ec-council university

Term begins on

Sept 30, 2024

Application Deadline

Sept 15, 2024

Mode of Learning

Online

Eligibility

For Bachelors: Undergraduate
For Masters: Graduate

EC-Council Certifications

Included at no extra cost.

About EC-Council University

EC-Council University is dedicated to creating superior educational programs that equip graduates to face the latest IT security risks and lead their colleagues in strategically handling those challenges. EC-Council University builds on the recognition and strengths of its parent corporation, The International Council of Electronic Commerce Consultants (also known as EC-Council), a globally recognized IT certification body specializing in Information Assurance and e-business.

How Can an Online Master’s or Bachelor’s Degree in Cybersecurity from EC-Council University Elevate your Career?

93%

Employment Rate

EC-Council University graduates are in high demand, with nearly all securing employment after graduation.

90.9%

Satisfaction Rate

Our graduates are highly satisfied with their studies, with over 90% indicating a positive experience.

82%

Career Advancement Rate

Our graduates frequently report career advancement, with 82% of students crediting their education to enhance their professional opportunities.

80%

Practical & Theoretical Training

EC-Council University equips you with a solid theoretical and practical application foundation, ensuring you’re ready for real-world challenges.

*Source: EC-Council University internal Data.

Cybersecurity Courses

Master’s & Bachelor’s Degree

Overview

​The Bachelor of Science in Cyber Security is a degree completion program that helps students obtain the knowledge needed for careers in cyber security. The cyber security bachelor’s degree covers topical areas that deal with cyber security management, incident response, and security threat assessment, which requires students to be creators of knowledge and inventors of processes, not merely users of information. With this online cyber security bachelor’s degree, students will receive instruction in leadership and management to help them prepare to assume managerial and executive positions in the industry.

Note: A degree completion program is an academic program specifically designed to give students who have started but not finished, a two-year undergraduate degree the opportunity to complete and earn their Bachelor’s in Cyber Security Online. Most degree completion programs will allow students to transfer some, or all their credits previously earned from other programs and/or institutions. These programs provide students a cost-effective and timely option to complete and earn their Bachelor’s degree without having to start a new program from the beginning.

Program Outline

It provides a comprehensive overview of the essential concepts readers must know as they pursue careers in cybersecurity systems. Part one opens with a discussion of the new cybersecurity risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. Part Two is adapted for the official (ISC)2 SSCP Certified Body of Knowledge and presents a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. The text closes with a resource for readers who desire additional material on cybersecurity standards, education, professional certifications, and compliance laws.

Legal Issues in Cybersecurity addresses the area where law and cybersecurity concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous cybersecurity and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and meet the expectations of employees and customers.

C|TIA is a method-driven course that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.
The Purpose of C|TIA is: To enable individuals and organizations with the ability to prepare and run a threat intelligence program that allows ‘evidence- based knowledge’ and provides ‘actionable advice’ about ‘existing and unknown threats.’ To ensure that organizations have predictive capabilities rather than just proactive measures beyond active defense mechanism; to empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program; to differentiate threat intelligence professionals from other information security professionals. For individuals: To provide an invaluable ability to structured threat intelligence to enhance skills and boost their employability.

This course provides an overview of security administration and fundamentals of designing security architectures. Topics include networking technologies, TCP/IP concepts, protocols, network traffic analysis, monitoring, and security best practices. Upon completion, students should be able to identify normal network traffic using network analysis tools and design basic security defenses.

This course will help the student to acquire trending and in demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. It covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the student will learn to manage various SOC processes and collaborate with CSIRT at the time of need.

Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. Revised and updated with the latest data from this fast-paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It provides a student and professional resource that details how to put access control systems to work, as well as testing and managing them.

This course focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system. The majority of individuals, students, educators, business organizations and governments use Microsoft Windows, which has experienced frequent attacks against its well- publicized vulnerabilities. Particular emphasis is placed on Windows XP, Vista, and seven on the desktop, and Windows Server 2003 and 2008 versions. It high- lights how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style and step-by step examples, this must-have resource will ensure its readers are educated on the latest Windows security.

Linux addresses the fundamentals of the Linux operating system. This course include system architecture and history, system installation and configuration, the command line interface and shell commands, basic system administration, system updates, file systems, access controls, network services configuration, printer configuration, system services, security models, and scripting.
Major Instructional Areas:

  • Linux operating system architecture, use cases, and general background
  • Linux system installation and configuration
  • The command line interface and shell commands
  • Basic system administration and system updates
  • Network services and printer configuration
  • Linux system services and security
  • Editing files and scripting
  • User accounts, user groups, user ownerships, and user permissions (access controls)
  • Linux cloud and virtualization

Provide a unique, in-depth look at the significant business challenges and cybersecurity threats that are introduced when an organization’s network is connected to the public Internet. Written by an industry expert, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. This book incorporates hands-on activities, using examples and exercises from the field to prepare the reader to disarm threats and prepare for emerging technologies and future attacks. Upon successful completion of this course, students may take the Certified Network Defender (CND) certification exam through EC-Council. If students wish additional information to assist them in preparing for the certification exam, they may purchase an iLab at an additional cost of $50.00.

It begins with an examination of the landscape, key terms, and concepts that a cybersecurity professional needs to know about hackers and cyber computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, the Second Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them. Upon successful completion of this course, students may take the Certified Ethical Hacker (CEH) certification exam through EC-Council.

Provides an in-depth look at how to secure mobile users as customer- facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by an industry expert, the book explores the evolutionary changes that have occurred in data processing and computing, personal and business communications, and social interactions and networking on the Internet. It goes on to review all the cybersecurity risks, threats, and vulnerabilities associated with Web- enabled applications accessible via the Internet. Using examples and exercises, the Second Edition incorporates hands on activities to prepare readers to secure web-enabled applications successfully.

This class is designed to provide the participants with the necessary skills to perform an effective digital forensics investigation. The course presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators. Upon successful completion of this course, students may take the Computer Hacking Forensic Investigator (CHFI) certification exam through ECCouncil.

This course explores the cyberwarfare landscape, offensive and defensive cyber warfare techniques, and the future of cyber warfare. It also addresses military doctrine and strategies, intelligence operations, and cyberwarfarerelated laws and ethics. Students will be exposed to many cybersecurity technologies, processes, and procedures that help to protect endpoints, networks, and data. They will also learn how to identify and analyze threat and vulnerabilities and create appropriate mitigation strategies.

This course explores the evolution of wired networks to wireless networking and its impact on the corporate world. The world of wireless and mobile devices is evolving day-to-day, with many individuals relying solely on their wireless devices in the workplace and the home. The growing use of mobile devices demands that organizations become more educated in securing this growing technology and determining how to protect their assets best-using case studies and real-world events, it goes on to discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. The text closes with a look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.

