Students
Tuition Fee
Not Available
Start Date
Not Available
Medium of studying
Not Available
Duration
Not Available
Details
Program Details
Degree
Masters
Major
Cybersecurity
Area of study
Information and Communication Technologies
Course Language
English
About Program

Program Overview


Master of Cybersecurity Program

Overview

The Master of Cybersecurity program is designed to provide students with a comprehensive understanding of the principles and practices of cybersecurity. This program aims to equip students with the knowledge and skills necessary to protect computer systems, networks, and organizations from cyber threats.


Program Description

The Master of Cybersecurity program covers a wide range of topics, including:


  • Cybersecurity fundamentals
  • Network security
  • Cryptography
  • Threat analysis and risk management
  • Incident response and recovery
  • Cybersecurity policy and governance

Admission Criteria

To be eligible for the Master of Cybersecurity program, applicants must meet the following criteria:


  • Hold a bachelor's degree in a relevant field (e.g., computer science, information technology)
  • Have a minimum GPA of 3.0
  • Provide transcripts and letters of recommendation
  • Pass a background check (if required)

Program Requirements

The Master of Cybersecurity program requires students to complete:


  • 30 credits of coursework
  • A capstone project or thesis
  • A comprehensive exam

Tuition Fees

The tuition fees for the Master of Cybersecurity program are:


  • $10,000 per semester (full-time)
  • $5,000 per semester (part-time)

Research Areas

The Master of Cybersecurity program offers research opportunities in the following areas:


  • Network security
  • Cryptography
  • Artificial intelligence and machine learning for cybersecurity
  • Cybersecurity policy and governance

Career Opportunities

Graduates of the Master of Cybersecurity program can pursue careers in:


  • Cybersecurity consulting
  • Incident response and threat analysis
  • Cybersecurity policy and governance
  • Information security management
  • Cybersecurity research and development
See More