Agency and the Department of Homeland Security have designated Utica College as a National Center of Academic Excellence in Cyber Defense Education (CAE-CD) through academic year 2024.
Our cybersecurity programs have also been recognized for their excellence by the Defense Cyber Crime Center (DC3) and EC-Council, one of the premier international certifying cybersecurity bodies.
When you graduate with a new set of expert-level skills in cybersecurity, information assurance, and computer forensics, you’ll be in high demand wherever you’re interested in protecting data and deterring cybercrime.
In-demand jobs are available in corporate, governmental, analytical, or investigative environments. Employment of computer and information technology occupations is projected to grow much faster than average 12 percent through 2028, according to the U.S. Bureau of Labor Statistics.
See our M.S. in Cybersecurity Career Outlook page for detailed information about the career paths, jobs, and earning potential that may be possible for you after graduation.
No. While previous experience in computer and information security may provide valuable context to your studies, work history in the field is not required for admittance to the program. See our full list of admissions requirements for the M.S. in Cybersecurity program.
The Master of Science in Cybersecurity program is a 30-credit-hour program at a cost of $895 per credit hour, for a total estimated tuition cost of $26,850. Dual-specialization students will require 42 credit hours for a total of $37,590.
For a detailed list of all related expenses and fees, see the M.S. in Cybersecurity tuitions and fees page.
In order to complete the program, you’ll be required to complete 30 credit hours, which will include a foundational set of courses as well as your chosen specialization. Dual-specialization students will require 42 credit hours. See the full M.S. in Cybersecurity curriculum for detailed information.
- Bureau of Labor Statistics (2017 May). Occupational Outlook Handbook: Information Security Analysts. Retrieved February 6, 2019, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-1.