Master of Science

Cybersecurity Degree

Take your cybersecurity career to the next level with industry tools and experience.


Take your cybersecurity career to the next level with industry tools and experience.

Learn On Campus Or Online

Cybersecurity Degree

Learn from cybersecurity pros in an NSA-approved program.

With all the risks posed to our online information today, the world needs cybersecurity professionals who have mastered the latest innovations within their industry and know how to apply them in the field. Our master’s in cybersecurity degree provides an immersive learning experience with many open source and commercial cyber tools that prepare you to lead the charge in defending networks and systems in any field. Learn from industry professionals from the likes of the DoD, USAF, and NASA in a National Center of Academic Excellence in Cyber Defense Education designated by the National Security Agency and the Department of Homeland Security.

Looking for an online, accelerated cybersecurity degree program for your Master’s?

colleagues looking over code on computer

NSA and DHS Designation of Excellence.

Center for Academic Excellence Seal
National Security Agency Seal

The National Security Agency and the Department of Homeland Security have designated Bellevue University as a National Center of Academic Excellence in Cyber Defense, (CAE-CD). This designation covers academic years 2022 through 2027.

No GRE or GMAT required to enter master's program.

Select a career-focused cybersecurity master's degree without the cost and hassle of admissions tests. Our admissions team is here to help you apply and enroll so you can get started quickly on the program you want.

Take the next step in your cybersecurity master's degree. We’re ready to help you get there.

Courses

What You’ll Learn

Bellevue University’s Master of Science in Cybersecurity degree will enable you to:

  • Develop, evaluate and communicate information and physical security policies, standards and guidelines.
  • Assess and apply information technology governance, risk management and compliance procedures.
  • Recommend control strategies to mitigate identified risks to information technology assets and manage responses to security incidents.

Cybersecurity Degree Courses

Current students please login to BRUIN and select “Academic Progress” for your curriculum requirements.

Requirements (36 credit hours)

(Click a course name below to view course details).

Core Requirements (27 credit hours)

This course is designed as an overview of the investigative methods and tools associated with computer forensics. Topics include: processing crime and incident scenes, digital evidence controls, recovery of information, network forensics, data acquisition, and legal and ethical issues associated with investigations.

This course addresses the issues relating to successful information security management. Topics include access control systems, network and software security, management practices, risk management, protection mechanisms, business continuity planning, and legal and ethical issues. The course allows for analysis of current security management models.

This course presents an examination of effective security methodologies based on comprehensive assessment of threats and implementation of a layered system of physical and electronic protection. Threat identification, countermeasures, and prevention are explored.

This course provides an introduction to the fundamental components of security architecture. Topics include computer organization; hardware, software and firmware components; open and distributed systems; and protection mechanisms. Discussion also includes certification and accreditation; formal security models; and evaluation criteria. Assigned projects include designing a model secure system.

This course provides an exploration of the human aspects of Cybersecurity. Topics include human behavior and interaction, motivation and influence, and social engineering. Emphasis on the human element of cyber incidents in relation to protecting information and technology assets.

This course provides a technical study of offensive and defensive techniques for protecting cyber assets. Topics include security testing, risk mitigation techniques, and threat response. Discussion also includes penetration testing theory, techniques, and tools; networks, systems, and application vulnerability scanning; risk analysis and response; and intrusion detection and response. Emphasis is placed on identification of system vulnerabilities and threats and techniques for preventing attacks.

This course provides an exploration of how organizations manage risks to information technology assets. Discussion includes the application of methodologies and models for managing such risks. Topics also include recognition of security threats and vulnerabilities and the analysis of associated risks. A systematic approach for acquiring and analyzing information to support decision-making in the protection of assets and the allocation of security resources is presented.

This course explores the concepts of governance and how it applies to information systems. Discussion includes the importance of compliance with laws, regulations, policies, and procedures as a means of minimizing risk through mandated security and control measures. Through this course, students also gain an understanding of Information Technology (IT) Auditing processes and principles.

This course presents an in-depth study of current trends in Cybersecurity threats. Discussion includes the identification and management of threats and vulnerabilities within an effective enterprise security program. Prior Cybersecurity education is synthesized through projects and assignments. Prerequisite: Must have 30 hours towards major requirements completed.

Elective Courses (9 credit hours)

Choose three courses from those listed below. PS 639 OR CIS 610 may be taken but not both.

