Master in Cyber Security
Get global Cyber Security recognition with the Master degree in Cyber Security!
Master in Cyber Security – Mode of Study
2- to 3-year international and part-time Master program through e-learning leading to the official US MS degree.
Stand-alone program: Certificate in Cyber Security - Threat Detection (part of the Master in Cyber Security)
Cyber Security experts are in high demand
Cyber Security threats do not respect borders. With the dramatic rise in global cyber crime,
Cyber Security has become one of the fastest growing IT disciplines in the world today. No organization wants to be a victim to cybercrime. The fallout can take years to fix and in some instances, it can be hard to fully recover at all. The growing concern among decision makers at major organizations over cybercrime is therefore boosting the demand for Cyber Security experts worldwide. (ISC)2, being a security certification and industry body, revealed that by 2020, there will be a shortfall of 1.5 million Cyber Security experts. Be quick and get your global Master degree in Cyber Security now!
The Master degree in Cyber Security is one of the most current in demand graduate qualifications in the world
In collaboration with an outstanding American university we now offer you a Cyber Security specialization program on a Master level fully through e-learning. Various leading Cyber Security experts from all over the world will teach you. In only 2 to 3 years time, you will earn your Master degree in global Cyber Security.
Global Cyber Security recognition with the Master degree in Cyber Security!
The Master in Cyber Security will prepare you to take up challenging and rewarding career positions in various high-demand industries in the private and public sector. You can take on responsibilities that include the administration, operation and protection of mission-critical computer systems, information systems, networks, infrastructures and communication networks.
For this Master we are looking for high potentials with a global mindset. Your fellow students work as managers, consultants or researchers for organizations that specialize in Cyber Security or that heavily rely on IT security. Already offered at a number of campuses in the USA, we now also offer you this Master in Cyber Security worldwide through e-learning. The university is one of the most diverse and global universities in the world. As a student you have the opportunity to study whenever and wherever you want while earning an accredited American Master degree.
Why study for a Master in Cyber Security with us?
We offer the international Master of Cyber Security in collaboration with an American university that is home to a variety of students from over 50 countries worldwide. You will be connected to a network of more than 170,000 alumni worldwide. Points of distinction of this Master are:
- The Master in Cyber Security consists of 13 courses, spanning 9 weeks each. You can take a course at a time that personally suits you.
- Each course consists of 9 weeks and can be taken fully through e-learning.
- You can perfectly combine this e-learning Master with your job.
- You can choose to book and pay for each course separately (only € 2,400) instead of paying for the complete Master at once.
- You can take a term off if necessary without any (financial) penalties involved.
- There are 5 start dates a year, in January, March, May, August and October.
- You can take 1 or 2 courses per semester at your choice.
- As the term schedule is consistent with the US campus, you may study at a physical location in the USA any time.
- A personal academic advisor, who provides you with all the help you need and who really cares about your success, will assist you.
- This Master offers a global perspective on Cyber Security from a global university.
- You will earn the official American MS (Master in Cyber Security) degree, equivalent to the well-known European MSc degree.
Master in Cyber Security – Course material and examination
At the start of each course you will receive an elaborate syllabus outlining in detail what is expected of you. A course can consist of various components such as case studies, literature studies, group discussions and quizzes. The evaluation method differs per course and usually consists of at least 3 evaluation methods such as quizzes, midterms/papers and finals/final papers.
Master in Cyber Security – Language of Instruction
The language of instruction for the Master in Cyber Security program is English.
Master in Cyber Security – Admission Requirements
The Master in Cyber Security aims at professionals with a relevant Bachelor or Master's degree in the field of IT, Business or International Relations, an adequate proficiency in the English language and several years of professional experience, who wish to broaden or deepen their knowledge of Cyber Security. You will need to take an English proficiency test at the start of the Master in order to proceed (not included in the fee).
Master in Cyber Security – Course Load
The Master in Cyber Security program consists of 6 core courses, 2 capstone courses and 5 elective courses that deal with basic, advanced and specialized Cyber Security aspects. These include emphasis on various kinds of threat resolution and problem solving measures. One course grants you 3 credit hours and spans 9 weeks. You must gain a total of 39 credit hours to successfully accomplish this graduate program. Per course you need to take into account 20 study hours per week, including the online sessions.
Certificate in Cyber Security - Threat Detection – Part of the Master in Cyber Security
Threat detection focuses on the knowledge and tools necessary to address the increasing demand of corporate and governmental organizations to improve the security of their cyber content. The 4 courses of this certificate, each spanning 9 weeks, provide an understanding of the foundation of current Cyber Security threats, the phraseology and terminology used in the sector, as well as the various roles, responsibilities and tools related to the detection of cyber threats.
