Master in Cybersecurity
Get global Cybersecurity recognition with the Master degree in Cybersecurity!
Master in Cybersecurity – Mode of Study
2- to 3-year international and part-time Master program through e-learning leading to the official US MS degree.
Stand-alone program: Certificate in Cybersecurity - Threat Detection (part of the Master in Cybersecurity)
The demand for IT Security specialists is soaring
Cybersecurity threats do not respect borders. With the dramatic rise in global Cybercrime,
Cybersecurity has become one of the fastest growing IT disciplines in the world today. No organization wants to be a victim to Cybercrime. The fallout can take years to fix and in some instances, it can be hard to fully recover at all. The growing concern among decision makers at major organizations over Cybercrime is therefore boosting the demand for Cybersecurity experts worldwide. According to the U.S. Bureau of Labor Statistics, IT Security Specialist employment will increase by 37% from 2012 to 2022, over 3-times faster than the 11% average for all occupations, placing this network security position among the nation's fastest growing positions. Be quick and get your global Master degree in Cybersecurity now!
The Master degree in Cybersecurity is one of the most current in demand graduate qualifications in the world
In collaboration with an outstanding American university we now offer you a Cybersecurity specialization program on a Master level fully through e-learning. Various leading Cybersecurity experts from all over the world will teach you. In only 2 to 3 years time, you will earn your Master degree in global Cybersecurity.
Global Cybersecurity recognition with the Master degree in Cybersecurity!
The Master in Cybersecurity will prepare you to take up challenging and rewarding career positions in various high-demand industries in the private and public sector. You can take on responsibilities that include the administration, operation and protection of mission-critical computer systems, information systems, networks, infrastructures and communication networks.
For this Master we are looking for high potentials with a global mindset. Your fellow students work as managers, consultants or researchers for organizations that specialize in Cybersecurity or that heavily rely on IT security. Already offered live at a number of campuses in the USA, we now also offer you this Master in Cybersecurity worldwide through e-learning. The university is one of the most diverse and global universities in the world. As a student you have the opportunity to study whenever and wherever you want while earning an accredited American Master degree.
Why study for a Master in Cybersecurity with us?
We offer the international Master of Cybersecurity in collaboration with an American university that is home to a variety of students from over 50 countries worldwide. You will be connected to a network of more than 170,000 alumni worldwide. Points of distinction of this Master are:
- The Master in Cybersecurity consists of 13 courses, spanning 9 weeks each. You can take a course at a time that personally suits you.
- Each course lasts for 9 weeks and can be taken fully through e-learning.
- You can perfectly combine this e-learning Master with your job.
- You can choose to book and pay for each course separately (only € 2,400) instead of paying for the complete Master at once.
- You can take a term off if necessary without any (financial) penalties involved.
- There are 5 start dates a year, in January, March, May, August and October.
- You can take 1 or 2 courses per semester at your choice.
- As the term schedule is consistent with the U.S. campus, you may study at a physical location in the USA any time.
- A personal academic advisor, who provides you with all the help you need and who really cares about your success, will assist you.
- This Master offers a global perspective on Cybersecurity from a global university.
- You will earn the official American MS (Master in Cybersecurity) degree, equivalent to the well-known European MSc degree.
Master in Cybersecurity – Course material and examination
At the start of each course you will receive an elaborate syllabus outlining in detail what is expected of you. A course can consist of various components such as case studies, literature studies, group discussions and quizzes. The evaluation method differs per course and usually consists of at least 3 evaluation methods such as quizzes, midterms/papers and finals/final papers.
Master in Cybersecurity – Language of Instruction
The language of instruction for the Master in Cybersecurity program is English.
Master in Cybersecurity – Admission Requirements
The Master in Cybersecurity aims at professionals with a relevant Bachelor or Master's degree in the field of IT, Business or International Relations, an adequate proficiency in the English language and several years of professional experience, who wish to broaden or deepen their knowledge of Cybersecurity. You will need to take an English proficiency test at the start of the Master in order to proceed (not included in the fee).
