Program Overview

See a snapshot of the online Master of Science in Cybersecurity

Meet the growing demand for skilled cyber professionals who can protect and defend against real-world digital threats. Our Master of Science in Cybersecurity online program offers you the latest defenses against cybercriminals—whether they are stealing identities, high-jacking organization-wide digital resources or leaking sensitive data, our graduate-level cybersecurity classes online will prepare you to intercept data breaches before it is too late.

Strategically designed to protect data from all angles, the online cybersecurity degree curriculum emphasizes both offensive and defensive security measures—preparing you to anticipate cyber attacks and arming you with the software, tools and resources to counterattack. As part of the coursework, you will learn the most in-demand skills, including: cyber defense, cybersecurity threat and risk evaluation, digital forensics, disaster recovery, identity management, incident response, network detection and response, penetration testing , systems architecture and so much more.

Our expert faculty, who hold advanced degrees and industry certifications in the cybersecurity field, will teach you how to overcome real-world digital threats and how to rise as an industry leader who is qualified for even the most high-stakes security jobs. You can choose the thesis-based track if you are interested in pursuing further postgraduate studies—or the project-based track if you aspire to work in leading data protection roles immediately after graduating from the online master’s in cybersecurity program.

Graduates of the Online Master's in Cybersecurity will learn to:

  • Design, implement and evaluate computing-based solutions for cybersecurity purposes
  • Develop and implement cryptography for information systems
  • Engage in state-of-the-art research activities
  • Analyze complex cybersecurity problems and apply security principles that offer solutions
  • Understand and implement advanced security to networks and software
  • Analyze and evaluate operating systems to detect risks and threats
  • Rise to professional responsibilities, including making informed decisions in cybersecurity practices that adhere to legal and ethical principles

Career opportunities:

  • Systems Analyst
  • Network Engineer
  • Information Security Manager
  • Information Security Engineer

Also available:

Eastern Michigan University offers a variety of graduate programs and a post-master’s certificate online. Check out our other online programs.

Program Details

$600 Per Credit Hour

As few as 12 months 

30 Credit Hours

Apply Now

Request Info

Need More Information?


Call 734.487.8892

Tuition and Fees

Choosing our online program is cost-effective

The Master of Science in Cybersecurity online tuition is the same affordable, pay–by–the–course rate for in-state and out-of-state students. Financial aid may also be available for eligible students.

Tuition Breakdown

$600 Per Credit Hour

For more information regarding Tuition and Fees, please visit Student Business Services.

Calendar

View the online dates and deadlines for EMU

The M.S. in Cybersecurity online program features accelerated 7.5-week courses and six start dates a year. View the full calendar to find the best start date for you, along with corresponding deadlines for submitting your application and paying tuition.

Now Enrolling

August 25 - Begin Fall 2025 Classes

Admissions

See the qualifications for our online M.S. in Cybersecurity program

The M.S. in Cybersecurity online program admission process is streamlined to help you get started right away.

Admission Requirements:

  • Undergraduate GPA of at least 3.0 on a 4.0 scale
  • No prior cybersecurity experience is required
  • No GMAT is required

View all admission requirements:

  • Master of Science in Cybersecurity Online Admission Requirements Expand dropdown

    Applicants are reviewed on an individual basis to offer you a seamless and customized experience. While applicants are not required to have prior experience in cybersecurity, many do. If you do not have prior experience, EMU will work with you to ensure your success by offering five leveling courses to fully prepare you for the rigor of the cybersecurity program. These courses may be taken at other institutions, but we prefer you take them at EMU; they may be taken concurrently with the rest of the courses in the cybersecurity master's program.

    If you need to submit official documents by mail, send them to:

    Office of Admissions
    Eastern Michigan University
    P.O. Box 970
    Ypsilanti, MI 48197

    Documentation can be sent via email to: [email protected].

    Have a question? Call us at 734.487.8892.

Begin Application Process

Start your application today!

Apply Now

Courses

View the degree plan for our online M.S. in Cybersecurity program

To earn the Master of Science in Cybersecurity online, you must complete 30 credit hours. For the thesis track, this includes 6 core courses, 2 elective courses and 2 capstone courses; the project track includes 6 core courses, 3 elective courses and 1 capstone course

