Master Cybersecurity

Choose Your Path

I am looking to earn my

Master of Science in Cybersecurity  

Classroom to Career

Take the opportunity to gain a greater understanding of the concepts, organization structures and strategies driving today’s complex organizational environment.

Degree Program Outcomes

Upon completion of the MSCSM degree program, you will be able to:

  • compile, analyze, and assess the applicability of best practices in addressing information security issues relevant to the cybersecurity community
  • evaluate the impact of business constraints and processes on the implementation of information security programs
  • integrate principles and techniques of risk analysis, project planning and change management in the development of information security strategies
  • demonstrate secondary research skills in the investigation and selection of best practice solutions to address information security challenges
  • demonstrate mastery of theory, concepts and skills in addressing specialized aspects of information security management

Course Information

Master of Science in Cybersecurity Management (MSCM): 36 Credits

SYNC SESSIONS

MSCM Courses

OFFERED TIMES

Thursday or Friday Night (8PM, 9PM, or 10PM EST)

Program Core: 36 Credits

Core Courses

IA7000 Security in the Digital Age

In this course, students explore the eight domains of the (ISC)2 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK) in information security as a framework to critically analyze security awareness issues and to evaluate best practices in implementing security systems within the enterprise. (3 credits)

IA7401 Ethical Hacking

This class will evaluate the security of a network or system’s infrastructure and outline how hackers find and attempt to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible. (3 credits)

IA8020 Security Policies, Standards, and Procedures

In this course, students examine the role of security policies, standards, and procedures in addressing business and technical risks and develop a security governance report to evaluate compliance across the enterprise. (3 credits)

IA8030 Design, Development and Evaluation of Security Controls

In this course, students transform high-level policies and procedures into quantifiable and measurable controls and mechanisms that enforce data and process integrity, availability and confidentiality. (3 credits)

IA8050 Security Risk and Vulnerability Assessment

In this course, students explore advanced techniques and tools for identifying and categorizing vulnerabilities which allow penetration of networked systems and environments. (3 credits)

IA8060 Intrusion Detection, Attacks, and Countermeasures

In this course, students examine common attack methods, technologies, and countermeasures. Students also gain skills needed to recognize various stages and methods of attack on the enterprise. (3 credits)

IA8070 Design and Development of Security Architectures

In this course, students evaluate the principles, attributes, and processes used in designing and deploying a comprehensive and resilient layered security architecture that supports the business and technical objectives of the enterprise. (3 credits)

IA8080 Security Solution Implementation

In this course, students compare, contrast, and evaluate contemporary practices in the implementation of security solutions. (3 credits)

IA8125 Information Security Policy Planning and Analysis

In this course, students develop information assurance policies and deployment plans as part of the comprehensive strategic plan and operational objectives for the enterprise. (3 credits)

Research Methods Courses

RM8250 Web-Based Research Methods in Information Security

In this course, students acquire information retrieval skills and research competencies to identify and evaluate industry-relevant sources of information for the purposes of analysis and research information security. Students compare and contrast the utility of publicly-available and subscription-based information sources for the purposes of meeting academic and professional requirements. (3 credits)

Electives 2 of 3 Classes

PM8100 Information Security Project Management

In this course, students utilize PMI’s Project Management Body of Knowledge (PMBOK) as a framework, to apply project management concepts in the information security arena. Each student develops a project plan for a security assessment which incorporates the technical and behavioral characteristics of high-performance teams. (3 credits)

IA8210 Risk Management and Compliance

In this course, students evaluate the procedures and results of risk analysis, as well as compliance processes which address the regulatory requirements that drive the need for risk analysis within the enterprise. Security related regulations such as SOX, GLBA, FISMA and HIPAA are examined. (3 credits)

IA8140 Business Continuity Planning and Recovery

In this course, students explore tools and strategies for Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) activities. Topics include business impact assessment methods, recovery strategy approaches and solutions and continuity planning. (3 credits)

IA7402 Information Security Management

In this course, students explore the five domains of the Certified Information Security Manager (CISM). This framework will include areas in information security governance, risk management, program development, program management, and incident management and response. (3 credit hours)

Technology Requirements

*Students must have immediate access to a laptop, tablet, or desktop.

Technology Requirements

Following are the recommended general technical hardware/software specifications for students enrolled in all academic programs at the University of Fairfax. Please note that

a) these specifications are sufficient for the entire duration of the program,

b) need for specific applications/software would be determined by the actual course(s) registered and the availability of the applications, and

c) although students with Mac computers can access any applications/software by leveraging remote access tools, Mac platform is not recommended and supported, and

d) doctoral students will be required to user several open-source applications, hosted services, and publicly available virtual machines. This may include but is not limited to SAS (Statistical Analysis System) OnDemand, Oracle Virtual Box, Kali OS, Apache Web Server, GNU/Linux, OpenSSL, ROS (Robot Operating System), Blender (3D computer graphics), and Orange (Data Mining).

Minimum Recommended Specifications 

1. Ownership of either laptop or desktop is mandatory. Mobile devices such as Tablets/Smart Phones cannot be used for running any applications. Mobile devices may be used for simple tasks such as accessing Canvas courses for checking messages, grades, due dates, and read the slides. For other tasks such as taking test, uploading assignments, and participating in discussion forums, mobile devices are not recommended and must not be used.

