Master of Science in Cybersecurity

18 Months
Yes, I want to communicate with Norwich University via SMS. I am providing my consent by leaving the opt-in checked. Message and data rates may apply. Privacy and Terms

Norwich’s 36-credit online cybersecurity program is composed of six courses, each 11 weeks in length. Students master one course at a time to create a strong foundation of knowledge and context for future topics.

Our graduates can:

  • Apply technical and management skills needed to pursue leadership positions in information security
  • Gain extensive knowledge in information security best practices, organizational structure and policy development, the regulatory environment, and management strategies
  • Develop a thorough foundation in the business, governance, and policy decisions that lead to effective solutions to current and emerging security threats

Core Courses

Our specialized program curriculum blends the management and technical aspects of an information security/assurance program, enabling you to develop the skills required to protect your organization and its critical information.

  • Foundations and Historical Underpinnings of Information Assurance


    This course explores the historical foundations of information assurance, from the early days of mainframes to the foundations of today’s sophisticated networks and distributed computing systems. You will explore the earliest thinking about data structures and domains, interoperability among various computing platforms, mechanisms for data transfer, and the emergence of encryption as a defense against early forms of computer crime. The course examines privacy, policies, security standards and regulatory requirements, and the underlying models that define information assurance. You will also be introduced to IA architecture.

  • Information Assurance Technology


    This course focuses on the use of technological defenses against threats and exploitations of vulnerabilities in information systems. Topics include physical security measures, access controls, security elements of operating systems, network security measures, anti-malware tools, anti-spam measures, anti-piracy systems, software development methods supporting security, and security certifications for software products.

  • Human Factors and Managing Risk


    This course focuses on the ways business objectives, user attitudes, and user activities significantly influence both the development of an information assurance program and its successful implementation. The first week focuses on operations security and why it’s the foundation of an IA program.

    During the following five weeks, you will explore security awareness as a component of organizational culture; the process of crafting an information assurance message; ethical decision making as a factor in security; social psychology and how behaviors influence the effectiveness of security activities; the use of employment practices and policies to support information security; and the creation of acceptable use and email policies.

    The final four weeks of the course examine elements of risk management from basic principles through application, using the NIST Special Publication 800-30 as a solid foundation for the risk management issues. You will also discuss two popular risk assessment processes and several other processes that help identify risk.

  • Information Assurance Management & Analytics


    This course covers four general areas of information assurance management and analytics – from the strategic to the tactical level: compliance; management, leadership, and policy development; relationships and adding value; and project management. You will explore the aspects, methods, and alternatives in information assurance management and compare and utilize them with respect to non-IT-related management approaches and styles. The course covers alternatives in building support and consensus for projects and activities and focuses heavily on adding value to the organization. You will examine the development of an information assurance marketing plan and use it to help identify techniques of improving information assurance awareness. Topics also include analytics in terms of both metrics and measuring business impact, and problem solving and project management techniques and alternatives.


Tailor Your Cybersecurity Degree

After completing the core curriculum, you choose a concentration that suits your career and professional goals.

Computer Forensic Investigation and Incident Response Team Management

Through this concentration, you can learn to create, train, and manage a computer security incident response team (CSIRT) and examine the protocols for conducting computer forensic investigations.

  • Computer Security Incident Response Team Management


    In this course, you will analyze and apply the key points in creating and managing a computer security incident response team (CSIRT), also known as a computer incident response team (CIRT) or a computer emergency response team (CERT). Topics include establishing CSIRTs; responding to computer emergencies; securing the CSIRT; managing the CSIRT with respect to professionalism, setting priorities for triage, and protecting personnel against burnout; and learning from emergencies using the incident postmortem and establishing continuous process improvement within the organization. Students will use their case study to apply their knowledge to real-world situations and will prepare recommendations for the establishment of a new CSIRT or improvement of their existing CSIRT.

  • Computer Forensic Investigation


    This course focuses on the spectrum of tools and techniques used to investigate digital incidents, whether in a civil or criminal environment. The course provides the broad understanding that information assurance professionals must have of the management, investigation, and analysis of digital incidents. It also places that understanding in the context of other information assurance domains. Discussions of digital investigation and forensics cover topics from both technical and management perspectives to increase the information assurance professional’s understanding and application of domain-specific knowledge.


