Call Now
General Inquiries
1-866-684-7237
Master's Admissions
1-800-460-5597 (US & Canada)
+1-647-722-6642 (International)
Bachelor's and Certificate Admissions
1-866-684-7237
This will only take a minute.
Now more than ever, organizations are looking for cybersecurity experts. Norwich University’s online Master of Science in Cybersecurity program can help you develop the business acumen and management skills needed to lead the field. Graduates of our program are armed with the skills they need to help ensure that information assets are understood, valued, and protected within the complex business enterprise.
Request more information about this program.
Courses completed entirely online
Maximum number of students per class
Average time to program completion
Next Start Date
Application Deadline
Tailor your learning experience with six concentration options.
Join a program ranked #2 for cybersecurity by the Ponemon Institute (2014).
Learn from one of the earliest institutions to be recognized as a Center of Academic Excellence in Information Assurance Education* by the National Security Agency and Department of Homeland Security.
Benefit from a leader in information assurance instruction for more than a decade.
Receive continuing professional education credits as a member of ISACA or (ISC)2.
Apply to one of four start dates per year.
*Now referred to as a Center of Academic Excellence in Cyber Defense.
Norwich University is accredited by the New England Commission of Higher Education (formerly the Commission on Institutions of Higher Education of the New England Association of Schools and Colleges, Inc.).
Norwich University has been designated as a Center for Academic Excellence in Cyber Defense Education by the National Security Agency and Department of Homeland Security.
Norwich University offers a range of opportunities to help you lower your overall tuition costs. Contact our admissions team today to learn more about your options. Please note that scholarships are not additive. In addition to scholarships, students may also be eligible for discounts if their organization partners with Norwich University.
Discover Scholarships
Norwich University Online students may be eligible for scholarships and we encourage all potential students to visit our scholarships page here.
Norwich’s 36-credit online cybersecurity program is composed of six courses, each 11 weeks in length. Students master one course at a time to create a strong foundation of knowledge and context for future topics.
Our graduates can:
Core Courses
Our specialized program curriculum blends the management and technical aspects of an information security/assurance program, enabling you to develop the skills required to protect your organization and its critical information.
This course explores the historical foundations of information assurance, from the early days of mainframes to the foundations of today’s sophisticated networks and distributed computing systems. You will explore the earliest thinking about data structures and domains, interoperability among various computing platforms, mechanisms for data transfer, and the emergence of encryption as a defense against early forms of computer crime. The course examines privacy, policies, security standards and regulatory requirements, and the underlying models that define information assurance. You will also be introduced to IA architecture.
This course focuses on the use of technological defenses against threats and exploitations of vulnerabilities in information systems. Topics include physical security measures, access controls, security elements of operating systems, network security measures, anti-malware tools, anti-spam measures, anti-piracy systems, software development methods supporting security, and security certifications for software products.
This course focuses on the ways business objectives, user attitudes, and user activities significantly influence both the development of an information assurance program and its successful implementation. The first week focuses on operations security and why it’s the foundation of an IA program.
During the following five weeks, you will explore security awareness as a component of organizational culture; the process of crafting an information assurance message; ethical decision making as a factor in security; social psychology and how behaviors influence the effectiveness of security activities; the use of employment practices and policies to support information security; and the creation of acceptable use and email policies.
The final four weeks of the course examine elements of risk management from basic principles through application, using the NIST Special Publication 800-30 as a solid foundation for the risk management issues. You will also discuss two popular risk assessment processes and several other processes that help identify risk.
This course covers four general areas of information assurance management and analytics – from the strategic to the tactical level: compliance; management, leadership, and policy development; relationships and adding value; and project management. You will explore the aspects, methods, and alternatives in information assurance management and compare and utilize them with respect to non-IT-related management approaches and styles. The course covers alternatives in building support and consensus for projects and activities and focuses heavily on adding value to the organization. You will examine the development of an information assurance marketing plan and use it to help identify techniques of improving information assurance awareness. Topics also include analytics in terms of both metrics and measuring business impact, and problem solving and project management techniques and alternatives.
After completing the core curriculum, you choose a concentration that suits your career and professional goals.
Through this concentration, you can learn to create, train, and manage a computer security incident response team (CSIRT) and examine the protocols for conducting computer forensic investigations.
In this course, you will analyze and apply the key points in creating and managing a computer security incident response team (CSIRT), also known as a computer incident response team (CIRT) or a computer emergency response team (CERT). Topics include establishing CSIRTs; responding to computer emergencies; securing the CSIRT; managing the CSIRT with respect to professionalism, setting priorities for triage, and protecting personnel against burnout; and learning from emergencies using the incident postmortem and establishing continuous process improvement within the organization. Students will use their case study to apply their knowledge to real-world situations and will prepare recommendations for the establishment of a new CSIRT or improvement of their existing CSIRT.
This course focuses on the spectrum of tools and techniques used to investigate digital incidents, whether in a civil or criminal environment. The course provides the broad understanding that information assurance professionals must have of the management, investigation, and analysis of digital incidents. It also places that understanding in the context of other information assurance domains. Discussions of digital investigation and forensics cover topics from both technical and management perspectives to increase the information assurance professional’s understanding and application of domain-specific knowledge.
