Students
Tuition Fee
Not Available
Start Date
Not Available
Medium of studying
Not Available
Duration
Not Available
Details
Program Details
Degree
Masters
Major
Computer Science | Cybersecurity | Information Technology
Area of study
Information and Communication Technologies
Course Language
English
About Program

Program Overview


Program Overview

The Master of Science in Cyber Technology degree program is a 30-credit, ten-course program that introduces students to best practices from leading experts and provides practical technical skills through hands-on course labs to design, implement, and manage cutting-edge cyber technology solutions. The program provides a rigorous academic foundation combined with real-world technical exposure that bridges the gap between technical expertise and strategic governance.


Program Requirements

  • Core courses cover enterprise systems, the business of technology, cyber law and policy, and cybersecurity threats and mitigations.
  • Each student chooses a concentration (Cybersecurity, Leadership, Data and Artificial Intelligence, Cyber Technology Fundamentals) to further elevate their cyber skills.
  • The program consists of 30 credit hours, including:
    • Core Courses:
      • CPST 6250: Enterprise Information Technology (3 credits)
      • CPST 7150: The Business of IT (3 credits)
      • CPST 7600: Enterprise Infrastructure Arch (3 credits)
      • CPST 7800: Cyber Law and Policy (3 credits)
      • CPST 7900: Sec & Cyber Threats - IT Mgrs (3 credits)
      • CPST 7100: Cyber Technology Program Capstone (3 credits)
    • Select Four-Course Certificate Track in a Specialized Area: (12 credits)
      • Cybersecurity Certificate
      • Data and Artificial Intelligence Certificate
      • Technology Leadership Certificate
      • Cyber Technology Fundamentals Certificate (for students without prior technical experience)

Program Learning Objectives

  1. Graduates will be able to plan, develop, deploy, and sustain an effective regulation and case law-informed IT governance policy that employs current and emerging industry best practices to manage and deliver Information Technology resources.
  2. Graduates will be able to develop and champion business cases, apply standard business practices as they pertain to specific technology issues and solutions.
  3. Evaluate cybersecurity principles and strategies used in Information Technology
  4. Graduates will be able to plan, develop and execute on disaster recovery and business continuity plans, and demonstrate a strategy to maintain and update these plans.
  5. Graduates will be able to articulate a secure enterprise system architecture (hardware and software) based on business requirements that will include emerging technologies.

Program Details

  • Program String and Field of Study: PAMS_GR, MSCT
  • Catalog Addendum Note: This program was added to the catalog in July 2025.
See More