Cybersecurity (M.S.)
Marymount’s cybersecurity program is designed to prepare individuals for high-level positions in cybersecurity by developing the necessary knowledge, skills, and abilities in the technology and management of cybersecurity. Graduates will be able to protect the digital world for the federal government, state and local governments, nonprofits, and industry.
Students may take elective courses to meet their professional needs or take a specialized track in either data science or digital health. Students may pursue a dual degree in cybersecurity and information technology to broaden their knowledge in technology.
Because of the university's proximity to federal agencies, including the Department of Homeland Security, Department of Defense, and National Science Foundation, faculty members in the program are involved in and aware of current federal government initiatives and requirements. Further, program leaders are able to call on practitioners in the field as guest speakers and adjunct professors.
This 36-credit program is offered in online and face-to-face formats, and students may take any combination of course formats to meet the requirements of the program. Courses are rigorous and include readings, collaboration, and practical assignments using inquiry-based learning techniques with online multimedia presentations, online tools, and online simulations and labs. The program is designed to prepare individuals for promotion to a cybersecurity analysis position and to meet the certification requirements currently imposed on the profession, particularly by the Department of Defense. While all other coursework may be completed online, the culminating course is recommended to be completed in residency in order to take advantage of the cybersecurity resources of the Washington, DC, area. Students will gain hands-on practice with equipment and tools as they interact with cybersecurity experts in government and industry.
The program is committed to exhibiting the highest professional and ethical standards that address the needs of working individuals, full-time students, and business and government organizations. A variety of electives enable individual students to tailor the program to their knowledge base and career aspirations.
Upon successful completion of the cybersecurity program, students will be able to
- identify and solve cybersecurity issues in business and society by managing cybersecurity operations using available tools and techniques such as vulnerability assessments, risk mitigation, auditing, and certification and accreditation of information systems;
- review and understand the legal, regulatory, policy, and ethical issues related to securing cyberspace and ensuring the privacy of personally identifiable information (PII);
- communicate effectively with others, including technologists and managers in cybersecurity and IT as well as users and managers in the business context;
- work effectively as a member or as a leader of a cross-disciplinary team in the cybersecurity field where teamwork is essential to the success of a time-critical project; and
- develop the knowledge and skills required to pursue lifelong learning in areas relating to cybersecurity and to adapt to an ever-changing global technological and business environment through information literacy activities relevant to a fast-changing discipline.
Admission Requirements: In addition to meeting the university's requirements, it is preferred that applicants for this program hold certification or demonstrate work experience in computer networking. Those lacking this credential or work experience must take IT 520 Enterprise Infrastructure and Networks before taking the technical courses in the program.
Course Substitution Policy: If a student can exhibit a depth of knowledge gained through prior experience, advanced certifications, and/or previous coursework, more advanced courses may be substituted for lower-level program requirements.
Minimum Grade Requirements: A minimum grade of B- is needed to receive credit for a course in the cybersecurity program. All graduate students in the School of Business and Technology must maintain a minimum cumulative GPA of 3.0.
Students whose cumulative GPA falls below 3.0 will be placed on academic probation. Students must bring their cumulative GPA to 3.0 or higher within nine (9) graduate credits or be dismissed. A student whose cumulative GPA falls below 3.0 a second time will be dismissed.
Degree Requirements — Cybersecurity (M.S.)
36 credits
Degree Required Courses
IT530 | Computer Security | 3 |
IT535 | Advanced Computer Security | 3 |
IT560 | Applications of Cryptography | 3 |
IT570 | Cybersecurity: Law, Policy, Ethics, and Compliance | 3 |
IT670 | Computer Network Defense | 3 |
IT575 | Information Security Management | 3 |
| | |
IT543 | Project Management | 3 |
| OR | |
IT580 | Technology Leadership | 3 |
| OR | |
IT585 | Managing Technical People | 3 |
| | |
IT680 | IT Master's Project | 3 |
| Take a specialized track or select four (4) courses from the following | |
IT537 | Computer Forensics and Incident Response | 3 |
IT540 | Enterprise Data Management and Analysis | 3 |
IT546 | Principles of Data Science | 3 |
IT547 | Security and Privacy of Electronic Documents | 3 |
IT552 | Operating Systems | 3 |
IT557 | Measuring Systems Security: Monitoring and Auditing | 3 |
IT566 | Computer Scripting Techniques | 3 |
IT567 | Global Cybersecurity and Cyber Warfare | 3 |
IT576 | Natural Language Processing (NLP) Techniques | 3 |
IT577 | Human Factors in Cybersecurity | 3 |
IT586 | Machine Learning | 3 |
IT587 | Cybersecurity Systems: Certification and Accreditation | 3 |
IT597 | Security and Privacy of Medical Devices | 3 |
Degree Track Courses
Data Science Track
IT546 | Principles of Data Science | 3 |
IT566 | Computer Scripting Techniques | 3 |
IT576 | Natural Language Processing (NLP) Techniques | 3 |
IT586 | Machine Learning | 3 |
Digital Health Track
IT545 | Health Care Informatics | 3 |
IT546 | Principles of Data Science | 3 |
IT547 | Security and Privacy of Electronic Documents | 3 |
IT597 | Security and Privacy of Medical Devices | 3 |