The Certificate in Cyber Security - Threat Detection consists of the following 4 courses and is also offered fully through e-learning:
- Course 1 - Introduction to Cyber Security
- Course 2 - Cyber Security Law and Policy
- Course 3 - Cyber Security Infrastructures
- Course 4 - Cyber Security Threat Detection
Who should you contact for more information?
Please contact Sonja Boelhouwer MSc for more information at +31 (0)40 246 0220 or send her an e-mail (firstname.lastname@example.org).
Would you like your logo/banner to be displayed here and are you interested in becoming a partner? Join us now and you and your business will have exposure during our monthly courses, on our website, in our brochures and through our newsletters. Contact us for more information!
Master in Cyber Security – Program Curriculum
To successfully accomplish this Master and to earn the official American MS (Master in Cyber Security) degree, you must gain a total of 39 credit hours by taking 13 courses altogether. These include 6 core courses as well as 5 elective courses and 2 capstone courses. Each course gives you 3 credit hours and spans 9 weeks. Per week you should count on approx. 20 hours of self study, including the online sessions.
Master in Cyber Security – 6 Core Courses
You will need to take all 6 core courses (mandatory).
- Introduction to Cyber Security
- Cyber Security Communications
- Cyber Security Infrastructures
- Cyber Security Intelligence/Counter Intelligence
- Cyber Security Strategic Operations
- Encryption Methods and Techniques
These courses combined will grant you 18 credit hours.
Master in Cyber Security – 5 Elective Courses
In addition you need to take 5 elective courses. You must choose 3 courses from;
- Cyber Security Law and Policy
- Cyber Security Threat Detection
- Cyber Security Forensics
- Pre-emptive Deterrence
- Use and Protection of Space Assets
- Advanced Topics in Cyber Security
The remaining 2 courses may be chosen from the elective courses above or other courses offered by the university in a complementary field. With 5 elective courses you will attain 15 credit hours.
Master in Cyber Security – 2 Capstone Courses
- Practical Research in Cyber Security I
- Practical Research in Cyber Security II
These courses combined will grant you the remaining 6 credit hours.
All courses are described below. You can choose which course and how many courses to take at what moment, in agreement with your academic advisor. There is only one requirement; you must always start with core course 1, 'Introduction to Cyber Security'.
MASTER IN CYBER SECURITY – CORE COURSES
1. Introduction to Cyber Security (3 credit hours)
The first course is designed to provide you with an overview of the major core areas of study you will encounter throughout the Master program.
- Introduction to Computer System Architectures
- Critical Infrastructures
- The growing threat of Social Networks
- Intelligence and Counter Intelligence
- International laws
- Security Policies
- Privacy and Information Liability
- Cyber Attacks and Counter Cyber Attacks
- Risk Assessment
- Cyber Security Forensics including data gathering and recovery
- Future Cyber Technology developments
2. Cyber Security Communications (3 credit hours)
Digital communications have grown rapidly and provide increased opportunities to access information, share and disseminate knowledge, create new innovative services and compete in a global environment. It presents new opportunities and a growing threat posed by a connected society that can impact critical interests.
- The basics of Communication Systems
- The ISO Layer Model
- Topologies such as Local Area Networks (LAN's), Wide Area Networks (WAN's), the World Wide Web (WWW) and the Internet
- Space-based communications used by the Department of Defense and commercial entities
- Rapidly developing personal Mobile Communication Technologies such as Wireless Local Area Network (WLAN) and Wifi
3. Cyber Security Infrastructures (3 credit hours)
The impact of 9/11 in 2001 cemented our attention on physical attacks on critical infrastructures. Although still a concern, a growing Cyber Security threat requires additional focus on potential virtual attacks on these same critical infrastructures. Both physical and virtual in capacitance of a critical infrastructure such as the power grid, communications and financial transactions can have a great or greater impact on our society. Cyber attacks have and can cripple an industry and the services they provide to millions of users. In this course, the critical infrastructures are examined from a Cyber Security perspective.
4. Cyber Security Intelligence/Counter Intelligence (3 credit hours)
In this course you will examine:
- Methods, ethics, policies and procedures for accessing and gathering information for positive or negative use
- How to apply counter intelligence to evade, trick or trap individuals, agencies, or national entities who wish to steal, damage or deny access to valid users of critical information and its sources
- Active measures, passive counter measures, intelligence gathering processes
- How to determine the validity and success of gathering information
5. Cyber Security Strategic Operations (3 credit hours)
- Specific methods, ethics, laws, policies and procedures for conducting strategic operations and counter measures
- How to identify critical infrastructures, communication channels, and information protection schemes?
- How to detect threats?
- How to assess vulnerabilities?
- How to penetrate and exploit cyber targets?
- How to monitor, spoof, redirect and deny access?
- How to protect critical assets?
