Master of Science in Cybersecurity with a Specialization in IT and Cybersecurity Policy Online

Enhance your ability to identify and eliminate threats to critical networks in this multidisciplinary online program that combines aspects of computer science, management and criminal justice.

Apply by: 5/6/24
Start classes: 5/20/24
Request Info Request Info Apply Now

Program Overview

Get to know the M.S. in Cybersecurity – IT Policy online program

Total Tuition: $30,450
Program Duration: As few as 24 months
Credit Hours: 30

Prepare for leading roles combating cyberattacks with the online Master of Science in Cybersecurity with a Concentration in IT and Cybersecurity Policy from La Salle University. You will gain experience creating and analyzing plans to protect personal and corporate infrastructures as you learn from our experienced faculty. Benefit from curriculum that focuses on current trends in cybersecurity.

This online master’s cybersecurity policy program deepens your understanding of strategies for reducing breaches and mitigating damages while equipping you to manage information technology and cybersecurity processes. Designed for working professionals, our 100 percent online coursework develops your ability to oversee authentication and access controls.

Graduates of the online M.S. in Cybersecurity – IT and Cybersecurity Policy program will learn how to:

  • Explain internet structures, enterprise network structures and consulting services related to network infrastructures
  • Identify and analyze federal global legislation related to security and data threats
  • Differentiate between cybercrime, cyber espionage and cyberwar
  • Analyze plans to protect personal, corporate and national infrastructures
  • Formulate plans for securing and analyzing digital forensic data
  • Explain internet structures, enterprise network structures and consulting services related to network infrastructures
  • Identify and analyze federal global legislation related to security and data threats
  • Differentiate between cybercrime, cyber espionage and cyberwar
  • Analyze plans to protect personal, corporate and national infrastructures
  • Formulate plans for securing and analyzing digital forensic data

Upon completion of the online M.S. in Cybersecurity – IT and Cybersecurity Policy program, you will be prepared for a variety of cybersecurity management roles, including:

  • Information Security Analyst
  • Security Auditor
  • Compliance Auditor
  • Information Security Analyst
  • Security Auditor
  • Compliance Auditor

Online technology programs also available:

La Salle University offers a variety of specialized technology programs. Check out all of our technology online programs.

Total Tuition: $30,450
Program Duration: As few as 24 months
Credit Hours: 30
Need More Information?

Call 844-466-5587

Call 844-466-5587

Tuition

Learn more about our affordable tuition

Our M.S. in Cybersecurity – IT and Cybersecurity Policy online program offers affordable, pay-by-the-course tuition which is the same for in-state and out-of-state students. All program and course fees are included in the total tuition cost.

Tuition breakdown:

Total Tuition: $30,450
Per Credit Hour: $1,015

Tuition breakdown:

Total Tuition: $30,450
Per Credit Hour: $1,015

Calendar

Key dates to remember

La Salle University online programs are delivered in an accelerated format ideal for working professionals, conveniently featuring multiple start dates each year.

Now enrolling:

Next Apply Date: 5/6/24
Next Class Start Date: 5/20/24
TermStart DateApp DeadlineDocument DeadlineRegistration DeadlineTuition DeadlineClass End DateTerm Length
Spring II3/18/243/4/243/8/243/8/243/14/245/9/248 weeks
Summer I5/20/245/6/245/10/245/10/245/16/247/14/248 weeks
Fall I8/26/248/12/248/16/248/16/248/22/2410/20/248 weeks
Fall II10/21/2410/7/2410/11/2410/11/2410/17/2412/15/248 weeks

Now enrolling:

Next Apply Date: 5/6/24
Next Class Start Date: 5/20/24

Have questions or need more information about our online programs?

Ready to take the rewarding path toward earning your degree online?

Admissions

Discover how easily you can apply to the M.S. in Cybersecurity – IT and Cybersecurity Policy online program

Applications for the M.S. in Cybersecurity – IT and Cybersecurity Policy are evaluated on a holistic basis. The Admissions Committee takes into account interest, aptitude and potential for achievement in graduate studies. The requirements include:

Admission Requirements:

  • Bachelor’s degree from an accredited institution
  • Minimum 3.0 GPA*
  • No GMAT required

Prior to evaluation by the Admissions Committee, applicants must submit the following:

  • Transcript(s) from the college/university where you earned your bachelor’s degree and, if applicable, master’s degree. You will be notified if you need to submit additional transcripts for advising purposes.
  • Minimum 3.0 GPA*
  • No GMAT/GRE required
  • A current professional resume
  • Provide a personal statement (about 500 words in length) explaining why you are interested in this program, your qualifications and how this program will assist with your professional goals

Documentation can be sent via email to [email protected]. If you need to submit official documents by mail, send them to:

La Salle University
Office of Adult Enrollment
Box 112
1900 West Olney Avenue
Philadelphia, PA 19141

Have a question? Call us at 844-466-5587.

Courses

Explore what you’ll learn in the M.S. in Cybersecurity – IT Policy online program

For the M.S. in Cybersecurity – IT and Cybersecurity Policy online, the curriculum is comprised of six core courses, three specialty courses and the integrated capstone course.

