Design Software, Tools and Networks to Combat Cyber Attacks
Ranked 6th among the 20 Best Online Masters in Cyber Security in 2017
Our top-ranked1 Cyber Security concentration in the online M.S. in Computer Science (MSCS) program teaches students how to identify, monitor and investigate organizational cyber threats, as well as how to create responses to them. Learn how to design software, networks, and encryption and authentication systems that combat cyber attacks. Plus, learn to investigate the aftermath of cyber attacks using popular digital forensics tools, as well as tools you create yourself.
Career Spotlight: Information Security Analyst
Lewis University's Cyber Security concentration prepares you for success in many cyber security roles, including Information Security Analyst. Ranked as the #2 Best Technology Job by U.S. News & World Report2, Information Security Analysts plan and execute security measures to shield organizations from cyber attacks and infiltrations.
From large companies like Sony, JPMorgan Chase and Target to smaller organizations, hacks and breaches now make daily appearances in the news. Any company that needs to protect its data needs support from an Information Security Analyst.
The median salary for this position is $95,510, with 28 percent job growth expected by 20263. Prepare to take advantage of these lucrative opportunities with our concentration in Cyber Security.
Cyber Security Courses
For the Cyber Security concentration, students will take 4 courses (12 credit hours) from the track plus 1 elective (3 credit hours) for a total of 15 credit hours. A sample of the online Cyber Security courses offered includes:
- Digital Forensics
- Industrial and Critical Infrastructure Network Security
- Encryption and Authentication
- Intrusion Detection, Response and Recovery
- Wireless Security
Based on students' interests, potential projects may involve intrusion detection, reverse engineering of malware, penetration testing, operating system and network forensics, defense-in-depth technologies, and other assignments relevant to keeping data systems secure.
Student Learning Outcomes
Upon completion of the Cyber Security concentration in the MSCS program, students will be equipped to:
- Identify the risks an organization faces due to cyber threats and recommend steps to combat those risks
- Apply skills and knowledge to create new responses to emerging cyber security problems so that they can respond to new attacks as they evolve
- Describe how cyber attacks against an organization can be monitored and investigated for actionable intelligence
- Explain how symmetric and asymmetric encryption and authentication systems safeguard data, and recommend encryption and authentication systems suited to particular tasks and settings
- Identify components of a modern information system and the threats that challenge their security
- Design software and networks that resist and mitigate cyber attacks
- Specify tools and architectures to help secure information systems both proactively and reactively
Shape the Science of Technology
To learn more about the online M.S. in Computer Science, call (866) 967-7046 to speak with a Graduate Admissions Counselor or click here to request more information.
- U.S. News & World Report, https://money.usnews.com/careers/best-jobs/information-security-analyst
- U.S. Bureau of Labor Statistics, https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm