Cybersecurity
Become a highly skilled, adaptable cybersecurity professional.
Ready to Get Started?
Fill out the form below to get in touch with an enrollment counselor.
Cybersecurity, M.S. Overview
With cyber attacks becoming more frequent in the news, many organizations are in need of trained professionals who can secure data, information and networks and serve as a layer of defense against cybercriminals. The online M.S. in Cybersecurity from the University of West Florida will prepare you for the front lines of this battle as you learn to plan, implement, upgrade, manage and monitor the security of data, systems and networks. Our fully online program takes only two years to complete, and you can gain hands-on experience in virtualized computing systems of the UWF Cyber Range, a state-of-the-art platform for cybersecurity education, training and research.
Through a required capstone course, you will identify, research and report on contemporary cybersecurity issues.
Key topics of study include:
- Computer and network security
- Digital forensics
- Data security from a data centric viewpoint
- Secure software development
- Information security management
- Threat monitoring
After graduating with your online cybersecurity degree, you’ll be prepared for a career in this fast-growing field and be equipped with the advanced knowledge you need to effectively predict and protect against cybercrimes.
Select your Concentration
The online M.S. in Cybersecurity includes four career-focused concentrations to customize your degree. Each option aligns with the National Institute of Standards and Technology’s NICE Cybersecurity Workforce Framework categories.
Data Security
This concentration teaches students best practices for preventing system breaches and protecting data assets. Students will complete online data security courses and learn techniques for modeling and securing sensitive data while developing their skills in data mining and network security monitoring. Graduates can pursue careers like security analyst, data security engineer and information security analyst.
National Security
Students who choose the online master’s degree with national security concentration learn the latest policy and theoretical approaches to confront the complexities of today’s global security environment. Coursework teaches students to analyze national security threats and examine policies aimed at preventing cybersecurity attacks. Possible career paths for graduates include those in intelligence, security consulting and public policy.
Security Management
This concentration combines technical and managerial principles, giving students the skills needed to establish cybersecurity policies and procedures in organizations. Courses provide instruction for students to become effective members of cybersecurity process development, implementation and assessment teams. Pursuing an online degree with security management concentration qualifies graduates for roles like cybersecurity policy analyst, cybersecurity management analyst and cybersecurity policy auditor.
Software and System Security
The software and system security concentration focuses on security properties and vulnerabilities of software systems. Courses train students to analyze and apply defensive programming techniques to reduce the risk of cyber attacks. Students learn to monitor networks and systems and apply forensic techniques to investigate digital crimes. Graduates have the skills required for careers like penetration tester, cybersecurity specialist and cyber threat analyst.
Candidates for This Program Include:
- Students with a technical background in an area such as information technology or computer science
- Working professionals seeking to enter the specialized field of cybersecurity
- Those currently working in a related field
Learning Outcomes
- Identify and prioritize system and network security threats
- Formulate and evaluate solutions to cybersecurity problems
- Demonstrate high familiarity with primary and secondary sources describing cybersecurity threats and remedies
- Analyze concepts, principles and theories in computing technology for cybersecurity
Courses and Requirements
UWF’s online cybersecurity degree includes a total of 30 credit hours. Through 21 credit hours, you’ll explore fundamental topics in key cybersecurity areas. You can further tailor your degree to suit your needs through nine credit hours of elective courses.
Students entering the program with a degree not in Computing and wishing to pursue the Data Security or Software & System Security track will be required to complete prerequisite foundational courses in computing and programming as listed below, which will count toward the program’s 30 total required credit hours as part of the 6 required elective credit hours. These foundational courses do require students to have adequate background, either academic or professional, in computation, programming and computer networking.
- COP 5518 - Foundations: Computing Essentials
3 Credit Hours
Foundations: Computing Essentials
This course reviews fundamental principles of modern computer architectures, operating systems and computer networks and relates them to computer programming. The course covers topics such as the design of various components of operating systems and services they provide to users and application developers, network structures & devices, network protocol stacks, network performance metrics, network routing algorithms, and network traffic analysis. The role of security in systems and networks will also be covered. This course may require completion of graduate foundations courses in computer programming or the equivalent undergraduate coursework if a student has insufficient academic or professional experience in the discipline.
