Online M.S. in Cyber Security Curriculum
Designed to accommodate the needs and schedules of working professionals like you, the online M.S. in Cyber Security program offers classes 100% online.
Students progress through the weekly course content on their own schedules, complemented by regular, instructor-led discussions via synchronous video conferences.
Students acquire hands-on skills by participating in labs administered through remote virtual machines. They also take advantage of specialized learning tools designed to help them read annotations and engage with their classmates.
The online M.S. in Cyber Security includes course materials developed by respected faculty who are leaders in their field. The program is comprised of 30 credits (15 core credits and 15 elective credits).
Electives are designed to either have a leadership or technical skills focus.
Core Courses – for both Leadership and Technical Tracks
Introduction to cybersecurity concepts and topics. The security of socio-technical systems will be studied by examining a range of threats, vulnerabilities and countermeasures. Topics include software security, malware, keylogging, data loss and privacy. In addition to technical approaches, human factors, economic, legal and ethical issues will be considered. Students will participate in discussions and hands-on projects.
Explores essential defensive cybersecurity concepts and technologies used by modern organizations. Using security frameworks and documented best practices, we will examine information security risks, threats, and vulnerabilities faced by modern organizations and use actual security tools during the class to help introduce different security threat mitigations and their limitations.
Technical aspects of computer, network, and information system security. Concepts, principles, models and techniques of access control, authentication, secure communication and audit. Security system design, engineering and operation. Fundamentals and applications of cryptography.
The course covers principles of computer networks and network security design and operation. Principles of computer networks: requirements, connectivity levels, layered architectures, and applications. Direct link networks, packet switched networks, IP, and internetworking. Core perimeter security fundamentals and network security components. Layered security and defense in depth. Packet filtering, routers as security devices, intrusion detection systems, IPSec, and VPNs. Incident response, design fundamentals, and security assessments to maintain security posture.
Introduction to the legal, policy, technical, and logical dimensions of information security (computer systems and networks). Selected topics include data security regulation, security breach law, cybersecurity litigation, anti-hacking laws, emerging threats and vulnerabilities, law enforcement and the encryption debate, and cyberwarfare. No technical background is required.
In this course, students will be exposed to fundamental security concerns related to information systems and methodologies to mitigate vulnerabilities and threats to improve information assurance. These concerns include information access, exchange, and flow within an information system and among its internal and external components. Significant examination of NIST documents will guide the student through the process standardization guidelines available for information system assurance and how they can be applied. Information system security policies will be examined and critiqued so that students can articulate policies and mechanisms for their enforcement. The influence of software systems architecture on information systems security will be detailed, so that students can document the software architecture of their system and model information flow and stakeholder perspectives. These processes will reflect the NIST Cybersecurity Framework and incorporate methodologies and practices for information system security certification and accreditation.
CompTIA’s PenTest+ is a comprehensive technical certification that addresses all stages of modern organizational penetration testing. PenTest+ is compliant with ISO 17024 standards and approved by the Department of Defense to meet directive 8140/8570.01-M requirements. This course covers the knowledge and skills necessary to successfully pass the Pentest+ certification exam and prepares students for more advanced penetration testing courses in the curriculum. Upon completion of this course, students will be able to plan and scope a penetration testing engagement, understand legal and compliance requirements, perform vulnerability scanning and penetration testing using appropriate tools and techniques and then analyze the results, produce a written report containing proposed remediation techniques, and effectively communicate results and provide practical recommendations to the management team.
Students learn to apply risk metrics to threats from vulnerabilities and exploits. They identify, understand, and apply defensive practices against the major classes of vulnerabilities. They gain knowledge of standard penetration testing methodology and outcomes. Students understand auditing and testing methodologies for common IT elements and perform basic penetration testing.
Accepted best practices and guidelines to secure information systems and networks. Detection of abnormal events, intrusion detection, incident handling, response, and recovery. Security policies, system configuration, integration, and maintenance.
Suitable for Leadership & Technical Tracks
This is an experiential lab-focused course in which students apply cybersecurity concepts from system, web and network security, as well as cryptography. Students use knowledge accrued through their courses to understand and craft specific attacks in a contained environment and implement defenses. Topics include privilege escalation, race conditions, injection attacks, firewall evasion, communication relay and interception, hash-collisions and public key infrastructure on-path attacks.
This course enables students to understand the architecture of cryptocurrencies, describe the operation of and work with blockchains, develop smart contracts using Ethereum, explain monetary and banking issues that have arisen in cryptocurrencies and blockchain technology, and understand and explain relevant financial rules and regulations that impact these types of technologies.
Created in 2017, The University of Tulsa’s online M.S. in Cyber Security program is made possible by dedicated faculty active in cybersecurity research.Explore Online Faculty
We commend you for considering graduate education as part of your professional and personal development. We encourage you to submit your online application as soon as possible.How to Apply