  • Core Courses Expand dropdown
    • IA 544: Cyber Law, Privacy, Policy and Compliance Expand dropdown
      Duration: 7.5 weeks
      Credit Hours: 3
      An in-depth examination of the law dealing with computers and the Internet, including such issues as intellectual property, electronic commerce, information privacy, freedom of expression, cybercrime, jurisdiction, compliance and the policy that governs. Included are a detailed analysis of significant legal case studies plus a review of applicable federal and state legislation as applied to such standards as HIPPA, Sarbanes Oxley, FISMA and FIPS 200 Compliance.
    • IA 651: Cyber Security Project Management Expand dropdown
      Duration: 7.5 weeks
      Credit Hours: 3
      This course prepares students for knowledge of cybersecurity defense system design principles, their human aspects and project management.
    • IA 645: Data Analytics for Cybersecurity Expand dropdown
      Duration: 7.5 weeks
      Credit Hours: 3
      This course focuses on the application of data science techniques from network security perspectives. Students learn how to gather, process, store and visualize security-related data as well as the application of various statistics and machines learning techniques to detect intrusion and malicious activities. After taking this course, a student will be able to: 1) Apply tactics, techniques, and procedures for a full range of investigative tools and processes to include but not limited to interview and interrogation techniques, surveillance, counter-surveillance, and surveillance detection, and appropriately balances the benefits of prosecution versus intelligence gathering. 2) Develops and administers security event databases and/or data management systems that allow for the storage, query, and utilization of event data 3) Leverage state-of-the-art data mining, Big Data, and/or Data Science tools and techniques in the cyber security field.
    • IA 642: Defensive Security Expand dropdown
      Duration: 7.5 weeks
      Credit Hours: 3
      This course provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing. Security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.
    • IA 650: Offensive Security Expand dropdown
      Duration: 7.5 weeks
      Credit Hours: 3
      This course provides knowledge on how to fortify computer networks by learning and effectively applying ethical hacking techniques. The course clearly explains the enemy’s devious weapons, skills, and tactics and offers field-tested remedies, case studies, and interesting labs. Students will get complete coverage of penetration testing, vulnerability discovery, malware analysis, reverse engineering, and the Internet of Things security. State-of-the-art mobile exploits, ransomware, and legal issues are thoroughly explained.
    • IA 622: Risk Management and Incident Response Expand dropdown
      Duration: 7.5 weeks
      Credit Hours: 3
      This course prepares students for knowledge of risk management processes as well as incidence response and orderly failure preparation (e.g., methods for assessing and mitigating risk in a systematic way).
  • Elective Courses Expand dropdown
    • IA 622: Risk Management and Incident Response Expand dropdown
      Duration: 7.5 weeks
      Credit Hours: 3
      This course prepares students for knowledge of risk management processes as well as incidence response and orderly failure preparation (e.g., methods for assessing and mitigating risk in a systematic way).
    • IA 533: Cybercrime & Information Warfare Expand dropdown
      Duration: 7.5 weeks
      Credit Hours: 3
      Intensive hands-on investigation of computer-related cyber crime and information welfare and designed to prepare students to have knowledge and skills in an electronic crime investigation. Thus, the course prepares students to become effective cybercrime investigators. Students will identify, evaluate, classify and demonstrate proficiency in investigating computer-related cyber crime and information welfare. Students may be subject to a background check prior to admittance.
    • IA 643: Discovery Recovery - Business Continuity Expand dropdown
      Duration: 7.5 weeks
      Credit Hours: 3
      Disaster Recovery and Business Continuity is built upon the concepts of risk analysis and business impact planning, this course is designed to provide a foundation and guide to coordinated organizational emergency response and event management during and after a disruptive occurrence.
  • Capstone Courses Expand dropdown

    If you choose the thesis track, you will take both IA 690 and IA 691. If you choose the project track, you will take IA 694 and another elective course.

    • IA 694: Project Design & Implementations Expand dropdown
      Duration: 7.5 weeks
      Credit Hours: 3
      This course provides a culminating experience for students completing their master’s degree in cybersecurity. It will include discussion, research and experimental activities that encourage students to apply academic achievements to functional professional situations.
    • IA 690: Thesis Expand dropdown
      Duration: 7.5 weeks
      Credit Hours: 3
      Completion of research problem, writing thesis and defense of thesis.
    • IA 691: Thesis Expand dropdown
      Duration: 7.5 weeks
      Credit Hours: 3
      Completion of research problem, writing thesis and defense of thesis.

Best in the Midwest

Designated a Best Midwestern College among the "2020 Best Colleges: Region by Region" (The Princeton Review web feature)

Request More Information

Begin Application Process

Start your application today!

Apply Now

Still have questions?

Feel free to reach out to us at 734.487.8892 or email us at [email protected]

Call 734.487.8892

Additional Resources

Interested in learning more? Explore our academic resources for information about programs, calendars, academic support, and so much more. While you're there don't forget to visit our five colleges. Our Graduate School provides a wealth of information to help you navigate your graduate education journey. Ready to get started? Just click Apply Now to begin the application process.