Earn your Master's In Cyber Security
- $627/credit (36 credits total)
- Transfer up to 12 graduate credits
- Complete in as few as 15 months
- Labs provide hands-on cyber experience
- Participate in cyber competitions
- IT management concentration available
Master's in Cyber Security Program Overview
As high-profile cyber attacks and security breaches become more common, the critical need for well-educated cyber security professionals greatly increases.
Southern New Hampshire University's online Master of Science in Cyber Security program positions you for in-demand roles, allowing you to take preventive measures to keep away the threat of breach – and maintain public confidence. SNHU's affordable master's in cyber security online delivers a deep dive, giving you a competitive edge in this high-growth, well-paying industry.
"The goal is to balance the needs of the company or the organization you're working for with the need to protect the confidentiality of customer data and trade secrets," said Jon Kamyck, associate dean of cyber security at Southern New Hampshire University.
Learn how to:
- Plan, prepare and respond to cyber threats
- Conduct risk assessments and develop risk management plans
- Develop information security policies
- Create business continuity and disaster recovery plans that are distinct, but complementary, activities
- Employ leadership strategies for ethical behavior, tech standards and emerging trends
- Enhance collaboration and communication skills
Choose the general track, or opt to specialize your degree with a concentration in IT management.
Enhance your expertise in enterprise-level technology management by earning a Master of Science in Cyber Security with a concentration in IT Management.
With an IT management concentration, you'll dive deeper into the management of varying aspects of information technology, including the relationships between structure and process in project management and the management of IT functions within an organization. Additionally, you'll explore enterprise resource planning and the implications of cyber law and ethics.
In this program, you'll learn to:
- Facilitate best practices for managing IT functions and interrelationships
- Adopt new technologies
- Develop and work on projects within the IT organizational unit
Overall, those in computer and information technology occupations can expect to see 12% growth in employment through 2028, according to the U.S. Bureau of Labor Statistics.1 The median annual wages in May 2019 for these roles was $88,240 – much higher than the median annual wages for all occupations.1
In addition, in that same time period, the BLS projects 32% growth in demand for information security analysts – a pace much faster than the national average.1 And in 2019, the median annual wages for those roles was $99,730.1
Courses may include:
- Advanced Information Technology
- Enterprise Resource Planning
- Management of Information Technology
As hackers develop sophisticated skill sets, the need exists for even more savvy cyber security professionals – in diverse settings throughout government, military and private sectors worldwide. What's more, the demand for those professionals clearly outweighs the number of well-qualified candidates to fill these critical roles.
"We're seeing a tremendous demand for cyber security practitioners across industries and organizations," said Jon Kamyck, associate dean of cyber security at Southern New Hampshire University. "As the internet has evolved into the engine driving modern society, the increased connectivity has made it far easier for cyber criminals to attack vulnerable organizations at an unprecedented, global scale. Today’s learners will quickly become tomorrow’s front-line cyber defenders."
The U.S. Bureau of Labor Statistics forecasts 32% growth in demand for information security analysts, far above the national average, by 2028.1 The employment projections for information security analysts within computer systems design and related services are even stronger: The field is expected to grow 55% through 2028, thanks to more organizations adopting cloud services and the threats that can come along with those advancements.1
What does that mean in terms of job numbers? From October 2018 to September 2019, almost 1 million people were employed in cyber security-related jobs.2 Even so, during that same time period, there were more than 500,000 online job listings for cyber security positions, highlighting the talent gap in the industry's workforce.2
SNHU's online master's in cyber security can offer you a solid return on your MS degree investment by qualifying you for such roles as cyber security manager or administrator, information security analyst and other sought-after positions within the cyber security industry.
Start Your Journey Toward an Online Cyber Security Degree
Why SNHU for Your Master's in Information Technology
With no set class meeting times, you can learn on your schedule and access online course materials 24/7.
Take advantage of some of the lowest online tuition rates in the nation, plus financial aid for those who qualify. We also make it easy to transfer to SNHU by accepting up to 12 credits from your previous institution.
Founded in 1932, Southern New Hampshire University is a private, nonprofit institution with over 100,000 graduates across the country. SNHU is regionally accredited by the New England Commission of Higher Education (NECHE), which advocates for institutional improvement and public assurance of quality.
Recently, Southern New Hampshire University has been nationally recognized for leading the way toward more innovative, affordable and achievable education:
- “Most Innovative” regional university honors from U.S. News & World Report each year since 2015
- A $1 million grant from Google.org to explore soft skills assessments for high-need youth
- Recognition as a 2017 Digital Learning Innovator by the Online Learning Consortium
At Southern New Hampshire University, you'll have access to a powerful network of more than 200,000 students, alumni and staff that can help support you long after graduation. Our instructors offer relevant, real-world expertise to help you understand and navigate your industry. Plus, with our growing, nationwide alumni network, you'll have the potential to tap into a number of internship and career opportunities.