Critical Infrastructure Protection & Cyber Crime

Our coursework examines the security of information critical to national security and the nature of conflict in cyberspace. This course will also strengthen your knowledge of supervisory control and data acquisition systems (SCADA) in the flow of resources such as electricity, water, and fuel.

  • Cyber Crime


    This course explores the nature of conflict in cyber space focusing on two major Internet-based threats to the U.S. national security: cyber terrorism and cyber crime. The course addresses questions such as: who is undertaking these cyber activities, what techniques do they use, and what countermeasures can be adopted to mitigate their impact. The course is built around a risk management framework to help information leaders leverage the benefits of Internet technologies while minimizing the risks that such technologies pose to their organizations.

  • Critical Infrastructure Protection


    This course examines the security of information in computer and communications networks within infrastructure sectors critical to national security. These include the sectors of banking, securities and commodities markets, industrial supply chain, electrical/smart grid, energy, transportation, communications, water supply and health. Special attention is paid to the risk management of information in critical infrastructure environments through an analysis and synthesis of assets, threats, vulnerabilities, impacts, and countermeasures. Critical consideration is paid to the role of Supervisory Control and Data Acquisition (SCADA) systems in the flow of resources such as electricity, water, and fuel.


Cyber Law & International Perspectives on Cyberspace

Focus on the legal and policy measures related to cyber breaches and learn to implement international cyberspace policies. Strengthen your knowledge of key topics including privacy and intellectual property, electronic contracting, non-repudiation, and fair information practices.

  • Cyber Law


    This course explores a broad variety of federal statutory, common, and international laws that may impact the information technology professional. Because the overwhelming majority of cyber infrastructure is owned and operated by the private sector, the course focus is on those laws that affect the interaction between government and the private sector information technology industry, including the privacy rights so often implicated in modern data storage systems. The course starts with a look at “cyber law” and whether it is really a distinct legal discipline at all. It then moves into criminal, civil, regulatory, international and common laws with which today’s information technology professional may come in contact. Throughout the course we discuss how public policy and other factors impact the development, implementation, and interpretation of the law. Students read, interpret and apply legal authorities and theories, a valuable skill for future information technology leaders if they are to stay in compliance with the ever-growing “cyber” legal framework.

  • International Perspectives on Cyberspace


    This course provides an overview of the issues surrounding transnational cyberspace policies, international investment strategies, and implementation of communication and information technologies that affect the global economy and transforms the flow of information across cultural and geographic boundaries. The course will examine various global governance frameworks, and organizations that shape and transform cyberspace such as the International Telecommunications Union, the World Bank Information and Communications Technology Sector and the U.S. Federal Communications Commission.


Project Management

Learn the key elements of project management, including the project process, scope, time, cost, quality, and schedule management. Students will take Project Management Techniques, Tools and Practices (GB544) and then choose either Project Management Leadership, Communications and Teams (GB554) or Strategic Management in Project Management (GB564).

Courses are cross-listed with the Master of Business Administration Program.

PMI logoAccredited by the PMI Global Accreditation Center for Project Management Education Programs (GAC)
PMI accreditation of Norwich’s project management concentration signifies that the courses meet the comprehensive academic quality and excellence standards necessary in the industry. Completion of Norwich’s project management courses only fulfills the education requirement for students interested in seeking certification through PMI. To obtain PMI certifications, such as the Project Management Professional (PMP) or the Certified Associate in Project Management (CAPM) designations, students will need to separately pursue the certification process administered through PMI, which includes submitting an application to PMI, acceptance by PMI of your application, and passing a certification exam administered by PMI.

  • Project Management Techniques, Tools and Practices


    This seminar focuses on the fundamentals of project management and practices. The key elements of project management from the project management framework, the project life cycle, project process and key project management knowledge areas are discussed. Additionally, the project integration, scope, time, cost, quality, resource and schedule management are studied. Other areas of focus are project management procurement and overall project communications.

  • Project Management Leadership, Communications, and Teams


    This seminar focuses on project management leadership, effective communications and the management of project teams. Students explore the fundamental principles of good project management, including: leadership skills, winning stakeholder cooperation, writing the rules to manage expectations, project risk management, creating realistic schedules, achieving accurate project estimates, trade-offs between project cost, schedule and quality, building strong project teams, clear communications, measuring progress, problem solving, defining clear requirements and applying lean principles in project management. This seminar discusses project leadership, communication and team management skills integrating them with  concepts from previous seminars, resulting in fundamental principles of project management being integrated with leadership, communications and team building practices and challenges.

