Online Master of Science Cybersecurity
PROGRAM AT A GLANCE
10 master's courses
11 weeks long
$ 2490
Cost per course
Flexible learning
Online and in-person programs at select campuses, subject to availability
Why earn a degree in cybersecurity from Strayer?
Through our Master of Science in cybersecurity program, you’ll learn advanced technologies and strategies to investigate cybersecurity events or crimes and minimize their impact on information technology systems.
Safeguard data with a cybersecurity degree
Deepen your understanding of how to protect information and systems with an MS in Cybersecurity from Strayer. You’ll explore ways to help organizations protect and defend IT systems through user education, implementation of new processes and threat mitigation strategies.
Skills you’ll learn in a Strayer MS in Cybersecurity
- How to administer and maintain IT system performance and security
- How to identify threats and investigate cybersecurity events
- Techniques to mitigate cybersecurity threat impacts on IT systems
Earn your degree from an accredited university
Strayer University is an accredited institution and a member of the Middle States Commission on Higher Education (MSCHE or the Commission) www.msche.org. Strayer University’s accreditation status is Accreditation Reaffirmed. The Commission’s most recent action on the institution’s accreditation status on June 22, 2017 was to reaffirm accreditation. MSCHE is recognized by the U.S. Secretary of Education to conduct accreditation and pre-accreditation (candidate status) activities for institutions of higher education including distance, correspondence education, and direct assessment programs offered at those institutions. The Commission’s geographic area of accrediting activities is throughout the United States.

Estimate the cost of your degree
How much does an MS in Cybersecurity cost?
Estimate the cost of your degree
How much does an MS in Cybersecurity cost?
Expected Graduation
...
Approximate Total
...
*Student is required to take two courses per quarter during disbursement period
PREPARING YOUR RESULTS
Time commitment
Calculate the approximate time commitment of your degree.
Course load | ... courses/term |
Classroom time | ... hours/week |
Terms per year | ... terms |
Terms to graduation | ... terms |
Cost analysis
Calculate the approximate cost of your degree
Tuition | ... |
Books | ... |
Fees | ... |
No-cost gen ed | $0 |
Transfer credits | ... |
Transfer Credit Scholarship | $0 |
$4K scholarship | $0 |
Strayer Learn and Earn Scholarship | $0 |
Approximate total | ... |
Program cost breakdown
The MS in Cybersecurity program consists of 10 courses, with the price of $2,490 per course. There are additional fees for textbooks and supplies, a $65 technology fee each term and a one-time $150 degree conferral fee. Earn a Master of Science in Cybersecurity, a STEM degree program, for under $25,000 in tuition. Additional fees, eligibility rules and restrictions apply.
Transfer credits
Courses from another institution may be eligible for transfer credits to Strayer, which can help reduce the number of courses you need to graduate and your overall tuition. You can transfer up to four classes toward your master’s degree. The Strayer transfer credit page has more information as well as a tool to estimate how many transfer credits you may be able to apply to your Strayer degree program.
Students enrolled in the Master of Business Administration in North Carolina or Pennsylvania may transfer up to four classes
Scholarships and financial aid
There are a number of financial aid options worth exploring on our financial aid page. To apply for federal aid, prospective students should fill out the Free Application for Federal Student Aid (FAFSA) form. Stafford loans are available for graduate study. These are direct unsubsidized loans, not based on financial need. Unlike subsidized loans, Stafford loan interest will accrue while in the program. Making interest payments while in school will help reduce the amount of principal that would otherwise build up, reducing your end cost.
There are also scholarships and private loans available for Strayer students.
More than 500 organizations invest in their employees by partnering with Strayer University to offer access to tuition savings and other educational benefits. If your employer is a corporate partner, you may qualify for programs that can help you discover career pathways in your field.
Private loans
Non-federal loans may pay the difference between the cost of attendance and the total of loans and grants received from other tuition assistance programs. The terms and conditions of federal loans are often more favorable than private loans and should be considered before exploring private loans.
