Master of Science

in Cyber Security

About the Program

A set of core courses provides the necessary skills in Cyber Security, organizational structure and behavior, research, and writing. Areas of emphasis in management and Cyber Security allow students to choose courses that meet their individual goals, interests and career needs.

Program ObjectivesCourse StructureAdmission RequirementsMode of StudyAward

Program Objectives

Developed from a learning model based on Bloom’s Taxonomy, the Master of Security Science program educational objectives identify what students should learn, understand, and be able to do as a result of their studies with EC-Council University.

  • The application of technical strategies, tools and techniques to secure data and information for a client or customer.
  • The adherence to a high standard of ethical behavior.
  • The use of research in both established venues and innovative applications to expand the body of knowledge in cyber security.
  • The application of critical thinking to creatively and systematically solve the problems and meet the challenges of the ever-changing environments of cyber security.
  • The mastery of the skills necessary to move into leadership roles in companies, agencies, divisions and departments.

Course Structure

The courses are presented in 12-week terms and consist of assigned readings, threaded discussions, case studies, written analysis, research projects and examinations.

Students must be prepared to spend 10-12 hours in study a week to complete the work. ECCU encourages regular and frequent student-faculty interaction via internet. Syllabi and grading rubrics clearly set out the course requirements, expectations and timelines, and students are kept abreast of their progress in the course through the MyECCU Online Learning Management System.

Admission Requirements

Applicants for admission must have a bachelor’s degree from an accredited institution and a TOEFL score of 550 or better, or proof of English competency.

For more information about admission requirements, please visit our Admission page.

Mode of Study

The MSS program is offered 100% online, allowing students to complete course work in a time frame that fits each person’s individual schedule. This also requires that the student has the appropriate kinds of technology and connectivity to sustain constant participation in class activities.

Award

The Master of Security Science degree will be awarded by EC-Council University upon successful completion of all degree requirements.

Course Descriptions

Three Credit Hours

This course focuses on evaluating network and Internet security issues, designing, implementing successful security policies and firewall strategies, exposing system and network vulnerabilities and defending against them. Topics include network protocols, network attacks, intrusion detection systems, packet filtering and proxy servers, Bastion host and honey pots, hardening routers, hardening security, E-Mail security, virtual private networks and creating fault tolerance. CNSS 4011


Learn More

Three Credit Hours
This course will lay a broad foundation of understanding the processes of business principles globally and for a varied population of students who work in businesses of all kinds including the IT and IA fields.   It covers the latest changes in Information Technology for Business, including computer-aided manufacturing (CAM), applications software, and recent ethical issues arising from IT. Real-life business examples are added throughout the course that reinforces the business principles.

Book Requirements:

  • Ebert, R., Griffin, R. Business Essentials. 9th ed. Pearson. 2013. ISBN: 13: 978-0-13-266402-8 (pbk)

Three Credit Hours
This course focuses on how perimeter defenses work, how intruders escalate privileges, and methods of securing systems. Additional topics include intrusion detection, policy creation, social engineering, DoS attacks, buffer overflows, and virus creation. CNSS 4013A.


Learn More

Three Credit Hours
This course focuses on cyber-attack prevention, planning, detection, and incident response with the goals of counteracting cyber crime, cyber terrorism, and cyber predators, and making them accountable. Additional topics include fundamentals of computer forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anonymity, computer security policies and guidelines, and case studies. CNSS 4012.



Learn More

Three Credit Hours
This course focuses on testing methods and techniques to effectively identify and mitigate risks to the security of a company’s infrastructure. Topics include penetration testing methodologies, test planning and scheduling, information gathering, password cracking penetration testing and security analysis, social engineering penetration testing and security analysis, internal and external penetration testing and security analysis, router penetration testing and security analysis, and reporting and documentation. Prerequisite 501. CNSS 4014.


Learn More

Three Credit Hours
This foundation course deals with organizational behavior and allows the  technology practitioner to experience the basic facets of organizational theory and define the skills required to understand and apply the theory to a real  organizational setting. Elements of the course are organizational structure, effective communication, team building, ethics and project management as seen through the organizational lens.

Book Requirements:

  • Glen, Paul. Leading Geeks: How to Manage and Lead People Who Deliver Technology. Jossey Bass. c2003. ISBN: 0-7879-6148-5.
  • Robbins, Stephen P. & DeCenzo, David A. Supervision Today, 5th ed. Prentice Hall. c2007. ISBN: 0-13-172609-9


Learn More

Three Credit Hours
This foundational core course introduces students to basic English writing skills and research methods also including: APA style writing, citing sources, determining when a website is credible, effective communication, outlines, and collaboration. Students will write/present portions of the above in the course in various formats.


Learn More

Three Credit Hours
This course focuses on mastery of the international standard for penetration testing. Topics include customers and legal agreements, penetration testing planning and scheduling, information gathering, external and internal network penetration testing, router penetration testing, firewalls penetration testing, intrusion detection system penetration testing, wireless networks penetration testing; password cracking penetration testing, social engineering penetration testing, PDA and cell phone penetration testing, and penetration testing report and documentation writing. Prerequisite ECCU 503. CNSS 4015.