  • Strategic Management in Project Management


    Applications from the GB 544 and GB 554 are applied in this seminar using the fundamental principles of project management from the project management framework, the project life cycle, project integration, scope, time, cost, quality, and schedule management. Students synthesize leadership skills, winning stakeholder cooperation, project risk management, building strong project teams, clear communications, measuring progress and problem solving in a proposed project. Prereqs: GB 544 and GB 554, or permission of the Program Director.


Vulnerability Management

Explore how to conduct legal and ethical security tests and vulnerability assessments and learn to use key open source tools such as the Metasploit Framework.

  • Vulnerability Management and Penetration Testing I


    This course introduces students to the penetration testing of computer networks. Students will utilize a virtual lab to gain experience through hands‐on lab exercises, and learn to use the well‐known open‐source Metasploit computer security project to understand security vulnerabilities. Students will apply this tool for penetration testing, testing the control tools, and learn how to conduct monitoring of an enterprise. Topics explored in this course include system security and vulnerability analysis, the most common system exploits and vulnerabilities, along with system “pivoting” and client‐side exploits. This course also introduces open‐source tools, in particular, the Metasploit Framework (MSF). Students will learn how to assess enterprise security controls and system vulnerability, and learn to document their findings. The course is designed for penetration testers, system security, and network administrators.

  • Vulnerability Management and Penetration Testing II


    This course introduces students to advanced open-source tools used to conduct penetration testing of computer networks. Students will learn the rules of engagement, and how to conduct legal and ethical security tests and vulnerability assessments. Students will utilize a virtual lab to gain experience through hands-on lab exercises. Students will learn to use the well-known open-source tools (Metasploit , John the Ripper, Wireshark) to understand security vulnerabilities and how to use this tool for penetration testing, testing the control tools, and how to conduct monitoring of an enterprise.


Procurement and Government Contract Management

The concentration focuses on the methods and processes of procurement and contract management at all levels of government management - federal, state, and local.

The College of Graduate and Continuing Studies at Norwich University has developed the courses within this concentration based upon NIGP’s publications and current standards in order to support the educational goals of the public procurement professional.

  • Public Procurement and Contracting


    This course examines the scope, methods and processes of forming contracts between public and private parties for the purpose of accomplishing the missions of governmental agencies at the international, federal, state/provincial and local levels. It is designed for individuals considering a career in public administration, persons employed in government agencies, public procurement personnel wishing to enhance their knowledge, and suppliers or citizens interested in learning more about the formulation of government contracts. Subject and foundational  areas such as planning, ethics, and of the legal basis of the public procurement function will be explored.

  • Government Contract Management


    Students study the concepts of contract management beginning with crafting the Request for Proposal (RFP) through contract negotiations, award, and management. Students gain knowledge of government contract management from both the government and the private sector (industry) perspective including all fields of procurement.


Career Opportunities for Cybersecurity Graduates

The cybersecurity market is expected to grow from a $75 billion industry in 2015 to a $170 billion industry by 2020.*

The demand for cybersecurity professionals is high, which means salaries are, too. Those in the field command an average salary 9% higher than other IT workers, according to the Job Market Intelligence: Cybersecurity Jobs 2015 report.

Career opportunities for those earning a Master of Science in Cybersecurity are on the rise, outpacing the availability of qualified professionals in the industry.

Our graduates have pursued a variety of roles, including:

Career Roles

  • Chief Information Assurance Officer
  • Chief Information Security Officer
  • Chief Risk Manager
  • Consultant
  • Cyber Security Engineer
  • Director of Information Systems
  • IT Security Manager
  • IT Specialist
  • Network Engineer
  • Security Compliance Manager
  • Security Liaison

Our alumni have attained positions at top organizations, including:

Public Sector

  • Baxter Healthcare
  • Pacific Rehabilitation and Behavioral Health
  • Louisiana Tech University
  • Naval Undersea Warfare Center
Private Sector

  • Triad Retail Media
  • Raytheon
  • E3 Technologies, Inc.
  • Madison Gas and Electric Company
  • American Family Insurance
  • Worldwide Language Resources


What our graduates have to say:

  • of responding graduates stated that their Norwich education gave them a competitive edge in the job market.**
  • of responding alumni would recommend Norwich’s online program to someone they know.**
  • Read more about our student outcomes.