96.5% of students would recommend SNHU.3 Discover why SNHU may be right for you.
Part of our mission to expand access to quality higher education means removing the barriers that may stand between you and your degree. That’s why you can apply at any time and get a decision within days of submitting all required materials — with no GRE or GMAT required.
Online master's degree candidates must also submit a personal resume. Students with an undergraduate GPA below 2.75 are eligible for provisional acceptance.
To apply, use the online application.
How to Apply
Cyber Security Center of Excellence
Through our Cyber Security Center of Excellence, SNHU proudly supports cyber security students across the globe. To learn more about our contributions to the field, and connect with our academic leaders, visit our Cyber Security Center of Excellence page.
Courses & Curriculum
The 36-credit Master of Science in Cyber Security program is designed for students who want to meet the challenges posed by security threats, learn to protect the confidentiality, availability and integrity of data, and develop risk management and mitigation strategies.
The master's in cyber security online degree program focuses on 5 key areas of competence:
- Information security governance
- Information security incidence response and business continuity
- Information security program creation and management
- Information security risk and compliance
- Leadership, collaboration and communication
Other opportunities to prepare you for your career:
- Cyber security capstone: Combine coursework and experience to design, develop and execute a project in a subject area of your choice that summarizes your learnings throughout the program.
- Technology competitions: Gain experience by competing in national tech competitions, including the National Cyber League – where SNHU fielded the first all-female team and earned multiple Top 10 finishes – and the Teradata University Network data competition, where SNHU teams have received two honorable mentions and earned one Top 10 finish.
- Technology conferences: Learn, network and discover with our students and alumni at major networking events like the Grace Hopper Celebration, Women in Cyber Security conference and ACM Richard Tapia Celebration of Diversity in Computing.
|View Full Curriculum in the Catalog|
|MS in Cybersecurity|
|Courses May Include|
|MS in Cyber Security Online|
|ISE 510||Security Risk Analysis and Planning||This course explores core areas of information security risk and planning, including risk analysis, business continuity, disaster recovery, incident response and security controls. The course will also explore risks as they relate to areas like financial regulations and privacy. Other topics include governance and internal and external partnerships, emerging threats and vulnerabilities, and emerging security capabilities.|
|ISE 620||Incident Detection and Response||This course provides students with the background and skills to manage information security incidents to minimize impact on business operations. Topics include detection, investigation, and response to different types of security incidents. Students explore these topics by developing incidence response plans; utilizing industry-standard processes and tools for investigating information security incidents; and recommending processes for incidence response that adhere to legal, regulatory, and organizational compliance. Students who have completed the course have a comprehensive view of cyber security incident detection and response.|
|ISE 640||Investigation and Digital Forensics||In this course, students learn the theory, practice, and principles of digital forensics through investigation of computer, network, operating system, mobile device and other areas of digital forensics. Topics include identification, collection, acquisition, authentication, preservation, examination, analysis and presentation of digital forensic evidence.|
|ISE 690||Cyber Security Capstone||This capstone course integrates previous coursework and practical experience with a focus on authentic demonstration of competencies outlined by the program. Rather than introducing new concepts, students synthesize prior learning to design, develop, and execute an analytics project on their chosen subject as a culmination of their studies. The course is structured around this critical capstone assessment, so that students have the appropriate support and resources required to be successful.|
|IT 549||Foundation in Information Assurance||This course explores the basic concepts and prepares students with the foundation skills for the protection of networks, communication, and data, as well as the knowledge base for planning, implementing, and managing enterprise level security and system integrity. Topics include approaches in an organization to prevent, detect and recover from the loss of information, cryptography and its applications, security in networks and distributed environments.|
|IT 552||Human Factors in Security||This course examines the human factors present in cyber security related to ethics, integrity, practices, policies and procedures. Students will design information technology security awareness training and optimize information technology organizational factors to foster a healthy security culture within an organization. Additionally, students will recommend mitigation strategies to protect an organization from human behaviors that could potentially cause a security threat.|
|IT 640||Telecommunications and Networking||Telecommunications is a business resource that must be well managed. This includes the technical aspects and the application of telecommunications technology to solve specific business problems and enhance the strategic position of a business enterprise. Topics include the importance of telecommunication in today's business environment, the analysis, design and implementation of telecommunications systems, the scope of the telecommunications industry and current trends; telecommunications hardware, the Open Systems Interconnection (OSI) network model, networking technologies and telecommunications software, protocols and standards.|
|IT 643||Network Assessment and Defense||Explore a broad range of topics from secure network fundamentals, protocols and analysis; threats and vulnerabilities; application, data and host security, access control and identity management. Examine defensive measures to secure an organization's network. Identify overall network security posture and the basic practices in vulnerability assessment.|
|IT 659||Cyberlaw and Ethics||This course addresses ethical and legal issues related to e-commerce and e-business. Students will investigate government approaches to content control and rights, access and jurisdiction regarding personal information, digital property, U.S. and international law, antitrust law, fraud and more.|
|Total Credits: 36|
Minimum Hardware Required Specifications
|Component Type||PC (Windows OS)||Apple (Mac OS)|
Windows 7* or newer
Note: If your computer runs on Windows 7, see the information regarding Windows 7 End of Life below
|Mac OS X Snow Leopard (10.6) or newer
||4 GB or higher
||4 GB or higher
||100GB or higher
||100GB or higher
||Office 2010 Professional or newer
||Office 2011 for Mac
||Required for on campus students. Strongly recommended for online students
||Required for on campus students. Strongly recommended for online students
CD/DVD drive. External hard drive. Extra power cord. Headphones/earbuds
|CD/DVD drive. External hard drive. Extra power cord. Headphones/earbuds
|SNHU Purchase Programs
- Laptop or Desktop? Whichever you choose depends on your personal preference and work style though laptops tend to offer more flexibility.