2. These recommendations are universal across all academic programs and provide a basic format for all courses. As you move further into a degree program, these requirements may increase (only minimal) based on the expectations of the program and the availability of applications.

 Platform: Intel-based systems

Minimum

Better

Best

CPU 4 core 3.0 GHz. 6 core 3.0 GHz. 8 core 3.0 GHz.
RAM 16GB 32GB 32GB
Storage 500GB SSD 1TB SSD 1TB SSD
Graphics {Integrated} OR {2GB} OR {1GB DirectX 11} {Integrated} OR {4GB} OR {2GB DirectX 11} OR {NVIDIA 4GB} OR {NVIDIA 4GB DirectX 11} {4GB} OR {NVIDIA 4GB} OR {4GB DirectX 11} OR {NVIDIA 6GB DirectX 11}
Operating System Windows 10 or 11 64-bit (Professional Edition only), No Home Edition Windows 10 or 11 64-bit (Professional Edition only), No Home Edition Windows 10 or 11 64-bit (Professional Edition only), No Home Edition
Extras

2-3 USB 2.0 or 2-3 USB 3.0 Ports

 

Microphone

 

Camera

 

External USB Drive for backup (minimum 1 TB)

2-3 USB 2.0 or 2-3 USB 3.0 Ports

 

Microphone

 

Camera

 

External USB Drive for backup (minimum 1 TB)

2-3 USB 2.0 or 2-3 USB 3.0 Ports

 

Microphone

 

Camera

 

External USB Drive for backup (minimum 1 TB)

Recommended Standard Productivity Applications

Access, Excel, OneNote, Outlook, PowerPoint, Power BI, Project, Publisher, Visio, Sway, Word, Forms, Delve

 

Internet browsers like Microsoft Edge, Google Chrome, Safari, Firefox, etc. (recommend the use of multiple browsers)

 

Document Management Application – Adobe Acrobat Professional

 

Zoom Desktop Client (https://zoom.us/download)

 

Free Video / Photo Editing (select 1 or2) Application – PowerDirector (best) – Google, Promeo – Best App for Social Media, iMovie – Video Editor App for Beginners, Splice – Free Video Editor for Trimming and Cropping, Quik – Best Video Editor for Montages, KineMaster – Video Editing App For Experienced Editors, Filmmaker Pro – Best for Vertical Editing, InShot – Best Video Editor App for Aspiring Social Media Content Creators, Mojo – Best for Any Kind of Social Media Post, VivaVideo – Best for Beginners

 

Keep the system up to date with Windows Updates, .NET Framework etc.

 

Access, Excel, OneNote, Outlook, PowerPoint, Power BI, Project, Publisher, Visio, Sway, Word, Forms, Delve

 

Internet browsers like Microsoft Edge, Google Chrome, Safari, Firefox, etc. (recommend the use of multiple browsers)

 

Document Management Application – Adobe Acrobat Professional

 

Zoom Desktop Client (https://zoom.us/download)

 

Free Video / Photo Editing (select 1 or 2) Application – PowerDirector (best) – Google, Promeo – Best App for Social Media, iMovie – Video Editor App for Beginners, Splice – Free Video Editor for Trimming and Cropping, Quik – Best Video Editor for Montages, KineMaster – Video Editing App For Experienced Editors, Filmmaker Pro – Best for Vertical Editing, InShot – Best Video Editor App for Aspiring Social Media Content Creators, Mojo – Best for Any Kind of Social Media Post, VivaVideo – Best for Beginners

 

Keep the system up to date with Windows Updates, .NET Framework etc.

Access, Excel, OneNote, Outlook, PowerPoint, Power BI, Project, Publisher, Visio, Sway, Word, Forms, Delve

 

Internet browsers like Microsoft Edge, Google Chrome, Safari, Firefox, etc. (recommend the use of multiple browsers)

 

Document Management Application – Adobe Acrobat Professional

 

Zoom Desktop Client (https://zoom.us/download)

 

Free Video / Photo Editing (select 1 or 2) Application – PowerDirector (best) – Google, Promeo – Best App for Social Media, iMovie – Video Editor App for Beginners, Splice – Free Video Editor for Trimming and Cropping, Quik – Best Video Editor for Montages, KineMaster – Video Editing App For Experienced Editors, Filmmaker Pro – Best for Vertical Editing, InShot – Best Video Editor App for Aspiring Social Media Content Creators, Mojo – Best for Any Kind of Social Media Post, VivaVideo – Best for Beginners

 

Keep the system up to date with Windows Updates, .NET Framework etc.

 

 

Note: Certain courses may require specific software. Before registering for a course, please contact your instructor or a Student Services Representative for applicable software requirements.

Policy on Sync Sessions

  • The Sync Sessions must be held in weeks 2, 4, 6, 8.
  • The Sync Sessions must be spent having students defending and explaining their research assignment for that week. This time should not be spent lecturing as it should be structured in a manner to help prepare candidates in the process of defending and justifying their research.
  • The Sync Sessions must be held Thursday-Saturday.
  • If the Sync Sessions are held on a Thursday or Friday night, the times to begin should be 8pm, 9pm, or 10pm Est to accommodate students who are on the west coast.

Build the foundation of your goals at University of Fairfax.