Duration: 8 weeks
Credit Hours: 3
Lecture/theory course considers the current methods, practices, and standards used to enable communication on computer and voice networks. This includes a study of the physical layers, architectural layers, design, operation, management, and ISO standards, with particular and telephony technologies. Both local and wide area networks are examined.
Duration: 8 weeks
Credit Hours: 3
This course introduces students to the differences between cybercrime, cyber espionage, and cyber warfare by discussing the relationship of cyber intrusions and cybersecurity to nations, businesses, society, and people. Students will use case studies to analyze the threats, vulnerabilities and risks present in these environments, and develop strategies to reduce the breaches and mitigate the damages.
Duration: 8 weeks
Credit Hours: 3
Computers have made organizations easier to run. All accounting information, inventory records, customer data, and intellectual property that an organization possesses is contained somewhere in an electronic file. As such, these electronic files are vulnerable to attacks from both employees and outsiders from around the world. This course will provide the student with an understanding of how computer fraud and manipulation is accomplished and what security measures should be instituted to prevent it.
Duration: 8 weeks
Credit Hours: 3
This course examines techniques used to conduct computer crime investigations and gather probative evidence to secure a conviction under state and federal laws. Students will simulate a computer forensic investigation: developing an investigation plan, securing the crime scene, analyzing evidence, preparing the case for court, and testifying in a moot court situation.
Duration: 8 weeks
Credit Hours: 3
Students will study and implement basic computer and network security strategies on Window and Linux networks. Students examine and analyze network traffic, including investigating wireless transmission, install firewalls and define Internet Protocol Security Controls (IPSEC). Labs include system hardening, dissecting network packet structure and creating encryption formats; managing authentication and access controls. Students study implementing a public key infrastructure and best strategies for using intrusion detection systems.
Duration: 8 weeks
Credit Hours: 3
The capstone project is an opportunity to pursue an independent learning experience focused on a specific aspect of economic crime forensics based on the student's interest. The capstone is intended to extend students beyond the coursework and cases to apply knowledge in ways that are relevant to their professional goals. Students will work on a research project or in an experiential learning environment. Each student will be required to present his/her capstone both as an oral presentation and a summary written document.
Duration: 8 weeks
Credit Hours: 3
Learners will explore white collar misconduct that constitutes civil and/or criminal fraud in a corporate setting, including but not limited to: (1) falsification of business records; (2) false billing; (3) forgery of documents or signatures; (4) embezzlement; (5) creation of false companies; (6) false insurance claims; (7) bankruptcy fraud; (8) investment frauds (such as Ponzi schemes); (9) tax fraud; and (10) securities fraud. Students will develop processes and procedures for proper evidence management as well as learn how to prepare to serve as an expert witness and write legally sound expert reports. Prerequisites: ECF 610.
Choose 3 of the following:
Duration: 8 weeks
Credit Hours: 3
This experiential course emphasizes the importance of feedback and self-assessment for leadership development. It includes extensive assessment of each participant’s management style and skills based on self-evaluations (using structured questionnaires) and feedback from coworkers, faculty, and other participants. Leadership development experiences emphasize time and stress management, individual and group problem-solving, communication, power and influence, motivation, conflict management, empowerment, and team leadership. Each participant identifies skills he or she needs to develop and reports on efforts to develop those skills.
Duration: 8 weeks
Credit Hours: 3
This course explores all aspects of computing and communications security, including policy, authentication, authorization, administration, and business resumption planning. It examines key security technologies, such as encryption, firewalls, public-key infrastructures, smart cards, and related technologies that support the development of an overall security architecture. Coursework includes plans for developing and implementing a technology security strategy focused on business needs.
Duration: 8 weeks
Credit Hours: 3
This course considers privacy both on- and off-line; legal background of intellectual property and e-mail; ethics and codes of ethics; effects of computers on work and society; and responsibilities and risks of computing, including topics such as accuracy of information, e-waste, and multitasking. This course includes an examination of government policies and regulations related to data security and information assurance.
Duration: 8 weeks
Credit Hours: 3
This course explores the area of Risk Management with particular emphasis on Business Continuity Management. Risk Management involves assessing threats which may lead to disastrous events, evaluating control alternatives and implementing solutions. Potential threats include terrorist, criminal, industrial, natural, technological, environmental, economic and political. Practical solutions to enable an organization to protect assets, mitigate risk, manage crisis and recover after a disaster will be discussed. The role of business and government will be explored, as well as professional practices, standards and strategies. The course is designed to expose the student to all aspects of a holistic Business, Continuity & Crisis Management program and to determine the most appropriate requirements.

La Salle University is ranked in the top 50 percent of national universities nationwide by U.S. News & World Report (2023).

Request More Information

Submit this form, and an Enrollment Specialist will contact you to answer your questions.

  • This field is for validation purposes and should be left unchanged.

Or call 844-466-5587

Begin Application Process

Start your application today!
Or call 844-466-5587 844-466-5587
for help with any questions you may have.