Military tuition assistance
Scholarships are offered to eligible students currently serving in the military, as well as military spouses. Strayer is also approved by Veterans Affairs to accept and process veteran education benefits. Learn more about the Strayer University active military assistance program here.
Veteran benefits
In addition to participating fully in the Yellow Ribbon Program, Strayer is approved by Veterans Affairs to accept and process veteran education benefits. Student veterans can receive transfer credit for military training and life experiences.
What coursework do you need to earn an MS in Cybersecurity?
Designed around standards set by the National Initiative for Cybersecurity Education (NICE) framework, our MS in Cybersecurity curriculum covers leading-edge techniques to help you assess and recommend safeguards to protect an organization’s information assets. You’ll explore real-world information assurance case studies and advanced technologies, then experience actual cyberthreats in lab settings. View all courses.
Sample courses
This course examines the structure and operation of digital computers in the context of providing data and infrastructure security. Emphasis will be placed on strategies to select, deploy, integrate and administer modern computing environments to support the organization's overall security posture. Topics include hardware components of modern computing environments and their deployment in compliance with applicable cybersecurity laws and policies.
This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.
This course presents typical cyber operations including access and control, where ethical dilemmas arise and provides tools for legal and ethical decision making. Topics include various stages of a cyber operation, U.S. regulations and ethical implications of granting access and control. Students will explore the authorities, roles and steps associated with ethical cyber operations.
This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab, investigating computer and cybercrime, tools, techniques and methods used to perform forensic investigations and concepts for collecting, analyzing, recovering and preserving forensic evidence.
This course covers cryptography from historical, applied, and theoretical perspectives. Topics include symmetric and asymmetric encryption techniques that include classical and modern algorithms. This course explores the framework and practice of using cryptography in securing information in organizational settings.
In this integrative capstone course, students will examine and solve real-world cybersecurity problems and apply associated techniques to create practical solutions. The course takes an integrative, senior security officer approach to address the policy, risk and control opportunities within cyberspace and IT environments.
What can you do with an MS in Cybersecurity?
Your education can help you pursue your professional and personal goals. While Strayer cannot guarantee that a graduate will secure any specific career outcome, such as a job title, promotion or salary increase, we encourage you to explore the potential impact you can have in the cybersecurity field.
Versatile skills for your future
The cybersecurity program can provide the skills to help you defend against cyberattacks.
In addition, students who complete this concentration will be prepared to:
- Conduct risk assessments and carry out tests on data processing systems to ensure data processing tasks and security measures function properly.
- Control access to data files and monitor their use to protect information in computer files.
- Create strategies to protect computer files from accidental or unauthorized changes, destruction or disclosure, and to address emergency data processing requirements.
- Develop new applications, ideas, connections, systems or products.
- Document policies, procedures and tests for computer security and emergency measures.
- Educate users about security to enhance system security and optimize server and network efficiency.
- Evaluate relevant information to help you determine whether events or processes follow laws, regulations or standards.
- Examine computer security protocol violations and talk to those who violated them to help prevent future occurrences of the violations.
- Review and stay up to date on computer virus reports to determine when to update virus protection systems.
- Set up firewalls and encode data transmissions to hide sensitive information while it's being sent and to block malicious digital transfers.
- Speak with users to address matters like computer data access needs, security breaches and programming adjustments.
- Update computer security files to include new software, fix mistakes or adjust individual access permissions.
86
of Strayer master's alumni agree that Strayer was the right choice for earning their degree.
Strayer Alumni Survey, 2023
MS in Cybersecurity admission requirements
Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
International master’s students
We welcome international students.
Campus locations
Come to a campus near you for guidance and support. You’ll have access to helpful resources, a supportive community and plenty of spaces to learn and grow.
Ready to take the next step?
Your admissions officer is here to guide you through every step of the process, from completing your application to choosing your concentration.