This course is an introduction to object-oriented design and data structures using the popular Python programming language. The level of instruction assumes at least one term/semester of programming in an object-oriented language such as Java, C++, or Python. Through the step-by-step instruction and exercises in this book, you’ll cover such topics as the design of collection classes with polymorphism and inheritance, multiple implementations of collection interfaces, and the analysis of space/time tradeoffs of different collection implementations (specifically array-based implementations and link-based implementations). Collections covered include sets, lists, stacks, queues, trees, dictionaries, and graphs.

This course serves as a comprehensive assessment of knowledge and skills in information systems and cybersecurity. Activities include research into selected security problems and planning, designing, and implementing security solutions for a user organization.

This course is designed to prepare you in the basics of research and writing. You will begin with learning the fundamentals of writing: how to tell if a website is credible/trustworthy, tips and strategies, critiquing, preparing for a research paper, designing an outline, developing a thesis statement, writing a conclusion, and referencing your work. What you learn in this course will help you succeed in courses following this, including your final capstone project.

Introductory Statistics will familiarize students with a broad base of concepts in probability and statistical methods. Students will learn how to collect, analyze, and interpret numerical data and descriptive statistics, create basic probability models, and use statistical inference. This course stresses a wide variety of relevant applications, and students will understand how to interpret and critically analyze research data and apply statistical reasoning and interpretation.

Why do individuals behave in a certain manner? How do relationships, people, and society influence such behaviors? The The purpose of this course is to introduce you to the field of social psychology, but more specifically, to understand how others influence our behaviors. This course will provide a general overview of human behavior in a social matrix. The the course will explore topics and concepts such as social psychology research, the self, prejudice and discrimination, attraction, relationships, aggression, socialization, and conformity.

What is the right thing to do? What is the ETHICAL thing to do? This course will introduce the principles of ethics (moral philosophy) through a variety of topics and dilemmas. We will examine the ideas of goodness, badness, wrongness, and rightness. We will learn about the ethical theories of philosophers and apply the knowledge to current events to better understand morality, obligation, human rights, and human nature.

Economics is the study of how a society manages its resources. In most societies, resources are allocated through the combined choices of their members. Economists study how people make the decisions, how they work, what they buy, how much they save, and how they invest those savings. Economists also study how people interact with one another. Finally, economists analyze forces and trends that affect the economy, including the growth of income, the fraction of the population who cannot work, and the rate at which prices are rising or falling. This course covers these concepts and more.

Gain a strong understanding of IT project management as you learn to apply today’s most-effective project management tools and techniques. The course emphasizes the latest developments and skills to help you prepare for the Project Management Professional (PMP) or Certified Associate in Project Management (CAPM) exams. While the PMBOK® Guide discusses, the course goes well beyond the Guide to provide a meaningful context for project management.

Five Industry Certifications Included in the Program!

ECCU’s cyber security bachelor’s degree has the unique ability to allow students to join our program and walk away with a Cyber Security Bachelor degree and up to Five EC-Council industry-recognized certifications

Bachelor
Degree Courses
Industry
Certifications Included
CIS 403
Network Security,
Firewalls, and VPNs
Certified Network Defender
CIS 404
Hacker Techniques, Tools,
and Incident Handling
Certified Ethical Hacker
CIS 406
System Forensics,
Investigation, and Response
Computer Hacking Forensic Investigator
CIS 302
Managing Risk in
Information Systems
Certified Threat Intelligence Analyst
CIS 304
Auditing IT
Infrastructures for Compliance
Certified SOC Analyst

Cyber Security roles you may be eligible for after completing an undergraduate degree

Earning a bachelor’s degree in cybersecurity online will give you the opportunity to learn various methods used to protect data and information systems through skills like network security, ethical hacking, and cyber forensics that will help you achieve various job roles in the cybersecurity industry.

Get Hired for Jobs like:

  • Security Analyst
  • Security Architect
  • Security Engineer
  • Security Consultant
  • Security Systems Administrator
  • Network Security Engineer/ Analyst
  • Risk/ Vulnerability Analyst
  • Computer Forensic Analyst
  • Computer Network Defender
  • Computer Network Defense Analyst
  • Web Application Security Engineer
  • Forensic Analyst
  • Digital Forensic Examiner

Tuition Fees

One Course fee: $1,395 Additional Costs
Number of Courses: 20 Technology Fee: USD 50
per term
Total Tution Fee* $27,900 iLAB Fee: USD 50
whenever needed

What’s Included

  •  Books & Instructional Material
  •  Grammarly, a tool to Write Proficiently
  •  Weekly Live Online Classes
  •  Five Certification Exam Vouchers

The ECCU Governing Board has defined the regions. Student tuition rates are based on their official government photo ID that was submitted with the student admission application to determine the student’s region.

Overview

ECCU’s Master of Science in Cyber Security (MSCS) program prepares professionals to assume cybersecurity and information assurance leadership roles in corporations, agencies, and organizations. A curriculum rich in computer security management, IT security threat assessment, incident response, organizational management and behavior, and leadership challenges students to become creators of knowledge and inventors of processes.

ECCU’s online master’s in cybersecurity has been divided into a set of core courses that provide the necessary skills in cybersecurity, organizational behavior, and structure, research, and writing. The cyber security master’s degree then offers various specializations to allow students to select specific fields of study that they are passionate about, each having well-defined job prospects, derived from the NICE framework, affiliated with them.

ECCU’s cyber security master’s degree is offered 100% online, allowing students to complete coursework in a timeframe that fits their schedule. This also requires that the student has the appropriate technology and connectivity to sustain constant participation in class activities.

Program Outline

(3 Credits)
This foundational core course introduces students to basic English writing skills and research methods, including APA style writing, citing sources, determining when a website is credible, effective communication, outlines, and collaboration. Students will write/present portions of the above in the course in various formats.

(3 Credits)
This course will lay a broad foundation of understanding for global business principles for a varied population of students who work in businesses of all kinds, including the IT and IA fields. It covers the latest changes in Information Technology for Business, including computer-aided manufacturing (CAM), application software, and recent ethical issues arising from IT. Real-life business examples are added throughout the course that reinforce the business principles.

(3 Credits)
This foundational course deals with organizational behavior and allows the technology practitioner to experience the basic facets of organizational theory and define the skills required to understand and apply the theory to a real organizational setting. Elements of the course are organizational structure, effective communication, team building, ethics, and project management as seen through the organizational lens.

