Master of Science Cybersecurity

The MS in Cybersecurity is intended for students who wish to specialize in the security aspects of the Information Technology field. This program educates professionals for the fast growing and wide ranging information security and cybersecurity markets by providing foundations in the theory of information security as well as knowledge needed to properly design, implement, and manage secured IT infrastructure and risks in an enterprise. Common career areas include Computer Forensics, Incident Response, Network Security Administration, Risk Assessment, and Web Development.

For international students: this is a STEM-designated program, which can qualify you to extend your post-graduation stay in the United States.

Concentrations

Networking and Infrastructure

The Network Security concentration focuses on the network infrastructure and network security management aspects of information security. This concentration will provide in-depth coverage of network security infrastructure technologies such as firewalls, Virtual Private Networks (VPN), Intrusion Detection and Prevention Systems (IDS/IPS), vulnerability assessment tools, as well as overall security infrastructure engineering and design.

Computer Security

The Computer Security concentration focuses on fundamental security topics that arise in the design, analysis, and implementation of distributed systems. This concentration provides in-depth coverage of the theory and application of identity, authentication, access control, auditing, assessment and prevention of software vulnerabilities, and cryptography, in the context of modern enterprise-scale and web-based systems.

Governance, Risk Management and Compliance

The Governance, Risk Management, and Compliance concentration focuses on enterprise-level information security risk management, IT audit, and regulatory compliance. This cross-disciplinary concentration focuses on how to:

  • develop an information security program;
  • assess security risk in business processes;
  • identify and implement a system of controls for security governance and regulatory compliance;
  • plan and conduct IT audits; and
  • develop business continuity and disaster recovery plans.
 

Learning Outcomes

Students will be able to:

  • "Identify the information security services provided by "Confidentiality," "Integrity," and "Availability" (CIA).
  • Develop a security awareness program adapted to the different stakeholder of an enterprise.
  • Evaluate sets of security controls to enforce security policies.
  • Select appropriate tools and methods to conduct a proper incident response and forensic investigation in an enterprise environment."

Career Outcomes

94% of reporting program graduates were employed, continuing education, or not seeking employment within six months of graduation

$87,500 median salary reported by program graduates six months after graduation

Faculty Member's NSA Grant Brings Cybersecurity to High Schools

Assistant Professor Filipo Sharevski has earned a $949,000 grant from the National Centers of Academic Excellence in Cybersecurity, housed within the National Security Agency, to bring cybersecurity courses into high school classrooms. Sharevski led the creation of the National Cybersecurity Teaching Academy, a collaboration among 10 institutions throughout the U.S. As the first certification program of its kind for high school teachers, the inaugural program will prepare 90 high school teachers to teach an advanced cybersecurity course.

US NSA and US DHS logos  

National Center of Academic Excellence

DePaul has been designated a Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency. The designation indicates that we are helping to reduce threats to our national infrastructure by promoting higher education and research in cyber defense as well as providing the nation with a pipeline of qualified cybersecurity professionals. 

team posing for a pic  

Security Daemons

DePaul’s cybersecurity team, the Security Daemons, participate in many Capture the Flag (CTF) competitions throughout the year, and compete annually in the National Collegiate Cyber Defence Competition. In 2023 the team placed third nationally, beating out nearly 180 other college and university teams over the course of state and regional competitions.

2 students viewing a computer screen together 

Hands-On Learning

Coursework emphasizes hands-on learning with Cisco equipment. The CDM Security Lab contains more than 100 routers, over 60 switches, 90 firewalls, and a wide variety of servers and specialized network appliances, all of which are available to students in Cybersecurity courses to practice and perfect their networking and security skills.

studnets in a classroom  

Capstone

During the capstone seminar, students work for ten weeks to bring everything they have learned in the program, through completing the risk analysis; vulnerability and threat analysis; security infrastructure requirements; logical, physical, and management design; pricing; and implementation planning for a realistic critical infrastructure case study. Students leave the program ready for the corporate world and with a great work product to show prospective employers.

security locks  

CyberCenter

DePaul’s CyberCenter, founded in June 2003, is chartered to advance the science, teaching, and practice of computer security, information assurance, network security, and related disciplines. Through affiliated labs, including the Secure Design Lab, Adversarial Cybersecurity Automation Lab (ACAL), Network and Security Lab, and more, the Center aims to increase the awareness of security and produce program graduates who are better able to meet the increasing needs of the nation in the area of information assurance. The Center also works in cooperation with Chicagoland area corporations to assist them in applying information assurance practices into their businesses operations and coordinates with community service organizations to help increase their awareness and implementation of information assurance.

faculty with mentor  

Faculty Research

School of Computing faculty perform research in a wide variety of areas, with many projects funded by federal agencies. Faculty research areas include artificial intelligence, data mining, database systems, high performance and scientific computing, human-computer interaction, programming languages and systems, security, software engineering, technology education, theory, and visual computing.

Application Deadlines

Enrollment QuarterDomestic Student DeadlineInternational Student Deadline
FallAugust 1June 15
WinterDecember 1October 15
SpringMarch 1January 15
SummerMay 1April 15

Admission Process

The graduate application process involves completing an online application, sending in your transcripts and submitting any supplemental material (e.g., letters of recommendation, certifications, etc.). To learn more about your program specific requirements, visit our Graduate Admission page.

Admission Requirements

Contact Graduate Admission

Request Information

 

Ask a Student Ambassador