- COP 5007 - Foundations: Programming Essentials
3 Credit Hours
Foundations: Programming Essentials
A course in the Accelerated Software Engineering Foundations Series in which students will gain a comprehensive understanding of principles/concepts of Java programming and how to apply those principles/concepts in conjunction with principles of software engineering to design and develop object- oriented software systems. Students taking this course should have an understanding of programming language fundamentals including variables, constants, selection, iteration, arrays, and functions or methods.
- COP 5518 - Foundations: Computing Essentials
- ISM 6574 - Advanced Legal, Ethical, and Human Aspects of Cybersecurity
3 Credit Hours
Advanced Legal, Ethical, and Human Aspects of Cybersecurity
This course addresses the human facets of cybersecurity. Coverage will include advanced legal, ethical, regulatory environment, psychology, and hacker culture. The focus will be on the human element and the motivation and deterrence of cyber-crimes.
- CIS 5775 - Cybersecurity Principles
3 Credit Hours
Cybersecurity Principles
This course introduces students to topics in cybersecurity. It provides information related to threat models, vulnerability analysis, and security-policy formation and enforcement. In addition, the course covers information assurance controlling laws and guidelines as well as introduces students to broad topics in network and system security, Internet services, and digital forensics.
- ISM 6574 - Advanced Legal, Ethical, and Human Aspects of Cybersecurity
Data Security (12 credit hours)
- COP 5725 - Database Systems
3.0 Credit Hours
Database Systems
Introduction to database systems and database management system architectures. Various database models are discussed with emphasis on the relational model and relational database design. Case applications using fourth-generation languages, such as SQL are included. This course requires completion of graduate foundations courses in computer programming or the equivalent undergraduate coursework.
Choose three courses from the following:
- CAP 6771 - Data Mining
3 Credit Hours
Data Mining
The course addresses methods to discover patterns and trends in large datasets. With the aid of contemporary data mining software, students will apply the theoretical skills they acquire in the course to go through the complete data mining process starting from data pre-processing and cleaning, concept hierarchy generation, attribute relevance analysis to frequent itemset mining and association rule mining. Traditional methods such as Bayesian decision theory as well as modern approaches in classification and unsupervised clustering will be covered as well. Prerequisite: COP 5725
- CAP 6772 - Data Warehousing
3 Credit Hours
Data Warehousing
The primary focus of this course is on data warehousing and its applications to business intelligence. Some areas of concentration are: requirements gathering for data warehousing; data warehouse architecture; dimensional model design for data warehousing; physical database design for data warehousing; extracting, transforming and loading strategies; introduction to business intelligence; design and development of business intelligence applications; expansion and support of a data warehouse.
- CAP 6789 - Advanced Big Data Analytics
3 Credit Hours
Advanced Big Data Analytics
In this course students study advanced methods to handle and analyze very large data sets in Hadoop's Big Data environment. Students work with the Spark architecture in the MapReduce framework. Students also learn to apply machine learning algorithms in Spark.
Prerequisite: CAP 6597 AND COP 5725 - CET 6882 - Network Performance Monitoring and Security
3 Credit Hours
Network Performance Monitoring and Security
Students enrolled in the MSIT program take a sequence of courses related to information processing, analytics and security. This course examines network performance, strategies to optimize network performance and protocols related to network security. Students should have a basic understanding of computer networks.
- CIS 6376 - Database Security
3 Credit Hours
Database Security
Database Security is designed to teach students how database systems are used, managed, and issues associated with protecting the associated data assets are resolved. This course will cover various methods to ensure information confidentiality, integrity, and availability on various data storage systems. This graduate course is an elective for graduate Cybersecurity and Information Technology programs. Prerequisite: COP 5725
- CIS 6394 - Digital Forensics
3 Credit Hours
Digital Forensics
This course will provide a solid foundation for performing a digital forensic examination; introduces tools and techniques required for conducting a forensic analysis on systems and data pertaining to evidences in civil, criminal or administrative cases. It introduces systematic problem-solving techniques and applies them to digital investigations. The techniques directly correlate to methods used to recover/restore data for various requirements, ranging from litigation to fraud-based investigations.
