Master of Science

in Cyber Security

Overview

The ECCU Master of Science in Cyber Security (MSCS) program prepares information security professionals to assume cybersecurity and assurance leadership roles in corporations, agencies, and organizations. A curriculum rich in computer security management, IT security threat assessment, incident response, organizational management and behavior, leadership, challenges students to become creators of knowledge, and inventors of processes.

The program has been divided into a set of core courses that provide the necessary skills in cybersecurity, organizational behavior and structure, research and writing. The program then offers various specializations to allow students to select specific fields of study that they are passionate about, each having well-defined job prospects, derived from the NICE framework, affiliated to them.

The MSCS program is offered 100% online, allowing students to complete course work in a time frame that fits each person’s individual schedule. This also requires that the student has the appropriate kinds of technology and connectivity to sustain constant participation in class activities.

Our Masters of Science in Cyber Security Specializations:

security-analyst
enterprise-security-architect
digital-forensics
incident-management-business-continuity
executive-leadership-in-information-assurance

About the Program

Developed from a learning model based on Bloom’s Taxonomy, the Master of Science in Cyber Security program educational objectives identify what students should learn, understand, and be able to do because of their studies with EC-Council University.

What you will learn upon completion:

  • The application of technical strategies, tools and techniques to secure data and information for a client or customer.
  • The adherence to a high standard of ethical behavior.
  • The use of research in both established venues and innovative applications to expand the body of knowledge in cyber security.
  • The application of critical thinking to creatively and systematically solve the problems and meet the challenges of the ever-changing environments of cyber security.
  • The mastery of the skills necessary to move into leadership roles in companies, agencies, divisions and departments.

Course Structure

The courses are presented in 12-week terms and consist of assigned readings, threaded discussions, case studies, written analysis, research projects and examinations.

Students must be prepared to spend 10-12 hours of study a week to complete the work. ECCU encourages regular and frequent student-faculty interaction via internet. Syllabi and grading rubrics clearly set out the course requirements, expectations and timelines, and students are kept abreast of their progress in the course through the MyECCU Online Learning Management System.

Admission Requirements

Applicants for admission must have a Bachelor’s degree from an accredited institution and a TOEFL score of 550 or better, or proof of English competency.

For more information about admission requirements, please visit our Admission page.

  • Student Enrollment Application
  • Official government ID or passport (international students)
  • Official transcript(s) from the institution where student received Bachelor’s or most recent Master’s Degree.
  • Official evaluation of international credits (for students with international transcripts only)
  • Proof of English proficiency (international students only; see section on English Requirement for International Students)
  • Application fee

Graduation Requirements

The Master of Science in Cyber Security degree will be awarded by EC-Council University upon successful completion of all degree requirements.

In addition to the specific degree requirements, each candidate for graduation must meet the following requirements:

  • Completion of thirty-six (36) credits of 500 level courses in which the candidate earned a cumulative GPA of 3.0 or better.
  • Satisfactory completion of the summative capstone course.
  • All degree requirements must be completed within one and a half times the program length or have a cumulative course completion rate of 67% of course work from the date the student enrolls in the University and begins the program

Virtual Labs

100% Virtualization for a Complete Learning Experience!

iLabs was built for you, whether beginner or expert, iLabs is completely customizable to your needs. No experience necessary!

Practical hands-on learning provides access to real-world tools and scenarios, boosts knowledge retention and is proven to be more effective at preparing you for the job!

information security certifications to degrees

Pricing

masters in information security

Apply For A Scholarship

eccu scholarship
eccu student scholarship
eccu student scholarship

An education is a major foundation of any person’s professional and personal growth. At EC-Council University, we not only recognize and help many students gain access to a chance at holding a scholarship, but also have many scholarship opportunities for our students, conducted through the years.

Scholarship Opportunities

Transfer of Credits

transfer of credits

Click here to read more about EC-Council University Transfer of Credits program

masters in cybersecurity
Without a second thought, I chose EC-Council University (ECCU) as it is among the most renowned cybersecurity-focused universities across the globe.

