Skip to Main Content

Online M.S. in Cyber Security Curriculum

Request Information

Please enter your first name.
Please enter your last name.
Please enter a valid email address.
Please enter a valid phone number (numbers only).
Please enter a valid postal code.

By providing my information and clicking the “Learn More” button, I consent to being contacted via telephone (including a cell phone, if provided), email, and text message about the Cyber Security program.

Designed to accommodate the needs and schedules of working professionals like you, the online M.S. in Cyber Security program offers classes 100% online.

Students progress through the weekly course content on their own schedules, complimented by regular, instructor-led discussion via synchronus video conference.

Students acquire hands-on skills by participating in labs administered through remote virtual machines. Students also take advantage of specialized learning tools integrated throughout the curriculum, designed to assist with reading annotations and student engagement within the class community, as two examples.

Course Requirements

The online M.S. in Cyber Security includes course materials developed by respected faculty that are leaders in their field. The program is comprised of 30 credits (18 core credits and 12 elective credits).

Electives are designed to either have a Leadership or Technical Skills focus.

Explores essential defensive Cyber Security concepts and technologies used by modern organizations. Using security frameworks and documented best practices, we will examine information security risks, threats, and vulnerabilities faced by modern organizations and use actual security tools during the class to help introduce different security threat mitigations, and their limitations.

Core - 3 Credits

Introduction to Cyber Security concepts and topics. The security of socio-technical systems will be studied by examining a range of threats, vulnerabilities and countermeasures. Topics include software security, malware, keylogging, data loss, and privacy. In addition to technical approaches, human factors, economic, legal and ethical issues will be considered. Students will participate in discussions and hands-on projects.

Core - 3 Credits

Design and analysis methods for high assurance information systems. Safety, reliability, and security. Specification of mission critical system properties. Software validation, verification, and certification.

Core - 3 Credits

Technical aspects of computer, network, and information system security. Concepts, principles, models and techniques of access control, authentication, secure communication and audit. Security system design, engineering, and operation. Fundamentals and applications of cryptography.

Core - 3 Credits

Students learn to apply risk metrics to threats from vulnerabilities and exploits. They identify, understand, and apply defensive practices against the major classes of vulnerabilities. They gain knowledge of standard penetration testing methodology and outcomes. Students understand auditing and testing methodologies for common IT elements and perform basic penetration testing.

Elective - 3 Credits

Introduction to the legal, policy, technical, and logical dimensions of information security (computer systems and networks). Selected topics include data security regulation, security breach law, cybersecurity litigation, anti-hacking laws, emerging threats and vulnerabilities, law enforcement and the encryption debate, and cyberwarfare. No technical background is required.

Elective - 3 Credits

The course covers principles of computer networks and network security design and operation. Principles of computer networks: requirements, connectivity levels, layered architectures, and applications. Direct link networks, packet switched networks, IP, and internetworking. Core perimeter security fundamentals and network security components. Layered security and defense in depth. Packet filtering, routers as security devices, intrusion detection systems, IPSec, and VPNs. Incident response, design fundamentals, and security assessments to maintain security posture.

Core - 3 Credits

Accepted best practices and guidelines to secure information systems and networks. Detection of abnormal events, intrusion detection, incident handling, response, and recovery. Security policies, system configuration, integration, and maintenance.

Core - 3 Credits

This course presents a survey of the security vulnerabilities in hardware and cover mitigation techniques. Hardware systems investigated include digital systems, embedded systems, wireless systems, RFID, and programmable digital systems (e.g., FPGAs). Approaches to design and apply security practices and techniques to hardware are covered.

Elective - 3 Credits

This course covers the process, policies, and strategies for developing and maintaining a strong Cyber Security posture within an organization. Effective organizational Cyber Security requires defining each member’s Cyber Security role and aligning leadership, staffing, training, and performance management to achieve these roles. Students in this course will critically examine their own organization’s current system as part of this course.

Elective - 3 Credits

University of Tulsa faculty
Created in 2017, The University of Tulsa’s online M.S. in Cyber Security program is made possible by dedicated faculty active in cyber security research
A building from University of Tulsa
We commend you for considering graduate education as part of your professional and personal development. We encourage you to submit your online application as soon as possible

Ready to take your next big step?

For more information about The University of Tulsa’s online M.S. in Cyber Security program, please complete the form below.

Please enter your first name.
Please enter your last name.
Please enter a valid email address.
Please enter a valid phone number (numbers only).
Please enter a valid postal code.

By providing my information and clicking the “Learn More” button, I consent to being contacted via telephone (including a cell phone, if provided), email, and text message about the Cyber Security program.