- CIS 6625 - Data Security
3 Credit Hours
Data Security
This course covers concepts of Data Security from a data centric perspective. Challenges faced by today’s systems will be studied and the future of data security will be discussed. This course may require completion of graduate foundations courses in computer programming or the equivalent undergraduate coursework if a student has insufficient academic or professional experience in computer science. Prerequisite: COP 5725
- COP 5775 - Database Administration
3 Credit Hours
Database Administration
Database administration skills covering installation, configuration and tuning a database, administering servers and server groups, managing and optimizing schemas, tables, indexes and views, creating logins, configuring permissions, assigning roles and performing other essential security tasks, backup and recovery strategies, automation and maintenance. Prerequisite: COP 5725.
- CTS 5458 - Data Visualization
3 Credit Hours
Data Visualization
This course provides students with skills to describe theory and concepts related to efficient and effective display of data. Students will use a variety of tools necessary to prepare and present the factual data in a visually compelling manner. Data Visualization tools have a wide applicability and tools and technologies available today allow students, researchers and other users of data leverage on these tools to empower their presentations. Offered concurrently with CTS 4540; graduate students will be assigned additional work.
National Security (12 credit hours)
Note: National Security specialization courses incorporate synchronous virtual learning sessions.
- DSC 6045 - Homeland Security
3 Credit Hours
Homeland Security
This course will provide students a critical assessment of the larger history, purpose, function and effectiveness of homeland security initiatives. In so doing, we will evaluate the different threats posed to the homeland, the way we prepare for them, the law surrounding our response to homeland security as well as the different agencies tasked with minimizing threats to the homeland. Analyzes homeland security efforts geared towards the fight against terrorism and those directed at minimizing threats from natural disasters, technological hazards, cyber and transportation attack. Scientifically-based methods of inquiry will be utilized in the study of the extent and impact of homeland security efforts.
Choose three courses from the following:
- CCJ 5018 - Crime and Public Policy
3 Credit Hours
Crime and Public Policy
Analysis of various policy initiatives designed to reduce the level of crime. Applies elements of criminological theory and research methods to critically evaluate the effectiveness of policies.
- CCJ 6715 - Issues in Contemporary Criminal Justice
3 Credit Hours
Issues in Contemporary Criminal Justice
An in-depth study of issues confronting 21st Century criminal justice systems. Topics include those associated with current events and controversies.
- INR 6097 - Political Violence
3 Credit Hours
Political Violence
This class explores the conditions under which political actors use violence, and the conditions that lead to civil war and genocide. We approach questions of conflict behavior and political violence from the perspective of strategic choice. Strategic choice explains conflict not as an accident, but as the deliberate result of choice by actors. Actors chose the course of action they think will best help them achieve their preferred outcomes. Focusing on strategic choices helps us to understand how we sometimes fail to achieve peaceful solutions to political problems.
- DSC 5020 - Terrorism
3 Credit Hours
Terrorism
Critical analysis of major issues related to the study of terrorism. From initially critiquing the numerous conceptualizations of terrorism, the course will then evaluate theories of terrorist activity, the organizational and financial structure of terrorist cells, and the different tactics terrorists adopt in order to fulfill their objectives. The course will explore the contentious and oftentimes violent history of the Middle East and how this part of the world has spawned the development of multiple terrorist groups. Scientifically-based methods of inquiry will be utilized in the study of the extent and impact of terrorism on society.
- INR 5129 - Statecraft
3 Credit Hours
Statecraft
This course introduces students to fundamental questions, theoretical arguments and concepts in the area of foreign policy analysis and decision making, otherwise known as Statecraft. The course examines core topics in statecraft such as deterrence (conventional and nuclear), coercive diplomacy, tools of coercion, and the ethics of using force. Throughout the course, students will also study several prominent cases.