— Youssef Elmalty, Global Cybersecurity Architect, IBM

ec-council university

Course Description

ECCU 505 Introduction to Research and Writing for the IT Practitioner

Three Credit Hours

This foundational core course introduces students to basic English writing skills and research methods also including: APA style writing, citing sources, determining when a website is credible, effective communication, outlines, and collaboration. Students will write/present portions of the above in the course in various formats.

MGMT 502 Business Essentials

Three Credit Hours

This course will lay a broad foundation of understanding the processes of business principles globally and for a varied population of students who work in businesses of all kinds including the IT and IA fields. It covers the latest changes in Information Technology for Business, including computer-aided manufacturing (CAM), applications software, and recent ethical issues arising from IT. Real-life business examples are added throughout the course that reinforces the business principles.

Book Requirements:

    • Ebert, R., Griffin, R. Business Essentials. 9th ed. Pearson. 2013. ISBN: 13: 978-0-13-266402-8 (pbk)

ECCU 504 Foundations of Organizational Behavior for the IT Practitioner

Three Credit Hours

This foundation course deals with organizational behavior and allows the technology practitioner to experience the basic facets of organizational theory and define the skills required to understand and apply the theory to a real organizational setting. Elements of the course are organizational structure, effec tive communication, team building, ethics and project management as seen through the organizational lens.

Book Requirements:

  • Glen, Paul. Leading Geeks: How to Manage and Lead People Who Deliver Technology. Jossey Bass. c2003. ISBN: 0-7879-6148-5.
  • Robbins, Stephen P. & DeCenzo, David A. Supervision Today, 5th ed. Prentice Hall. c2007. ISBN: 0-13-172609-9



Learn More

ECCU 516 The Hacker Mind: Profiling the IT Criminal

Three Credit Hours

Cyber space has increased human communication, connectivity, creativity, capacity and crime by leaps and bounds in the last decade. For all of the positive aspects it offers, it offers as many negative aspects. Those negative aspects are explored and developed by everyone from the high school challenge hacker to the international terrorist. Businesses, governmental agencies, militaries, and organizations of every kind are threatened by the IT criminal. This course will survey the spectrum of psychological attributes which may make up the profile of the IT criminal.

Book Requirements:

  • Chiesa, Raoul & Ducci, Stefania. Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking. CRC Press. c2009. ISBN: 13: 978-1-4200-8693-5 (pbk)
  • Lacey, David. Managing the Human Factor in Information Security: How to Win Over Staff and Influence Business Managers. John Wiley & Sons. c2009. ISBN: 978-0-470-72199-5 (pbk)



Learn More

ECCU 514 Quantum Leadership

Three Credit Hours

This course encompasses an extensive research project about cross-cultural differences in leadership conducted by a group of researchers in 62 countries. It lays a foundation of understanding the process of leadership. The study describes the roles, functions and impact of global leadership concepts. The speed at which leadership must work is provided by many team exercises. Research and views into how most cultures respond to this area of management are provided.

Book Requirements:

  • Nahavandi, Afsaneh. The Art and Science of Leadership, 5th ed. Pearson/Prentice Hall. c2009. ISBN: 13: 978-0-13-604408-6

ECCU 500 Managing Secure Network Systems

Three Credit Hours

This course focuses on evaluating network and Internet security issues, designing, implementing successful security policies and firewall strategies, exposing system and network vulnerabilities and defending against them. Topics include network protocols, network attacks, intrusion detection systems, packet filtering and proxy servers, Bastion host and honey pots, hardening routers, hardening security, email security, virtual private networks and creating fault tolerance.


Learn More

ECCU 507 Linux Networking and Security

Three Credit Hours

This course focuses on configuring a secure Linux network using command line and graphical utilities. Emphasis is placed on file sharing technologies such as the Network File System, NetWare’s NCP file sharing, and File Transfer Protocol. Additional topics include making data secure, user security, file security, and network intrusion detection. Students will be required to take on the role of problem solvers and apply the concepts presented to situations that might occur in a work environment.