**Source: Norwich University Master of Science Information Security & Assurance Graduate Survey, fielded March 2016

Our Master of Science in Cybersecurity program is led by dedicated faculty and staff members who are available to help you reach your academic, professional, and personal goals.

Our faculty members hold advanced degrees and industry certifications and are subject matter experts and practitioners in topics including organizational governance, cybersecurity threats, risk management, and cyber crisis management.

We have an in-house instructional design team who work hand-in-hand with program faculty and staff to ensure a world-class, efficient, and interactive online learning experience in each course.

MSN Admissions Advisor

Admissions Advisor
Admissions Advisor
Admissions Advisor

Speak to one of our knowledgeable admissions advisors today - we can help answer your questions about your program of interest.

Master of Science in Nursing: Adult Gerontology Acute Care Nurse Practitioner
Master of Science in Nursing: Family Nurse Practitioner
Master of Science in Nursing: Psychiatric Mental Health Nurse Practitioner
Master of Science in Nursing: Healthcare Systems Leadership

Henry Collier


Henry Collier is the program director for Norwich University's online Master of Science in Cybersecurity program, and he is the program manager for Norwich University's online Bachelor of Science Cybersecurity and Bachelor of Science in Computer Science & Information Systems programs. He has developed and taught courses in computer networking, systems administration, computer programming, relational database design and management, information assurance, network security, healthcare information technology and digital forensics. Prior to coming to Norwich, he was the Program Director for Computer Technology and Cybersecurity & Healthcare IT at River Valley Community College where he rejuvenated the Cisco Networking Academy and managed a National Science Foundation Advanced Technological Education grant to develop the Cybersecurity & Healthcare IT program. Before entering the academic arena, he worked for several years in the private industry as a telecommunications/information technology specialist. Henry served six years on active duty in the Army, stationed in Korea and Kentucky, and he currently has 23 years in the Army Reserves, where he has risen to the rank of Chief Warrant Officer 3 as an Cyber Operations Technician. He has a Ph.D. in Engineering with a concentration in Security, a master’s degree in Managing Innovations and Information Technology from Champlain College and a bachelor's degree in Information Technology with a concentration in systems analysis and design from Granite State College. He lives in Vermont with his wife and their daughter and son. In his free time he enjoys writing short stories, riding his bike, playing the guitar, cooking, gardening and woodworking.

I wanted to advance my career and knowledge. Having finished the CISSP certification recently, this was a natural next challenge, to attain the master's degree in information assurance. Meghan Rioux Norwich Graduate, Class of 2016 zulqamain ali shah, norwich graduate
Achieve Your Career Goals Help Secure Your Future with Specialized Information Security Skills

Now more than ever, organizations are looking for cybersecurity experts. Norwich University’s online Master of Science in Cybersecurity program can help you develop the business acumen and management skills needed to lead the field. Graduates of our program are armed with the skills they need to help ensure that information assets are understood, valued, and protected within the complex business enterprise.

Request more information about this program.


Master of Science
  • Computer Forensic Investigation and Incident Response Team Management
  • Critical Infrastructure Protection and Cyber Crime
  • Cyber Law and International Perspectives on Cyberspace
  • Project Management
  • Vulnerability Management
  • Procurement and Government Contract Management
100% Online 100% Online Courses completed entirely online 15 Students 15 15 Students Maximum number of students per class 18 Months 18 Months Average time to program completion Next Start Date 8 June Next Start Date App Deadline 11 May Application Deadline Why Norwich?

Tailor your learning experience with six concentration options.

Join a program ranked #2 for cybersecurity by the Ponemon Institute (2014).

Learn from one of the earliest institutions to be recognized as a Center of Academic Excellence in Information Assurance Education* by the National Security Agency and Department of Homeland Security.

Benefit from a leader in information assurance instruction for more than a decade.

Receive continuing professional education credits as a member of ISACA or (ISC)2.

Apply to one of four start dates per year.

*Now referred to as a Center of Academic Excellence in Cyber Defense.