(3 Credits)
Cyberspace has increased human communication, connectivity, creativity, capacity and crime by leaps and bounds in the last decade. For all of the positive aspects it offers, it offers as many negative aspects. Those negative aspects are explored and developed by everyone from the high school challenge hacker to international terrorists. The IT criminal threatens businesses, governmental agencies, militaries, and organizations of every kind. This course will survey the spectrum of psychological attributes of the IT criminal.

(3 Credits)
This course encompasses an extensive research project about cross-cultural differences in leadership conducted by a group of researchers in 62 countries. It lays a foundation for understanding the process of leadership. The study describes the roles, functions, and impact of global leadership concepts. Many team exercises provide the speed at which leaders must work. Research and views into how most cultures respond to this area of management are provided.

(3 Credits)
This course focuses on evaluating network and Internet security issues, designing and implementing successful security policies and firewall strategies, and exposing the system and network vulnerabilities and defending against them. Topics include network protocols, network attacks, intrusion detection systems, packet filtering and proxy servers, Bastion hosts and honey pots, hardening routers, hardening security, email security, virtual private networks, and creating fault tolerance.

(3 Credits)
This course explores the various tools and techniques commonly used by Linux system administrators. It is designed for students who have limited or no previous exposure to Linus. Emphasis is placed on writing a simple bash script, using a text editor, manage processes within the Linux file system. Additional topics include making data secure, user security, and file security. Students will be required to take on the role of problem solvers and apply the concepts presented to situations that might occur in a work environment.

(3 Credits)
This course focuses on how perimeter defenses work, how intruders escalate privileges, and methods of securing systems. Additional topics include intrusion detection, policy creation, social engineering, DoS attacks, buffer overflows, and virus creation.

(3 Credits)
This course focuses on how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. Topics include Introduction to Penetration Testing and Methodologies, Penetration Testing Scoping and Engagement, Open-Source Intelligence (OSINT), Social Engineering Penetration Testing, External Network Penetration Testing, Internal Network Penetration Testing, and Network Penetration Testing for Perimeter Devices.

(3 Credits)
This course focuses on the mastery of the advanced penetration testing skills that real world practitioners face on the job. Topics include Web Application Penetration Testing, Wireless Penetration Testing, IoT Penetration Testing, OT and SCADA Penetration Testing, Cloud Penetration Testing, Binary Analysis and Exploitation, and Report Writing and Post Testing Actions. Upon successful completion of the course, students may take the Certified Penetration Testing Professional (CPENT) exam through EC-Council.

(3 Credits)
This course focuses on the various methods of securing wireless networks including authentication, authorization, and encryption. Topics include radio frequency communications, infrared, Bluetooth, low-speed wireless local area networks, high-speed WLANs and WLAN security, digital cellular telephone, fixed wireless, and wireless communications in business.

(3 Credits)
The Capstone is the summative experience designed to allow students to demonstrate all program objectives and draw on the knowledge and skills learned throughout the entire program. Students can enroll in the Capstone after successful completion of all core degree requirements, but must be within six credit hours of graduation. Students must demonstrate attainment of a 3.0 cumulative grade point average and have the Registrar approval to register in this class.

(3 Credits)
This course focuses on the fundamental areas of fortifying your defenses by discovering methods of developing a secure baseline and how to harden your enterprise architecture from the most advanced attacks. It provides segmentation and isolation to reduce the effectiveness of advanced persistent threats.

(3 Credits)
The sole purpose of this course is to reduce operating costs and increase efficiency by getting rid of on-premise servers; however, poor cloud security practices defeats this purpose as your environment might be open to attacks like ransomware, denial of service, data breach, and other activities that might cause irreversible damage to your company revenue and reputation or even completely shut down the business. This course will guide you on how to best manage the risk in your cloud environment with good overall security practices ranging from user accounts, data, and network. We will also focus on the largest cloud computing providers.

(3 Credits)
Certified Application Security Engineer (CASE) is a hands-on, Instructor-led, comprehensive application security course, which encompasses security activities involved in all of the phases of the Software Development Lifecycle (SDLC). The course also focuses on selecting and implementing the right security strategies, guidelines, and practices that are widely accepted and applicable to most environments used today.

(3 Credits)
This course focuses on cyber-attack prevention, planning, detection, and incident response with the goals of counteracting cybercrime, cyber terrorism, and cyber predators, and making them accountable. Additional topics include fundamentals of computer forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anonymity, computer security policies and guidelines, and case studies.

(3 Credits)
This course focuses on the intricacies of manual acquisition (physical vs. logical) and advanced analysis using reverse engineering to understand how popular Mobile OSs are hardened to defend against common attacks and exploits. Topics include mobile forensic challenges and process, mobile hardware design and architectures, OS architecture, boot process, file systems, threats and security, evidence acquisition and analysis, application reverse engineering, and mobile forensics reporting and expert testimony.

(3 Credits)
This course focuses on the legal issues affected by online criminal conduct, electronic evidence and the legal ramifications of neglecting trademarks, copyrights, patents, and digital rights. Topics include laws, regulations, and international standards; privacy laws governing law enforcement investigations in cyberspace; implications of cybercrimes upon the traditional notions of sovereignty; and current events that affect cyber laws. Prerequisite ECCU 505.

(3 Credits)
This course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Additional emphasis is placed on computer forensics and its role in handling and responding to incidents. Through this course, students will be proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, insider attack threats, incident response teams, incident management training methods, and incident recovery techniques in detail.

(3 Credits)
This course focuses on disaster recovery principles including assessment of risks to an enterprise, development of disaster recovery policies and procedures, the roles and relationships of various members of an organization, preparation of a disaster recovery plan, testing and rehearsal of the plan, implementation of the plan, and recovering from a disaster. Additional emphasis is placed on identifying vulnerabilities and taking appropriate countermeasures to prevent information failure risks.

(3 Credits)
Whether an organization has experienced a disaster, downsizing, a shift in culture, or a change in leadership, it will experience organizational change. This change demands remembering the past, finding ways to recover from it, engaging the future, and energizing change. Leaders in change must have the skills to identify, structure, forecast, envision, design, plan, implement, account for, and lead a team through change that has been strategically planned to advance the organization. Such a leader is a change agent and must understand the process, expectations, and nuances of change.

(3 Credits)
This course is designed to provide fundamental skills needed to understand global leadership concepts such as developing technological savvy, appreciating diversity, building partnerships, creating a shared vision, maintaining a competitive advantage, integrity, and leading for change. This is a study of current and historical leadership theories with an emphasis on viewing the leadership function in the context of global organizational behavior and organizational designs.

(3 Credits)
This course is designed to bring together all the components required for a C-Level position by combining Governance, Security Risk Management, Controls, and Audit Management, Security Program Management and Operations, Information Security Core Concepts, Strategic Planning, Finance, and Vendor Management to lead a highly successful IS program.