- INR 5330 - National Security Policy, Technology and Cyber
3 Credit Hours
National Security Policy, Technology and Cyber
This course introduces the basic concepts, theoretical debates and practical policy issues surrounding American national security with a focus on technology policy. Technological innovation changes history. It creates new threats, opens opportunities, upends economies, and allows new types of interaction. It also pressures political leaders to innovate and adapt national security policy. This course presents several different approaches to the analysis of technology and national security. It starts with world historical analyses before turning to more recent theories of politics, innovation, and national security. Throughout, the course focuses particularly on cybersecurity as an evolving policy challenge, and it concludes with a concentrated set of readings on the topic. This is a seminar, and students should be prepared to present and evaluate each day's assigned reading. The course may include several written and oral assignments such as short briefings, research projects or papers, and essay questions on exams.
- INR 5365 - Intelligence
3 Credit Hours
Intelligence
This course explores the National Foreign Intelligence Community (NFIC). It examines how organizational factors, resources, management and oversight affect the process of supporting the development and executing U.S. National Security Policy. It covers the evolution, organization, oversight, funding and responsibilities of the NFIC: the relationships of the intelligence providers, especially the Director of National Intelligence (DNI), with key policymakers and overseers such as the President, National Security Council, senior executives; the CONGRESS, its relevant committees and staffs; as well as the courts, the media and public opinion.
Security Management (12 credit hours)
- ISM 6575 - Advanced Cybersecurity Risk Management
3 Credit Hours
Advanced Cybersecurity Risk Management
This course focuses on the advanced application of risk management theory and principles of information security policy. An additional major area of focus is incident response and contingency planning consisting of incident response planning, disaster recovery planning, and business continuity planning.
Choose three courses from the following:
- COP 5725 - Database Systems
3 Credit Hours
Database Systems
Introduction to database systems and database management system architectures. Various database models are discussed with emphasis on the relational model and relational database design. Case applications using fourth-generation languages, such as SQL are included. This course requires completion of graduate foundations courses in computer programming or the equivalent undergraduate coursework.
- COP 5775 - Database Administration
3 Credit Hours
Database Administration
Database administration skills covering installation, configuration and tuning a database, administering servers and server groups, managing and optimizing schemas, tables, indexes and views, creating logins, configuring permissions, assigning roles and performing other essential security tasks, backup and recovery strategies, automation and maintenance. Prerequisite: COP 5725.
- GEB 5816 - MBA Foundations: Principles of Human Resources Management
1.5 Credit Hours
MBA Foundations: Principles of Human Resources Management
A course in the Accelerated MBA Foundations Series in which students are introduced to the basic functions of human resource management, including employment law, planning, job analysis, recruitment and selection, training and development, performance management, compensation and benefits, employee and labor relations, safety and health, and international human resource management.
- GEB 5875 - MBA Foundations: Management Skills and Applications
1.5 Credit Hours
MBA Foundations: Management Skills and Applications
Covers the historical evolution of management, organizational design, motivation, team building, leadership, change management, culture, strategic planning, and critical implementation/control elements critical to successful management and strategy. Social responsibility, ethics, globalization, and futures are also stressed.
- ISM 6326 - Information Systems Auditing and Control
3 Credit Hours
Information Systems Auditing and Control
Focuses on the role of management in controlling information technology and understanding the risks of a highly interconnected business environment. Topics include compliance and operational network information security; contingency planning on application, data and host security; systems development controls; access controls and identity management; threats and vulnerabilities controls; and assurance and security of information related to on-line, web-based cloud computing, and other advanced computer topics. This course will cover all the topic areas and prepare the student to take the CompTIA Security+ Certification exam.
* GEB 5816 MBA Foundations: Human Resources Management and GEB 5875 MBA Foundations: Management Skills and Applications Courses are 1.5 credit hours each. Students must take both courses.
Software and System Security (12 credit hours)
- CEN 5079 - Secure Software Development
3 Credit Hours
Secure Software Development
Examines the importance of building security into the design, implementation and testing phases of software development. Covers coding techniques that avoid known vulnerabilities and test strategies that can uncover previously unknown weaknesses. Includes discussion of security policies and design principles. Prior to taking this course students should have knowledge and skill in software development.
