MS in Cybersecurity
Master of Science in Cybersecurity
Interested in applying?
Visit the application and admission requirements page here.
Have questions or want to learn more before you apply?
Contact the Program Director, Dr. Matt Hale or the College of IS&T graduate advisors.
MS in Cybersecurity
Students enrolling in the degree program will be given the choice between two tracks: systems or management. The systems track is geared towards those who want to approach Cybersecurity from a more technical computer science perspective. This includes a greater focus upon technology issues such as encryption, malware, secure software, and theoretical foundations of information security. The management track is geared towards a Management Information Systems perspective and revolves around policy and management in the realm of Cybersecurity. This would include topics in the creation and enforcement of policies necessary for assurance, disaster recovery techniques, and critical business systems practices. Students enrolled in the program would be expected to make use of their previous education and experience in Computer Science or Management Information Systems depending upon the track selected.
The Master of Science degree program also provides a choice between a thesis option and capstone option. Students who want to actively engage in Cybersecurity research or pursue a Ph.D. are encouraged to select the thesis option. Students who desire a more practical education who potentially see themselves as Cybersecurity professionals may want to choose the capstone option. This option requires the students to take a capstone class in which they will work with on practical research problems related to current Cybersecurity issues. They will be expected to present their research results but are not expected to write a full thesis on the work.
Each degree path requires a 33-hour program of study and all share a set of common courses. These courses encompass the majority of the Cybersecurity common body of knowledge. In addition, non-core courses are designed to allow students to explore a wide variety of areas to which the core concepts are applicable. This includes but is not limited to topics such as information warfare, forensics, software reverse engineering, secure software engineering, and corporate information technology security policy management.
MS Concentrations in Cybersecurity
In addition to the Cybersecurity Master of Science program, the College of Information Science & Technology provides Cybersecurity concentrations for Computer Science and Management Information Systems graduate students. Students interested in an Cybersecurity concentration must still take their particular degree’s core coursework along with Cybersecurity electives. Additionally, students in the Cybersecurity program can take a core of Cybersecurity and take electives in Computer Science and/or MIS courses as needed.
Faculty and Facilities
The Cybersecurity program is maintained by NUCIA, the Nebraska University Center for Information Assurance. NUCIA is one of the Academic Centers of Excellence supported by the National Security Agency. The staff at NUCIA includes terminal degreed Information Assurance experts and certified information security professionals with the experience, expertise, and industry background to provide a strong program.
NUCIA also features a network of laboratories built specifically for Cybersecurity training and research called STEAL, Security Technology Education and Analysis Laboratories. The STEAL environment provides a place where students can conduct experiments and research in an isolated and safe setting. This also allows the students the ability to conduct experiments that would be potentially dangerous or harmful to external systems and networks. Such an environment provides students in the Cybersecurity program the hands-on experience that is all too valuable in this particular field.
Student Learning Outcomes for Cybersecurity Graduate Program
SLO 1: Analyze a problem, identify and define the security requirements appropriate to its solution, and implement the requirements.
SLO 2: Create an effective presentation for a range of audiences which explains the problem, security issues, and requirements and presents a solution.
SLO 3: Function effectively on teams to accomplish a common goal in a professional, ethical, legal, and responsible manner.