Online Master of Cyber Security » Schools » ​University of Southern California
​University of Southern California – Online Master of Science in Cyber Security Engineering2018-09-26T23:15:56+00:00

​​University of Southern California – Online Master of Science in Cyber Security Engineering

Program Overview

According to the University of Southern California:

The Master of Science in Cyber Security Engineering is intended for graduate students who desire to: a) obtain jobs in which computer network operations knowledge and skills are required; b) continue an education path toward a doctorate degree with focus on information security. It is also for individuals who are in degree programs or job fields that have some responsibility with information security and desire enhanced knowledge and skills. The degree focuses on the fundamentals of developing, engineering and operating secure information systems. Students will be well versed in the challenges and problems of secure operating systems, secure applications, secure networking, use of cryptography and key management. They will understand how to develop a security policy and how policy drives technology decisions. Students will have hands-on experience in situations that simulate real world scenarios with all technical and theoretical situations through extensive laboratory work, which are designed by current and former information security practitioners.

At a Glance

URL https://online.usc.edu/programs/cyber-security/
Total credit hours 28
Tuition per credit Tuition and fees
Full-time/part-time/accelerated Full-time/part-time
Time to complete 1.5-3.5 years
Admission requirements According to the University of Southern California, to be eligible for admission to the Master of Cyber Security program, applicants must fulfill the following requirements:

  • An undergraduate degree in computer science, electrical engineering or information security
  • Programming capability
  • Understanding of computer networking and computer operating systems
  • Desire to learn information security techniques and tools that are directly applicable to current information security challenges
  • Above average mathematical foundation.