(3 Credits)
This course looks at project management from a cybersecurity planning perspective – specifically IT Project Management. Students will learn how to use the IT framework to develop an effective IT security project plan. This process will help reinforce IT project management skills while providing the student with a road map for implementing IT security in an organization.

Industry Certifications Included in the Cybersecurity Master's Degree Programs!

ECCU understands the modern students need to be industry-ready. Hence, all of EC Council’s relevant industry certifications have been included in the various specialisations. Earn up to 3 industry certifications for any specialisation selected.

Certifications Master’ Degree
Courses
ECCU
Student Price
Certified Network Defender ECCU 500
Managing Secure Network Systems
Inclusive
Certified Ethical hacker ECCU 501
Ethical Hacking and Countermeasures
Inclusive
Computer Hacking Forensic Investigator ECCU 502
Investigating Network Intrusions and Computer Forensics
Inclusive
CPENT ECCU 506
Conducting Penetration and Security Tests
ECCU 503
Security Analyst and Vulnerability Assessment
Inclusive

Exam Fee: $799

EC-Council Disaster Recovery Professional ECCU 513
Disaster Recovery
Inclusive
EC-Council Certified Incident Handler ECCU 522
Incident Handling and Response
Inclusive
EC-Council Information Security Manager ECCU 523
Executive Governance and Management*
Inclusive
Certified Chief Information Security Officer ECCU 523
Executive Governance and Management*
Exam Fee: $999

*Upon successful completion of this course, students will be provided with an opportunity to take the EC-Council Information Security Manager (EISM) certification exam.
Note: Students who are interested in taking the CCISO exam will need to purchase a voucher from the ECCU Bookstore; in order to take the CCISO exam, student must show at least 5 years of experience in three of the CCISO domains.

ECCU’s Cybersecurity Masters Degree Specializations

Security Analyst

The Information Security Analyst specialization of the Cyber security masters degree focuses on testing methods and techniques to effectively identify and mitigate risks to the security of a company’s infrastructure while providing application and network-based security vulnerability assessments, pen testing, and securing wireless networks including authentication, authorization, and encryption in accordance with industry-accepted methods and protocols.

By specializing as an IT security analyst, you will be given the opportunity to train in various domains through specialized online ethical hacking and penetration testing courses. The average cybersecurity analyst salary, according to PayScale, is $75,883.

Cloud Security Architect

The Cloud Security Architect specialization skills of the Cyber security masters degree are focused on planning, analyzing, designing, configuring, testing, implementing, maintaining, and supporting an organization’s on-premise and cloud security infrastructure.

The Cloud Security Architect’s responsibilities include training to harden enterprise architecture and cloud architecture from the most advanced attacks and secure programming practices to overcome these inherent drawbacks to pre-empt bugs from the code and designing and implementing cloud security. The average cloud security architect salary, according to PayScale, is $123,642.

Digital Forensics

The Digital Forensic specialization of ECCU’s Masters degree cyber security program focuses on demonstrating the required skill set of a Computer Forensic Investigator. Through this specialization, candidates who aspire to become digital forensics experts will learn the various aspects of digital forensics, including investigating network intrusions and mobile forensics. With a specialization in digital forensics, you may qualify as a Digital Forensic Investigator with the government at any level, as well as private industry––both on or leading an incident response team. The average digital forensics salary, according to PayScale, is $73,798.

Incident Management and Business Continuity

The Incident Management and Business Continuity specialization of ECCU’s Master’s degree cyber security program focuses on handling and responding to various security incidents, identifying vulnerabilities, and taking appropriate countermeasures to prevent information failure risks.

In this cybersecurity incident management and business continuity specialization of our master of science in cybersecurity program, you will be given the opportunity to train on incident handling, disaster recovery, business continuity, and much more.

Executive Leadership in Information Assurance

The Executive Leadership in Information Assurance specialization of the Master of Science in cybersecurity program focuses on providing the fundamental skills that are required to understand global leadership concepts, bringing together all the components required for a C-Level information security position, and providing students with the knowledge of how to manage IT security projects to enhance the success rate for both organizations and IT managers. This Executive Leadership program specialization mostly leads individuals to assume the position of CISO (and even CTO) at companies.

Executive Leadership training under information security master’s specialization includes global business leadership, executive governance and management, and project management in IT security.

Tuition Fees

One Course fee: $1,620 Additional Costs
Number of Courses: 12 Technology Fee: USD 50
per term
Total Tution Fee* $19,440 iLAB Fee: USD 50
whenever needed

What’s Included

  •  Books & Instructional Material
  •  Grammarly, a tool to Write Proficiently
  •  Weekly Live Online Classes
  •  Upto 4 Certification Exam Vouchers

The ECCU Governing Board has defined the regions. Student tuition rates are based on their official government photo ID that was submitted with the student admission application to determine the student’s region.

Course Essentials

Why Choose EC-Council University

Mode of Study
100% Online & Flexible

Holistic learning experience
Unique course structure

Transfer to ECCU College Transfer Credits

Learn from Acclaimed Faculty

Real World Experience EC-Council | iLabs

Up to 5 Certifications from EC-Council

Additional Benefits Library, Webinars, Exam Vouchers

Conversations with
Inspiring Mentors

Key Features of Cybersecurity Degree Programs

Program Features

EC-Council University paves the way for a successful career in cybersecurity and information assurance by offering programs that include:

  • null
    In-depth curriculum
  • null
    One-on-One Tutoring
  • null
    Weekly threaded discussions
  • null
    In-depth curriculum
  • null
    Self-paced independent study courses
  • null
    ECCU alumni status
  • null
    Up to 5 Industry recognized Certifications
  • null
    Online Quizzes/exams and Research Projects/papers

Count On Your Qualification

EC-Council University has been ranked among “The Top 10 Best Online Master’s in Cybersecurity” by Fortune®, underscoring our commitment to excellence, innovation, and ethical practices in cybersecurity education.

From Fortune. ©2024 Fortune Media IP Limited. All rights reserved. Used under license.

EC-Council University has been ranked in the “The Top 45 Online Master’s in Internet Security Degree Programs” by Intelligent.com, highlighting our high standards of quality postsecondary education.

The American Council on Education (ACE) is a membership organization that mobilizes the higher education community to shape effective public policy and foster innovative, high-quality practice. As the major coordinating body for the nation’s colleges and universities, our strength lies in our diverse membership of more than 1,700 colleges and universities, related associations, and other organizations in America and abroad.

A national advocate and institutional voice for promoting academic quality through accreditation, CHEA is an association of 3,000 degree-granting colleges and universities and recognizes approximately 60 institutional and programmatic accrediting organizations.