- IMPORTANT NOTE: Chromebooks (Chrome OS) and iPads (iOS) do not meet the minimum requirements for coursework at SNHU, nor does the Microsoft Surface RT. These offer limited functionality and do not work with some course technologies. They are not acceptable as the only device you use for coursework. While these devices are convenient and may be utilized for some course functions they cannot be your primary device.
- Office 365 Pro Plus is available free of charge to all SNHU students and faculty. The Office suite will remain free while you are a student at SNHU. Upon graduation you may convert to a paid subscription if you wish. Terms subject to change at Microsoft's discretion. The following platforms are no longer supported by Office 365:
- Android 4.3 and earlier versions
- Firefox version 5.0 and earlier versions
- Internet Explorer 8-10 on Windows 7 and earlier versions
- Internet Explorer 10 on Win Phone 8.0
- Safari 6.0.4/OS X10.11 and earlier versions
- Antivirus software: Check with your ISP as they may offer antivirus software free of charge to subscribers.
- Optional Accessories:
- Many laptops on the market today do not include CD/DVD drives. While SNHU typically does not utilize CD/DVD content, this is a good accessory to have.
- External Hard Drive - it is always a good idea to back up your files and an external hard drive is a great way to do that.
- Extra power cord - if you have a laptop and are frequently on the move, many people find it useful to have a second power cord - one for home and one for your bag.
- Headphones/earbuds - many SNHU courses include audio and video content. These will make viewing and listening easier.
*Windows 7 End of Life Statement for Students
Effective Jan. 14, 2020, Microsoft will no longer support Windows 7. What does this mean for you?
As part of the continuing evolution of computer systems, Microsoft will no longer provide security updates for Windows 7. Keeping your computer current with security updates helps your computer run better and protect your information. Since Microsoft will no longer release updates, the information on your computer will be more vulnerable and your computer may not function as well.
We strongly recommend you update to Windows 10 at your earliest convenience. You can upgrade to Windows 10 for free.
Have questions? Contact the ITS help desk via the service portal or by phone at 1.855.877.9919. Technical support is available 24/7.
Tuition & Fees
Tuition rates for SNHU's online degree programs are among the lowest in the nation. We offer a 25% tuition discount for U.S. service members, both full and part time, and the spouses of those on active duty.
|Online Graduate Programs||Per Course||Per Credit Hour||Annual Cost for 15 credits|
(U.S. service members, both full and part time, and the spouses of those on active duty)
Tuition rates are subject to change and are reviewed annually.
$150 Graduation Fee, Course Materials ($ varies by course)
Frequently Asked Questions
Can you get a master's in cyber security?
Yes, you can earn a cyber security master's degree. It can be a great idea if you're looking to move into advanced roles in the field.
In fact, almost 25% of information security analysts 25 or older had earned a master's degree in 2016-17, the most recent data available through the U.S. Bureau of Labor Statistics.1
SNHU offers an online master's in cyber security, making it easier for busy adults to reach their goals. With 24/7 access to the classroom, you can take your graduate courses when it's convenient for you.
The application process here is simple: You'll receive a decision just days after submitting the required materials. You can begin when the time is right for you, since SNHU has 5 graduate term starts each year.
As a student, you'll build a relationship with an academic advisor who specializes in cyber security, and you'll learn from instructors who are currently working in the field.
Jillian Seabrook ’17 ’18G chose to study cyber security at the graduate level after she discovered an interest in it while working at a bank. A co-worker refused to help her with a task, afraid that passing the information along would remove job security. Seabrook said she didn't want to be the person who couldn't help others when it came to such risky topics.