Master in Cybersecurity – Course Load
The Master in Cybersecurity program consists of 7 core courses and 5 elective courses that deal with basic, advanced and specialized Cybersecurity aspects. These include emphasis on various kinds of threat resolution and problem solving measures. One course grants you 3 credit hours and spans 9 weeks. You must gain a total of 36 credit hours to successfully accomplish this graduate program. Per week you should count on approx. 20 hours of self study, including the online sessions.
Certificate in Cybersecurity - Threat Detection – Part of the Master in Cybersecurity
The Certificate in Cybersecurity - Threat Detection program consists of 6 courses, spanning 9 weeks per course. The Certificate in Cybersecurity - Threat Detection is a stand-alone part of the international Master in Cybersecurity (MS) and can also be studied through e-learning.
The Certificate in Cybersecurity - Threat Detection consists of the following 6 courses and is also offered fully through e-learning:
- Course 1 - Cybersecurity Infrastructures
- Course 2 - Cybersecurity Intelligence/Counter-intelligence
- Course 3 - Cybersecurity Law and Policy
- Course 4 - Encryption Methods and Techniques
- Course 5 - Cybersecurity Threat Detection
- Course 6 - Cybersecurity Forensics
Who should you contact for more information?
Please contact Sonja Boelhouwer MSc for more information at +31 (0)40 246 0220 or send her an e-mail (email@example.com).
Would you like your logo/banner to be displayed here and are you interested in becoming a partner? Join us now and you and your business will have exposure during our monthly courses, on our website, in our brochures and through our newsletters. Contact us for more information!
Master in Cybersecurity – Program Curriculum
To successfully accomplish this Master and to earn the official American MS (Master in Cybersecurity) degree, you must gain a total of 36 credit hours by taking 12 courses altogether. These include 7 core courses and 5 elective courses. Each course gives you 3 credit hours and spans 9 weeks. Per week you should count on approx. 20 hours of self study, including the online sessions.
Master in Cybersecurity – 7 Core Courses
You will need to take all 7 core courses (mandatory).
- Introduction to Cybersecurity
- Cybersecurity Communications
- Cybersecurity Infrastructures
- Cybersecurity Intelligence/Counter-intelligence
- Cybersecurity Strategic Operations
- Encryption Methods and Techniques
- Practical Research in Cybersecurity
These courses combined will grant you 21 credit hours.
Master in Cybersecurity – 5 Elective Courses
In addition you need to take 5 elective courses. You can choose from:
- Cybersecurity Law and Policy
- Cybersecurity Threat Detection
- Cybersecurity Forensics
- Pre-emptive Deterrence
- Use and Protection of Space Assets
- Cybersecurity in Cloud Computing
- Social Engineering
- Cybersecurity Risk Management Framework
- Cybersecurity Internship
- Advanced Topics in Cybersecurity
From these 5 elective courses, you may - in agreement with your academic advisor - choose another course offered by the university in a complementary field/from a different Master.
With 5 elective courses you will attain the 15 remaining credit hours.
All courses are described below. You can choose which course and how many courses to take at what moment, in agreement with your academic advisor. There is only one requirement; you must always start with core course 1, 'Introduction to Cybersecurity'.
MASTER IN CYBERSECURITY – CORE COURSES
1. Introduction to Cybersecurity
The first course is designed to provide you with an overview of the major core areas of study you will encounter throughout the Master program.
- Introduction to Computer System Architectures
- Critical Infrastructures
- The growing threat of Social Networks
- Intelligence and Counter Intelligence
- International laws
- Security Policies
- Privacy and Information Liability
- Cyber Attacks and Counter Cyber Attacks
- Risk Assessment
- Cybersecurity Forensics including data gathering and recovery
- Future Cyber Technology developments
2. Cybersecurity Communications (3 credit hours)
Digital communications have grown rapidly and provide increased opportunities to access information, share and disseminate knowledge, create new innovative services and compete in a global environment. It presents new opportunities and a growing threat posed by a connected society that can impact critical interests.