The State Authorization Reciprocity Agreement is a voluntary agreement among its member states and U.S. territories that establishes comparable national standards for interstate offering of postsecondary distance-education courses and programs. It is intended to make it easier for students to take online courses offered by postsecondary institutions based in another state.

EC-Council University is accredited by the Distance Education Accrediting Commission. The Distance Education Accrediting Commission is listed by the U.S. Department of Education as a recognized accrediting agency. The Distance Education Accrediting Commission is recognized by the Council for Higher Education Accreditation (CHEA).

Why Pursue a Career in Cybersecurity?

$78,603 to $113,190

is the average annual salary range for an entry-level cybersecurity job in the United States

(accourding to Salary.com)

3.5 Million

job vacancies in the world by 2025

(Source: https://drexel.edu/)

2.4x

faster growth in employer demand for cybersecurity professionals that the overall rate across the U.S. economy

(Source: www.prnewswire.com)

0%

Unemployment Rate

( Source: https://cybersn.com/)

Dedicated Customer Support

Testimonials

Here are a few of our alumni who found their dream job in Cyber Security

Count On Your Qualification

FAQs of Cyber security Degree Program

Q. What can I do with a master’s in cybersecurity?
+

Ans. A master’s in cybersecurity degree paves the way for a candidate to enter the industry as a professional and secure an executive-level position. EC-Council University’s Master of Science in Cyber Security degree has been designed to train candidates and transform them into professionals to assume leadership roles in corporations, agencies, and organizations. Job roles that one can aim for with a cybersecurity master’s degree – Risk/Vulnerability Analyst/Manager, Information Security Analyst, Information Security Manager/Specialist, Chief Information Security Officer, among others.

Q. How much can I make after pursuing a master’s in cybersecurity?
+

Ans. Cybersecurity is one of the most in-demand professions globally in 2024. Cybersecurity specialists are entrusted with safeguarding massive amounts of private and sensitive data. Consequently, employers are willing to offer competitive salaries to candidates with the right skill set. According to Talent.com, the average annual salary of a penetration tester in the United States 132,841#. Similarly, the average annual salary of a Cyber Security Engineer is $102,185*.
#Source: https://www.talent.com/salary?job=penetration+tester
*Source: https://www.payscale.com/research/US/Job=Cyber_Security_Engineer/Salary
Also Read – Top 5 Entry-Level Cyber Security Career Opportunities for Women

Q.What specializations can I get with an online master’s in cybersecurity?
+

Ans. ECCU offers five specializations under its online master’s in cybersecurity program. Aspirants who wish to pursue this degree can choose one from – MSCS in Security Analyst, MSCS in Cloud Security Architect, MSCS in Digital Forensics, MSCS in Incident Management, and Business Continuity and MSCS in Executive Leadership in Information Assurance.

Q. Is MS in cybersecurity worth it?
+

Ans. Cybersecurity is a continually growing industry. The rise in technological advancement and the parallel increase in the number of cyberattacks has made the need for cybersecurity specialists more vital. Getting an MS in cybersecurity can be worth it for candidates because of the growing demand for such professionals. With a master’s in cybersecurity online degree, candidates can fulfill the requirements of employers with the right skill set.

Q. Should I get myself a master’s in cyber security degree?
+

Ans.  You should definitely go for a master’s in cyber security degree if you aim to rise high in your cyber security career pertaining to either of these five specializations: Security Analyst, Cloud Security Architect, Digital Forensics, Management and Business Continuity, Executive Leadership in Information Assurance. Following are some of the narrower job roles that these specializations will lead you to:

  • Information Security Manager/Specialist
  • Information Security Auditor
  • Risk/Vulnerability Analyst/Manager
  • Information Security Analyst
  • Penetration Tester
  • Security Architect
  • Computer Network Defender
  • Cyber security Defense Analyst
  • Information Security (IS) Director
  • Information Assurance (IA) Program Manager
  • IT Project Manager
  • Application Security Engineer/Manager
  • Enterprise Architect
  • Security Architect
  • Research & Development Specialist
Q. Who all can apply for the master’s degree in Cyber Security (MSCS) program?
+

Ans.  Aspiring students who have met the following conditions are eligible to apply for the master’s degree in cyber security:

  • Have earned their bachelor’s degree or foreign equivalent from an appropriately accredited institution that is listed in the International Handbook of Universities, accredited by an agency recognized by the US Secretary of Education, and/or the Council for Higher Education Accreditation (CHEA).
  • Have a Proof of English proficiency (international Students only; see the section on English Requirement for International Students here https://www.eccu.edu/student-services/admission/)
Q. Is a master’s in cyber security better than certifications?
+

Ans.  The master’s in cyber security program at EC-Council University comes packaged with a string of industry-recognized certifications: Certified Network Defender (CND), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator (CHFI), Certified Penetration Testing Professional (CPENT), Certified Chief Information Security Officer (CCISO), EC-Council Disaster Recovery Professional, EC-Council Certified Incident Handler (ECIH), EC-Council Information Security Manager (EISM). The master’s degree, of course, has a broader coverage of topics and offers a deeper insight into the specialized areas. Aspirants may earn up to 4 industry certifications for any specialization selected.

Q. What is the program length and total number of credit hours for the MSCS program?
+

Ans.  The master’s degree in Cyber Security is a 100% online program. It spans 2 years and is divided into “10-week terms” and 36 Semester credit hours.

Q. What are the career opportunities after successful completion of MSCS?
+

Ans.  Upon the successful completion of the master’s degree in Cyber Security, you will be able to master the skills necessary to move into leadership roles in companies, agencies, divisions, and departments. It will lead you to multitude of career opportunities including:

  • Information Security Auditor
  • information Security Manager/Specialist
  • Risk/Vulnerability Analyst/Manager
  • Information Security Analyst
  • Penetration Tester
  • Security Architect
  • Computer Network Defender
  • Cyber security Defense Analyst
  • Information Security (IS) Director
  • Information Assurance (IA) Program Manager
  • IT Project Manager
  • Application Security Engineer/Manager
  • Enterprise Architect
  • Security Architect
Q. what are the methods of assessment for the students of this program?
+

Ans.  Students are evaluated by their participation in discussion threads, assignments, lab assessments and reports, final examinations, papers, course final projects, and the capstone course.

Q. What is the admission process at ECCU?
+

Ans.  Prospective students wishing to attend EC-Council University (ECCU) shall submit a complete application package including:

  • a list of all prior institutions attended with the application fee.
  • a signed copy of a Student Enrollment Agreement (SEA).
  • official transcripts for evaluation of transfer credits.
  • a copy of your unofficial transcripts may be submitted for provisional admission.
  • an official copy of transcripts must be submitted for full admission.

