The online masters degree in cyber security weaves together technical curriculum with courses and discussions that focus on ethical concerns within the industry. The coursework also includes an opportunity for students to develop and advance as professionals, examining communication techniques and career skills that can help them secure their ideal position.
The program requires 36 credit hours to complete.
Core Requirements (12-13 credits)
Concepts of data security, including policies, attacks, vulnerabilities, encryption, information states, and forensics. Prerequisite: IT 501
The study of the impact that politics and government have on technology – on technology’s development, applications, and benefits and costs – and the study of the impact that technologies such as television and the Internet have on politics, including elections. Focus on US policy with some attention to developments in other countries
This course examines the essential business issues, information technology infrastructure, and the foundations of information technology risk management. Students apply IT Risk Management topics to information security and assurance and focus on managerial policy and strategies used in the selection of technology solutions.
Encourages students to reflect upon their career goals, strengths, and challenges as they plan their entry into the job market, and to develop successful skills and strategies for a job search. Includes resume and cover letter preparation, networking, interviewing, approaching referees, and other topics relevant to preparation for career advancement, including further graduate study. S/U grade only.
Choose one of the following:
This course focuses on overall security processes with particular emphasis on security policy enforcement and compliance in Microsoft Windows environments. This course also provides a survey of security technologies, products & solutions. Hands-on skill labs focus on Windows group policy, windows networking security and security architecture of Windows systems. Windows server and client administration is also discussed.
This course discusses the secure administration of Linux server and client systems. The course will focus on security strategies in implementing Linux systems. Hands-on skill labs focus on Linux firewall design, the installation, configuration and maintenance of Linux server environments. This course also examines common vulnerabilities and other security issues in Linux operating systems.
Communication Requirement (3 credits)
Choose one of the following:
This course offers a detailed study of writing and speaking practices for effective communication in business, industry, and not-for-profit organizations. It combines analysis and praxis in composing and executing various messages in formats including letters, memoranda, reports, proposals, and oral presentations. It also emphasizes audience analysis, organizational strategies and motivational appeals, style and language choice, format and appearance. Current issues include communication ethics, intercultural communication, and electronic communication technologies in the workplace.
This course teaches engineering and science students to write and talk about design and research problems in terms that satisfy a specialist and also enable a non-specialist to understand what the problem is and how it was (or can be) solved.
Development and preparation toward writing a major graduate level paper, literature review, research study, or thesis. With focus on a particular theme or topic related to their area of concentration or program, students develop a thesis, design a study, and collect and analyze information or data as appropriate. Students may choose the S/U grading option.
Capstone Experience (3 credits)
At least 300 hours of supervised work experience in a cyber security firm or a cyber security related position (1 credit = 100 hours). May be repeated. No more than 4 credits of CYB 686 may be applied toward the degree. Prerequisite: CYB 689 and approval by the program director and/or Dean of Graduate School.
Research on a topic of special interest to the student under the supervision of a faculty adviser. Major paper or evidence of project completion is required. Prerequisite: 9 credits of CYB coursework and the project must be approved prior to registration. No more than 6 credits of CYB 692 and CYB 695 may be applied toward the degree.
Elective Courses (17-18 credits)
Students can complete whichever of the courses below suit their interests to satisfy the 17-18 required hours.
This course is an introduction to the concepts of modern operating systems. Topics include processes, scheduling, synchronization, virtual memory, file systems, shells, and security. Lab topics include common operating system utilities and commands as well as programming to use OS facilities. Prerequisite: CS 240 or CS 245 or permission from instructor.
Students explore fundamentals of the structure of digital computers and an introduction to assembly language programming. Topics include machine instructions, data representation, addressing techniques and program segmentation and linkage. Prerequisite: IT 500.
The course approaches the fundamental principles of cryptography and network security from both theoretical and applied aspects. It considers classical goals of cryptography such as privacy, authenticity and integrity. Topics include stream and block ciphers, symmetric and asymmetric encryption schemes, message authentication codes, public key encryption, and digital signatures. Additional topics include number theory, traffic analysis and crypto-attacks.
This course is an introduction to the art of determining what a piece of software does and how it works without access to the source code. Students will learn the use of tools that assist in this process including assembler and machine language.
This course develops the skills of IT auditing, monitoring and testing within an organization. Student will prepare audits of technology resources as required by several government regulations. This course utilizes approaches from several IT governance frameworks
This course introduces the fundamentals of digital network systems and the security issues associated with them. Topics include analysis of switching and routing protocols, OSI, TCP/IP, traffic analysis, network security management, client-server models, DNS and DHCP attacks, web servers and web security and LAN security.
