Cybersecurity, Master of Science

Admissions Process

Please refer to “The Graduate Admissions Process” section for general graduate admission information and requirements.

If you are an international student, please contact International Student Admissions for additional information.

1. Submit a Graduate Application

A $35 non-refundable application fee is required.

2. Submit official transcripts

A conferred bachelor’s degree from an accredited institution.

Official transcripts should be sent electronically or by mail to:

Wilmington University

Office of Admissions

320 N Dupont Highway

New Castle, DE 19720

Any transcripts from institutions outside of the United States require an official course-by-course evaluation by a NACES.org approved agency.

Note: In order to receive financial aid official transcripts must be on file.

3. Program Planning Conference

To schedule your Program Planning Conference with your Program Advisor complete an Online Request form.

4. Register for CYB 6010 as your first course.

The Master of Science - Cybersecurity program uses the APA Research Format for all research papers. If you are not familiar with this citation system, please consider taking Wilmington University's introductory academic writing seminar: Student Success Seminar:  APA Style for Graduate Students

 

 

Program Purpose

Students earning this degree will be prepared to advance in the growing and challenging field of Cybersecurity. The program offers students the opportunity to learn both tactical and strategic perspectives of Cybersecurity. The combination of tactical and strategic perspectives enables students to become practitioners and leaders in the field of Cybersecurity. 

Program Competencies

In addition to satisfying the University's graduate graduation competencies, students will have an advanced level of applicable knowledge in the following areas as appropriate to one's field of study: 

Cybersecurity Best Practices

  • Apply a Cybersecurity best practice to a scenario.
  • Compare and contrast a given set of Cybersecurity best practices.

Cybersecurity Plan

  • Develop a Cybersecurity plan for a given situation/case study.
  • Analyze / critique a Cybersecurity plan.

Cybersecurity Tools, Techniques, and Methodologies

  • Compare and contrast a given set of Cybersecurity methodologies.
  • Apply/utilize the appropriate Cybersecurity tool for a given situation/case study.
  • Describe a given Cybersecurity technique.

 

Program Design

Students who successfully complete the Master of Science in Cybersecurity will possess a working command of current cybersecurity practices that can be immediately applied to an organization regardless of size. Degree recipients will be capable of managing complex cybersecurity responsibilities and projects from inception to completion. Students have the option to pursue a concentration that caters to their vocational pursuit. Students graduating from the MS in Cybersecurity program should be prepared to provide leadership in the field of Cybersecurity. Graduates will have the following skills, knowledge, and values:

• A core knowledge of Cybersecurity

• Communication, interpersonal, and team skills

• Analytical and critical thinking skills

• Specific skills leading to a career

  

 

 

Cybersecurity Core Course Requirements

CYB 6000Network Security

3

CYB 6010Protecting and Securing the OS

3

CYB 6020Vulnerability Assmt and PT

3

CYB 6030IDS and IPS

3

CYB 6040Cyberthreat Intelligence

3

CYB 8100Cybersecurity Capstone

3

CYB 8101Research Seminar

3

Electives

If pursuing no concentration, then select five (5) of the following electives:

CYB 6005Applied Cybersecurity

3

CYB 6015Intelligence Writing

3

CYB 6025Open Source Intelligence (OSINT)

3

CYB 6050Information Warfare (Social Media Intelligence)

3

CYB 6090Special Topics: Cybersecurity

3

IST 7060Project and Change Management

3

SEC 6040Web and Data Security

3

SEC 6060Incident Handling and Response

3

Cyber Terrorism Concentration

Students pursuing the Cyber Terrorism Concentration should select five (5) of the following courses:

MHS 7000/MAJ 7000Contemporary Issues in Homeland Security

3

MHS 7001Sociology of Terrorism

3

MHS 7002/MAJ 7002Legal Aspects and Policy of Homeland Security

3

MHS 7003/MAJ 7003Risk Assessment and Management

3

MHS 7006Topics in Intelligence

3

MHS 7007Strategic Planning in Homeland Security

3

SCADA Cybersecurity Concentration

Students pursuing the SCADA Cybersecurity concentration will complete the following courses:

IST 7100IT Policy and Strategy

3

SEC 6080Industrial Control Systems (ICS) Security

3

SEC 6082SCADA Architecture

3

SEC 6084SCADA Risk Management and Auditing

3

SEC 6086SCADA Security Awareness and Standards

3

Qualifications for Degree

To qualify for the Master of Science degree in Cybersecurity, a student must successfully complete a minimum of 36 credit hours (12 courses), including the Cybersecurity Capstone and Research Seminar. Both are intended to enhance a student’s occupational interest through the correlation of theory and practice. Students must maintain a minimum cumulative grade point average of 3.0. The program must be completed within five years.