Choose three courses from the following:
- CEN 6074 - Software Assurance and Security
3 Credit Hours
Software Assurance and Security
Concepts and principles related to developing and maintaining secure software systems with no exploitable vulnerabilities with high levels of integrity and reliability. This course may require completion of graduate foundational courses in computer science or undergraduate coursework in computer programming if a student has insufficient academic or professional experience in the discipline.
- CIS 5396 - Ethical Hacking and Penetration Testing
3 Credit Hours
Ethical Hacking and Penetration Testing
This course provides a understanding of how to effectively protect computer networks. Students will learn the tools and penetration testing methodologies used by ethical hackers. The tools and methodology will focus on gathering information and identifying flaws and vulnerabilities in documentation, software and computer systems and exploiting those flaws. In addition, the course provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Students will be provided with an overview of computer crime laws. Offered concurrently with CIS 4385;graduate students will be assigned additional work. Credit may not be received in both CIS 5396 and CIS 4385.
- CIS 6394 - Digital Forensics
3 Credit Hours
Digital Forensics
This course will provide a solid foundation for performing a digital forensic examination; introduces tools and techniques required for conducting a forensic analysis on systems and data pertaining to evidences in civil, criminal or administrative cases. It introduces systematic problem-solving techniques and applies them to digital investigations. The techniques directly correlate to methods used to recover/restore data for various requirements, ranging from litigation to fraud-based investigations.
- CIS 6625 - Data Security
3 Credit Hours
Data Security
This course covers concepts of Data Security from a data centric perspective. Challenges faced by today’s systems will be studied and the future of data security will be discussed. This course may require completion of graduate foundations courses in computer programming or the equivalent undergraduate coursework if a student has insufficient academic or professional experience in computer science. Prerequisite: COP 5725
- COP 5522 - Parallel and Distributed Programming
3 Credit Hours
Parallel and Distributed Programming
A comprehensive overview of parallel programming using MPI and OpenMP. A survey of common parallel architectures, communication primitives, applications of those primitives to design efficient parallel algorithms, definition of models and metrics to evaluate the effectiveness of parallel algorithms theoretically and empirically, and introduction to cloud computing. Students taking this course should have a good understanding of undergraduate level data structures and algorithms, and mastery of undergraduate level programming in a UNIX environment.
- COP 5725 - Database Systems
3.0 Credit Hours
Database Systems
Introduction to database systems and database management system architectures. Various database models are discussed with emphasis on the relational model and relational database design. Case applications using fourth-generation languages, such as SQL are included. This course requires completion of graduate foundations courses in computer programming or the equivalent undergraduate coursework.
- CNT 5407 - System and Network Security
3 Credit Hours
System and Network Security
This course covers the basic strategies and tools that prepare students to engage in proactive and aggressive cybersecurity activities, with an increased focus on computer, network and system security. Students will learn about protection strategies which are most effective when dealing with cyber attacks, especially in an age of increased reliance on distributed devices. This course may require completion of graduate foundational courses in computer science or undergraduate coursework in computer networks and operating systems if a student has insufficient academic or professional experience in the field.
- CNT 6519 - Wireless Network Security
3 Credit Hours
Wireless Network Security
The objective of the course is to study and understand the security and research challenges of existing and emerging wireless networks. Students will learn about various security issues such as key management, privacy, authentication and secure data aggregation and the algorithms used to resolve these issues.
- COP 5725 - Database Systems
Choose 3 electives at the 5000- or 6000-level with the approval of the program advisor.
For a health focus in the program, students may consider completing the following courses:
- HSA 6197 - Health Informatics
3.0 Credit Hours
Health Informatics
This course discusses the multifaceted, interdisciplinary nature of health informatics. Topics covered include computer applications in medicine, health data classification and coding and legal and ethical issues (including documentation, security and regulatory requirements). Additional avenues for further credentialing will be covered.
- HSA 6752 - Quantitative Foundations and Data Analysis for Health Admin
3.0 Credit Hours
Quantitative Foundations and Data Analysis for Health Admin
This course will introduce the methods for description and analysis which provide healthcare professionals with useful tools for making sense from data. The course will cover how healthcare data is dependent on analysis, categorization, and management.
