Master of Science (M.S.)


Become a highly skilled, adaptable cybersecurity professional.

Ready to Get Started?

Fill out the form below to get in touch with an enrollment counselor.

Form Goes Here
Gain hands-on experience through real-world simulations
The Cybersecurity CAE Regional Resource Center for the Southeast U.S.
Choose from four concentrations: Data Security, National Security, Security Management or Software and System Security

Cybersecurity, M.S. Overview

With cyber attacks becoming more frequent in the news, many organizations are in need of trained professionals who can secure data, information and networks and serve as a layer of defense against cybercriminals. The online M.S. in Cybersecurity from the University of West Florida will prepare you for the front lines of this battle as you learn to plan, implement, upgrade, manage and monitor the security of data, systems and networks. Our fully online program takes only two years to complete, and you can gain hands-on experience in virtualized computing systems of the UWF Cyber Range, a state-of-the-art platform for cybersecurity education, training and research.

Through a required capstone course, you will identify, research and report on contemporary cybersecurity issues.

Key topics of study include:

  • Computer and network security
  • Digital forensics
  • Data security from a data centric viewpoint
  • Secure software development
  • Information security management
  • Threat monitoring

After graduating with your online cybersecurity degree, you’ll be prepared for a career in this fast-growing field and be equipped with the advanced knowledge you need to effectively predict and protect against cybercrimes.

Select your Concentration

The online M.S. in Cybersecurity includes four career-focused concentrations to customize your degree. Each option aligns with the National Institute of Standards and Technology’s NICE Cybersecurity Workforce Framework categories.

Data Security

This concentration teaches students best practices for preventing system breaches and protecting data assets. Students will complete online data security courses and learn techniques for modeling and securing sensitive data while developing their skills in data mining and network security monitoring. Graduates can pursue careers like security analyst, data security engineer and information security analyst.

National Security

Students who choose the online master’s degree with national security concentration learn the latest policy and theoretical approaches to confront the complexities of today’s global security environment. Coursework teaches students to analyze national security threats and examine policies aimed at preventing cybersecurity attacks. Possible career paths for graduates include those in intelligence, security consulting and public policy.

Security Management

This concentration combines technical and managerial principles, giving students the skills needed to establish cybersecurity policies and procedures in organizations. Courses provide instruction for students to become effective members of cybersecurity process development, implementation and assessment teams. Pursuing an online degree with security management concentration qualifies graduates for roles like cybersecurity policy analyst, cybersecurity management analyst and cybersecurity policy auditor.

Software and System Security

The software and system security concentration focuses on security properties and vulnerabilities of software systems. Courses train students to analyze and apply defensive programming techniques to reduce the risk of cyber attacks. Students learn to monitor networks and systems and apply forensic techniques to investigate digital crimes. Graduates have the skills required for careers like penetration tester, cybersecurity specialist and cyber threat analyst.

Candidates for This Program Include:

  • Students with a technical background in an area such as information technology or computer science
  • Working professionals seeking to enter the specialized field of cybersecurity
  • Those currently working in a related field

Learning Outcomes

  • Identify and prioritize system and network security threats
  • Formulate and evaluate solutions to cybersecurity problems
  • Demonstrate high familiarity with primary and secondary sources describing cybersecurity threats and remedies
  • Analyze concepts, principles and theories in computing technology for cybersecurity