Accreditation & Recognition
logo, new england commission of higher education

Norwich University is accredited by the New England Commission of Higher Education (formerly the Commission on Institutions of Higher Education of the New England Association of Schools and Colleges, Inc.).

logo, national security agency

Norwich University has been designated as a Center for Academic Excellence in Cyber Defense Education by the National Security Agency and Department of Homeland Security.


Amy Immen

Student Support Advisor

Amy joined Norwich University’s advising team in August 2019. Prior to Norwich, Amy worked as an admissions counselor at another university. Amy has a B.A. in English and B.S. in secondary education from the University of Vermont, and a M.A. in English and creative writing from Southern New Hampshire University. Amy enjoyed working in secondary education and early childhood education before finding her home in higher education.

profile image

D. Stuart McCubbrey


D. Stuart McCubbrey has more than 30 years of experience in information technology audit and information security management/consulting. He is currently the director of IT risk management & compliance at General Motors in Detroit, MI, leading a team responsible for IT Risk Management, IT Regulatory Compliance (SOX, PCI, HIPAA) and IT Security Metrics, reporting to the chief information security officer. Prior to this role, Stuart led the global Information Technology Audit function at GM.

D. Stuart

Jerry Dixon


Jerry is the Chief Information Security Officer for Crowdstrike. Jerry has over two decades of cybersecurity experience on the front lines of incident response, cyber crisis management, national cybersecurity policy, and critical infrastructure protection. Most recently as the Vice President of Cyber Threat Intelligence and Incident Response for American Express. Prior to that, he has led teams at Cisco, IRS, Marriott, and Homeland Security. Most notably as the Director of the National Cyber Security Division and US-CERT.


Get to know the graduates of Norwich’s online Master of Science in Cybersecurity (formerly M.S. in Information Security & Assurance) program.



At a Glance

  • No GRE/GMAT required
  • Undergraduate GPA of 2.75 or higher

Contact Admissions

Monday - Friday: 8 a.m. to 4:30 p.m. EDT
Extended hours available by appointment

Call: 1-802-962-4330

  • student writing in notebook
    Transfer Credits
    You may receive the equivalent of up to 12 semester credits for study conducted elsewhere. Norwich complies with VA regulations and guidelines as it pertains to transfer credits.
  • international student at graduation
    International Admissions
    Norwich University welcomes students from all countries who want to study through our online programs. You must complete all steps in the admissions process.
  • benjamin bragdon on norwich campus, graduate
    Norwich Alumni Benefits
    Reconnect with Norwich to complete your master's degree. As a part of our alumni community, you are eligible for a $2,500 scholarship and other benefits.

Eligibility Requirements

  • A bachelor's degree from a regionally or nationally accredited U.S. institution, or an equivalent degree from a foreign institution, as evaluated by WESIERFSpanTran, or CED.
  • If English is not your first language, proof of English language proficiency is required.  This can be demonstrated in one of three ways:
    • TOEFL - a minimum score of 550 (paper-based test) or 80 (Internet-based test) is required.*
    • IELTS – a minimum composite score of 6.5 is required.*
    • The applicant holds a baccalaureate or master’s degree from a college/university/institution in which the primary language of instruction was English.

Please Note:  All eligibility requirements are expected to be met unless noted in specific articulation agreements or memoranda of understanding (MOUs).

Application Process

We encourage you to contact an admissions advisor (see below) if you need help at any stage of the application process. You will be required to submit the following items:

  • Application form
  • Resume that includes 3 professional references with contact information; please specify any current industry certifications you may hold, such as CISSP, CISM
  • Official transcript of your undergraduate degree from a regionally or nationally accredited university
  • Letter of intent
  • Proof of English language proficiency if applicable (TOEFL)

To contact an admissions advisor:

Phone: 802-962-4330


Norwich provides a top-notch educational experience; we also work hard to help make it affordable. There are many ways to get financial aid and several strategies to help you finance your education. Norwich is committed to making this often-difficult process easier for you.

Tuition at a Glance

  • Credit Hours: 36
  • Cost Per Credit Hour: $850
2021-22 Tuition and Fee Schedule - Master's Programs

Technology - $300/term
Library - $75/term
Graduation - $150/one-time


Featured Alumni

What courses can I take in the cybersecurity program?

