Online Master of Science Cybersecurity
PROGRAM AT A GLANCE
10 master's courses
11 weeks long
$ 2490
Cost per course
Flexible learning
Online and in-person programs at select campuses, subject to availability
Why earn a degree in cybersecurity from Strayer?
Through our Master of Science in cybersecurity program, you’ll learn advanced technologies and strategies to investigate cybersecurity events or crimes and minimize their impact on information technology systems.
Safeguard data with a cybersecurity degree
Deepen your understanding of how to protect information and systems with an MS in Cybersecurity from Strayer. You’ll explore ways to help organizations protect and defend IT systems through user education, implementation of new processes and threat mitigation strategies.
Skills you’ll learn in a Strayer MS in Cybersecurity
- How to administer and maintain IT system performance and security
- How to identify threats and investigate cybersecurity events
- Techniques to mitigate cybersecurity threat impacts on IT systems
Earn your degree from an accredited university
Strayer University is an accredited institution and a member of the Middle States Commission on Higher Education (MSCHE or the Commission) www.msche.org. Strayer University’s accreditation status is Accreditation Reaffirmed. The Commission’s most recent action on the institution’s accreditation status on June 22, 2017 was to reaffirm accreditation. MSCHE is recognized by the U.S. Secretary of Education to conduct accreditation and pre-accreditation (candidate status) activities for institutions of higher education including distance, correspondence education, and direct assessment programs offered at those institutions. The Commission’s geographic area of accrediting activities is throughout the United States.

Master of Science in Cybersecurity cost breakdown
- 10 courses, $2490 per course
- $65 technology fee each term
- $150 one-time degree conferral fee
- Additional costs for textbooks and supplies
Estimate the cost of your degree
How much can I save on a Master of Science in Cybersecurity?
Estimate the cost of your degree
How much can I save on a Master of Science in Cybersecurity?
Expected Graduation
...
Approximate Total
...
*Student is required to take two courses per quarter during disbursement period
PREPARING YOUR RESULTS
Time commitment
Calculate the approximate time commitment of your degree.
Course load | ... courses/term |
Classroom time | ... hours/week |
Terms per year | ... terms |
Terms to graduation | ... terms |
Cost analysis
Calculate the approximate cost of your degree
Tuition | ... |
Books | ... |
Fees | ... |
No-cost gen ed | $0 |
Transfer credits | ... |
Transfer Credit Scholarship | $0 |
$4K scholarship | $0 |
Strayer Learn and Earn Scholarship | $0 |
Approximate total | ... |
Ways to reduce tuition
$4K Alumni Master’s Scholarship
If you’re a Strayer University Alumni and ready to pursue a master’s degree, our Alumni Scholarship can save you $4,000. All you need to do is register for an eligible Strayer graduate program, maintain a GPA of 2.5 or greater and meet eligibility requirements.
50% off Master’s Scholarship
Enroll in two master’s courses, get 50% off tuition. Summer or fall 2025 term only.*
*Eligibility rules, restrictions and exclusions apply.
Civic and Community Alliance Scholarship
Ready to earn an affordable Strayer degree? Admitted Strayer or JWMI students who are employed in certain civic roles or volunteer for a nonprofit may be eligible to receive 25% off tuition for the duration of their program.
What coursework do you need to earn an MS in Cybersecurity?
Designed around standards set by the National Initiative for Cybersecurity Education (NICE) framework, our MS in Cybersecurity curriculum covers leading-edge techniques to help you assess and recommend safeguards to protect an organization’s information assets. You’ll explore real-world information assurance case studies and advanced technologies, then experience actual cyberthreats in lab settings. View all courses.
Sample courses
This course examines the structure and operation of digital computers in the context of providing data and infrastructure security. Emphasis will be placed on strategies to select, deploy, integrate and administer modern computing environments to support the organization's overall security posture. Topics include hardware components of modern computing environments and their deployment in compliance with applicable cybersecurity laws and policies.
This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.
This course presents typical cyber operations including access and control, where ethical dilemmas arise and provides tools for legal and ethical decision making. Topics include various stages of a cyber operation, U.S. regulations and ethical implications of granting access and control. Students will explore the authorities, roles and steps associated with ethical cyber operations.
This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab, investigating computer and cybercrime, tools, techniques and methods used to perform forensic investigations and concepts for collecting, analyzing, recovering and preserving forensic evidence.
This course covers cryptography from historical, applied, and theoretical perspectives. Topics include symmetric and asymmetric encryption techniques that include classical and modern algorithms. This course explores the framework and practice of using cryptography in securing information in organizational settings.
In this integrative capstone course, students will examine and solve real-world cybersecurity problems and apply associated techniques to create practical solutions. The course takes an integrative, senior security officer approach to address the policy, risk and control opportunities within cyberspace and IT environments.
What can you do with an MS in Cybersecurity?
Your education can help you pursue your professional and personal goals. While Strayer cannot guarantee that a graduate will secure any specific career outcome, such as a job title, promotion or salary increase, we encourage you to explore the potential impact you can have in the cybersecurity field.
Versatile skills for your future
The cybersecurity program can provide the skills to help you defend against cyberattacks.
In addition, students who complete this concentration will be prepared to:
- Conduct risk assessments and carry out tests on data processing systems to ensure data processing tasks and security measures function properly.
- Control access to data files and monitor their use to protect information in computer files.
- Create strategies to protect computer files from accidental or unauthorized changes, destruction or disclosure, and to address emergency data processing requirements.
- Develop new applications, ideas, connections, systems or products.
- Document policies, procedures and tests for computer security and emergency measures.
- Educate users about security to enhance system security and optimize server and network efficiency.
- Evaluate relevant information to help you determine whether events or processes follow laws, regulations or standards.
- Examine computer security protocol violations and talk to those who violated them to help prevent future occurrences of the violations.
- Review and stay up to date on computer virus reports to determine when to update virus protection systems.
- Set up firewalls and encode data transmissions to hide sensitive information while it's being sent and to block malicious digital transfers.
- Speak with users to address matters like computer data access needs, security breaches and programming adjustments.
- Update computer security files to include new software, fix mistakes or adjust individual access permissions.
86
of Strayer master's alumni agree that Strayer was the right choice for earning their degree.
Strayer Alumni Survey, 2023
How to apply for a master’s degree at Strayer?
An admissions officer can help you choose the right program, register for classes, transfer credits and find cost-savings opportunities.
Here’s what you’ll need to get started:
A completed application and enrollment agreement
Proof of a completed baccalaureate degree from an accredited college or university with a cumulative GPA of 2.50 out of 4.0
Official transcripts from all colleges or universities attended
A valid, current and legible government-issued photo ID
Fall classes start on October 6
Learn more about Strayer University’s admissions process.
Transferring to Strayer from another university?
Transfer up to four eligible classes from a prior college or university to your master’s degree, saving time and money.
Strayer welcomes international students
Strayer University is proud to have hosted more than 3,000 international students from over 110 countries. Earn your degree in the U.S. or completely online in your home country – it’s your choice.
Campus locations
Come to a campus near you for guidance and support. You’ll have access to helpful resources, a supportive community and plenty of spaces to learn and grow.
Ready to take the next step?
Your admissions officer is here to guide you through every step of the process, from completing your application to choosing your concentration.