Learn More

ECCU 501 Ethical Hacking & Countermeasures

Three Credit Hours

This course focuses on how perimeter defenses work, how intruders escalate privileges, and methods of securing systems. Additional topics include intrusion detection, policy creation, social engineering, DoS attacks, buffer overflows, and virus creation.


Learn More

ECCU 503 Security Analysis and Vulnerability Assessment

Three Credit Hours

This course focuses on testing methods and techniques to effectively identify and mitigate risks to the security of a company’s infrastructure. Topics include penetration testing methodologies, test planning and scheduling, information gathering, password cracking penetration testing and security analysis, social engineering penetration testing and security analysis, internal and external penetration testing and security analysis, router penetration testing and security analysis, and reporting and documentation.


Learn More

ECCU 506 Conducting Penetration and Security Tests

Three Credit Hours

This course focuses on mastery of the international standard for penetration testing. Topics include customers and legal agreements, penetration testing planning and scheduling, information gathering, external and internal network penetration testing, router penetration testing, firewalls penetration testing, intrusion detection system penetration testing, wireless networks penetration testing; password cracking penetration testing, social engineering penetration testing, PDA and cell phone penetration testing, and penetration testing report and documentation writing.


Learn More

ECCU 509 Securing Wireless Networks

Three Credit Hours

This course focuses on the various methods of securing wireless networks including authentication, authorization, and encryption. Topics include radio frequency communications, infrared, Bluetooth, low-speed wireless local area networks, high-speed WLANs and WLAN Security, digital cellular telephone, fixed wireless, and wireless communications in business.


Learn More

ECCU 520: Advanced Network Defense

Three Credit Hours

This course focuses on the fundamental areas of fortifying your defenses by discovering methods of developing a secure baseline and how to harden your enterprise architecture from the most advanced attacks. It provides segmentation and isolation to reduce the effectiveness of the advanced persistent threats.

ECCU 518: Designing and Implementing Cloud Security

Three Credit Hours

This course focuses provides comprehensive knowledge of cloud services, their characteristics, benefits, applications, and service models. It covers planning, designing, and implementing cloud security controls. It delves into various cloud standards, countermeasures, and best practices to secure information in the cloud. The program also emphasizes the business aspects of cloud security such as cloud uptime, uptime guarantee, availability, fault tolerance, failover policy, and how cloud security strengthens the business case for cloud adoption.

ECCU 510 Secure Programming

Three Credit Hours

This course provides the essential and fundamental skills for secure programming. The most prevalent reason behind buggy code and vulnerabilities being exploited by hackers and malicious code is the lack of adoption of secure coding practices. This program will ensure that students are exposed to the inherent security drawbacks in various programming languages or architectures. They will be exposed to exercise secure programming practices to overcome these inherent drawbacks to preempt bugs from the code.


Learn More

ECCU 502 Investigating Network Intrusions and Computer Forensics

Three Credit Hours

This course focuses on cyber-attack prevention, planning, detection, and incident response with the goals of counteracting cyber crime, cyber terrorism, and cyber predators, and making them accountable. Additional topics include fundamentals of computer forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anonymity, computer security policies and guidelines, and case studies.


Book Requirements:

  • Britz, M. (2013). Computer Forensics and Cyber Crime: An Introduction. 3rd ed. Prentice Hall. 978-0132677717
  • Luttgens, J., Pope, M., and Mandia, K (2014). Incident Response, 3rd ed. McGraw-Hill. ISBN: 978-007198686



Learn More

ECCU 521: Advanced Mobile Forensics and Security

Three Credit Hours

This course focuses on the intricacies of manual acquisition (physical vs. logical) and advanced analysis using reverse engineering to understand how popular Mobile OSs are hardened to defend against common attacks and exploits. Topics include: mobile forensic challenges and process, mobile hardware design and architectures, OS architecture, boot process, and file systems, threats and security, evidence acquisition and analysis, application reverse engineering, and mobile forensics reporting and expert testimony.