Our coursework examines the security of information critical to national security and the nature of conflict in cyberspace. This course will also strengthen your knowledge of supervisory control and data acquisition systems (SCADA) in the flow of resources such as electricity, water, and fuel.
This course explores the nature of conflict in cyber space focusing on two major Internet-based threats to the U.S. national security: cyber terrorism and cyber crime. The course addresses questions such as: who is undertaking these cyber activities, what techniques do they use, and what countermeasures can be adopted to mitigate their impact. The course is built around a risk management framework to help information leaders leverage the benefits of Internet technologies while minimizing the risks that such technologies pose to their organizations.
This course examines the security of information in computer and communications networks within infrastructure sectors critical to national security. These include the sectors of banking, securities and commodities markets, industrial supply chain, electrical/smart grid, energy, transportation, communications, water supply and health. Special attention is paid to the risk management of information in critical infrastructure environments through an analysis and synthesis of assets, threats, vulnerabilities, impacts, and countermeasures. Critical consideration is paid to the role of Supervisory Control and Data Acquisition (SCADA) systems in the flow of resources such as electricity, water, and fuel.
Focus on the legal and policy measures related to cyber breaches and learn to implement international cyberspace policies. Strengthen your knowledge of key topics including privacy and intellectual property, electronic contracting, non-repudiation, and fair information practices.
This course explores a broad variety of federal statutory, common, and international laws that may impact the information technology professional. Because the overwhelming majority of cyber infrastructure is owned and operated by the private sector, the course focus is on those laws that affect the interaction between government and the private sector information technology industry, including the privacy rights so often implicated in modern data storage systems. The course starts with a look at “cyber law” and whether it is really a distinct legal discipline at all. It then moves into criminal, civil, regulatory, international and common laws with which today’s information technology professional may come in contact. Throughout the course we discuss how public policy and other factors impact the development, implementation, and interpretation of the law. Students read, interpret and apply legal authorities and theories, a valuable skill for future information technology leaders if they are to stay in compliance with the ever-growing “cyber” legal framework.
This course explores the concept of cyber and cyberspace from an international perspective. It starts with a look at the technical nature of the internet from its very beginning. It then moves on to explore the various threats facing all nations, including the various threat actors and their motivations, capabilities and intentions. The course then looks at how technical aspects of cyberspace complicate policing and monitoring of activities. Policies, both U.S. and international are explored next, including a look at the prospects for international cooperation. A look at cyber deterrence and cyberwar follows, as well as a more detailed look into the cyber policies and activities of certain state and non-state actors.
Learn the key elements of project management, including the project process, scope, time, cost, quality, and schedule management. Students will take Project Management Techniques, Tools and Practices (GB544) and then choose either Project Management Leadership, Communications and Teams (GB554) or Strategic Management in Project Management (GB564).
Courses are cross-listed with the Master of Business Administration Program.
This seminar focuses on the fundamentals of project management and practices. The key elements of project management from the project management framework, the project life cycle, project process and key project management knowledge areas are discussed. Additionally, the project integration, scope, time, cost, quality, resource and schedule management are studied. Other areas of focus are project management procurement and overall project communications.
This seminar focuses on project management leadership, effective communications and the management of project teams. Students explore the fundamental principles of good project management, including: leadership skills, winning stakeholder cooperation, writing the rules to manage expectations, project risk management, creating realistic schedules, achieving accurate project estimates, trade-offs between project cost, schedule and quality, building strong project teams, clear communications, measuring progress, problem solving, defining clear requirements and applying lean principles in project management. This seminar discusses project leadership, communication and team management skills integrating them with concepts from previous seminars, resulting in fundamental principles of project management being integrated with leadership, communications and team building practices and challenges.
Applications from the GB 544 and GB 554 are applied in this seminar using the fundamental principles of project management from the project management framework, the project life cycle, project integration, scope, time, cost, quality, and schedule management. Students synthesize leadership skills, winning stakeholder cooperation, project risk management, building strong project teams, clear communications, measuring progress and problem solving in a proposed project. Prereqs: GB 544 and GB 554, or permission of the Program Director.
Explore how to conduct legal and ethical security tests and vulnerability assessments and learn to use key open source tools such as the Metasploit Framework.
This course introduces students to the penetration testing of computer networks. Students will utilize a virtual lab to gain experience through hands‐on lab exercises, and learn to use the well‐known open‐source Metasploit computer security project to understand security vulnerabilities. Students will apply this tool for penetration testing, testing the control tools, and learn how to conduct monitoring of an enterprise. Topics explored in this course include system security and vulnerability analysis, the most common system exploits and vulnerabilities, along with system “pivoting” and client‐side exploits. This course also introduces open‐source tools, in particular, the Metasploit Framework (MSF). Students will learn how to assess enterprise security controls and system vulnerability, and learn to document their findings. The course is designed for penetration testers, system security, and network administrators.