Learn More

Three Credit Hours
This course focuses on configuring a secure Linux network using command line and graphical utilities. Emphasis is placed on file sharing technologies such as the Network File System, NetWare’s NCP file sharing, and File Transfer Protocol. Additional topics include making data secure, user security, file security, and network intrusion detection. Students will be required to take on the role of problem solvers and apply the concepts presented to situations that might occur in a work environment. Prerequisite ECCU 500.


Learn More

Three Credit Hours
This course focuses on the various methods of securing wireless networks including authentication, authorization, and encryption. Topics include radio frequency communications, infrared, Bluetooth, low-speed wireless local area networks, high-speed WLANs and WLAN Security, digital cellular telephone, fixed wireless, and wireless communications in business.


Learn More

Three Credit Hours
This course provides the essential and fundamental skills for secure programming. The most prevalent reason behind buggy code and vulnerabilities being exploited by hackers and malicious code is the lack of adoption of secure coding practices. This program will ensure that students are exposed to the inherent security drawbacks in various programming languages or architectures. They will be exposed to exercise secure programming practices to overcome these inherent drawbacks in order to preempt bugs from the code.


Learn More

Three Credit Hours
This course is designed to provide fundamental skills needed to understand global leadership concepts such as developing technological savvy, appreciating diversity, building partnerships, creating shared vision, maintaining a competitive advantage, integrity and leading for change. This is a study of current and historical leadership theories with emphasis on viewing the leadership function in the context of global organizational behavior and organizational designs. Prerequisite ECCU 505.

Book Requirements:

  • Goldsmith, Marshall…[et. al.]. Global Leadership: The Next Generation. Pearson Education, Inc. c2003. ISBN: 0131402439


Learn More

Three Credit Hours
Whether an organization has experienced a disaster, downsizing, a shift in culture or a change in leadership; it will experience organizational change. This change demands remembering the past, finding ways to recover from it, engaging the future and energizing change. Leaders in change must have the skills to identify, structure, forecast, envision, design, plan, implement, account for and lead a team through change that has been strategically planned to advance the organization. Such a leader is a change agent and must understand the process, expectations, and nuances of change. Prerequisite: ECCU 505

Book Requirements:

  • Andre, Rae. Organizational Behavior. Prentice Hall. c2008. ISBN: 13: 978-0-13-185495-6 (chapter 18 only from this book).
  • Bosworth, Seymour & Kabay, M.E. Computer Security Handbook, 4th Ed. Wiley C Pub. c2002. ISBN: 0-471-41258-9. (chapters 42 and 43 only)
  • Lacey, David. Managing the Human Factor in Information Security: How to Win Over Staff and Influence Business Managers. John Wiley & Sons. c2009. ISBN: 978-0-470-72199-5 (pbk) (chapter 5 only from this book)
  • Robbins, Stephen P. & DeCenzo, David A. Supervision Today, 5th ed. Prentice Hall. c2007. ISBN: 0-13-172609-9 (chapter 15 only from this book).


Learn More

Three Credit Hours
This course focuses on disaster recovery principles including assessment of risks to an enterprise, development of disaster recovery policies and procedures, the roles and relationships of various members of an organization, preparation of a disaster recovery plan, testing and rehearsal of the plan, implementation of the plan, and recovering from a disaster. Additional emphasis is placed on identifying vulnerabilities and taking appropriate countermeasures to prevent information failure risks. CNSS 4016.


Learn More

Three Credit Hours
This course encompasses an extensive research project about cross-cultural differences in leadership conducted by a group of researchers in 62 countries. It lays a foundation of understanding the process of leadership. The study describes the roles, functions and impact of global leadership concepts. The speed at which leadership must work is provided by many team exercises. Research and views into how most cultures respond to this area of management are provided. Prerequisite: ECCU 505

Book Requirements:

  • Nahavandi, Afsaneh. The Art and Science of Leadership, 5th ed. Pearson/Prentice Hall. c2009. ISBN: 13: 978-0-13-604408-6

Three Credit Hours
This class is designed to provide students with the knowledge of how to manage IT security projects in order to enhance the success rate for both organizations and IT managers. It acts as an operational framework for users who design their own IT security project plan. The goal of PMITS is to help the students implement their IT project management skills by providing a road-map for implementing IT security in their organizations. It standardizes the knowledge base for business professionals by incorporating the best practices and legal standards related to corporate IT security.


