Program Description

The M.S. in Cybersecurity program curriculum is aimed at professionals with a background in business management, information technology, computer science, or criminal justice. This multidisciplinary curriculum is designed for busy adult learners and draws courses from our information technology leadership, computer information science, and economic crime forensics programs. The curriculum is intended to create a better understanding of:

  •     Information security policies and procedures
  •     Computer crimes and related legislation
  •     Investigative practices and procedures
  •     Corporate ethics and compliance

The program is offered in a totally online format. It follows the traditional academic calendar of a fall and spring semester and a shorter summer semester. The fall and spring semesters are divided into two 8 week terms.  A full-time graduate student carries a minimum of 6 semester credit hours. Some courses may require more hours per week in some areas of instruction. All courses are online and 3 credits in the length. The courses will meet both synchronously (optional) and asynchronously. Students are required to participate in chat sessions and/or discussion boards, which will take the place of classroom meetings.  Synchronous sessions will be recorded for students who are not able to attend the actual session.  Students who are not able to attend the synchronous sessions will be asked to complete a short assignment related to the recorded session. Depending on their personal schedules, students may elect to take courses every term or wait for the next term to continue studies.  Courses in the summer are also 8 weeks in length.  If a student decides to take two courses during the summer session, they will overlap in the time frame.




The graduate program in M.S. Cybersecurity educates students in theoretical and practical knowledge of cybersecurity.  The program develops competencies in cybersecurity management as well as breach detection, mitigation and prevention.  The faculty and students develop and maintain relationships with industry practitioners to encourage excellence and provide attention to ethical principles and changes related to cybersecurity.

Program Goals

  • Prepare students to explain Internet infrastructure and enterprise network connections.
  • Prepare student to assess organizational security policies, plans and procedures and implementations.
  • Prepare students to identify and assess legislation related to cybersecurity.
  • Prepare students to enter specialized careers in cybersecurity.
  • Faculty maintains currency and breadth in cybersecurity threats and risk mitigation strategies.
  • Utilize the alumni network to enhance curricular and co-curricular opportunities for students.

Student Learning Outcomes

  • Explain Internet structures, enterprise network structures, and consulting services related to network infrastructures
  • Develop, propose, and plan an organization’s information security policy.
  • Assess security gaps in organizational policies and plans.
  • Identify and analyze federal global legislation related to security and data threats.
  • Differentiate between cybercrime, cyber espionage, and cyberwar.
  • Analyze plans to protect personal, corporate and national infrastructures.
  • Formulate plans for securing and analyzing digital forensic data

Program Specific Information

Admission Requirements

To be accepted for admission into the program, a candidate must:

  1. Complete the Application for Admission which may be obtained at accompanied by the stipulated application fee payable to La Salle University. The application fee is waived for applications submitted online.
  2. Provide evidence of successful academic achievement in the completion of a baccalaureate degree from an accredited institution of higher education with an appropriate major. Appropriate undergraduate majors include, but are not limited to, management science, business administration, electrical engineering, systems engineering, mathematics, or computer science. A minimum undergraduate GPA of 3.0 will normally be required.
  3. Provide official transcripts from all undergraduate and graduate colleges and universities he/she has attended. For students whose undergraduate transcripts are from institutions outside the U.S.: Transcripts/marksheets must be sent to the World Education Service ( for a course-by-course evaluation. An appropriate background in management science, systems analysis and design, computer science, or a related discipline, or other equivalent training is required. On the basis of admissions credentials, students may be required to complete a few foundation courses.
  4. Provide a professional resume addressing one’s educational and professional background.
  5. A personal statement explaining the applicant’s interest in and goals for pursuit of this degree
  6. Attend an interview with member(s) of the admission committee. These are typically telephone interviews.

The application package is viewed as a whole, and the prevailing criterion is the applicant’s capacity for completing the program successfully.

The University’s Nondiscrimination Policy is stated in the General Reference section of this catalog. Because oral and written communication is an integral part of many courses, students must communicate clearly in English. Since this program is offered in an online format, it does not meet the requirement for a U.S. student visa.

A maximum of six hours of transfer credit may be granted for graduate work at another institution. The student must supply a course description and syllabus in order to facilitate the transfer of credit. After matriculation at La Salle, students must have a course pre-approved by the director (in conjunction with the appropriate faculty member(s)) for it to be considered for transfer purposes.

All documents should be sent to the following:

Office of Graduate Enrollment
La Salle University - Box 826
1900 W. Olney Avenue
Philadelphia, PA 19141
(215) 951-1100 / Fax (215) 951-1462

Tuition and Fees

Tuition and fees for the current year are provided in the General Reference section of this catalog.

Tuition Assistance

Partial scholarship grants are offered on the basis of academic credentials and financial need.

Information about other financial aid, payment options, and application forms may be obtained from the Director of Financial Aid, La Salle University, (215) 951-1070.

Academic Requirements

Students are required to complete 10 courses (30 credits) for this program.  The final course is a capstone. 

