Master of Science in Cybersecurity Policy

CTU's Master of Science in Cybersecurity Policy degree program is intended to provide a basic knowledge of cybersecurity issues for managers of Information Technology professionals. This curriculum is designed to help students develop skills to cope with policy-level decision-making with respect to cybersecurity issues in the public or private sector.

Coursework is designed to cover management, IT/Computer Science and cybersecurity law and policy for those who require some baseline knowledge of cybersecurity issues, but not at the level of a technical specialist.

For IT professionals interested in the more technical roles of implementing and overseeing IT systems, CTU's MSIT degree program offers a concentration in Security Management.

National Center of Academic Excellence in Information Assurance/Cybersecurity 2014-2021*

Relevant Institutional/Programmatic Accreditation
CTU is institutionally accredited by the Higher Learning Commission www.hlcomission.org

  • Classes start

  • Total Credits 

    48
  • Program Availability

    Online

Program Details

Program Outline
Career Paths
  • Program Outline

    The courses for the Master of Science in Cybersecurity Policy degree are focused on providing a holistic overview of industry-relevant to those who aspire to work in the cybersecurity field. Courses include:

    • Data and Applications Security
    • Computer Systems Security Foundations
    • Operating Systems Security
    • Network Security
    • IT Management
    • Leadership and Ethical Decision-Making
    • Project Management Processes in Organizations
    • Introduction to Cybersecurity Policy
    • Government and the Cyber Sector
    • Cyber Organizations and Structures
    • Emerging Initiatives in Cybersecurity Strategy
    • Cybersecurity Policy Capstone

    View this degree in the catalog for a full course listing.

    Headset icon Contact an Admissions Advisor for additional information Calculator icon Estimate your tuition cost and graduation date
  • Career Paths

    If you want to achieve more in your career, you have to own every opportunity— starting with the right master’s degree. Potential career paths for those who earn a Master of Science in Cybersecurity Policy degree include:1

    • Security Manager
    • Information Technology Project Manager
    • Technical Program Manager
    • Director of Emergency Services
    • Technical Project Manager
    • Risk Manager
    Headset icon Request more information now

Gainful Employment and Other Student Disclosures

Below you can find placement rates and other information tailored to your chosen campus and program. Certain disclosures are published on this website to assist students in understanding the facts about their programs.

Program Disclosure Information for:
Online Programs - Master of Science in Cybersecurity Policy

Gainful Employment Disclosure Button
 
 

Online Programs - Graduation Rate

The percentage of first-time, full-time undergraduate students who started between
7/1/2009 and 10/15/2009 who completed within 150% of the normal time period: 23%

Learn More  

Graduation Rate

A first-time student has no prior postsecondary experience before enrolling at this campus. This means that a student who attended another college, university or other postsecondary school before enrolling at this school is not included in the calculation. The rate also does not include students initially enrolled part-time, taking individual classes (as compared to enrolling in a full program), or only auditing classes. These rates are calculated using the Student Right-to-Know formula in order to comply with U.S. Department of Education requirements. The statistics track all first-time, full-time and certificate or degree-seeking undergraduate students who began school during the date range and have completed within 150% of the normal program length. For example, for a two-year program, the graduation rate would include students who had completed within three years of beginning the program. This statistic is not specific to one program alone; rather, all applicable undergraduate programs are included in this overall rate. Information pertaining to the Graduation Rates of all postsecondary institutions recognized by the U.S. Department of Education may be found on the College Navigator website. http://nces.ed.gov/collegenavigator/

×

Need help choosing the right degree program?

Request Information Chat Now

1http://burning-glass.com/job-market-data/; The career titles are provided by Burning Glass. These results are based upon an analysis of over 7 million current job listings compiled from over 17,000 sources – the world’s most comprehensive repository of job openings. Students who earn this degree should not view this list as exhaustive and are not limited to only these options post-graduation. Some career titles listed above may not be entry-level and may require further education or job experience.

*CTU has been designated as a National Center of Academic Excellence in Information Assurance/Cyberscurity for academic years 2014-2021 for its cybersecurity and information assurance programs

Copyright © 2016 Colorado Technical University (CTU). All rights reserved. No information may be duplicated without CTU's permission. The CTU logo is a registered trademark of Career Education Corporation. CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Programs vary by location and modality; see catalog for details. Financial aid is available for those who qualify. See the Accreditation & Licensure section for information on the agencies that approve and regulate the school's programs, including relevant complaint procedures here. Find employment rates, financial obligations and other disclosures below.

Privacy Statement Legal Terms and Conditions Student Disclosures Sitemap Student Safety Contact Us


 (855) 230-0555

Terms and Conditions By providing your mobile number, you agree to receive text messages from Colorado Tech via its mobile text message provider.  You may opt out of receiving messages by texting the word STOP to 94576, or simply reply with the word STOP to any text message you receive from Colorado Tech. While CEC or its mobile text message provider will not charge end users for receiving/responding to promotional messages, depending on the terms of your mobile phone plan, you may incur a cost from your mobile service carrier to receive and respond to any promotional text messages (standard messaging and data rates/fees and other charges may apply).  Charges will appear on your mobile phone bill or will be deducted from pre-paid amounts.  Current participating/supported carriers are: Alltel, AT&T, Boost, Cellcom, Cellular One, Cellular South, Cincinnati Bell, Cricket, Element Wireless, Golden State Cellular, iWireless, Metro PCS, Nextel, nTelos, Plateau Wireless, Sprint, T-Mobile, US Cellular, Verizon Wireless, Viaero Wireless, Virgin, and more.×