Be a white hat. You’ll do that here.

As we’ve become dependent on the tools and technology of modern life, others have sought to prove destructive to those same systems. From malware to ransomware, phishing to cloaking, there seems to be no limit of the threats to our technological infrastructure. Enter cybersecurity professionals, tasked with protecting and defending these critical infrastructures.

What You’ll Do

The program focuses on developing a highly skilled cybersecurity workforce with specialization in the area of critical infrastructure as defined by the Department of Homeland Security. In this program, you’ll also:

  • Master the most up-to-date cybersecurity technologies.
  • Get focused attention from industry-expert faculty.
  • Gain critical reasoning and technical writing skills.

What Can You Do with an M.S. in Cybersecurity?

Graduates from our master’s in cybersecurity program will enter the most demanding and rewarding careers in the cybersecurity field.

  • New cybersecurity graduates enjoy a hefty salary with a median base pay of $75,000 per year.
  • The job outlook for software developers is expected to grow 28% from 2016 to 2026.

Outcomes & Careers

  • 100%

    Successful Outcomes Rate

    Students graduating with degrees from the Department of Computer Science report being employed or furthering their education six months after graduation.

  • $168k

    Computer & Information Systems Manager

    According to the Bureau of Labor Statistics, the mean annual salary for a computer and information systems manager is $161,730.

  • $99k

    Computer Systems Analyst

    According to the Bureau of Labor Statistics, the mean annual salary for a computer systems analyst is $99,020.

  • $131k

    Computer & Information Research Scientist

    According to the Bureau of Labor Statistics, the mean annual salary for a computer and information research scientist is $130,980.

Cybersecurity Degree Map

Explore the courses you'll need to complete your degree

What You’ll Study

With a Master’s degree in Cybersecurity, you’ll be prepared to enter the field even without a Bachelor’s degree in cybersecurity or similar degree. The program trains new graduates as well as existing practitioners, with skills required to protect critical infrastructure. You’ll take courses in computational cryptography, introduction of cybersecurity, information security in system administration, and security of critical infrastructure.

In addition to the criteria established for general admission to graduate studies, applicants must have the following: 

  • A bachelor’s degree in cybersecurity or related field* 
    * Students with bachelor’s degrees from other fields will be required to take up to two prerequisites related to Fundamentals of Computing and Programming. 
  • An undergraduate GPA of 3.0 on a 4.0 scale 
  • Six completed hours of science and six completed hours of mathematics in the undergraduate degree 

Probationary Admission

Applicants who do not meet the general and/or program’s admission requirements may be considered for probationary admission upon approval by the graduate program coordinator. While under probation, students must complete nine credit hours that count toward the degree with a grade of “B” or better to continue in the program. 

Core Requirements:

  • CY501 Introduction to Cybersecurity (3)
  • CY510 Information Security and Assurance (3)
  • CY520 Information Security in System Administration (3)
  • CY530 Computer Network Security and Defense (3)
  • MA664 Computational Cryptography (3)
Choose one thesis option:
Thesis option
  • CY655 Research Methods in Cybersecurity (3)
  • CY691 Thesis Research I (3)
  • CY692 Thesis Research II (3)
  • GR699 Master's Oral Examination (0)
  • Choose 6 hours of electives from the elective list. At least 3 hours must be at 600 level. (6)
Non Thesis option
  • CY690 Graduate Project (3)
  • GR698 Master's Final Comprehensive Examination (0)
  • Choose 15 hours from the elective list. At least 12 hours must be at the 600 level. (15)

Electives may be chosen from the following with the advice of advisor:*

  • CS506 Distributed Cloud Computing (3)
  • CY610 Web Application Security (3)
  • CY620 Advanced Computer Forensics (3)
  • CY643 Independent Study (3)*
  • CY650 Legal, Risk & Compliance for Security (3)
  • CY653 Special Topics in Cybersecurity (3)*
  • CY660 Cyber Operations (3)
  • CY662 Ethical Hacking (3)
  • CY670 Secure Operating Environments (3)
  • CS699 Internship (3)*
  • MA510 Mathematical Foundations (3)
  • TN562 Introduction to Networks (3)
  • TN564 Routing and Switching Essentials (3)

*May be taken once for credit on program

Graduate Assistantships

The graduate assistantship (GA) is designed to provide support during full-time graduate study. It’s an opportunity for the graduate students to serve in a professional role while establishing a professional relationship with faculty and administrators. In addition to a per year stipend, GAs gain valuable experience. There are two kinds of assistantships: teaching and administrative.

Harrison College of Business & Computing

This program is housed in the Harrison College of Business and Computing. The College prepares students for the global marketplace. Alumni work for some of the world’s largest corporations to some of today’s most innovative startups. The focus is on creating and innovating, data and trends, supported by faculty mentors who themselves are leaders in business and computing.

Accreditations and Designations

  • Accreditation Board for Engineering and Technology (ABET): Computing Accreditation Commission logo
  • National Security Agency logo
  • U.S. Department of Homeland Security logo
  • official Centers of academic excellence in cybersecurity community logo

Getting the Job

Your education is just one piece to launching an extraordinary career. Once you’ve mastered the material, you still have to find the job you want, make the right connections, sell your knowledge and experience—and if all this is giving you anxiety, don’t panic. SEMO’s Career Services office is here to help you with the next step. They’ll provide the expertise and support you need, so you’re landing your dream job in no time.

Become a Redhawk.

Do more than dream about the future. Take the first steps to make it all happen.

Graduate Coordinators

Graduate coordinators serve as the contact for graduate programs. The coordinators are most often faculty within the college which houses the program, helping you to get questions answered and first-hand knowledge of the degree requirements and placement opportunities.

Location
Office
Dempster Hall, 021A
Mailing Address
One University Plaza, MS 5950
Cape Girardeau, MO 63701