Study of special and timely topics in cyber security. May be repeated more than once when topics differ. Prerequisite might be set by Instructor.
This course introduces the processes of performing cybercrime investigations. It provides the students with both the theoretical and practical foundation on techniques and methods used for extraction of information from digital devices. Students will be exposed to developing and using various computer forensics tools to be used in the cyber forensics process. Both Windows and Unix systems will be used to illustrate typical investigative process.
Cyberspace has become a new battle space equally important with the land, sea and air. This course will focus on the exploration of what cyberspace is and the role that it plays in both civilian life and military operations. It discusses the technical, tactical and operational issues from both defensive and offensive sides. This course will also address the emerging policy and regulations, doctrine and strategy of conducting cyber warfare at the nation level. Students will be exposed to the development and use of operational systems and concepts.
This course introduces system security issues in wireless networks such as wireless local area networks, satellite communications, cellular networks and wireless personal area networks (Bluetooth, Zigbee and RFID). Topics include availability, integrity, confidentiality, control of fraudulent usage of networks, jamming and interception. It teaches students how to develop attacks for wireless networks and appropriate defense mechanisms for them.
This course introduces a process for designing secure applications that can withstand attacks. The course also discusses security testing and auditing. It focuses on the security issues a developer faces and common security vulnerabilities and flaws. The course explains security principles, strategies, coding techniques, and tools that can help make code more resistant to attacks. Students will write and analyze code that demonstrates specific secure development techniques.
This course will help student study for and prepare to take the Certified Information Systems Security Professional (CISSP) exam.
Study of special advanced topics in cyber security. May be repeated more than once when topics differ. Prerequisite: 9 credits of CYB course work.
Investigation of cyber security topics under a faculty supervisor. Requires a research or concluding paper, or evidence of project completion. Prerequisite: 9 credits of CYB coursework and the project must be approved prior to registration. No more than 6 credits of CYB 692 and CYB 695 may be applied toward the degree.
Data mining is a broad area that integrates techniques from several fields, including machine learning, statistics, pattern recognition, artificial intelligence, and database systems, for the analysis of large volumes of data. This course gives a wide exposition of these techniques and their software tools.
The study of several ethical hacking techniques and principles needed for a security expert in today’s world. Students will acquire in-depth knowledge of network security.
Preparation and Prerequisites
The curriculum of the online master’s degree in cyber security is built to suit both established security professionals and those who have working knowledge of computing, electrical or computer engineering, IT, or the applied sciences, but may have limited professional experience or academic background in these areas.
Foundation courses are available and may be required as prerequisites for some students. If you have questions about these requirements, contact an Admissions Specialist for more information.
If you have questions about the Foundation courses, contact an Admissions Specialist for more information.
A first course in problem-solving through algorithm development and analysis and software design. Students design and write elementary and intermediate sized programs. Includes an intensive study of Java or another similar programming language.
An introduction to the concepts of computer networks, with an emphasis on Internet Protocol. Topics include the OSI layered model, network and transport layer protocols, design goals, and security. Lab topics include common network information and configuration utilities, as well as programming to use network facilities.
An introduction to probability and statistics for calculus-ready students. Topics include probability, empirical and theoretical frequency distributions, sampling, correlation and regression, testing hypotheses, and estimation of parameters, with an emphasis on illustrations and applications of these techniques. Prerequisites: Precalculus or placement in Calculus on the math placement examination.
An introduction to mathematical reasoning, algorithm analysis, and the concepts that provide a mathematical foundation for computer science. Topics include a review of sets, relations, functions and matrices, logic, proof techniques including mathematical induction, counting techniques, difference equations, applications, and elementary analysis of iterative and recursive algorithms. Usually offered every spring semester. Prerequisite: Calculus (may be taken concurrently).
Request More Information
To learn more about the online masters degree in cyber security and download a free brochure, please fill out this form.
Are you enrolling from outside the U.S.? Click Here.
Valparaiso University respects your right to privacy. The information you submit will be used to respond to your request for information and may be shared with parties working on behalf of Valparaiso for limited purposes. By submitting this form, you consent to receive emails and calls from a representative of Valparaiso University, which may include the use of automated technology. Consent is needed to contact you, but is not a requirement to register or enroll.