“I just saw fraud happen all the time,” Seabrook said. “At least once a week someone came in with a fake check or a sob story about how they got scammed on Craigslist, and I was like, this is interesting. I want to go do something about that.”
For students who don't have a tech background who want to pursue an MS in Cyber Security, SNHU offers plenty of support and resources through our academic advising team, library, technology partners and social communities.
How long does it take to get a master's in cyber security?
Earning a master's in cyber security can be done in as few as 15 months.
However, finishing in a quicker time frame can depend on your schedule. If you're working full time and have personal obligations, you can create a schedule with your academic advisor – a timeline that allows you to both be successful and reach your goals.
SNHU categorizes students as either full time (2 courses per 10-week term) or part time (1 course per term). With only 12 courses in our online master's in cyber security, you can finish your degree on your terms.
What can I do with a master's in cyber security?
With a master's in cyber security, you can gain more focused skills and the ability to lead information security strategies that can identify and respond to risk.
An MS in Cyber Security might be ideal for those who already work within the field, but are looking to move up the ladder in their career. By developing your skill set with leadership, communication and collaboration traits, you can set yourself apart from other mid-level candidates.
You may also consider a cyber security master's if you have a technical background – like IT, system administration or application development, for example – and are interested in moving your career into a different direction. With over 500,000 cyber security job openings posted from October 2018 to September 2019, it's an excellent time to jump into the field.2
But you don't necessarily need a strong technical background to begin your master's in cyber security, either. If you've already earned a bachelor's degree in a different academic area, it's still possible to enter a graduate program in cyber security so that you can earn a more technical role. SNHU offers a foundation course called Core Technologies that gives you the opportunity to get to know the basics of information systems, including hardware, software, networks and delivery systems.
How much do cyber security professionals make?
According to the U.S. Bureau of Labor Statistics, the median annual wage for information security analysts was $99,730 in May 2019.1
The top paying industries for information security analysts and their median annual wages in May 20191, according to BLS, were:
- Finance and insurance: $103,510
- Computer systems design and related services: $101,980
- Information: $100,560
- Management of companies and enterprises: $97,440
- Administrative and support services: $96,190
And according to the BLS, those who held master's degrees in 2019 earned almost 20% more than those with only a bachelor's degree in terms of median weekly pay.1
Will I get hands-on, real-world experience with an online master's in cyber security?
Of course. When you earn a master's in cyber security online, you can still get the same hands-on learning experiences that you would in a traditional campus environment – but you're able to do it on a convenient schedule that works for you.
You'll get lab experience in a number of classes, like:
- Incident Detection and Response: Explore topics like detection, investigation and response by developing plans that use industry-standard processes and tools to investigate incidents and recommend processes for incidence response.
- Investigation and Digital Forensics: Learn the theory, practice and principles of digital forensics through investigation of computers, networks, operating systems and mobile devices. You'll develop skills for all steps in the evidence cycle: identification, collection, acquisition, authentication, preservation, examination, analysis and presentation.
- Network Assessment and Defense: Examine defensive measures to secure an organization’s network, and study topics like secure network fundamentals, protocols and analysis; threats and vulnerabilities; and application, data and host security, access control and identity management.
With your capstone course, you'll have the opportunity to demonstrate what you've learned with a project that's structured around a topic of your choice. By creating a real-world project that highlights your mastery of cyber security, you have an example of large-scale work that you can show employers.
"We want students to be able to be operating effectively day one after graduation," said Jon Kamyck, associate dean of cyber security at Southern New Hampshire University. "We prepare them with all the tools, techniques, methods (and) tradecraft necessary to succeed out of the gate."
Another way to get hands-on experience with your cyber security master's degree is by incorporating an internship into your program, giving you the ability to take your learnings into the workforce. When you're able to add experience to your resume before you graduate, you indicate to employers that you're ready to take on a role that can help them advance their organization.
SNHU has provided additional information for programs that educationally prepare students for professional licensure or certification. Learn more about what that means for your program on our licensure and certification disclosure page.
Southern New Hampshire University is a private, nonprofit institution accredited by the New England Commission of Higher Education (NECHE) as well as several other accrediting bodies.
Sources & Citations (1, 2, 3)
1 Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, on the internet, at:
- https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm (viewed June 9, 2020)
- https://www.bls.gov/emp/tables/educational-attainment.htm (viewed Dec. 20, 2019)
- https://www.bls.gov/emp/chart-unemployment-earnings-education.htm (viewed Dec. 20, 2019)
Cited projections may not reflect local and/or short-term economic or job conditions and do not guarantee actual job growth.
2 Cyber Seek, Cybersecurity Supply/Demand Heat Map, on the internet, at https://www.cyberseek.org/heatmap.html (viewed Dec. 19, 2019).
3 According to more than 9,200 SNHU online students in survey responses from the fall of 2019.