Learn More

Three Credit Hours
Cyber space has increased human communication, connectivity, creativity, capacity and crime by leaps and bounds in the last decade. For all of the positive aspects it offers, it offers as many negative aspects. Those negative aspects are explored and developed by everyone from the high school challenge hacker to the international terrorist. Businesses, governmental agencies, militaries, and organizations of every kind are threatened by the IT criminal. This course will survey the spectrum of psychological attributes which may make up the profile of the IT criminal. Prerequisite: ECCU 505

Book Requirements:

  • Chiesa, Raoul & Ducci, Stefania. Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking. CRC Press. c2009. ISBN: 13: 978-1-4200-8693-5 (pbk)
  • Lacey, David. Managing the Human Factor in Information Security: How to Win Over Staff and Influence Business Managers. John Wiley & Sons. c2009. ISBN: 978-0-470-72199-5 (pbk)


Learn More

Three Credit Hours
This course focuses on the legal issues affected by on-line criminal conduct and electronic evidence and the legal ramifications of neglecting trademarks, copyrights, patents, and digital rights. Topics include: laws, regulations, and international standards; privacy laws governing law enforcement investigations in cyberspace; implications of cyber crimes upon the traditional notions of sovereignty; and current events that affect cyber laws. Prerequisite ECCU 505.


Learn More

Three Credit Hours
Special topics courses will be offered from time to time to pilot a course or to respond to a particular trend in information assurance. These courses will be considered as electives. Prerequisites ECCU 500 and 505.


Learn More

Three Credit Hours
The Capstone is the summative experience designed to allow students to demonstrate all program objectives and draw on the knowledge and skills learned throughout the entire program. Students can enroll in the Capstone after of successful completion of all core degree requirements; must be within 6 credit hours of graduation and the attainment of a 3.0 cumulative grade point average.

World Class Practitioners, World Class Challenges, World Class Education

The Master of Security Science (MSS) Program prepares Information Technology professionals to assume cyber security and assurance leadership roles in corporations, agencies and organizations. A curriculum rich in computer security management, IT security threat assessment, incident response, organizational management and behavior, and leadership, challenges students to become creators of knowledge, inventors of processes and leaders of others.

The program is designed by the faculty at EC-Council University, all of whom are real life cyber security practitioner for both newcomers to the field seeking advanced knowledge and seasoned professionals interested in either specialization or career advancement. Thirty-six credit hours are required for graduation.

Why Pursue the Masters of Security Science?

World Class Education:

You will gain world-class education, which will help you prepare for a leadership career in cyber security. ECCU has a very strict policy of hiring faculty who have real world experience and these leaders will help mold you as a capable leader in this field. The MSS program as it stands today is the result of over 200 years of combined experience and tenacious work of various cyber security leaders and practitioners, all of whom are part of the faculty. Because each course is being taught by active professionals in the field they are instructions, they bring tremendous value added to the course with their real life experience in the field.  This gives the active students glimpse into the life and responsibilities they will face when they move into those professional positions themselves.

Network with the Best:

You will gain by networking with the best. Many students come from a variety of backgrounds, ranging from new graduates through to senior security managers in Fortune 500 companies, all of who are seeking a formal qualification to prove their calibre in the space of Cyber Security.

EC-Council Brand Heritage:

You will benefit immensely from ECCU’s parentage – the EC-Council Group, a world leader in cyber security education, certification, services, events and training. You will receive commercially relevant and up to date degree program, which will help launch you in this field. EC-Council has certified more than 140, 000 Infosec professionals in 100 countries from world class organizations like FBI, US Dept. of Defense (Pentagon) and Fortune 500 companies like Microsoft, PWC, IBM, Symantec, etc.

Career progression:

The MSS program helps you prove to your leadership that you are ready for the next step in your career. Attaining an accredited postgraduate degree from one of the finest brand names in the industry for cyber security.

Certification:

The ECCU courses map to many of the EC-Council certifications which are required by many Fortune 500 companies. By attaining the MSS, you will be poised to be challenge these certifications without additional training.

American Degree, Local Fees:

Attain World class American degree program at fees structures that are affordable to you based on your geographic region.

Online & Flexible:

The program is completely online. As such, you can complete this program from the comfort of your own home or country. The ECCU MSS is 100% online allowing students to do course work according to their work and personal schedules. Additionally, ECCU has two distinct advantages over traditional Brick and Mortar universities. Firstly, our faculty are actively practicing their profession in the field, they can make the class come alive for the students, as well as serve as mentors for the students with new, real life examples on our Cyber Range.  The second advantage, and perhaps most important, is that you will be getting hands on education and use tools and technology that you will be using in the field.  This helps you hit the ground running and will help you become functional for any employer from day one of their employment!

2 in 1:

Great Leaders have diverse skills. This is even more true in the field of cyber security. With MSCS, you will combine the acquisition of both your technical and management skills at the same time.

Prestige:

EC-Council University Core courseware maps to Department of Homeland Security/ National Security Agency’s US Committee on National Security Standards (CNSS).

Accredited:

EC-Council University is accredited by the Distance Education Accrediting Commission (DEAC).  The Distance Education Accrediting Commission is listed by the U.S. Department of Education as a nationally recognized accrediting agency and is a recognized member of the Council for Higher Education Accreditation (CHEA).

Excellent support:

The ECCU Student services team is always ready to assist you with any of academic needs.