- The basics of Communication Systems
- The ISO Layer Model
- Topologies such as Local Area Networks (LAN's), Wide Area Networks (WAN's), the World Wide Web (WWW) and the Internet
- Space-based communications used by the Department of Defense and commercial entities
- Rapidly developing personal Mobile Communication Technologies such as Wireless Local Area Network (WLAN) and Wifi
3. Cybersecurity Infrastructures (3 credit hours)
The impact of 9/11 in 2001 cemented our attention on physical attacks on critical infrastructures. Although still a concern, a growing Cybersecurity threat requires additional focus on potential virtual attacks on these same critical infrastructures. Both physical and virtual in capacitance of a critical infrastructure such as the power grid, communications and financial transactions can have a great or greater impact on our society. Cyber Attacks have and can cripple an industry and the services they provide to millions of users. In this course, the critical infrastructures are examined from a Cybersecurity perspective.
4. Cybersecurity Intelligence/Counter-intelligence (3 credit hours)
In this course you will examine:
- Methods, ethics, policies and procedures for accessing and gathering information for positive or negative use
- How to apply counter intelligence to evade, trick or trap individuals, agencies, or national entities who wish to steal, damage or deny access to valid users of critical information and its sources
- Active measures, passive counter measures, intelligence gathering processes
- How to determine the validity and success of gathering information
5. Cybersecurity Strategic Operations (3 credit hours)
- Specific methods, ethics, laws, policies and procedures for conducting strategic operations and counter measures
- How to identify critical infrastructures, communication channels, and information protection schemes?
- How to detect threats?
- How to assess vulnerabilities?
- How to penetrate and exploit Cyber targets?
- How to monitor, spoof, redirect and deny access?
- How to protect critical assets?
6. Encryption Methods and Techniques (3 credit hours)
- Detailed examination of the history and application of ciphers, codes and encryption/decryption methods and techniques
- Public and private keys and other advanced methods
- Encryption and communications systems
- Storage of data
- Methods employed for decryption, verification and authentication
- The role of ethics and information privacy when security is applied to public systems and e-mail content as well as higher levels of security for corporations' proprietary and government classified information
- The Data Protection Act
7. Practical Research in Cybersecurity
The student is expected to synthesize and integrate the learning experiences acquired throughout the Master in Cybersecurity and to evaluate current and future topics relative to this Master. Specific papers, projects, or other methodologies must include Cybersecurity related technical and management areas than span this entire degree emphasis. Prerequisite: successful completion of all other required core courses.
MASTER IN CYBERSECURITY – ELECTIVE COURSES
1. Cybersecurity Law and Policy
- The laws and policies dealing with Cybercrime, Cyber warfare, privacy and international perspectives
- In-depth look at the U.S. National Security Act, the U.S. Cybersecurity Electronic Security Act, the Cybersecurity Enhancement Act, the Protecting Cybersecurity as a National Asset Act, the Communications Assistance for Law Enforcement Act (CALEA)
- (International) Cyber crime laws
- Review of other current laws and policies
2. Cybersecurity Threat Detection
- Various methods used to threaten our Cyber system such as viruses, spoofing, denial of service, fraud, theft, phishing, spy bots, spam, Trojan horses, e-mail and active malware attachments, viral applications, hardware (computers and portable storage devices) with built-in viruses or trap-doors, fake websites
- Eaves dropping via wireless networks
- Criminal access to national, corporate or personal data
- The growing loss of privacy over social networks
3. Cybersecurity Forensics
This course covers methods and procedures for the identification and recovery of damaged or erased digital data.