- HSA 5198 - Electronic Clinical Record Systems
3 Credit Hours
Electronic Clinical Record Systems
This course explores the use and evaluation of commercially available electronic medical record systems. Healthcare workflow issues will be addressed as well as billing, collections, HIPAA and scheduling. Offered concurrently with HSA 5198; graduate students will be assigned additional work.
- PHC 6251 - Disease Surveillance and Monitoring
3.0 Credit Hours
Disease Surveillance and Monitoring
Disease surveillance and monitoring is the systematic collection, analysis, interpretation, and dissemination of data for use in prioritizing, planning, implementing, and evaluating health programs, activities and practices in the United States as well as in other developed and developing countries. We will focus on these fundamental processes and procedures which are utilized to investigate and track infectious and communicable diseases as well as non-infectious chronic diseases. The course will highlight the importance of designing and reporting quantitative and qualitative contents in disease surveillance.
- HSA 6197 - Health Informatics
Admission Requirements
To be considered for admission into UWF’s online cybersecurity program, you must have earned an undergraduate degree from an accredited institution, with a minimum institutional GPA of 3.0 on a 4.0 scale on the last 60 hours of coursework in the baccalaureate degree.
How to Apply
To apply for admission to this program, you first need to submit an application for graduate admission (plus a $30 application fee) and be accepted for admission into University of West Florida. In addition, you must:
- Submit official transcripts confirming a bachelor’s degree from an institution whose accrediting agency is included on the list of UWF approved accrediting agencies
- Submit a letter of intent describing your work experience and reasons for pursuing the degree, including how the degree relates to your career goals. Within your submission please also include the concentration you wish to pursue.
- Submit contact information (email addresses and phone numbers) for two professional references
- Submit a resume
Students entering the program with a degree other than computer science or information technology and pursue the Data or Software & System Security track may be required to complete prerequisite courses in computing and programming.
Have questions about this program or the admissions process? Connect with one of our knowledgeable enrollment counselors.
Costs & Financial Aid
Component | Cost | Total* |
---|---|---|
Full Online Program Tuition | $425 per credit hour | $12,750.00 |
Tuition with Maximum Transfer Credits (Up to 6) | $425 per credit hour | $10,200.00 |
Full Face-to-Face In-State Program Tuition | $377.60 per credit hour | $11,328.00 |
Time to completion varies by student, depending on individual progress and credits transferred, if applicable. Fees are charged per semester unless otherwise noted. This program takes up to four semesters to complete, depending on transfer credits. For a personalized estimate of time to completion, call an enrollment advisor at 844.372.9390 or request information.
Refer to UWF Cost of Attendance Estimates and Financial Literacy for more information on UWF costs and financial aid.
* Tuition and fees are subject to change.
Military Students
UWF proudly serves active duty U.S. military members and veterans. As UWF has been a participant of the Yellow Ribbon Program since 2011, you could be eligible to receive free tuition with your military benefits.
See How We Can Serve YouFinancial Aid
Funding your college education should not empty your wallet. We offer various financial aid options for our online students, including loans, scholarships and grants for degree-seeking students.
Learn More About Financial AidCareer Outcomes
Upon completion of our cybersecurity degree online program, you can pursue a variety of careers within the field.
* Salary and job outlook information from the Bureau of Labor Statistics.
Network Administrator
Network administrators are in charge of maintaining an organization’s network security, plus assessing and improving its network performance. They are also responsible for adding users to a network and updating network security positions. Network administrators earned a median wage of $95,360 in 2023, and employment is expected to grow 2% from 2022 to 2032.
Information Security Analysts
These employees are responsible for overseeing cybersecurity in businesses and organizations. They work with both software and hardware to make sure the business runs smoothly. Information security analysts may also teach other employees how to protect their information and address their concerns. In 2023, information security analysts made a median annual salary of $120,360. Available jobs are predicted to grow 32 percent through 2032, much faster than the average for all occupations.
Database Administrator
Database administrators organize large amounts of data and optimize databases to function most efficiently. Maintaining database security is crucial because databases could contain personal or financial information. In 2023, these employees made a median annual salary of $117,450. Employment opportunities for database administrators are projected to increase by 8% from 2022 to 2032.