Master of Science in Cybersecurity Policy

CTU's Master of Science in Cybersecurity Policy degree program is intended to provide a basic knowledge of cybersecurity issues for managers of Information Technology professionals. This curriculum is designed to help students develop skills to cope with policy-level decision-making with respect to cybersecurity issues in the public or private sector.

Coursework is designed to cover management, IT/Computer Science and cybersecurity law and policy for those who require some baseline knowledge of cybersecurity issues, but not at the level of a technical specialist.

For IT professionals interested in the more technical roles of implementing and overseeing IT systems, CTU's MSIT degree program offers a concentration in Security Management.

National Center of Academic Excellence in Information Assurance/Cybersecurity 2014-2021*

Relevant Institutional/Programmatic Accreditation
CTU is institutionally accredited by the Higher Learning Commission

  • Classes start

  • Total Credits 

  • Program Availability


Program Details

Ways to Save
  • Courses

    Degree Requirements

    Courses: Core
    CS632Data and Applications Security4
    CS651Computer Systems Security Foundations4
    CS652Operating Systems Security4
    CS653Network Security4
    IT600IT Management4
    INTD670Leadership and Ethical Decision-Making4
    PM600Project Management Processes in Organizations4
    Total Credit Hours:28
    Courses: Concentration
    HLS651Introduction to Cybersecurity Policy4
    HLS652Government and the Cyber Sector4
    HLS653Cyber Organizations and Structures4
    HLS654Emerging Initiatives in Cybersecurity Policy4
    HLS655Cybersecurity Policy Capstone4
    Total Credit Hours:20

    Total Credit Hours: 48

    National Security Agency and Department of Homeland Security

    The Department of Homeland Security and the National Security Agency have recognized Colorado Technical University as a National Center of Academic Excellence in Information Assurance and Cyber Defense (CAE IA/CD). The CTU cyber security curriculum was certified thereby to map to the DHS/NSA cybersecurity knowledge units. This recognition and certification is valid through 2021.

    This CAE IA/CD designation is applicable to this degree program.

  • Tuition


    Total tuition for this degree program will vary depending on your educational needs, existing experience, and other factors.

    View our tuition resources page for links to information on our civilian and military student tuition, books and fees.

    Calculator icon Estimate your costs, potential savings and graduation date
  • Ways to Save

    Ways to Save

    Cost of this degree may be reduced based on one or more of the following:

  • Outcomes

    If you want to achieve more in your career, you have to own every opportunity— starting with the right master’s degree. Potential career paths for those who earn a Master of Science in Cybersecurity Policy degree include:1

    • Security Manager
    • Information Technology Project Manager
    • Technical Program Manager
    • Director of Emergency Services
    • Technical Project Manager
    • Risk Manager

Gainful Employment and Other Student Disclosures

Below you can find placement rates and other information tailored to your chosen campus and program. Certain disclosures are published on this website to assist students in understanding the facts about their programs.

Program Disclosure Information for:
Online Programs - Master of Science in Cybersecurity Policy

Gainful Employment Disclosure Button

Online Programs - Graduation Rate

The percentage of first-time, full-time undergraduate students who started between
7/1/2009 and 10/15/2009 who completed within 150% of the normal time period: 23%

Learn More  

Graduation Rate

A first-time student has no prior postsecondary experience before enrolling at this campus. This means that a student who attended another college, university or other postsecondary school before enrolling at this school is not included in the calculation. The rate also does not include students initially enrolled part-time, taking individual classes (as compared to enrolling in a full program), or only auditing classes. These rates are calculated using the Student Right-to-Know formula in order to comply with U.S. Department of Education requirements. The statistics track all first-time, full-time and certificate or degree-seeking undergraduate students who began school during the date range and have completed within 150% of the normal program length. For example, for a two-year program, the graduation rate would include students who had completed within three years of beginning the program. This statistic is not specific to one program alone; rather, all applicable undergraduate programs are included in this overall rate. Information pertaining to the Graduation Rates of all postsecondary institutions recognized by the U.S. Department of Education may be found on the College Navigator website.


Need help choosing the right degree program?

Request Information Chat Now

1; The career titles are provided by Burning Glass. These results are based upon an analysis of over 7 million current job listings compiled from over 17,000 sources – the world’s most comprehensive repository of job openings. Students who earn this degree should not view this list as exhaustive and are not limited to only these options post-graduation. Some career titles listed above may not be entry-level and may require further education or job experience.

*CTU has been designated as a National Center of Academic Excellence in Information Assurance/Cyberscurity for academic years 2014-2021 for its cybersecurity and information assurance programs