Leverage Both Defensive and Offensive Tactics of Cyber Operations
32% Job Growth
Hands-On Experience Opportunities
Learn More Today
Complete the form to learn more about this program.
- Duration 2 years
- Cost per Credit $895
- Credit Hours 30
Take Advantage of Countless Opportunities
Cybersecurity is more than just defending against cyberattacks. Through 18 core credits and 12 specialization credits, you’ll examine both defensive and offensive modes of cyber operations in Utica College’s Master of Science in Cybersecurity Cyber Operations specialization.
By understanding both sides of the spectrum through hands-on coursework, you’ll graduate ready to detect, investigate, and prevent cybercrime for employers ranging from defense contractors to financial services to critical infrastructure.
As the government, businesses, and individuals continue to use more complex technologies daily — like smartwatches, IoT devices, and more — the opportunity for cybercrime is expanding exponentially. In 2017 alone, almost 180 million records were exposed through data breaches.1 As a result, organizations across industries are increasing their investment in information security. According to Forbes, global information security spending will reach $124 billion in 2019, meaning that professionals with these specialized skills can look forward to strong demand in the coming years.2
CAREER SPOTLIGHT: COMPUTER NETWORK DEFENSE ANALYST
As a computer network defense analyst, you could be responsible for assessing security controls and applying appropriate incident response methods to ensure critical networks are properly protected from cyberattack. You would also investigate threats, manage network access, and more.3
CAREER SPOTLIGHT: VULNERABILITY ASSESSMENT ANALYST
As a vulnerability assessment analyst, you would be responsible for routinely testing and maintaining critical networks and infrastructure. You’ll also seek out system vulnerabilities and recommend solutions that align with cyber defense best practices and current regulations.4
Other titles you may qualify for:
- Penetration Tester
- Computer Network Operations Analyst
Curriculum: Gain Practical Experience in the Virtual Classroom
As one of the few programs in the U.S. that address cyber operations technology, this specialization uses virtual hands-on labs to help students gain critical skills in current technologies. Utica’s online infrastructure provides special servers, virtual machines, and experimental environments that give students a “learn by doing” experience. Labs include penetration testing, vulnerability assessment, data hiding and steganography, anonymity, and autonomous cyber operations.
Course Spotlight: CYB 640 – Tactics, Techniques, and Procedures
Become acquainted with Tactics, Techniques, and Procedures (TTPs) — a foundational concept in terrorism studies — and the essential role TTP analysis plays in cybersecurity while exploring the intervening legal and ethical issues. You’ll study the evolution of cyber TTPs and their use in current events and understand the development of computer network operations (CNO) from a strategic and national perspective.Explore Courses
Course Spotlight: CYB 642 – Access Methods and Data Hiding
Take an in-depth look at data-hiding techniques and access common methods, both past and present, including an up-to-the-minute review of the latest developments. Through research and practical experimentation, you’ll develop an understanding of data-hiding tools, investigation techniques, and the latest countermeasures.
You’ll also have the opportunity to dive into topics like malware, exfiltration of information, and the legal, ethical, social, and cultural principles related to cyber operations.
More Options for Your Degree
M.S. in Cybersecurity: Computer Forensics
Pursue your passion for collecting and preparing evidence for computer crimes such as fraud, child pornography and cyber espionage with courses that emphasize a comprehensive understanding of the forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence.
M.S. in Cybersecurity: Intelligence
Learn to protect and maintain homeland and national security through cyber intelligence and counterintelligence, cyber counterterrorism, and cyber counter sabotage. Graduate with the knowledge to create and leverage systems to protect our nation’s critical data and help ensure security for all.
Frequently Asked Questions
Advancing your life and career with an online degree comes with lots of questions, and we want to ensure your search for answers is effortless. If you have a question we haven’t covered, call (866) 295-3106 to speak with an enrollment counselor.
The online M.S. in Cybersecurity program is designed for professionals who work full-time and is offered part-time, which allows you to achieve a realistic balance between work, school, and personal responsibilities and gives you the opportunity to fully absorb the information in your coursework. To see the curriculum, view our courses page.
The National Security Agency and the Department of Homeland Security have designated Utica College as a National Center of Academic Excellence in Cyber Defense Education (CAE-CD) through the academic year 2024.
Our cybersecurity programs have also been recognized for their excellence by the:
- Defense Cyber Crime Center (DC3)
- EC-Council, one of the premier certifying cybersecurity bodies
Read more about the M.S. in Cybersecurity.
Yes, the M.S. in Cybersecurity offers these specializations:
- Computer Forensics
- Cyber Operations
- Cyber Policy
- Data Analytics
- Electronic Crime
- Malware Analysis
You can review courses now.
Yes, as part of the M.S. in Cybersecurity, you’ll complete a two-day online virtual cybersecurity residency. Learn more about the curriculum.
The M.S. in Cybersecurity prepares you for industry certifications like CompTIA A+, Security+, and CISSP—among others.
- Statista (n.d.). U.S. Data Breaches and Exposed Records 2018 | Statistic. Retrieved on November 27, 2018, from https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
- Aitken, R. (2018 August 19). Global Information Security Spending To Exceed $124B In 2019, Privacy Concerns Driving Demand. Retrieved November 27, 2018, from https://www.forbes.com/sites/rogeraitken/2018/08/19/global-information-security-spending-to-exceed-124b-in-2019-privacy-concerns-driving-demand/#3c99daac7112.
- PayScale (n.d.). Average Network Defense Analyst Salary. Retrieved on April 26, 2019, from https://www.payscale.com/research/US/Job=Network_Defense_Analyst/Salary
- PayScale (n.d.). Average Vulnerability Analyst Salary. Retrieved on April 26, 2019, from https://www.payscale.com/research/US/Job=Vulnerability_Analyst/Salary