Cyber Security Master's Degree Online
Master of Cybersecurity Management
The accredited Master of Science in Cybersecurity Management (MSCSM) degree program consists of 12 online courses.
Learn from seasoned security practitioners and utilize cutting edge curriculum to take your cybersecurity credentials to the next level. The University of Fairfax Master’s program was developed by industry experts and allows you to explore the full spectrum of the cybersecurity field.
Degree Program Objectives
The MSCSM degree program develops professionals who:
- are recognized as knowledgeable and qualified practitioners in a specialized field of information security
- possess a depth of knowledge in current cybersecurity practices
- apply critical thinking and problem-solving skills in the analysis of issues relevant to the cybersecurity community
- utilize secondary research competencies in the investigation and selection of best-practice solutions to information security challenges
- demonstrate the knowledge and skills necessary to address a specialized area of information security management
Degree Program Outcomes
Upon completion of the MSCSM degree program, you will be able to:
- compile, analyze, and assess the applicability of best practices in addressing information security issues relevant to the cybersecurity community
- evaluate the impact of business constraints and processes on the implementation of information security programs
- integrate principles and techniques of risk analysis, project planning and change management in the development of information security strategies
- demonstrate secondary research skills in the investigation and selection of best practice solutions to address information security challenges
- demonstrate mastery of theory, concepts and skills in addressing specialized aspects of information security management
Core Courses
IA7000 Security in the Digital Age
In this course, students explore the eight domains of the (ISC)2 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK) in information security as a framework to critically analyze security awareness issues and to evaluate best practices in implementing security systems within the enterprise. (3 credits)
IA7401 Ethical Hacking
This class will evaluate the security of a network or system’s infrastructure and outline how hackers find and attempt to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible. (3 credits)
IA8020 Security Policies, Standards, and Procedures
In this course, students examine the role of security policies, standards, and procedures in addressing business and technical risks and develop a security governance report to evaluate compliance across the enterprise. (3 credits)
IA8030 Design, Development and Evaluation of Security Controls
In this course, students transform high-level policies and procedures into quantifiable and measurable controls and mechanisms that enforce data and process integrity, availability and confidentiality. (3 credits)
IA8050 Security Risk and Vulnerability Assessment
In this course, students explore advanced techniques and tools for identifying and categorizing vulnerabilities which allow penetration of networked systems and environments. (3 credits)
IA8060 Intrusion Detection, Attacks, and Countermeasures
In this course, students examine common attack methods, technologies, and countermeasures. Students also gain skills needed to recognize various stages and methods of attack on the enterprise. (3 credits)
IA8070 Design and Development of Security Architectures
In this course, students evaluate the principles, attributes, and processes used in designing and deploying a comprehensive and resilient layered security architecture that supports the business and technical objectives of the enterprise. (3 credits)
IA8080 Security Solution Implementation
In this course, students compare, contrast, and evaluate contemporary practices in the implementation of security solutions. (3 credits)
IA8125 Information Security Policy Planning and Analysis
In this course, students develop information assurance policies and deployment plans as part of the comprehensive strategic plan and operational objectives for the enterprise. (3 credits)
Research Methods Courses
RM8250 Web-Based Research Methods in Information Security
In this course, students acquire information retrieval skills and research competencies to identify and evaluate industry-relevant sources of information for the purposes of analysis and research information security. Students compare and contrast the utility of publicly-available and subscription-based information sources for the purposes of meeting academic and professional requirements. (3 credits)
Electives 2 of 3 Classes
PM8100 Information Security Project Management
In this course, students utilize PMI’s Project Management Body of Knowledge (PMBOK) as a framework, to apply project management concepts in the information security arena. Each student develops a project plan for a security assessment which incorporates the technical and behavioral characteristics of high-performance teams. (3 credits)
IA8210 Risk Management and Compliance
In this course, students evaluate the procedures and results of risk analysis, as well as compliance processes which address the regulatory requirements that drive the need for risk analysis within the enterprise. Security related regulations such as SOX, GLBA, FISMA and HIPAA are examined. (3 credits)
IA8140 Business Continuity Planning and Recovery
In this course, students explore tools and strategies for Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) activities. Topics include business impact assessment methods, recovery strategy approaches and solutions and continuity planning. (3 credits)
IA7402 Information Security Management
In this course, students explore the five domains of the Certified Information Security Manager (CISM). This framework will include areas in information security governance, risk management, program development, program management, and incident management and response. (3 credit hours)
Potential Careers for Master of Science in Cybersecurity Management Graduates:
An I.T. Strategist is responsible for a business’s technology strategy and for I.T. security. This is critical for a business because of the myriad ways that technology can reduce costs yield greater efficiency and profit for an organization. The strategist evaluates where the business and its clients can benefit from innovative technologies and implements this technology, ensuring compliance with security regulations.
When you graduate with a MSCSM at Fairfax, you will be prepared for many exciting careers in this growing industry. Our graduates have gone on to work in high-level positions in the United States Navy, the Department of Veterans Affairs, Lockheed Martin, Cisco Systems, Wells Fargo, and more!
Whether you want to work as a Chief Technology Officer, Cybersecurity Technician, Engineer, Manager, or Incident Analyst, we will help you develop the skills to succeed in your chosen career. Learn more about the career potential for some of the most common jobs in the cybersecurity field:
Cybersecurity Specialist/Technician
Cybersecurity Specialists sometimes work as Information Security Analysts, a role that is rapidly growing. According to the Bureau of Labor Statistics, these roles are expected to grow at a whopping 28% between 2016-2026. This is much higher than the national average of 7% for all occupations combined.
I.T. Auditor
I.T. auditors are specialists that help companies protect their valuable data. They work with I.T. teams to make sure the internal networks and organizational processes are optimal for securing proprietary data and other confidential information. Some I.T. professionals work as Computer Systems Analysts, using these same skills. According to the BLS, professionals in this role earn an average salary of $87,220 per year.
Cybersecurity Engineer
Like Computer and Information Research Scientists, Cybersecurity Engineers solve the tough challenges that companies and organizations face, handling potential threats and vulnerabilities in their networks. The BLS states that computer and information research scientists can earn around $111,840 per year, and that these roles often require a master’s degree. When you speak with our advisors about your career potential, be sure to ask what other masters-level careers graduates can pursue with our MSCSM degree.
Overall, the Bureau of Labor Statistics expects cybersecurity professions to grow at an average rate of 13% between 2016-2026. This means that students seeking advanced security skills should strongly consider the online Masters of Cybersecurity Management program at University of Fairfax.
Transfer Credits
A maximum of 18 semester credits equivalent to our courses in content, credit and level and taken for graduate credit, as part of a degree or graduate certificate program, from an accredited institution may be transferred.
Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.