Skip to Main Content

Cybersecurity (MS) | Cyber Operations Specialization

Download as PDF

Cybersecurity Graduate (Semester Credit) Master of Science

College

College of Technology

Program CIP Code

11.1003

The Master of Science in Cybersecurity program is designed to prepare students for leadership in information technology security. The program is focused on providing knowledge and skills to apply the principles and concepts related to the development and management of secure information systems and technology at the enterprise and individual levels, locally and globally.

The program is designed for IT professionals, executives, and baccalaureate degree graduates who realize the necessity of delivering value to customers through secure information technology systems. The degree provides students with theoretical, practical, and applied skills in computer-based information systems and the technologies that support them, as well as a broad perspective of the business and management environments in which information system technologies play a strategic role.

The Cyber Operations concentration focuses on the analysis, design, deployment, and monitoring of cyber technologies and techniques necessary to maintain the security posture of an organization. Graduates will have the skills to ensure operational continuity of large-scale organizations.

About Cybersecurity

Graduates of the Master of Science in Cybersecurity program will be hired by three distinct groups: 1) Private industry firms to assume a technical/administrative leadership role related to cybersecurity; 2) State and local government agencies to assume a technical/administrative leadership role in cybersecurity; 3) Institutions of higher education that need competent faculty members in cybersecurity, and other related knowledge areas.

Possible job titles for a Master of Science in Cybersecurity graduate include Cybersecurity Analyst, Penetration Tester, Data Center or Network Security Administrator, Information Systems Security Engineer, Risk Assessment and Vulnerability Analysis Manager. With significant, successful work experience in the field, management opportunities could be available to the graduate.

Recommended Certifications

Certifications are not required for completion of this program; however, ECPI encourages students to obtain all appropriate certifications to increase potential job opportunities. Recommended certifications are the Certified Information Systems Security Professional (CISSP) and Cisco Certified Network Associate (CCNA).