Master of Science (M.S.)


Become a highly skilled, adaptable cybersecurity professional.

Ready to Get Started?

Fill out the form below to get in touch with an enrollment counselor.

Form Goes Here
Gain hands-on experience through real-world simulations
The Cybersecurity CAE Regional Resource Center for the Southeast U.S.

Cybersecurity, M.S. Overview

With cyber attacks becoming more frequent in the news, many organizations are in need of trained professionals who can secure data, information and networks and serve as a layer of defense against cybercriminals. The online M.S. in Cybersecurity from the University of West Florida will prepare you for the front lines of this battle as you learn to plan, implement, upgrade, manage and monitor the security of data, systems and networks. Our fully online program takes only two years to complete, and you can gain hands-on experience in virtualized computing systems of the UWF Cyber Range, a state-of-the-art platform for cybersecurity education, training and research.

Through a required capstone course, you will identify, research and report on contemporary cybersecurity issues.

Key topics of study include:

  • Computer and network security
  • Digital forensics
  • Data security from a data centric viewpoint
  • Secure software development
  • Information security management
  • Threat monitoring

After graduating with your online cybersecurity degree, you’ll be prepared for a career in this fast-growing field and be equipped with the advanced knowledge you need to effectively predict and protect against cybercrimes.

Candidates for This Program Include:

  • Students with a technical background in an area such as information technology or computer science
  • Working professionals seeking to enter the specialized field of cybersecurity
  • Those currently working in a related field

Learning Outcomes

  • Identify and prioritize system and network security threats
  • Formulate and evaluate solutions to cybersecurity problems
  • Demonstrate high familiarity with primary and secondary sources describing cybersecurity threats and remedies
  • Analyze concepts, principles and theories in computing technology for cybersecurity