Master of Science in Cyber Security
August 8, 2022 2024-12-12 10:37Master of Science in Cyber Security
The Cyber Security Landscape
667%
74%
$6 Trillion
0%
Why choose a Master of Science in Cyber Security
Admission Requirements
General Admission Requirements
Additional Admission Requirements for the Master of Science in Cyber Security:
Admission Decisions & Process
We evaluate candidates on their academic background, career accomplishments and the thoughtfulness, and candor within their application. Ultimately, we look for driven, early-career professionals with business leadership potential.
Online Application
Online Assessment
Personal Interview
Entry Documents Verification
Final Committee Decision
Admission Application & Graduation Requirements
Application For Admission
All persons interested in applying for admission to the university should complete an application which must be accompanied by a non-refundable required application fee of $500.00 (check, money order, or credit card) to process the application. The check/money order should be made payable to Birchwood University. Applicants must submit all required application documents to be considered for admission. Once a decision is made, an email will be sent to the candidate with further instructions. Candidates will be contacted by their admissions agent regularly to ensure the completed documents are received by the office.
Graduation Requirements
Master of Science in Cyber Security Course - Key Highlights
Earn a globally recognized online master’s degree equally credible as offline.
100% Online Programs
24*7 Access
World Class Curriculum
The Cohort Experience
Program Description
- Apply the necessary skills to protect a network or system from hacking.
- Apply theoretical knowledge in real-life scenarios and perform hacking on different devices.
- Effectively use the skills to perform ethical hacking.
- Be proficient in different techniques used by the attackers to gain access to any device.
- Be proficient in the countermeasures for different techniques of hacking.
- Be proficient in analyzing and detecting security threats to an organization's computing systems.
- Be proficient in applying security principles and practices to maintain operations of computing systems in the presence of risks and threats.
- Effectively communicate across all levels of the organization to convey complex technical matters.
- Recognize professional responsibility to make informed decisions on computing practices based on legal and ethical principles.
Program Breakdown
MCS500 | Networking and Kali Linux | 3 credit hours
MCS505 | Networking Concept and Kali Linux | 3 credit hours
MCS510 | Kali Linux for Hacking | 3 credit hours
MCS515 | Concepts of Hacking | 3 credit hours
MCS520 | Engineering Hacking | 3 credit hours
MCS525 | Internet of Things and Cryptography | 3 Credit Hours
MCS530 | Forensic Computing – 3 credit hours | Credit Hours
MCS535 | Application And Device Control | 3 Credit Hours
MCS540 | Administration and Audits | 6 Credit Hours
This course includes Security Administrators, Network Security, Cyber security Audits.
Students can choose any two courses and will get training for both the courses:
• Security Administration: In this course, students will be provided with
knowledge about system security, how attackers harm the system and practical
including Data and System Security, Disk encryption, Hardware Firmware
Security, securing different operating systems from data destruction and any
cyber-attack. Students will be provided with expertise in firewall technologies,
Intrusion Detection, and Intrusion Prevention System.
• Network Administration: Students are trained for identifying and solving any
problem that arises in computer network and installing and configuring computer
networks. Hands on training provided on Network Firewall, proxy servers, using
Virtual Private Network (VPN), protecting servers from cyber-attacks, security of
different layers and application of Code Quality and Testing.
• Cyber Security Audits: In this course, students will be trained for performing
audits which includes Operation Security which includes review of policies,
procedures and security controls, Data Security including use of encryption
techniques, data security during transmission and storage, Physical Security
including role-based access controls, disk encryption, multi-factor authentication.
The student will get complete practical knowledge and will be able to identify
vulnerabilities in security, compliance, and testing controls.
MCS545 | Capstone Project | 6 Credit Hours
Additional
Information
Additional Information for Master of Science in Cyber Security Program.