The Master of Science in Cybersecurity degree enhances career opportunities to supervise, design, develop, and operate a secure cyber environment. The program can be completed 100% online in 12 months by fully prepared applicants and employs a unique 7-week course structure allowing students to complete four courses per fall and spring semester while taking two classes at a time.
Upon completion of the MS-Cybersecurity, students will be able to: strategize, design, develop, deploy, and lead cybersecurity efforts in the enterprise; prepare for, respond to, and recover from cybersecurity threats and incidents; manage cybersecurity risk to information assets; and select and apply appropriate tools and methodologies to solve real-world cyber problems.
This program is a part of the College of Computing and Software Engineering .
return to top ↑
Admissions Requirements
The following are requirements beyond the general Admissions requirements:
- Resume/Vita required.
- Statement of purpose (Optional but recommended).
- Two letters of recommendation (Optional but recommended).
- Undergraduate degree from an accredited university.
- Minimum undergraduate degree GPA 2.75. Lower GPA is considered on a case-by-case basis.
Required Background
The Master of Science in Cybersecurity is made up of 9 required courses and one capstone course (for a total of 30 Credit hours). All students must satisfy the 4 foundation requirements in the area of programming, computing infrastructure, data communication and networking, and cybersecurity foundation. Students can satisfy the foundation requirements for the MS Cybersecurity in one of the following two manners:
1) By completing the appropriate prerequisite modules through the KSU College of Graduate and Professional Education in the areas of Programming Principles, Computing Infrastructure, Data Communication and Networking, and Cybersecurity Foundation.
2) By completing the following undergraduate courses (or their KSU equivalents) with a grade of “C” or better:
- Programming Principles
- Computing Infrastructure
- Data Communication and Networking
- Cybersecurity Foundation
Petition to Graduate
Each candidate must petition to graduate online. For more information, please view the corresponding section in Academic Policies: 5.0 PROGRAM REQUIREMENTS & GRADUATION .
return to top ↑