- Tracing information access (web history, cookies, cache memory and internet source identification)
- Determination of system vulnerabilities (e.g. TEMPEST), communication ports and computer system architectures and encryption methods
- Incident monitoring and response
4. Pre-emptive Deterrence
- Planning and executing pre-emptive Cybersecurity deterrence operations and force application
- Specific methods
- Ethics, laws
- Policies and procedures
5. Use and Protection of Space Assets
- Space, ground and use of fixed and mobile communication
- Global Positioning System (GPS) assets and their attributes
- Examination of secure and non-secure systems to show the breadth of capabilities along with the pros and cons
- Uplink and downlink signal characteristics, signal bouncing and relaying capabilities
- Frequency hopping
- Spread spectrum
- Interception and overpowering of signals through the use of steerable beams
- Application of laser and fiber-optics
- Encryption techniques
6. Cybersecurity in Cloud Computing
This course begins with an introduction to cloud computing and security and then provides an examination of cloud security architecture. The essential characteristics of cloud computing are discussed using the National Institute of Standards and Technology (NIST) Cloud Computing Model, SPI cloud service models and the different cloud delivery models. With this background, key strategies and best practices for cloud security are developed, including data protection methods, cloud security controls and countermeasures, virtualization, security management, and securing of data in rest and in motion. In addition, legal and regulatory considerations for different types of clouds are presented. Based on the cloud security requirements, the course defines the steps for an organization to use in selecting an external cloud service provider (CSP). In addition to commercial selection requirements, the U.S. Department of Defense Enterprise Cloud Service Broker Cloud Security Model, which specifies what controls the CSP must implement in the military environment, is reviewed. Prerequisite: successful completion of the course 'Cybersecurity Communications'.
7. Social Engineering
This course examines social engineering - the science of influencing a target to perform a desired task or divulge information. The course provides the student with current information defining the many methods of deception hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access; discusses actives toward preventing social engineering threats ranging from elicitation, pretexting, influence and manipulation. The elements of social engineering are presented, discussed and explained by using real-world examples, and the science behind them to unravel the mystery in social engineering.
To complement the social engineering threat, the course analyzes the ethical and social implications of computer technology. The course explores technological, social and philosophical issues to include the ramifications of automation, the ethical obligations of computer specialists, and the threats to privacy that come with increased computerization. Combining the criminal-centric role of social engineering with the ethical, legal and moral impacts of technology upon individuals results in a course that provides the student a comprehensive overview of the challenges, threats and issues of everyday life in the digital age.
8. Cybersecurity Risk Management Framework
This course provides a detailed review and analysis of the six-step Risk Management Framework (RMF) process utilizing the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 Security and Privacy Controls for Federal Information Systems and Organizations. The course includes the process for risk analysis and categorizing Cyber risks for information systems, and the application of controls to minimize Cyber risks for managing information. It also presents an in-depth overview of each step of RMF along the framework path as well as the methodology for monitoring IT systems.
9. Cybersecurity Internship
Students undertake, with the supervision of a qualified professional, an approved internship in a Cybersecurity-related setting. The course includes work and academic experience. The work experience involves professional Cybersecurity duties. The academic experience involves written assignments by the faculty advisor. The outline of duties and evaluative methods are established by the student and the internship mentor and approved by the faculty advisor prior to initiation of the program. Prerequisites: Completion of all of the required Cybersecurity courses.
10. Advanced Topics in Cybersecurity
This course is designed free-format to permit addressing advanced and emerging topics in Cybersecurity. This means that the subject and content of this course differ each time the course takes place. You can think of topics like:
- Cyberspace communications
- Cyber warfare planning and execution
- Future topics such as the application of quantum non-locality
Master in Cybersecurity – Teaching Staff
The teaching staff are all lecturers from outstanding (inter)national universities, highly-skilled top consultants and top practitioners from private and public organizations.
You can enroll for this e-learning Master 5 times a year. You should, however, always start with the core course 'Introduction to Cybersecurity'. Thereafter you can take the courses in the order you wish, in agreement with your academic advisor. You can enroll for the complete Master in Cybersecurity at once. You can also choose to enroll for the stand-alone Certificate in Cybersecurity - Threat Detection or choose just one or more courses from the full Master. The core course 'Introduction to Cybersecurity' starts on:
- 16 March 2020
- 25 May 2020
- 17 August 2020
- 19 October 2020
- 4 January 2021
- Certified Cloud Security Professional (CCSP)
- Certified Fraud Examiner (CFE)
- Certified Secure Software Lifecycle Professional (CSSLP)
- Cloud Security (CCSK)
- Cyber Security First Responder (CFR)
- Identity Management & Access Control
- ISO 31000 Risk Management
- Risk Management - Certified ISO 27005 Risk Manager