Recent Searches

Close

History

Close

Recent Pages

Recent Searches

EIU Master of Science in Cybersecurity

Program Description

Graduates from the M.S. in Cybersecurity are prepared to become leaders and technical managers in cybersecurity, with a solid understanding of security technology and organizational management principles and practices, preparing them to make knowledgeable and responsible decisions. Additionally, the EIU Cybersecurity program is designed to prepare graduates to take relevant certification exams, specifically  Certified Information Systems Security Professional (CISSP), the COMPTIA A+, and COMPTIA Security+. According to the National Initiative for Cybersecurity Education (NICE), are requisites for entering and performing successfully in the cybersecurity profession.

According to the Bureau of Labor Statistics, the employment opportunities for Information Security Analysts is expected to increase at a much higher than average rate over the next decade, at 18% from 2023-2033. Similarly, The Illinois Department of Employment Security projects over 35% growth in the profession by 2031. There is significant and growing demand for professionals with an information security background, and not enough supply of graduates to meet this demand. The M.S. in Cybersecurity is designed for working professionals with a general information technology background to specialize in this growing field to help to fill the projected demand for security expertise and to provide accessible professional growth opportunities for Illinois professionals and those from other areas interested in cybersecurity.

 

Typical positions will include (but are not limited to):

  • Cybersecurity Consultant
  • Network Security Specialist
  • Information Assurance Specialist
  • Computer Security System Analyst
  • Web Security Engineer
  • Information Security Officer
  • Information Security Operations Manager
  • Cybersecurity Administrator
  • IT Security Manager

Program Objectives

  1. Assess, by analyzing technical and operational requirements, an enterprise level information cybersecurity system.
  2. Construct the architecture of a typical cybersecurity system; identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed.
  3. Conduct network penetration tests, troubleshoot, and implement attack countermeasures in a typical information system.
  4. Identify the components of cybersecurity layered structure for:
    • Network defense architecture
    • Access control and auditing
    • Continuous network monitoring
    • Real-time security solutions
  1. Describe and apply the fundamental and advanced technologies, components, and issues related to communications, data networks, and information systems.
  2. Analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management, for wired and wireless networks that affect the security of the cyberspace.

Cybersecurity Coursework Requirements

CourseCredits
1: TEC 5313 - Networking and Advanced Data Communications 3
2: TEC 5323 - Advanced Database Technology 3
3: TEC 5353 - Cybersecurity 3
4: MIS 4850 - Systems Security 3
5: TEC 5363 - Database Security and Reliability 3
6: EGT 4823 - Facilities Security 3
7: CYB 5550 - Cybersecurity Professional Seminar 3
8: MBA 5670 - Management of IT OR TEC 5333 Management of Computer Technology 3
9: TEC 5413 - Biometric Security 3
10: MIS 4860 - Ethical Hacking and Network Defense 3
11: CYB 5900 - Cybersecurity Capstone 2
Total Required Hours 32

Related Pages


Take the next step

apply now
schedule a visit