This course introduces students to advanced open-source tools used to conduct penetration testing of computer networks. Students will learn the rules of engagement, and how to conduct legal and ethical security tests and vulnerability assessments. Students will utilize a virtual lab to gain experience through hands-on lab exercises. Students will learn to use the well-known open-source tools (Metasploit , John the Ripper, Wireshark) to understand security vulnerabilities and how to use this tool for penetration testing, testing the control tools, and how to conduct monitoring of an enterprise.
The concentration focuses on the methods and processes of procurement and contract management at all levels of government management - federal, state, and local.
The College of Graduate and Continuing Studies at Norwich University has developed the courses within this concentration based upon NIGP’s publications and current standards in order to support the educational goals of the public procurement professional.
This course examines the scope, methods and processes of forming contracts between public and private parties for the purpose of accomplishing the missions of governmental agencies at the international, federal, state/provincial and local levels. It is designed for individuals considering a career in public administration, persons employed in government agencies, public procurement personnel wishing to enhance their knowledge, and suppliers or citizens interested in learning more about the formulation of government contracts. Subject and foundational areas such as planning, ethics, and of the legal basis of the public procurement function will be explored.
Students study the concepts of contract management beginning with crafting the Request for Proposal (RFP) through contract negotiations, award, and management. Students gain knowledge of government contract management from both the government and the private sector (industry) perspective including all fields of procurement.
Monday - Friday: 8 a.m. to 4:30 p.m. EDT
Extended hours available by appointment
Call: 1-866-684-7237
Email: learn@norwich.edu
Norwich University, in compliance with Title IV of the Civil Rights Act of 1964, Title IX of the Education Amendment of 1972, and Section 504 of the Rehabilitation Act of 1973, does not discriminate on the basis of race, religion, color, national origin, age, sex, or physical handicap in any of its policies, practices, or procedures.
Norwich provides a top-notch educational experience; we also work hard to help make it affordable. There are many ways to get financial aid and several strategies to help you finance your education. Norwich is committed to making this often-difficult process easier for you.
Ways to Pay
Do You Qualify for a Tuition Discount?
We Accept Military Benefits
Rate Per Credit |
Term
Tuition |
Additional Expenses | Total |
---|---|---|---|
$799; $550 (military; veteran; first responder)
|
$3,300-$4,794
|
Technology - $300/term |
$22,050-$31,014
|
The cybersecurity market is expected to grow from a $75 billion industry in 2015 to a $170 billion industry by 2020.*
The demand for cybersecurity professionals is high, which means salaries are, too. Those in the field command an average salary 9% higher than other IT workers, according to the Job Market Intelligence: Cybersecurity Jobs 2015 report.
Career opportunities for those earning a Master of Science in Cybersecurity are on the rise, outpacing the availability of qualified professionals in the industry.
Our graduates have pursued a variety of roles, including:
Our alumni have attained positions at top organizations, including:
*Source: https://www.forbes.com/sites/stevemorgan/2016/03/09/worldwide-cybersecurity-spending-increasing-to-170-billion-by-2020/#6b5269b76832
**Source: Norwich University Master of Science Information Security & Assurance Graduate Survey, fielded March 2016
Dr. Henry Collier is the Director of Technology Programs for Norwich University's College of Graduate and Continuing Studies. Dr. Collier manages the online programs at CGCS which include the Master of Science in Cybersecurity program, the Master of Science in Information Systems, the Bachelor of Science in Cybersecurity and Bachelor of Science in Computer Science & Information Systems programs. His areas of research include networking and the human firewall. Dr. Collier is an internationally recognized expert in the human firewall and has published several peer reviewed articles through international venues. Currently he is leading a team of international researchers in researching how culture plays a role in susceptibility to cybercrime. Prior to coming to Norwich, he was the Program Director for Computer Technology and Cybersecurity & Healthcare IT at River Valley Community College where he rejuvenated the Cisco Networking Academy and managed a National Science Foundation Advanced Technological Education grant to develop the Cybersecurity & Healthcare IT program. Before entering the academic arena, he worked for several years in the private industry as a telecommunications/information technology specialist. Dr. Collier served six years on active duty in the Army, stationed in Korea and Kentucky, and he currently has 25 years in the Army Reserves, where he has risen to the rank of Chief Warrant Officer 3. He has a Ph.D. in Engineering with a concentration in Security from the University of Colorado Colorado Springs, a master’s degree in Managing Innovations and Information Technology from Champlain College, a bachelor's degree in Information Technology with a concentration in systems analysis and design from Granite State College and an Associates Degree in Computer Technology from River Valley Community College. In his free time, he enjoys writing short stories, riding his bike, playing the guitar, cooking, gardening, painting, and woodworking.
Get to know the graduates of Norwich’s online Master of Science in Cybersecurity (formerly M.S. in Information Security & Assurance) program.
I was looking for a school with mature, highly ranked course. I wanted the curriculum to be certified by the NSA/DHS.
I think the most unique part about Norwich is the people. The faculty are outstanding. I couldn't tell you how much time and energy my professors gave me to help me prepare for my future career.
I was able to work through multiple obstacles of life while working full time that requires bi-monthly travel, writing course papers on the airplane, and meeting family obligations.