woman studying computer screens

Cybersecurity

Master of Science

The 100% online Master of Science in Cybersecurity enables working professionals to train for the most lucrative and rapidly growing career paths in information technology.

Loading...

100% Online Master's in Cybersecurity from the Top-Ranked University of Arizona

U.S. Department of Homeland Security
National Security Agency - USA
Center of Academic Excellence in Cybersecurity

In the process of earning the Master’s in Cybersecurity, students could also earn the Department of MIS’s Enterprise Security Certificate, which leverages the department’s designation – by the National Security Agency and the Department of Homeland Security – as a Center of Academic Excellence in Information Assurance Education.

The University of Arizona’s online master’s in cybersecurity is designed for working professionals who want to gain technical mastery in the rapidly growing field of cybersecurity. Leveraging three of the strongest departments at the University of Arizona, this unique program is a joint program administered by Management Information Systems (MIS) at the Eller College of Management, Electrical and Computer Engineering, and Systems and Industrial Engineering at the College of Engineering.

In this challenging yet inclusive online program, students learn how to assess, prevent, and manage information and systems security-related risks by applying systems security management and post-breach practices through hands-on, interactive classes taught by the UA’s excellent faculty.

The 33-credit, interdisciplinary cybersecurity program enables students to complete a common core of courses and then select either the Information Systems or Physical Systems track.

Start studying right away — the program offers six admission dates throughout the year, with accelerated 8-week courses.

View detailed program information

Career Level: Graduate
Degree: Master of Science
College: Eller College of Management and College of Engineering

Cost & Eligibility

Per Unit Cost: $1,332
*Residents of some U.S. Territories may not be eligible. Please see our Eligibility & State Authorization page for more information.

Wondering about the specific classes you can take in this program? See the course descriptions below.

  • MIS 515: Information Security in Public and Private Sectors - Gain a general knowledge of measures to ensure confidentiality, availability and integrity of information systems. Topics include hardware, software and network security; INFOSEC, OPSEC and NSTISS overviews; national policy, threats, countermeasures and risk management.
  • MIS 545: Data Mining for Business Intelligence - Learn how to discover knowledge and acquire business intelligence from massive datasets. Overview of the most important data mining techniques – classification, clustering, association rule mining, visualization, and prediction – used to discover patterns in fraud detection, consumer behavior, credit approval, etc.
  • ECE 578: Fundamentals of Computer Networks - Introduction to computer networks and protocols. Study of the ISO open systems interconnection model, with emphasis on the physical, data link, network and transport layers. Discussion of IEEE 802, OSI and Internet protocols.
  • SIE 571: Systems Cyber Security Engineering - Explore various techniques for eliminating security vulnerabilities, defining security specifications/plans, and incorporating countermeasures in order to achieve overall system assurance.
Student taking a UA Online course

Information Systems Track

Courses include Information Security Risk Management, Cyber Threat Intelligence, and Cyber Warfare Capstone

Globe

Physical Systems Track

Courses include Systems Engineering Process, Digital Communication, and Cyber Security: Concept, Theory, and Practice

Spinning gears
Man working with computers

Outcomes

As a result of this program, students will:

  • Understand the breadth and scope of security issues on personal, corporate, national, and global levels
  • Assess, prevent, and manage information or systems security-related risks
  • Perform system hardening, vulnerability testing, and forensic investigation procedures
  • Apply data analytics to develop threat intelligence for current and future information or systems security endeavors