6. Encryption Methods and Techniques (3 credit hours)
- Detailed examination of the history and application of ciphers, codes and encryption/decryption methods and techniques
- Public and private keys and other advanced methods
- Encryption and communications systems
- Storage of data
- Methods employed for decryption, verification and authentication
- The role of ethics and information privacy when security is applied to public systems and e-mail content as well as higher levels of security for corporations' proprietary and government classified information
- The Data Protection Act
MASTER IN CYBER SECURITY – ELECTIVE COURSES
1. Cyber Security Law and Policy (3 credit hours)
- The laws and policies dealing with cyber crime, cyber warfare, privacy and international perspectives
- In-depth look at the US National Security Act, the US Cyber Security Electronic Security Act, the Cyber Security Enhancement Act, the Protecting Cyber Security as a National Asset Act, the Communications Assistance for Law Enforcement Act (CALEA)
- (International) cyber crime laws
- Review of other current laws and policies
2. Cyber Security Threat Detection (3 credit hours)
- Various methods used to threaten our cyber system such as viruses, spoofing, denial of service, fraud, theft, phishing, spy bots, spam, Trojan horses, e-mail and active malware attachments, viral applications, hardware (computers and portable storage devices) with built-in viruses or trap-doors, fake websites
- Eaves dropping via wireless networks
- Criminal access to national, corporate or personal data
- The growing loss of privacy over social networks
3. Cyber Security Forensics (3 credit hours)
This course covers methods and procedures for the identification and recovery of damaged or erased digital data.
- Tracing information access (web history, cookies, cache memory and internet source identification)
- Determination of system vulnerabilities (e.g. TEMPEST), communication ports and computer system architectures and encryption methods
- Incident monitoring and response
4. Pre-emptive Deterrence (3 credit hours)
- Planning and executing pre-emptive Cyber Security deterrence operations and force application
- Specific methods
- Ethics, laws
- Policies and procedures
5. Use and Protection of Space Assets (3 credit hours)
- Space, ground and use of fixed and mobile communication
- Global Positioning System (GPS) assets and their attributes
- Examination of secure and non-secure systems to show the breadth of capabilities along with the pros and cons
- Uplink and downlink signal characteristics, signal bouncing and relaying capabilities
- Frequency hopping
- Spread spectrum
- Interception and overpowering of signals through the use of steerable beams
- Application of laser and fiber-optics
- Encryption techniques
6. Advanced Topics in Cyber Security (3 credit hours)
This course is designed free-format to permit addressing advanced and emerging topics in Cyber Security. This means that the subject and content of this course differ each time the course takes place. You can think of topics like:
- Cyberspace communications
- Cyber warfare planning and execution
- Policies and laws
- Future topics such as the application of quantum non-locality
MASTER IN CYBER SECURITY – CAPSTONE COURSES
Please note that you may only take this course, if the subject differs, two times. Should you take this course more often, you will only receive the maximum number of 6 credit hours.
1. Practical Research in Cyber Security I (3 credit hours); and
2. Practical Research in Cyber Security II (3 credit hours)
You are expected to synthesize and integrate the learning experiences acquired throughout the Master in Cyber Security and to evaluate current and future topics relative to this major. In this regard you may choose to:
- write a research paper; or
- do an (approved) internship in an area outside of your normal position duties; or
- do an individual or team project assignment.
These papers, projects or internships must include Cyber Security related technical and management areas that span this entire degree emphasis. Internships or practical research projects that span 2 consecutive semesters are considered appropriate applications of research in conjunction with the completion of this course. These two capstone courses must be completed over 2 sequential terms. In this period you are expected to have 72 contact hours with your teachers.
Master in Cyber Security – Teaching Staff
The teaching staff are all lecturers from outstanding (inter)national universities, highly-skilled top consultants and top practitioners from private and public organizations.
You can enroll for this e-learning Master every 2 months. You should, however, always start with the core course 'Introduction to Cyber Security'. Thereafter you can take the courses in the order you wish, in agreement with your academic advisor. You can enroll for the complete Master in Cyber Security at once. You can also choose to enroll for the stand-alone Certificate in Cyber Security - Threat Detection or choose just one or more courses from the full Master. The core course 'Introduction to Cyber Security' starts on:
- 6 January 2020
- 16 March 2020
- Certified Cloud Security Professional (CCSP)
- Certified Fraud Examiner (CFE)
- Certified Secure Software Lifecycle Professional (CSSLP)
- Cloud Security (CCSK)
- Cyber Security First Responder (CFR)
- Cyber Security-Threat Detection
- Global Industrial Cyber Security Professional (GICSP)
- Identity Management & Access Control
- ISO 31000 Risk Management
- Risk Management - Certified ISO 27005 Risk Manager