  • CYB 540 - Network Theory
  • CYB 612 - Ethics Issues and Government Regulations
  • CYB 604 - The Computer and Internet Fraud
  • CYB 652 - Leadership Assessment and Evaluation
  • CYB 628 - Cybercrime, Cyber Warfare, Cyber Espionage
  • CYB 644 - Information Security
  • CYB 648 - Secure Software Development
  • CYB 665 - Digital Computer Forensics
  • CYB 668 - Computer and Network Security
  • CYB 880 - Cybersecurity Capstone

Course Sequence

Tentative Schedule


Fall 1

CYB 540

CYB 644

Spring 1

CYB 628

CYB 604


Summer 1

CYB 668

CYB 665

Fall 2

CYB 648

CYB 652


Spring 2

CYB 612

CYB 880


Degree or Certificate Earned


Number of Courses Required for Program Completion


Number of Credits Required for Program Completion


GPA Required for Program Completion


Program Contact Information

If you have any questions regarding the Cybersecurity  program, please contact:

Staff Contact Information

Margaret McCoey

Program Director

Holroyd 123

(215) 951-1136


Program Director: Margaret McCoey, M.S.
Associate Professors: Blum, Wang
Assistant Professors: McCoey
Lecturers: Casey, Cerenzio, Henry, McGinley, Monaghan, Wacey

Course Descriptions

CYB 540 - Network Theory

Lecture/theory course considers the current methods, practices, and standards used to enable communication on computer and voice networks. This includes a study of the physical layers, architectural layers, design, operation, management, and ISO standards, with particular and telephony technologies. Both local and wide area networks are examined.

Number of Credits: 3

CYB 604 - The Computer and Internet Fraud

Computers have made organizations easier to run. All accounting information, inventory records, customer data, and intellectual property that an organization possesses is contained somewhere in an electronic file. As such, these electronic files are vulnerable to attacks from both employees and outsiders from around the world. This course will provide the student with an understanding of how computer fraud and manipulation is accomplished and what security measures should be instituted to prevent it.

Number of Credits: 3

CYB 612 - Ethics, Issues, and Government Regulations

This course considers privacy both on- and off-line; legal background of intellectual property and e-mail; ethics and codes of ethics; effects of computers on work and society; and responsibilities and risks of computing, including topics such as accuracy of information, e-waste, and multitasking. This course includes an examination of government policies and regulations related to data security and information assurance.

Number of Credits: 3

CYB 628 - Cybercrime, Cyber Warfare and Cyber Espionage

This course introduces students to the differences between cybercrime, cyber espionage, and cyber warfare by discussing the relationship of cyber intrusions and cybersecurity to nations, businesses, society, and people. Students will use case studies to analyze the threats, vulnerabilities and risks present in these environments, and develop strategies to reduce the breaches and mitigate the damages.

Number of Credits: 3

CYB 644 - Information Security

This course explores all aspects of computing and communications security, including policy, authentication, authorization, administration, and business resumption planning. It examines key security technologies, such as encryption, firewalls, public-key infrastructures, smart cards, and related technologies that support the development of an overall security architecture. Coursework includes plans for developing and implementing a technology security strategy focused on business needs.

Number of Credits: 3

Prerequisites: CIS 540

CYB 648 - Secure Software Development

This course will provide an overview of current software development methodologies and examine strategies to integrate security into all phases of the lifecycle. By examining current software vulnerabilities, students will develop secure coding guidelines, and strategies for static code analysis; they will create secure testing plans to mitigate security failures.  The course will examine language specific vulnerabilities, input validation and threat modeling.

Number of Credits: 3

CYB 652 - Leadership Assessment and Evaluation

This experiential course emphasizes the importance of feedback and self- assessment for leadership development. It includes extensive assessment of each participant’s management style and skills based on self-evaluations (using structured questionnaires) and feedback from coworkers, faculty, and other participants. Leadership development experiences emphasize time and stress management, individual and group problem-solving, communication, power and influence, motivation, conflict management, empowerment, and team leadership. Each participant identifies skills he or she needs to develop and reports on efforts to develop those skills.

Number of Credits: 3

CYB 665 - Computer Digital Forensics

This course examines techniques used to conduct computer crime investigations and gather probative evidence to secure a conviction under state and federal laws. Students will simulate a computer forensic investigation: developing an investigation plan, securing the crime scene, analyzing evidence, preparing the case for court, and testifying in a moot court situation.

Number of Credits: 3

CYB 668 - Computer and Network Security

Students will study and implement basic computer and network security strategies on Window and Linux networks. Students examine and analyze network traffic, including investigating wireless transmission, install firewalls and define Internet Protocol Security Controls (IPSEC). Labs include system hardening, dissecting network packet structure and creating encryption formats; managing authentication and access controls. Students study implementing a public key infrastructure and best strategies for using intrusion detection systems.

Number of Credits: 3

CYB 880 - Integrative Capstone

The capstone project is an opportunity to pursue an independent learning experience focused on a specific aspect of economic crime forensics based on the student interest. The capstone is intended to extend students beyond the coursework and cases to apply knowledge in ways that are relevant to their professional goals. Students will work on a research project or in an experiential learning environment. Each student will be required to present his/her capstone both as an oral presentation and a summary written document.

Number of Credits: 3