Master of Science in Cyber Security (M.S.)
The Master of Science in Cyber Security equips students with the hands-on skills needed to be a cyber-security professional. This 36-hour program provides balance between theory and practice, all of which is presented against a backdrop of Christian ethical values.
Program Learning Outcomes
The student will be able to:
- Evaluate emerging cyber security technologies.
- Design solutions, using cyber security knowledge, skills, and abilities, for practical scenarios.
- Comply with professional, ethical, legal, security and social responsibilities.
- Incorporate Christian worldview perspectives when addressing cyber security challenges.
Program Specific Admission Requirements
In addition to the general admission procedures, specific admission requirements for the Master of Science in Cyber Security program are as follows:
- An earned baccalaureate degree or its equivalent from an institution accredited by an agency recognized by the U.S. Department of Education (e.g. SACSCOS, TRACS, ABHE, etc.). The baccalaureate degree must be in one of the following or related fields:
- Information Systems
- Information Systems Management
- Information Technology
- Management Information Systems
- Computer Science
- Computer Programming
If a student does not have the appropriate Bachelor’s degree, then the transcript will be evaluated for 3 semester credit hours and a minimum grade of “C” in each of the following:
Course List Code Title Hours CSIS 209 C# Programming 3 MATH 121 College Algebra (or higher) 3 MATH 201 Introduction to Probability and Statistics 3 CSIS 331 Networks 3
- If a student does not meet any or all of the specific computer related undergraduate class requirements within the Bachelor’s degree, a resume can be submitted indicating 5 years of IT experience (including a demonstration of knowledge in networking and programming). The resume will be reviewed by the Program Director.
- An undergraduate cumulative GPA of 3.0 or above (on a 4.0 scale) for admission on good standing. Students that do not meet the minimum GPA of 3.0 (on a 4.0 scale) may be admitted on caution if they have a minimum GPA of 2.5-2.99.
- TOEFL Scores for students who speak English as a second language (score of 600 paper-based test; 250 computer-based test, 80 internet-based test).
Students may transfer up to 18 hours of graduate-level credit from an institution accredited by an agency recognized by the U.S. Department of Education. In order to transfer credits, students must have earned the minimum grade of B-, and courses must have been completed within five (5) years of the start date of the student’s program at Liberty University. Credits from a prior degree on the same academic level earned through Liberty University are considered transfer credits.
In addition to other regulations governing graduation as stated in the Liberty University Catalog, students must meet the following requirements:
- Complete a minimum of 36 semester hours.
- A maximum of 50% of the program hours may be transferred if approved and allowable, including credit from an earned degree from Liberty University on the same academic level.
- Must maintain a 3.0 GPA
- No more than two (2) grades of C may be applied to the degree (includes grades of C+/C-).
- No grade of D may be applied to the degree (includes grades of D+/D-).
- For information regarding the repeat policy, please refer to “Course Repeat Policy” in the Academic Information and Policies section of this Catalog.
- Degree must be completed within 3 years.
- Submission of Degree Completion Application must be completed within the last semester of a student's anticipated graduation date.
Delivery Format: Online Only
- Information Security Specialist
- Security Engineer
- Penetration Tester/Ethical Hacker
- Digital Forensics Analyst
This course surveys major topics in Computer and Network Security.
Note: Admission into program
This course covers the basics of digital forensics, including the technical aspects of evidence gathering for legal testimony and usage of digital forensics tools.
Note: Admission into program
This course covers ethical issues in computer and network security, legal issues, and business policy. It will teach students what the laws are concerning computer and network security, including the legal boundaries for breaking into systems without authorization. It will also cover the issues related to creating security policies for organizations, as well as the ethical responsibilities of protecting network and computer systems, and the ethical boundaries related to accessing other organizations systems.
Note: Admission into program
In this course the students will learn hands on, practical techniques for securing a network. Topics include installing, configuring and using Intrusion Detection software, firewalls, anti-virus, etc.
This course covers topics in modern cryptography with an emphasis on learning how to implement cryptographic protocols using mainstream cryptographic libraries such as OpenSSI.
This course is primarily concerned with how to write secure software, including common pitfalls in major languages.
This course covers issues related to validation and verification of the security of the software.
This course covers security and privacy issues that arise in the field and how to mitigate them, including privacy of data, privacy preserving data mining, routing security, sensor network security, anonymous routing, and social networking.
This course deals with web security issues, such as SQL injection and cross site scripting along with how to defend and protect against such attacks.
This course goes into the how and why of ethical hacking, and how it is used to strengthen security of systems, including issues in penetration testing, such as physical security and social engineering.
A study of advanced technical challenges in cyber security as the field continues to evolve. Current developments in the industry and research advances will dictate specific areas of emphasis in the course per semester.
The capstone is an opportunity for the student to demonstrate the Cyber Security skills gained throughout the program. The student will learn how to apply the tools, techniques, and knowledge gained throughout the program in a practical, real world setting. The goal for this course is to evaluate the knowledge and skills gained by students in the Cyber Security program.
Registration Restrictions: Final Semester