ECCU 517 Cyber Law

Three Credit Hours

This course focuses on the legal issues affected by on-line criminal conduct and electronic evidence and the legal ramifications of neglecting trademarks, copyrights, patents, and digital rights. Topics include: laws, regulations, and international standards; privacy laws governing law enforcement investigations in cyberspace; implications of cybercrimes upon the traditional notions of sovereignty; and current events that affect cyber laws. Prerequisite ECCU 505.

Learn More

ECCU 522: Incident Handling and Response

Three Credit Hours

This course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Additional emphasis is placed on computer forensics and its role in handling and responding to incidents. Through this course students will be proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, insider attack threats, incident response teams, incident management training methods, and incident recovery techniques in detail.

ECCU 513 Disaster Recovery

Three Credit Hours

This course focuses on disaster recovery principles including assessment of risks to an enterprise, development of disaster recovery policies and procedures, the roles and relationships of various members of an organization, preparation of a disaster recovery plan, testing and rehearsal of the plan, implementation of the plan, and recovering from a disaster. Additional emphasis is placed on identifying vulnerabilities and taking appropriate countermeasures to prevent information failure risks.

Learn More

ECCU 512 Beyond Business Continuity

Three Credit Hours

Whether an organization has experienced a disaster, downsizing, a shift in culture or a change in leadership; it will experience organizational change. This change demands remembering the past, finding ways to recover from it, engaging the future and energizing change. Leaders in change must have the skills to identify, structure, forecast, envision, design, plan, implement, account for and lead a team through change that has been strategically planned to advance the organization. Such a leader is a change agent and must understand the process, expectations, and nuances of change.

Book Requirements:

  • Andre, Rae. Organizational Behavior. Prentice Hall. c2008. ISBN: 13: 978-0-13-185495-6 (chapter 18 only from this book).
  • Bosworth, Seymour & Kabay, M.E. Computer Security Handbook, 4th Ed. Wiley C Pub. c2002. ISBN: 0-471-41258-9. (chapters 42 and 43 only)
  • Lacey, David. Managing the Human Factor in Information Security: How to Win Over Staff and Influence Business Managers. John Wiley & Sons. c2009. ISBN: 978-0-470-72199-5 (pbk) (chapter 5 only from this book)
  • Robbins, Stephen P. & DeCenzo, David A. Supervision Today, 5th ed. Prentice Hall. c2007. ISBN: 0-13-172609-9 (chapter 15 only from this book).


Learn More

ECCU 511 Global Business Leadership

Three Credit Hours

This course is designed to provide fundamental skills needed to understand global leadership concepts such as developing technological savvy, appreciating diversity, building partnerships, creating shared vision, maintaining a competitive advantage, integrity and leading for change. This is a study of current and historical leadership theories with emphasis on viewing the leadership function in the context of global organizational behavior and organizational designs.

Book Requirements:

  • Goldsmith, Marshall…[et. al.]. Global Leadership: The Next Generation. Pearson Education, Inc. c2003. ISBN: 0131402439


Learn More

ECCU 523 – Executive Information Security Management/ Executive Governance and Management

Three Credit Hours

This course is designed to bring together all the components required for a C-Level position by combining Governance, Security Risk Management, Controls, and Audit Management, Security Program Management and Operations, Information Security Core Concepts, Strategic Planning, Finance, and Vendor Management to lead a highly successful IS program.

ECCU 515 Project Management in IT Security

Three Credit Hours

This class is designed to provide students with the knowledge of how to manage IT security projects to enhance the success rate for both organizations and IT managers. It acts as an operational framework for users who design their own IT security project plan. The goal of PMITS is to help the students implement their IT project management skills by providing a road-map for implementing IT security in their organizations. It standardizes the knowledge base for business professionals by incorporating the best practices and legal standards related to corporate IT security.

Learn More
REQUEST INFO