Skip to content

M.S. in Cybersecurity: Cyber Policy Specialization

Oversee the Safekeeping of Networks and Data

Build a Foundation in Public Policy and Ethics

Explore Complex Organizational Issues

Industry-Experienced Faculty

Learn More Today

Complete the form to learn more about this program.

  • Duration 2 years
  • Cost per Credit $895
  • Credit Hours 30

Program Benefits

  • Influence cyber policy in public and private institutions
  • Participate in a virtual two-day immersive residency
  • National Center of Academic Excellence in Cyber Defense Education (CAE-CD)

Excel in a Growing Field

Responsibly oversee cyber policy and practices in modern organizations. Become a cyber policy professional and government decision-maker who understands oversight in today’s ever-changing online environment.

With the Cyber Policy specialization of the Master of Science in Cybersecurity, you’ll dig into coursework that blends policy and practice and builds a coherent set of underlying principles and procedures that are both legal and ethical. You’ll help your organization avoid and manage security risks to their networks, data, and other critical assets.

There’s an immense opportunity awaiting cyber policy professionals. Through our results-driven approach to current trends and regulations, you’ll complete this program with the right degree at the right time.

Career Outlook

Organizations everywhere — both private and public sector — need cyber policy professionals who can take on issues that aren’t easy to analyze and manage risk in a complex environment. You’ll gain the foresight to develop tomorrow’s cyber policy and excel in competitive workplaces using data-driven decision-making.

The global cybersecurity market grew by almost 3,500% from 2004 to 2017, from $3.5 billion to $120 billion.4 The U.S. government alone spent almost $20 billion on cybersecurity in 2017.4 There is an enormous opportunity for professionals with the expertise you’ll gain in this Cyber Policy specialization.



As a cybersecurity analyst (also known as a cyber threat analyst), you’ll take complicated technical concepts and explain them to senior-level executives and officials. You’ll also work to assess your organization’s data-security readiness through exercises and simulated cyberattacks. The most important qualification for this position is a solid understanding of information security and cyber intelligence principles — knowledge you can gain from this program.4



Take a seat in the boardroom as a Chief Information Security Officer, one of the highest-earning cybersecurity positions. You would be responsible for implementing, overseeing, and maintaining any security-related processes and initiatives that compromise your organization’s operational cybersecurity. The nationwide average for this salary is $155,578, and top-earning CISOs make up to $350,000 annually in cities like San Francisco, New York, and Washington, D.C.5,6

Other titles you may qualify for:

  • Incident Manager
  • Overwatch Officer
  • Compliance Officer
  • Cyber Surveillance Analyst
  • Cyber Policy Analyst
  • Cyber Intelligence Analyst
  • Cyber Fraud Investigations Manager
Jobs and Income

Curriculum: Know Your Enemy

Our master’s in cybersecurity with a cyber policy specialization is flexible and comprehensive.

You’ll learn foundational theories in cyber law, public policy, and ethics; along with policy and professional responsibility, cutting-edge skills in espionage, surveillance, and cyber data fusion. Ultimately, you’ll know how to analyze data, policy, and intelligence to understand your adversaries and predict their next move.

You’ll gain core competencies in:

  • Cyberspace and cybersecurity
  • Complex organizational issues
  • Foundations of security and privacy
  • Risk assessment and management

Course Spotlight: CYB 665 – Legal Foundations of Information Security and Privacy

Learn the principles of privacy relating to non-public personal, proprietary business, or government information. You’ll examine policy issues; legal, regulatory and business controls; and best practices.

Explore Courses

Course Spotlight: CYB 668 – Organizational Risk Management Frameworks

Examine rules, regulations, and issues related to organizational risk management. You’ll explore risk assessment and management from healthcare, financial, privacy, data breach, and government perspectives.

More Options for Your Degree

Computer Forensics

Pursue your passion for collecting and preparing evidence for computer crimes such as fraud, child pornography and cyber espionage with courses that emphasize a comprehensive understanding of the forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence.

Cyber Operations

Examine defensive and offensive modes of cyber operations as you become a cybersecurity expert. You’ll graduate ready to detect, investigate, and prevent cybercrime for employers ranging from defense contractors to financial services to critical infrastructure.

Data Analytics

Explore concepts in business intelligence, data analytics, and data science. Learn how to analyze big data to make strategic decisions, and advance in this fast-growing field.

Electronic Crime

Master the technical, legal, and ethical aspects of electronic crime, white collar crime and fraud investigation with a focus on risk and compliance, legal issues, fraud management, and advanced fraud analysis techniques.


Learn to protect and maintain homeland and national security through cyber intelligence and counterintelligence, cyber counterterrorism, and cyber counter sabotage. Graduate with the knowledge to create and leverage systems to protect our nation’s critical data and help ensure security for all.

Malware Analysis

Pursue your interest in the technical aspects of malware analysis with courses that focus on the basics of malware, identification of malware, and mitigation of the effects of malware.

Frequently Asked Questions

Advancing your life and career with an online degree comes with lots of questions, and we want to ensure your search for answers is effortless. If you have a question we haven’t covered, call (866) 295-3106 to speak with an enrollment counselor.

The online M.S. in Cybersecurity program is designed for professionals who work full-time and is offered part-time, which allows you to achieve a realistic balance between work, school, and personal responsibilities and gives you the opportunity to fully absorb the information in your coursework. To see the curriculum, view our courses page.

The National Security Agency and the Department of Homeland Security have designated Utica University as a National Center of Academic Excellence in Cyber Defense Education (CAE-CD) through the academic year 2024.

Our cybersecurity programs have also been recognized for their excellence by the:

  • Defense Cyber Crime Center (DC3)
  • EC-Council, one of the premier certifying cybersecurity bodies

Read more about the M.S. in Cybersecurity.

The first step toward applying to the M.S. in Cybersecurity is to start your online application. Then, you’ll need to gather official transcripts, a personal statement, two letters of recommendation, and a résumé. Read more about admission requirements for the M.S. in Cybersecurity.

Yes, the M.S. in Cybersecurity offers these specializations:

  • Computer Forensics
  • Cyber Operations
  • Cyber Policy
  • Data Analytics
  • Electronic Crime
  • Intelligence
  • Malware Analysis

You can review courses now.

Yes, as part of the M.S. in Cybersecurity, you’ll complete a two-day online virtual cybersecurity residency. Learn more about the curriculum.

The M.S. in Cybersecurity prepares you for industry certifications like CompTIA A+, Security+, and CISSP—among others.

Visit our FAQ page


  1. PayScale (2019 January). Average Cybersecurity Analyst Salary. Retrieved on January 9, 2019, from
  2. PayScale (2019 January). Average Incident Manager Salary. Retrieved on January 9, 2019, from
  3. PayScale (2019 January). Average Chief Information Security Officer Salary. Retrieved on January 9, 2019, from
  4. Morgan, C. (2018 May). 2018 Cybersecurity Market Report. Cybersecurity VenturesRetrieved on January 9, 2019, from