(Refer to our catalogue for more details: https://edm-image.s3.us-west-2.amazonaws.com/ECCU/catalog/EC-Council-University-catalog.pdf)

Q. How will I get the intimation of Admission at ECCU?
+

Ans.  You will get a postmarked, phoned, or emailed notification issued by the ECCU administration regarding admission statuses of prospective students.

Q. What System of education – Semester/ Term/ Trimester followed at ECCU?
+

Ans.  System of education in terms of format:

  • All courses are offered in 10-week term using an online format via the myECCU portal.
  • To be considered a full-time student, a graduate student must take two courses in each term, and undergraduate students must take three courses per term.
  • Students opting for fewer courses a term will be considered part-time.
  • All degree requirements must be completed within one and a half times the program length as measured by course completion rate of 67% of course work from the first term the student enrolls in the University and begins the program to graduation.

System of education in terms of grading:

  • All credits awarded by EC-Council University are semester hour credits.
  • Credits are awarded only upon successful completion of a course or project requirements.
  • Students will graduate with honors if they have a cumulative GPA of:
  1. Cum Laude – for grade point averages of 3.75 through 3.84
  2. Magna Cum Laude – for grade point averages of 3.85 through 3.94
  3. Summa Cum Laude – for grade point averages of 3.95 and above
Q. What are the tuition fees for the master’s program at the University?
+

Ans.  For the master’s degree program the fee structure is:

  • Tuition Costs $540 Per Credit Hour
  • Application Fee: $65
  • Technology Fee: $50 per term
  • Graduation Fee: $150
  • iLabs Fee: $50 per certification course
  • Transcript Fee: $10+shipping**
  • Transcript w/Apostille: $20+shipping**
  • Specialization: Security Analyst Exam Fee: $899
  • Specialization: Executive Leadership in Information Assurance Exam Fee: $999

Most textbooks are embedded digitally in courses; students may elect to purchase textbooks. Depending on the course choices students make, they can expect to spend between $250 and $900 USD for textbooks

Students must have all financial obligations met prior to transcripts being released. ECCU reserves the right to withhold transcripts and other similar documents when students, for example, have unmet obligations to ECCU.

Q. What are the modes of payment?
+

Ans.  ECCU accepts credit card payments through our student portal. Students can also make payments via PayPal. Please contact [email protected] for further information.

Q. What are the various scholarship / financial assistance schemes provided by ECCU?
+

Ans.  EC-Council University (ECCU) provides direct tuition assistance through the provision of following scholarships:

  • Associate’s Cyber security Scholarship – This is a need-based scholarship, designed to provide continuing education tuition assistance to undergraduate students who have graduated from a U.S. college with an earned associate’s degree. The award will be a one-time scholarship of up to $2,000 to continue your education in ECCU’s Bachelor of Science in Cyber Security program.
  • The President’s Choice Scholarship for Women – EC-Council University is dedicated to bringing women’s minds together by providing tuition assistance for women pursuing undergraduate and graduate studies in cyber security. A one-time scholarship of up to $2,000 may be awarded to women recognized by EC-Council University.
  • The Cyber Security Dean’s Scholarship – This is a need-based scholarship. The award will be continuous through the program of study in a scholarship amount of 10% of tuition for selected applicants.
  • New Mexico Scholarship – This is once again is a need-based scholarship, designed for students that are current residents of the state of New Mexico. The award will be continuous through the program of study in a scholarship amount of 10%.
  • Heroes Scholarship – This, too, is a need-based scholarship for students who are either on active duty in the U.S. military or are military veterans or first responders. It also applies to military personnel and first responders of other countries. The award will be continuous through the program of study in a scholarship amount of 10% of tuition for selected applicants.
  • Hardship Scholarship – The ECCU Hardship Scholarship is a need-based scholarship to help during uncertain times. The award is good for only a term at a time and will need to be applied for before the beginning of the new term. The students applying for it will need to produce proof of the need to be eligible for this 10% scholarship.
Q. Does ECCU offer assistance in providing Educational Loans?
+

Ans.  EC-Council is not currently approved by the US Department of Education as an eligible Title IV institution. While we do not currently participate in Title IV funded student loan programs, no-interest institutional payment plans are available.

However, EC-Council University offers monthly payment plans that divide the tuition into three equal payments. The initial payment is paid before the start of the first class of the term, and the subsequent two payments are due mid-month (15th) the first and second month of the term. This payment plan comes interest free. For a continued eligibility for program participation, students need to ensure a good standing.

Q. What are the course withdrawal guidelines at ECCU?
+

Ans.  Course withdrawal dates vary depending on the scheduled length of the course.

    • Once the Course Drop period has passed, students are permitted to withdraw from a course until 60% of the scheduled course length has elapsed.
    • A student who withdraws from all courses will be withdrawn from the University and will be subjected to the institution’s refund policy as described in the University Catalog.*
    • Anticipated graduation dates may be adjusted for students who withdraw from registered courses during a term. Student who withdraws from a course will no longer be allowed to continue with that.
    • Within the withdrawal period, students will get a withdrawal grade (W) on their transcripts for classes from which they have been withdrawn. See the Satisfactory Academic Progress Policy to understand the impacts of withdrawing from one or more courses.

0D

  • Tuition will continue to reflect the tuition billed at the close of the course drop period. Once 60% of the scheduled course length has passed, the student will receive a failing grade (FD) on their transcript for any classes from which they have been withdrawn. See the Satisfactory Academic Progress Policy to understand the impacts of withdrawing from one or more courses.
  • Tuition segment reflects the tuition billed at the close of the course drop period. To meet program completion requirements, a student will need to register for any failed or withdrawn courses in a future term, which may also impact the anticipated graduation date.
  • Anticipated graduation dates may be adjusted for students who withdraw from registered courses during a term.
  • Students who fail to notify the university that they have stopped attending and wish to withdraw from a class are still scheduled in the class. Students who do not attend for 21 days will be Administratively withdrawn per the Attendance Policy. See the Satisfactory Academic Progress Policy to understand the impacts of being withdrawn from one or more courses. Tuition will continue to reflect the tuition billed at the close of the drop period.

Refer to our catalogue for more details: https://edm-image.s3.us-west-2.amazonaws.com/ECCU/catalog/EC-Council-University-catalog.pdf

Q. What is the structure of the master’s in Cyber security program at ECCU?
+

Ans. 

