M.S. in Cybersecurity
Today, the world relies on global networks and information systems that collect and store real-time data, private information, and valuable assets for organizations.
At Saint Mary’s, you’ll receive a comprehensive education focusing on the key principles of information technology security and advanced topics, including digital forensics and cryptography. Unique to the M.S. in Cybersecurity program at Saint Mary’s, you’ll learn and develop leadership skills to head security information operations and manage teams in a variety of industries.
This cutting-edge program stays ahead of rapid technological changes, keeps up with new and evolving cybersecurity threats, and corroborates in-depth issues faced by organizations — giving you the skills and knowledge to become a cybersecurity expert — or lead a team of professionals protecting against cyberattacks.
Benefits of the M.S. in Cybersecurity program at Saint Mary’s
- The cybersecurity curriculum is designed with the CISSP and CISM certifications at its core, allowing you to thoroughly prepare for the professional security certification exams.
- The M.S. in Cybersecurity at Saint Mary’s uniquely focuses on cybersecurity and related technologies, and therefore, does not require a bachelor’s degree in computer science or technology.
- Earn your degree even faster by completing 12 courses, 100% online. Have your degree in hand in two years or less.
- Stand out as a leader and a cybersecurity expert by enhancing your education with online graduate certificates from Saint Mary’s in Cybersecurity Management and Cybersecurity Technology.
As a graduate of the M.S. in Cybersecurity program, you will gain knowledge of both leadership and technical expertise. This balance of interpersonal skills and technical knowledge is highly desired in the ever-changing world of cybersecurity. At Saint Mary’s, you will focus on these topics:
- Network security and cryptography
- Digital forensics
- Security architecture
- Ethical hacking and defense
- Security planning, risk management, and compliance
- Leadership and cybersecurity communication skills
- Cybersecurity and leadership capstone
Career Outlook and Potential Careers
Demand for cybersecurity professionals is expected to grow at a staggering rate as global commerce increasingly relies on information systems and advanced technologies. According to the U.S. Bureau of Labor and Statistics, the need for information security analysts is expected to grow 31% between 2012 to 2029.
Saint Mary’s prepares students to become cybersecurity experts who stand out to high-level employers and prominent organizations in the global market and leading industries, including:
- Banking and Finance
Computer Network Architect
Information Security Analyst
Information Security Engineer
Information Security Officer
Information Security Specialist
Expand Your Expertise
Showcase your up-to-date knowledge of securing information and technological systems. Saint Mary's offers two online graduate certificates that could supplement your existing bachelor's or maser's degree. These accelerated certificates can help promote your leadership competencies and help build your cybersecurity skill set:
- Demonstrate versatile leadership with the Cybersecurity Management certificate, preparing you to apply the ethics of effective security policy, risk management, and security architecture.
- Develop technological skills by earning a Cybersecurity Technology certificate, exploring intrusion detection, incident response, and network security.
- Demonstrate business management skills relevant to administering information security programs in organizations.
- Apply ethical and socially responsible leadership skills in information security planning and execution.
- Proficiently communicate technical information, including verbal and written communication with clarity and cohesiveness.
- Balance business needs and overall information security architecture planning.
- Evaluate risk management frameworks, methods, and strategies.
- Plan for cyberattacks on networks and computer systems.
- Protect the confidentiality, availability, and integrity of enterprise-wide information assets.