M.S. in Cybersecurity: Cyber Policy Specialization

Program Overview

Oversee the safekeeping of networks and data.

Responsibly oversee cyber policy and practices in modern organizations. Become a cyber policy professional and government decision-maker who understands oversight in today's ever-changing online environment.

Responsibly oversee cyber policy and practices in modern organizations. Become a cyber policy professional and government decision-maker who understands oversight in today's ever-changing online environment.

Excel in a Growing Field

With the Cyber Policy specialization of the Master of Science in Cybersecurity, you'll dig into coursework that blends policy and practice and builds a coherent set of underlying principles and procedures that are both legal and ethical. You'll help your organization avoid and manage security risks to their networks, data, and other critical assets.

There's an immense opportunity awaiting cyber policy professionals. Through our results-driven approach to current trends and regulations, you'll complete this program with the right degree at the right time.

Request More Information

We'd love to get to know you and hear more about your educational and professional goals. If you'd like to learn more about one of our programs, fill out this form and we'll be in touch:

          Yes, I do want to communicate with Utica College via SMS. I am providing my consent by leaving the opt-in checked. Message and data rates may apply. Privacy and Terms.
          This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

          Career Outlook

          Organizations everywhere — both private and public sector — need cyber policy professionals who can take on issues that aren't easy to analyze and manage risk in a complex environment. You'll gain the foresight to develop tomorrow's cyber policy and excel in competitive workplaces using data-driven decision-making.

          The global cybersecurity market grew by almost 3,500% from 2004 to 2017, from $3.5 billion to $120 billion.4 The U.S. government alone spent almost $20 billion on cybersecurity in 2017.4 There is an enormous opportunity for professionals with the expertise you'll gain in this Cyber Policy specialization.

          Career Spotlight: Cybersecurity Analyst


          As a cybersecurity analyst (also known as a cyber threat analyst), you'll take complicated technical concepts and explain them to senior-level executives and officials. You'll also work to assess your organization's data-security readiness through exercises and simulated cyberattacks. The most important qualification for this position is a solid understanding of information security and cyber intelligence principles — knowledge you can gain from this program.4

          Career Spotlight: Chief Information Security Officer


          Take a seat in the boardroom as a Chief Information Security Officer, one of the highest-earning cybersecurity positions. You would be responsible for implementing, overseeing, and maintaining any security-related processes and initiatives that compromise your organization's operational cybersecurity. The nationwide average for this salary is $155,578, and top-earning CISOs make up to $350,000 annually in cities like San Francisco, New York, and Washington, D.C.5,6

          Other titles you may qualify for:

          • Incident Manager
          • Overwatch Officer
          • Compliance Officer
          • Cyber Surveillance Analyst
          • Cyber Policy Analyst
          • Cyber Intelligence Analyst
          • Cyber Fraud Investigations Manager


          Curriculum: Know Your Enemy

          Our master's in cybersecurity with a cyber policy specialization is flexible and comprehensive.

          You'll learn foundational theories in cyber law, public policy, and ethics; along with policy and professional responsibility, cutting-edge skills in espionage, surveillance, and cyber data fusion. Ultimately, you'll know how to analyze data, policy, and intelligence to understand your adversaries and predict their next move.

          You’ll gain core competencies in:

          • Cyberspace and cybersecurity
          • Complex organizational issues
          • Foundations of security and privacy
          • Risk assessment and management

          Course Spotlight: CYB 665 – Legal Foundations of Information Security and Privacy

          Learn the principles of privacy relating to non-public personal, proprietary business, or government information. You'll examine policy issues; legal, regulatory and business controls; and best practices.


          Course Spotlight: CYB 668 – Organizational Risk Management Frameworks

          Examine rules, regulations, and issues related to organizational risk management. You'll explore risk assessment and management from healthcare, financial, privacy, data breach, and government perspectives.

          More Options for Your Degree

          Frequently Asked Questions

          Advancing your life and career with an online degree comes with lots of questions, and we want to ensure your search for answers is effortless. If you have a question we haven't covered, call (866) 295-3106 to speak with a program manager.

          The M.S. in Cybersecurity program is designed to be completed in less than two years by taking two classes per 16-week semester. Through 30 credit hours, you'll develop both a foundational understanding of cybersecurity principles, ethics, and critical thinking related to cybersecurity, and specialize in any of seven areas: Cyber Intelligence, Cyber Forensics, Malware Analysis, Electronic Crime, Cyber Operations, Cyber Policy, and Data Analytics.

          The National Security Agency and the Department of Homeland Security have designated Utica College as a National Center of Academic Excellence in Cyber Defense Education (CAE-CD) through academic year 2024.

          Our cybersecurity programs have also been recognized for their excellence by the Defense Cyber Crime Center (DC3) and EC-Council, one of the premier international certifying cybersecurity bodies.

          When you graduate with a new set of expert-level skills in cybersecurity, information assurance, and computer forensics, you'll be in high demand wherever you're interested in protecting data and deterring cybercrime.

          In-demand jobs are available in corporate, governmental, analytical, or investigative environments. Employment of computer and information technology occupations is projected to grow much faster than average 12 percent through 2028, according to the U.S. Bureau of Labor Statistics.

          See our M.S. in Cybersecurity Career Outlook page for detailed information about the career paths, jobs, and earning potential that may be possible for you after graduation.

          No. While previous experience in computer and information security may provide valuable context to your studies, work history in the field is not required for admittance to the program. See our full list of admissions requirements for the M.S. in Cybersecurity program.

          The Master of Science in Cybersecurity program is a 30-credit-hour program at a cost of $895 per credit hour, for a total estimated tuition cost of $26,850. Dual-specialization students will require 42 credit hours for a total of $37,590.

          For a detailed list of all related expenses and fees, see the M.S. in Cybersecurity tuitions and fees page.

          In order to complete the program, you'll be required to complete 30 credit hours, which will include a foundational set of courses as well as your chosen specialization. Dual-specialization students will require 42 credit hours. See the full M.S. in Cybersecurity curriculum for detailed information.


          1PayScale (2019 January). Average Cybersecurity Analyst Salary. Retrieved on January 9, 2019, from https://www.payscale.com/research/US/Job=Cyber_Security_Analyst/Salary
          2PayScale (2019 January). Average Incident Manager Salary. Retrieved on January 9, 2019, from https://www.payscale.com/research/US/Job=Incident_Manager/Salary
          3PayScale (2019 January). Average Chief Information Security Officer Salary. Retrieved on January 9, 2019, from https://www.payscale.com/research/US/Job=Chief_Information_Security_Officer/Salary
          4Morgan, C. (2018 May). 2018 Cybersecurity Market Report. Cybersecurity Ventures. Retrieved on January 9, 2019, from https://cybersecurityventures.com/cybersecurity-market-report/