Students can choose from a variety of courses specific to their interests in the field of cybersecurity. Course topics include foundations and historical underpinning of information assurance, use of technological defenses against threats, exploitations of vulnerabilities in information systems, operations security, and risk management.

What concentrations are available?

Students can choose one of six concentrations:

  • Computer Forensics and Incident Response Management
  • Critical Infrastructure Protection & Cyber Crime
  • Cyber Law & International Perspectives on Cyberspace
  • Project Management
  • Vulnerability Management
  • Procurement and Government Contract Management
What will my case study involve?

The purpose of the case study is to make real-world assessments of security principles and practices and apply lessons learned in the program to that real-world environment. The cybersecurity program recognizes that there are confidentiality concerns, and has put in place safeguards in order to maintain confidentiality.

How have graduates of the program applied their degree?

Our alumni have found employment with notable organizations such as the U.S. Army, Boeing, Bank of America, Department of Defense, IBM, AT&T, and Fidelity.

How are the cybersecurity program faculty members selected?

Cybersecurity program instructors all have advanced degrees (some are terminal) and must be currently certified as a CISSP or CISM. Other certifications may be honored if they relate to specific curriculum areas. They must demonstrate enthusiasm for university/college-level teaching, and solid, practical experience in information assurance. The faculty roster includes practitioners, publishers, speakers, writers, teachers, consultants, and senior executives.

What are the eligibility requirements for applying to the program?
  • A bachelor's degree from a regionally or nationally accredited institution or an equivalent degree from a foreign institution, as evaluated by WES, IERF, or SpanTran.
  • The GRE is not required to apply, but may be requested based upon an applicant's undergraduate GPA.
  • If English was not the language of degree study, proof of English language proficiency and a minimum score of 550 (paper-based test) or 80 (Internet-based test or iBT) on the TOEFL are required, unless otherwise noted in specific articulation agreements.


How long is the cybersecurity program?

The program's six courses (each six credits) take approximately 18 months to complete. Depending on when you start the program, you can expect your degree to be conferred in 18 to 24 months.

Is the online Master of Science in Cybersecurity program accredited?

In addition to the University’s regional accreditation, Norwich has been certified by the National Security Agency and Department of Homeland Security as a Center of Academic Excellence in Cyber Defense.

Will I be able to take my CISSP certification exam while studying at Norwich University?

In the past, students have had the opportunity to take their exams while at Norwich University as the exams’ timing coincided with the Residency Conference, although there is no direct preparation or connection to the residency activities.

How much is the online Master of Science in Cybersecurity program?
  • Credit Hours - 36
  • Price Per Credit - $850
  • Term Tuition - $5,100
  • Technology - $300/term
  • Library - $75/term
  • Graduation - $150/one-time
  • Total Program Cost (6 terms): $33,000



Does Norwich accept transfer credits?

When you apply for admission to the cybersecurity program, you can submit transcripts and course outlines from previously attended institutions of higher education to be considered for transfer credits. Transfer credits will be evaluated on a case-by-case basis and may be accepted for up to 12 credits. Norwich complies with VA regulations and guidelines as they pertain to transfer credits.

Learn more about Norwich University’s transfer credit policy.

Get Program Details This will only take a minute.

Scholarship Opportunities

Norwich University offers a range of opportunities to help you lower your overall tuition costs. Contact our admissions team today to learn more about the below options. Please note that scholarships are not additive. In addition to the below scholarships, students may also be eligible for discounts if their organization partners with Norwich University.

Achievement Scholarship

Recognizing your past academic and professional achievements, the Achievement Scholarship is for newly enrolled students. You could receive a $4,200 scholarship, which will be distributed equally over the courses of the program. To be considered for this scholarship opportunity, submit your application package (application form, resume, letter of intent, and essay (if applicable)) for your program of interest at least one week prior to the upcoming application deadline. The Scholarship Selection Committee will review all application materials and select the recipient. 

Norwich Alumni Scholarship

Norwich University alumni and their spouses, parents, and children are eligible to receive our Alumni Scholarship. The scholarship is awarded for each term of enrollment at $425 per term.

Active Duty Military Scholarship

Active duty, National Guard, and Reserve personnel are eligible to receive a $250 award for each term of enrollment in an online master’s degree program.


Apply Now Learn More About our Online Master of Science in Cybersecurity 23581 0 0