  • The course structure of master’s in cyber security is presented over 10-week terms and consists of assigned readings, threaded discussions, case studies, written analysis, research projects, and examinations.
  • The level of study is graduate, the number of courses is 12, and the span of the course is 36 credit hours.
  • Students must spend 10-12 hours of study a week to complete the work.
  • ECCU encourages regularity of attendance in the student-faculty online interaction sessions.
  • Online live sessions provide students with an opportunity for interaction and engagement regarding course content.
  • The entire syllabus is graded on the basis of grading rubrics of cyber security master’s degree. The course requirements, expectations, and timelines keep students abreast of their progress in the course through the My ECCU Online Learning Management System.
Q. Is there a placement facility for students enrolled in ECCU’s online degree programs?
+

Ans.  ECCU’s internships and capstone projects allow for applied avenues of academic knowledge in real-world / workplace settings. Under the aegis of ECCU, students will identify internship opportunities in their local area through the networking activities of the university, corporate partners, and student initiative.

ABOUT EC-COUNCIL UNIVERSITY (ECCU)

EC-Council University is a premier institute of cyber security studies and technologies. It is an accredited institute that provides 100% online programs in cyber security at the graduate and undergraduate levels enabling its graduates to obtain advanced cyber skillsets. Its unique programs allow its students to lead their peers to manage cyber security risks strategically and effectively in their organizations. Intelligent.com has ranked EC-Council university in the “The Top 45 Online master’s in Internet security degree programs” by highlighting its high standards of quality education.

Q. Why do I need a bachelor’s degree in cyber security?
+

Ans. If you want to consider gaining the full extent of knowledge and industry experience as a cyber security professional, then a bachelor’s degree is what you need, as it allows you to refresh your skillset and learn from your on-campus experience.

Q. How can a bachelor’s degree in cyber security advance my career?
+

Ans. A bachelor’s degree offers substantial career advantages. Studies consistently show that college graduates earn significantly more over their lifetimes compared to those with only a high school diploma. According to the U.S. Bureau of Labor Statistics, occupations that typically require a bachelor’s degree are expected to have 3.3 million openings yearly, on average, over the projected decade.* Overall, employment in bachelor’s-level occupations is projected to grow faster than the average for all occupations. This growth reflects the relatively high number of openings due to new jobs. Research indicates that higher education correlates with increased job satisfaction, promotion opportunities, and access to leadership positions.

Read More – Where Do I Start After I Get My Bachelor’s in Cyber Security?

Q. What kind of degree do you need for a career in cybersecurity?
+

Ans. Candidates who wish to start a career in cybersecurity can pursue a Bachelor’s degree in  Cybersecurity. EC-Council University offers degree courses for cybersecurity. It provides a 2-year online bachelor’s degree completion program in cybersecurity with up to 7 industry-recognized certifications. These cybersecurity certifications online are awarded to students on the successful passing of their courses at ECCU and then passing of the certification exams to be taken at ECC for which a complimentary voucher shall be provided at the end of the term. Certifications that are awarded to students after completion of their course include – Certified SOC Analyst (CSA), Certified Ethical Hacker (CEH), Certified Network Defender (CND), Certified Threat Intelligence Analyst (CTIA), Computer Hacking Forensics Investigator (CHFI), TestOut Linux Pro Certification and TestOut Security Pro Certification. To get the EC-Council Certification, a student should have completed and passed the corresponding ECCU course. They will then be eligible to test for the certification. A student must pass the test to earn the certification.

Q. Is a bachelor’s degree in cybersecurity worth it?
+

Ans. Yes, The Cybersecurity field is experiencing a severe shortage of talent over the last couple of years. According to a report by Cybersecurity Ventures, it has been estimated that by the year 2021, there will be more than 3.5 million unfilled cybersecurity positions. It is a good time for aspirants who wish to enter this field. As per a Burning Glass report, 84 percent of cybersecurity job postings require at least a bachelor’s degree. It also states that earning an advanced degree, like that of degree in cyber security, in this field will not just improve their salary but will also open more career options. The Bachelor’s Degree in Cyber Security Online from ECCU will help you make the best of these opportunities and other industry benefits.

Q. How to get a bachelor’s degree in cyber security (BSCS)?
+

Ans. The level of the BSCS program is undergraduate. It is designed to give students who have started, but not finished, a four-year undergraduate degree the opportunity to complete and earn their Bachelor’s degree. Most degree completion programs will allow students to transfer some, or all their credits previously earned from other programs and/or institutions. These programs provide students a cost-effective and timely option to complete and earn their Bachelor’s degree without having to start a new program from the beginning. If you fit the bill and meet the eligibility conditions, our counsellors will take you through the admission process.

Q. Who all can apply for BSCS in Cyber Security Program?
+

Ans. Aspiring students who have met the following conditions are eligible to apply for the BSCS:
• Earned an Associate’s degree or foreign equivalent from an appropriately accredited institution OR completed 60+ semester credit hours (90+ quarter credit hours) or foreign equivalent from an appropriately accredited institution.
• Have proof of a high school diploma or foreign equivalent.
• Have completed a college-level English and Math class with a grade of C or higher.
• Have proof of English proficiency.

Q. What is the program length and total number of credit hours for the BSCS program?
+

Ans. The BSCS is a two-year degree completion program and spans 60 credit hours.

Q. What is the broad scope of work for this program?
+

Ans. The scope of the work requires constant updating of skills with a broader perspective than just the bachelor’s degree and requires that graduates can communicate current industry trends that organizations are facing and stay abreast of industry trends as they evolve. The program covers topical areas that deal with cyber security management, incident response, and security threat assessment, which requires students to be creators of knowledge and inventors of processes, not merely users of information.

Q. What all industry certifications are associated with the BSCS program?
+

Ans. The BSCS program comes with up to five industry-recognized certifications: Certified Network Defender (CND), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator (CHFI), Certified Threat Intelligence Analyst (CTIA), and Certified SOC Analyst (CSA).

Q. What are the methods of assessment for the students of this program?
+

Ans. Students are evaluated by their participation in discussion threads, assignments, lab assessments and reports, final examinations, papers, course final projects, and the Capstone course

Q. What avenues does a bachelor’s degree in cyber security opens?
+

Ans. Earning a bachelor’s in cybersecurity online degree will teach you required skills that will help you achieve various job roles in the cybersecurity industry including the following:

  • Security Analyst
  • Security Architect
  • Security Engineer
  • Security Consultant
  • Security Systems Administrator
  • Network Security Engineer/ Analyst
  • Risk/ Vulnerability Analyst
  • Computer Forensic Analyst
  • Computer Network Defender
  • Computer Network Defense Analyst
  • Web Application Security Engineer
  • Forensic Analyst
  • Digital Forensic Examiner
What are the admissions requirements?
+

This is available on the admissions page on the website: https://www.eccu.edu/student-services/admission/

Do I need a bachelor’s degree to earn a graduate certificate or a Master’s degree?
+

Yes, you must have a Bachelor’s degree to qualify for the Master of Science in Cybersecurity degree program or for the graduate certificate programs.

