Master of Science Cybersecurity

The MS in Cybersecurity is intended for students who wish to specialize in the security aspects of the Information Technology field. This program educates professionals for the fast growing and wide ranging information security and cybersecurity markets by providing foundations in the theory of information security as well as knowledge needed to properly design, implement, and manage secured IT infrastructure and risks in an enterprise. Common career areas include Computer Forensics, Incident Response, Network Security Administration, Risk Assessment, and Web Development.

Concentrations

Networking and Infrastructure

The Network Security concentration focuses on the network infrastructure and network security management aspects of information security. This concentration will provide in-depth coverage of network security infrastructure technologies such as firewalls, Virtual Private Networks (VPN), Intrusion Detection and Prevention Systems (IDS/IPS), vulnerability assessment tools, as well as overall security infrastructure engineering and design.

Computer Security

The Computer Security concentration focuses on fundamental security topics that arise in the design, analysis, and implementation of distributed systems. This concentration provides in-depth coverage of the theory and application of identity, authentication, access control, auditing, assessment and prevention of software vulnerabilities, and cryptography, in the context of modern enterprise-scale and web-based systems.

Governance, Risk Management and Compliance

This concentration focuses on enterprise-level information security risk management, IT audit, and regulatory compliance. Using a cross-disciplinary approach, focus is put on how to develop an information security program; assess security risk in business processes; identify and implement a system of controls for security governance and regulatory compliance; plan and conduct IT audits; and develop business continuity and disaster recovery plans. This concentration has been certified as aligned with ISACA's Model Curriculum for IS Audit and Control.

 

93% of reporting program graduates were employed, continuing education, or not seeking employment within six months of graduation

$80,820 median salary reported by program graduates six months after graduation

Faculty Member's NSA Grant Brings Cybersecurity to High Schools

Assistant Professor Filipo Sharevski has earned a $949,000 grant from the National Centers of Academic Excellence in Cybersecurity, housed within the National Security Agency, to bring cybersecurity courses into high school classrooms. Sharevski led the creation of the National Cybersecurity Teaching Academy, a collaboration among 10 institutions throughout the U.S. As the first certification program of its kind for high school teachers, the inaugural program will prepare 90 high school teachers to teach an advanced cybersecurity course.

US NSA and US DHS logos  

National Center of Academic Excellence

DePaul has been designated a National Center of Academic Excellence in Cybersecurity by the Department of Homeland Security and the National Security Agency.

 

Security Daemons

Security Daemons is a very vibrant and active student club at CDM. The Daemons participate in many Capture The Flag (CTF) competitions throughout the year as well as the annual Collegiate Cyber Defense Competition (CCDC). In 2021, the team placed second in the national CCDC competition, and has placed in the top 5 nationally five of the last seven years.

2 students viewing a computer screen together 

Hands-On Learning

Coursework emphasizes hands-on learning with Cisco equipment. The CDM Security Lab contains more than 100 routers, over 60 switches, 90 firewalls, and a wide variety of servers and specialized network appliances, all of which are available to students in Cybersecurity courses to practice and perfect their networking and security skills.

studnets in a classroom  

Capstone

During the capstone seminar, students work for ten weeks to bring everything they have learned in the program, through completing the risk analysis; vulnerability and threat analysis; security infrastructure requirements; logical, physical, and management design; pricing; and implementation planning for a realistic critical infrastructure case study. Students leave the program ready for the corporate world and with a great work product to show prospective employers.

male using laptop remotely  

Online Learning

This degree can be completed entirely online. One hundred percent of the program’s lectures—from audio and video to whiteboard writing and supplemental materials—are captured and available online.

faculty with mentor  

Faculty Research

School of Computing faculty perform research in a wide variety of areas, with many projects funded by federal agencies. Faculty research areas include artificial intelligence, data mining, database systems, high performance and scientific computing, human-computer interaction, programming languages and systems, security, software engineering, technology education, theory, and visual computing.

Application Deadlines

Enrollment QuarterDomestic Student DeadlineInternational Student Deadline
FallAugust 1June 15
WinterDecember 1October 15
SpringMarch 1January 15
SummerMay 1April 15

Admission Process

The graduate application process involves completing an online application, sending in your transcripts and submitting any supplemental material (e.g., letters of recommendation, certifications, etc.). To learn more about your program specific requirements, visit our Graduate Admission page.

Admission Requirements

Contact Graduate Admission

Request Information

 

Ask a Student Ambassador