This course provides an introduction to the strategic use of information technology from a business perspective at the enterprise level. Emphasis is placed on the internal management of information systems services from the point of view of the Chief Information Officer. Alternative strategies and tactics available to management to achieve business goals are examined.

This course introduces the skills, techniques, tools and methodologies necessary to support information system analysis, design and implementation.

This course provides a brief overview of the field of ethics, computer privacy and security, computer crime and software piracy, intellectual property and information ownership, computers and gender, computers and social justice, and civil liberties in cyberspace. Additionally, ethical questions concerning professional codes of conduct and issues of moral responsibility for computer professionals are presented.

The subject of database management will be approached in its role as the back end of client/server technology. The focus will be relational database management with specific emphasis given to the use of relational database as an enabling technology in the area of Online Transaction Processing and Online Analytical processing. The use of SQL query language will be a second significant subject. Issues of databases including concurrency will also be covered. Prerequisite: CIS 535

This course examines what has become a key buzzword of 21st century security: cyber warfare and deterrence. The various forms and complexities of cyber war will be examined, including aspects of non-state actors, international law, financial flows, and state capabilities. Understanding how states try to protect themselves (and develop their own cyber weapons), in addition to comprehending the legal and ethical complications, will be a major element of the course. Finally the concept of deterrence will be evaluated, namely the various state attempts to produce it and the counter-arguments made against the concept overall.

This course is designed as an overview of the fundamental processes associated with waging war in an electronic age. Topics include strategic planning and tactical analysis for target identification, reconnaissance, and tool selection. The intent of this course is to focus on individual, corporate and national forms of warfare.

This course focuses on the architecture and security associated with cloud computing. Emphasis in placed on key drivers which lead to cloud computing adoption and issues associated with cloud computing governance. Additional topics will include infrastructure security, identity and access management, cloud services, data security and storage, and auditing and compliance. Prerequisites: Graduate Standing

This course addresses the complex and unique issues related to effectively managing projects in an Information Technology context. Focus is placed on processes, teams, technology, and global project management. The course is grounded on the Project Management Institute’s Project Management Body of Knowledge (PMBOK®) principles. Students will prepare project management deliverables based on actual problems provided within various business sectors and industries. The course provides students with an understanding of the problems inherent in managing integration, scope, schedule, cost, quality, human resources, communications, risk, procurement, and stakeholders.

This course covers the theory and practice of software testing. Emphasis is placed on the software testing design process, planning, criteria, evaluation and testing methods. Hands-on practice developing and using test plans based on various testing techniques is included.

This course explores common techniques, tools, and technologies for committing white-collar cyber crimes. Topics include fraud prevention, anti-money laundering, investigative methodologies, and protecting privacy. Case students will demonstrate real-world scenarios of white collar crimes, how to prevent or deter them, detection methods, and response techniques.

This course explores risks associated with Industrial Control Systems (ICS) within and across critical infrastructure and key resource sectors. Topics include a comparative analysis of IT and control system architecture, security vulnerabilities, and mitigation strategies unique to the control system domain. This includes activities to reduce the likelihood of success and severity of impact of a cyber-attack against critical infrastructure control systems through risk-mitigation activities.

This course provides cybersecurity students with an advanced study of computer, network, and device forensics as a part of investigations. Students will conduct hands-on forensic research to identify how digital media and/or digital networks were compromised and the method(s) of intrusion employed. Students will be able to review what data is stored on a device, how the device services are consumed, and what methods attackers (and forensic analysts) deploy to retrieve information without an owner’s permission. Pre-requisite: CIS 607.

This course provides the student with an opportunity to identify the processes associated with business continuity planning and disaster recovery. Business continuity topics such as project scope and planning, assessing risk, developing policy and procedures, conducting business impact analyses, recovery strategies, recovery plan development, and implementation are explored. Disaster recovery will be discussed in terms of recovery plan development, implementation, and restoration.

This course builds on CYBR 525 and explores advanced concepts, methods and techniques in preparing and conducting penetration tests on computers, networks, and devices. Students will employ various tools as well as unravel complex methods for exploiting client-side, service side and privilege escalation attacks. They will use advanced tools, techniques, and technologies for determining vulnerabilities in information systems and applications. Students will construct a final report outlining discovered vulnerabilities, make suggested recommendations to remediate and/or mitigate those vulnerabilities. Pre-requisite: CYBR 525.