What do I need to include with my admissions application?
+
  • A scan of your official government ID.
  • University transcripts for all the degrees you have earned.
  • If you are not from the U.S., proof that you meet the English requirement.
  • Your CV or Resume (optional).
Do you require the GRE?
+

No, we do not require the GRE.

How do I know if my international degree is equivalent to a U.S. Bachelor’s degree?
+

If your degree is from outside of the U.S., you must have it evaluated to determine if your degree is equivalent to a U.S. Bachelor’s degree.

A U.S. Bachelor’s degree usually takes 4 years to complete. That is 8 semesters with 5 or more classes each semester.

Methods are available to evaluate your degree:

All non-U.S. transcripts must be evaluated by an evaluator who is a member of NACES. Students applying for admission need to have a course-by-course evaluation with the corresponding GPA. Ask the evaluator to include the language of instruction. Send the evaluated transcripts for all colleges and universities you have attended.

Students may choose an evaluator who is a member of the National Association of Credential Evaluation Services (NACES) to complete the evaluation. Students can find a list of evaluators on the NACES website: https://www.naces.org/members.html

We recommend Educational Perspectives: https://www.edperspective.org/.

All documents are written and issued in a foreign language must have a certified English translation attached.

What is NACES?
+

NACES is a member organization. They have a list of all degree evaluators that you can choose from to have your degree evaluated.

The list is here: https://www.naces.org/members.html

You will need to pick one of the organizations on this list to evaluate your transcript. The price of the evaluation can vary. Many students use A2Z. Evaluations (https://www.a2zeval.com/), Educational Perspectives (https://www.edperspective.org/), or World Education Services (https://www.wes.org/). Some evaluators will keep your records on file and mail you new copies when you need them; others will not. The cost ranges from $100 to $200.

You need to order an evaluation that includes GPA calculation. If possible, request that they include your language of instruction.

The results of the evaluation should be sent directly to ECCU:

ATTN: Registrar

EC-Council University

101 C Sun Ave NE

Albuquerque, NM 87109

What do I need on my degree evaluation?
+

The evaluation needs to include the GPA, the U.S. equivalency, and, if possible, the language of instruction.

If you have a Master’s degree from a non-U.S. school and you are interested in transfer credit, then you will need to have a course-by-course evaluation done on your Master’s transcript.

Do I need a visa?
+

No, ECCU is 100% online. You do not need a visa to attend. You can take classes from where you live.

Do I need to take the TOEFL or the IELTS to show I am proficient in English?
+

There are several ways to show proof that you meet the English requirement.

  1. If your degree is earned in a country where English is the official language, you do not need to provide additional proof. The following countries do not require additional proof to meet the English requirement: Anguilla, Antigua and Barbuda, Australia, Bahamas, Barbados, Belize, Bermuda, Botswana, British Virgin Islands, Cameroon, Canada (except Quebec), Cayman Islands, Dominica, England, Fiji, Gambia, Ghana, Gibraltar, Grenada, Guyana, Ireland (Northern and Republic of), Jamaica, Kenya, Lesotho, Liberia, Malawi, Malta, Mauritius, Montserrat, Namibia, New Zealand, Nigeria, Papua New Guinea, St. Kitts and Nevis, St, Lucia, St. Vincent and the Grenadines, Scotland, Seychelles, Sierra Leon, Singapore, Solomon Islands, South Africa, Swaziland, Tanzania, Tonga, Trinidad and Tobago, Turks and Caicos Islands, Uganda, United Kingdom, Vanuatu, Wales, Zambia, or Zimbabwe. Please see the ECCU Catalog for more details.
  2. If English was the language of instruction at the university where you earned your degree, then you must provide a letter from the institution stating that English was the language of instruction. Or you can also request that the NACES, NAFSA or evaluator appointed by the university states the language of instruction on the degree evaluation.
  3. You can show English proficiency by taking a recognized English proficiency test.

Official documentation of test scores are required. Please see the ECCU Catalog for more details.

1) A passing score as indicated here on one of the following approved English Proficiency tests (presented as an official document with the appropriate minimum total score for one of the following exam options):

Degree Level TOEFL iBT (new TOEFL ed.) IELTS Pearson Duolingo MET ECCE ECPE
Undergraduate 57 61 6.0 44 95 53 650/LP 650/LP
Graduate 60 71 6.5 50 100 55 650/LP 650/LP

*This refers to any prospective student wishing to enter an undergraduate level course and/or program.

**This refers to any prospective student wishing to enter a graduate level course and/or program.

What is the total cost of the program?
+

This is available on the admissions page on the website: https://www.eccu.edu/student-services/admission/

Are payment plans available?
+

Yes, you can either pay the full tuition by the term deadline or you can pay the tuition in 3 monthly payments each term.

What payment method does ECCU accept?
+

ECCU accepts payments by credit card in our student portal. Students can also make payments via PayPal. Please contact Kathy at [email protected] to set up an invoice.

The program appears to be expensive.
+

This program is quite reasonably priced and much less than other U.S. universities.

– You do not pay the full degree cost upfront. You will pay for classes as you take them.

– Consider starting with one of the graduate certificates if the full price of the MSCS degree is too much right now.

– Also, consider the monthly payment plan.

What is a graduate certificate?
+

Here is a good online article that describes what a graduate certificate is: https://www.geteducated.com/career-center/detail/what-is-a-graduate-certificate-or-diploma

Is the university accredited?
+

Yes, EC-Council University is accredited by Distance Education Accrediting Commission.

The Distance Education Accrediting Commission is listed by the U.S. Department of Education as a recognized accrediting agency. The Distance Education Accrediting Commission is recognized by the Council for Higher Education Accreditation (CHEA).

How long does it take to complete the program?
+

The master’s program usually takes 2 years to complete.

The bachelor’s program also takes about 2 years to complete.

Each graduate certificate takes 9-15 months.

How do I know if I will get transfer credit?
+

You may receive up to 6 credits of transfer credit for your industry certifications in the Master’s program and up to 12 in the Bachelor’s program.

You will need to complete the prior learning portfolio, so that we can determine what transfer credit you are eligible to receive.

We evaluate all transcripts for possible transfer credit.

MSCS students may receive a maximum of 18 credits of transfer credit.

BSCS students may receive a maximum of 90 credits of transfer credit.

Which one should I opt for: Certification or Academic Degree?
+

Both. You can take classes at ECCU and then test for a certification.

I don’t have a programming background. Can I still opt for the Master’s degree?
+

Yes, the degrees are designed to be valuable for someone who has a computer background. They also must be appropriate for someone with no IT background who is changing careers.

If I am coming to the U.S. for graduation, can the university help me apply for my visa?
+

We will provide a letter of invitation to the graduation ceremony. However, we do not provide visa assistance.

ADMISSIONS OPEN 2024