A Master of Science in Cyber Security is a type of postgraduate academic master's degree awarded by universities in many countries. This degree is typically studied for in cyber security. What is offered by many institutions is actually called a Master in Strategic Cyber Operations and Information Management (SCOIM) which is commonly understood to be a Master in Cybersecurity. This degree is offered by at least some universities in their Professional Studies program (GWU for one) so that it can be accomplished while students are employed - in other words it allows for "distance learning" or online attendance. Requirements for the Professional Studies program include: 3.0 or better undergrad GPA, professional recommendations letters and an essay.
Maps, Directions, and Place Reviews
Curriculum Structure
The Master of Science in Cyber Security is a one to three years Master Degree, depending on the program, some may even start with two-year preparation classes and covers various areas of computer science, Internet security, Computer security, and or Information Assurance. Programs are offered online, on-campus, or a hybrid style. Please note that some schools offer the option of a graduate certificate in Cyber Security (for those not looking to do a full program).
Topics of study may include:
- Advanced persistent threat
- Advertising network
- Analytics
- Bulletproof hosting
- Browser security
- Certificate authority
- Computer ethics
- Computer forensics
- Computer insecurity
- Computer security
- Computer security policy
- Cryptography
- Cybercrime
- Cyber-collection
- Cyber ShockWave
- Cyber spying
- Cyber security standards
- Cyberpsychology
- Cyberterrorism
- Cyberwarfare in Russia
- Dark web
- Denial-of-service attack
- Economics of security
- Electronic warfare
- Fully undetectable
- Hacker (computer security)
- Industrial espionage
- Information assurance
- Information security
- Information warfare
- Internet governance
- IT risk
- iWar
- Legal aspects of computing
- License
- Malware
- Open-source bounty
- Password cracking
- Penetration test
- Phishing
- Privilege escalation
- Proactive Cyber Defence
- Quantum cryptography
- Remote administration software
- Sandbox (computer security)
- Security management
- Signals intelligence
- Swatting
- User Error
- Vulnerability
- Watering Hole
- Zero-day attack
Source of the article : Wikipedia
EmoticonEmoticon