Master of Science in Cybersecurity Policy
CTU's Master of Science in Cybersecurity Policy degree program is intended to provide a basic knowledge of cybersecurity issues for managers of Information Technology professionals. This curriculum is designed to help students develop skills to cope with policy-level decision-making with respect to cybersecurity issues in the public or private sector.
Coursework is designed to cover management, IT/Computer Science and cybersecurity law and policy for those who require some baseline knowledge of cybersecurity issues, but not at the level of a technical specialist.
For IT professionals interested in the more technical roles of implementing and overseeing IT systems, CTU's MSIT degree program offers a concentration in Security Management.
National Center of Academic Excellence in Information Assurance/Cybersecurity 2014-2021*
Relevant Institutional/Programmatic Accreditation
CTU is institutionally accredited by the Higher Learning Commission www.hlcomission.org
The courses for the Master of Science in Cybersecurity Policy degree are focused on providing a holistic overview of industry-relevant to those who aspire to work in the cybersecurity field. Courses include:
- Data and Applications Security
- Computer Systems Security Foundations
- Operating Systems Security
- Network Security
- IT Management
- Leadership and Ethical Decision-Making
- Project Management Processes in Organizations
- Introduction to Cybersecurity Policy
- Government and the Cyber Sector
- Cyber Organizations and Structures
- Emerging Initiatives in Cybersecurity Strategy
- Cybersecurity Policy Capstone
View this degree in the catalog for a full course listing.
Contact an Admissions Advisor for additional information
Estimate your tuition cost and graduation date
If you want to achieve more in your career, you have to own every opportunity— starting with the right master’s degree. Potential career paths for those who earn a Master of Science in Cybersecurity Policy degree include:1
Request more information now
- Security Manager
- Information Technology Project Manager
- Technical Program Manager
- Director of Emergency Services
- Technical Project Manager
- Risk Manager
Gainful Employment and Other Student Disclosures
Below you can find placement rates and other information tailored to your chosen campus and program. Certain disclosures are published on this website to assist students in understanding the facts about their programs.
Program Disclosure Information for:
Online Programs - Master of Science in Cybersecurity Policy
Online Programs - Graduation Rate
The percentage of first-time, full-time undergraduate students who started between
7/1/2009 and 10/15/2009 who completed within 150% of the normal time period: 23%
A first-time student has no prior postsecondary experience before enrolling at this campus. This means that a student who attended another college, university or other postsecondary school before enrolling at this school is not included in the calculation. The rate also does not include students initially enrolled part-time, taking individual classes (as compared to enrolling in a full program), or only auditing classes. These rates are calculated using the Student Right-to-Know formula in order to comply with U.S. Department of Education requirements. The statistics track all first-time, full-time and certificate or degree-seeking undergraduate students who began school during the date range and have completed within 150% of the normal program length. For example, for a two-year program, the graduation rate would include students who had completed within three years of beginning the program. This statistic is not specific to one program alone; rather, all applicable undergraduate programs are included in this overall rate. Information pertaining to the Graduation Rates of all postsecondary institutions recognized by the U.S. Department of Education may be found on the College Navigator website. http://nces.ed.gov/collegenavigator/×
1http://burning-glass.com/job-market-data/; The career titles are provided by Burning Glass. These results are based upon an analysis of over 7 million current job listings compiled from over 17,000 sources – the world’s most comprehensive repository of job openings. Students who earn this degree should not view this list as exhaustive and are not limited to only these options post-graduation. Some career titles listed above may not be entry-level and may require further education or job experience.
*CTU has been designated as a National Center of Academic Excellence in Information Assurance/Cyberscurity for academic years 2014-2021 for its cybersecurity and information assurance programs
Terms and Conditions
By providing your mobile number, you agree to receive text messages from Colorado Tech via its mobile text message provider. You may opt out of receiving messages by texting the word STOP to 94576, or simply reply with the word STOP to any text message you receive from Colorado Tech.
While CEC or its mobile text message provider will not charge end users for receiving/responding to promotional messages, depending on the terms of your mobile phone plan, you may incur a cost from your mobile service carrier to receive and respond to any promotional text messages (standard messaging and data rates/fees and other charges may apply). Charges will appear on your mobile phone bill or will be deducted from pre-paid amounts. Current participating/supported carriers are: Alltel, AT&T, Boost, Cellcom, Cellular One, Cellular South, Cincinnati Bell, Cricket, Element Wireless, Golden State Cellular, iWireless, Metro PCS, Nextel, nTelos, Plateau Wireless, Sprint, T-Mobile, US Cellular, Verizon Wireless, Viaero Wireless, Virgin, and more.×