This course is designed to teach the importance of risk management in projects and provide information about the tools needed to effectively assess and monitor risks throughout the project lifecycle. Emphasis is placed on managing risks associated with project changes and risks associated with information technology projects. Topics covered include recurring issues that lead to failure in IT projects, methods for addressing recurring issues, and assessing risk impact. Prerequisite: CIS 433 or CIS 633 or acceptance into the Master of Project Management (MPM) degree program.

This course provides an opportunity for students to expand their learning by gaining new skills and experiences in the workplace. Program Director and Dean approval is required prior to enrolling in the course and any CPT activities must comply with other eligibility requirements.

University Accreditation

Bellevue University is accredited by the Higher Learning Commission (hlcommission.org).

Whether a college, university, or program is accredited is important to students with financial aid, employers who provide tuition assistance, donors, and the federal government.

This program is considered a non-licensure degree/certificate program and is not intended for those seeking licensure or the practice of licensed profession. This program may be relevant to multiple occupations that do not require licensure and was not designed to meet educational requirements for any specific professional license or certification.

*Consult with an admissions counselor to determine your eligible credits, as well as to verify minimum graduation requirements for this degree. Transfer credits must be from a regionally accredited college or university. Bellevue University makes no promises to prospective students regarding the acceptance of credit awarded by examination, credit for prior learning, or credit for transfer until an evaluation has been conducted.

We work with the experience you bring to the table for your cybersecurity degree.

Format

100% Online learning that works for your life and your goals.

Our flexible online courses are designed to bring quality learning into a format that fits your schedule, without sacrificing meaningful faculty feedback and collaboration with peers across the country. Stay on track with the help of your Student Coach — with you from day one to graduation.

Find out more about the online experience >

On-campus classes offered on a convenient schedule.

If you prefer an in-person learning experience, our Omaha-area campus offers classes that accommodate the working professional’s schedule.

Make your master’s in cybersecurity work at Bellevue University.

Tuition & Financial Aid

Graduate degrees can be more affordable than you think.

Earning a degree is an investment in yourself. We want to help you make sure it’s a wise one.

2024 / 2025 Academic Year

Master's Degree

$660 In-Class or Online Cost Per Credit

(Additional fees may apply to individual courses within your major requirements)

Curious about financial aid? We’ve got the answers.

As a graduate student, you may be eligible for up to $20,500 per year in unsubsidized Direct Student Loans.

And, students often apply for graduate program scholarships through Bellevue University or tuition reimbursement through their employers. Talk to us and we’ll help you explore your options.

Learn more about financial aid >

Move forward with a more affordable master’s in cybersecurity.

Admissions

Start on the path to your master’s. No GRE or GMAT required.

We believe in reducing roadblocks to education. That’s why our admissions requirements focus only on what matters—helping hardworking students access the education they deserve.

For admission to Bellevue University, applicants must:

  • Possess a bachelor’s or master’s degree from a regionally accredited college or university, or a U.S. equivalent degree from a nationally or internationally accredited college or university.
  • Have maintained a GPA of 2.5 or better from the most recent 60 credits of coursework earned toward the bachelor’s degree or have maintained a GPA of 3.0 or better in previous graduate level coursework earned toward the graduate degree.

If you haven’t already, take a moment to request information about your masters program and get in touch with our admissions team. We’ll help make sure you have what you need and answer your questions.

When you’re ready to apply, start your application online. You’ll then:

  • Submit your deposit to Bellevue University. (You can do this at any point in the process.)
  • Submit your transcripts from past institutions and any other required documentation.
  • Complete the FAFSA and see what grants and loans you’re eligible for.

If you are an international student, please see the following specific information: International Student Master Admissions

You'll just need to create an account and complete a pre-application to Bellevue University through Guild. Once you receive confirmation that your pre-application to Bellevue University has been approved, you'll need to complete the required steps to get fully accepted and registered. These include:

  • Submitting transcripts from past institutions
  • Submitting related documentation

Ready to get started?
Reach out to admissions.

  • Get your questions answered about the Cybersecurity Degree
  • Understand your financial aid and scholarship options
  • Map out a schedule that fits with your priorities

STEP 1 of 3