This Master of Science degree is designed for computer science professionals or recent graduates who want to expand their skillset with operational cybersecurity skills and fundamental knowledge. Applicants must be well versed in computer science, digital networks and possess good mathematical skills.

Advantages to the MS in Cybersecurity Operations

The MS opens doors to technical or strategic careers in the field of cybersecurity such as security engineer, DevSecOps engineer, security architect, security auditor or more generally all cybersecurity specialist positions.

female Webster student works on computer with stack of cybersecurity books next to it

Excellent Employment Opportunities

female Webster student works on computer with stack of cybersecurity books next to it

As the dependence on digital systems grows, so does the need for experts in cybersecurity. Studying in this field will open the door to a range of positions in sectors including banking, health, telecommunications and the public sector.

This degree explores the theoretical foundations of cybersecurity, the practical aspects of networks and systems, strategic and intelligence analysis, and the psychology of social engineering. Students complete the program with a thesis that is combined with field experience or a recommended internship.

Accreditation and Curriculum for the MS in Cybersecurity Operations

Webster University carries full international accreditation from the Higher Learning Commission (HLC). Students at Webster Geneva Campus therefore earn the same degree that is awarded in the United States.

12 courses are required to complete the MS in Cybersecurity Operations, with a combination of eight required core courses and four electives.

Required Core Courses

  • Introduction to Cybersecurity
  • Cybersecurity Communications
  • Cybersecurity Infrastructures
  • Cybersecurity Intelligence/Counter Intelligence
  • Cybersecurity Strategic Operations
  • Encryption Methods and Techniques
  • Social Engineering
  • Practical Research in Cybersecurity

Example Elective Courses

  • Cybersecurity Forensics
  • Cybersecurity Threat Detection
  • Cybersecurity in Cloud Computing
  • Cybersecurity Law and Policy
  • Cybersecurity Risk Management Framework

Request More Information

Loading...