Boost your career by gaining the skills and knowledge to address cyber security threats from a management perspective.
The Master of Science in cybersecurity management and policy at University of Maryland University College can help you gain the tools you need to join the management track in cyber security so that you can establish, implement, and oversee a cyber security structure for an organization. Learn how to create a security approach that combines technology, governance, and compliance perspectives. Gain advanced knowledge in organizational structures, communication, operational business processes, and the legal framework for cyber security policy.
These program requirements are for students who enroll in the 2018–2019 academic year. For prior year academic requirements, visit the catalog archive in the Current Students section.
About the Cybersecurity Management and Policy Master's Degree
Coursework in the cybersecurity management and policy master's degree program features emerging topics in the field. Additionally, a board of industry leaders and employers advises our faculty to make sure our cybersecurity programs are covering emerging areas that are relevant to your career growth.
What You'll Learn
Through your coursework, you will learn how to
- Understand multinational compliance requirements for cyber security
- Apply risk analysis concepts and models to a variety of organizations
- Incorporate cyber security into numerous organizations, including healthcare and financial services organizations
- Create and establish cyber security frameworks in both the public and private sectors
- Develop complete cyber security incident response plans
In past projects, students have had the opportunity to
- Develop a cyber security program for a government entity private-sector organization
- Create cyber security policies for a government entity or private-sector organization
- Perform a cyber security threat analysis, including a vulnerability assessment, and develop a risk management approach for a government entity or private-sector organization
- Develop and determine cyber incident response procedures based on management best practices
This program can help prepare you for the following certification exam(s):
Cybersecurity Management and Policy Master's Degree Requirements
Our curriculum is designed with input from employers, industry experts, and scholars. You'll learn theories combined with real-world applications and practical skills you can apply on the job right away.
- CBR 600
- CMP 610
- CMP 620
- CMP 630
- CMP 640
- CYB 670
All courses must be taken in the order listed.
You must complete each course with a grade of B or better to advance to the next course. The grade of C is not available for these courses.
The courses in this program will have seven-day and 60-day options for the grade of Incomplete.
- You must maintain a GPA of 3.0 or higher at all times.
- All degree requirements must be fulfilled within five consecutive years.
- Any transfer credits must have been earned within the five-year time frame to be applied toward a graduate degree.
This program is designed to help IT professionals prepare to join the management team in a public- or private-sector cyber security organization and develop and oversee cyber security policy. Potential career fields include cybersecurity and policy, data protection, and information security.
Experience Recommended for Success in the Program
If you do not have work experience in information technology, an IT academic background, or IT certifications, we strongly recommend you take ASC 605, ASC 609, and ASC 611. These courses will give you a foundation that will help you succeed in the program. We recommend ASC 601 if you'd like to improve your graduate writing skills.
Facts & Figures
In Washington, D.C., especially, I think the unemployment rate for cyber security specialists is less than zero. They’re in great demand. And that’s true not just for government but for industry as well.
Former Vice President of U.S. Public Sector Cybersecurity Practice, HP Enterprise Services
One thing we do at UMUC is view cyber security holistically. For example, we offer a cybersecurity management and policy program because we recognize that cybersecurity is not just a technology problem. Technology people don't get together and work on a problem in isolation and then hand it over to policy, then legal, and then human resources. They must come together as a group to work on the problem and iron out a solution.
Emma Garrison-Alexander, PhD
Vice Dean, Cybersecurity and Information Assurance
I chose UMUC because it was one of the few cyber security policy programs and because of their reputation in the cyber world.
Cybersecurity Consultant, Deloitte
Master of Business Administration
Cybersecurity Management and Policy Master's Degree
The curriculum has a flexibility about it that I haven’t seen from other academic institutions. UMUC, I think, has cracked the code in terms of allowing it to be very agile and very much focused on the changing dimensions of cyber security.
President and CEO, Cyber Security Strategies
Student Clubs and Organizations
Type: Academic club
Available To: Undergraduate and Graduate
The Computing Club allows its student members to share experiences and offer each other guidance on academic major and career options. Club events provide opportunities for professional socialization and networking, and members are privy to club resources that will help them further their education and careers.
Type: Academic club
Available To: Undergraduate and Graduate
The Cyber Competition Team represent UMUC at various cybersecurity events and highly competitive tournaments nationwide. Being a member of the team allows students to develop their cybersecurity skills and to network with other students with similar interests.
About the Faculty
Our world-class faculty members combine academic credentials with a wealth of experience in the field.
Faculty members in this program hold or have recently held positions including
- Assistant attorney general
- Assistant deputy undersecretary
- Chief information security officer
- Chief technology officer
- Cryptologic manager
- Deputy chief, cyber security operations
- Director, server operations group
- IT director
- Team lead, cyber threat analysis
- Technical director, security engineering and testing
Our faculty work or have worked at organizations including
- Defense Information Systems Agency
- General Dynamics
- The Johns Hopkins University Applied Physics Laboratory
- Lucent Technologies
- National Biomedical Research Foundation
- National Security Agency
- Transportation Security Agency
- Science Applications International Corporation
- State of Maryland
- State University of New York
- U.S. Department of Defense
- U.S. Department of Homeland Security
The cybersecurity curriculum makes extensive use of online multimedia learning objects and interactive exercises. A minimum Internet connection speed of 512 KB per second is recommended with an up-to-date browser.
Frequently Asked Questions About the Program
Will I be able to successfully complete a UMUC cyber security graduate degree program without prior computer science or cyber security experience? +
Yes. The graduate cyber security program covers many technical topics but assumes no previous experience in cyber security or computer science. You may also want to consider the Master of Science in Cybersecurity Policy, which is less technical in nature and does not require prior technical expertise.
As the name of the program suggests, this program will help you develop your skills and competencies in management and policy. The focus of the program is on policies, procedures, and management approaches that keep networks and computer assets safe from intrusions as well as public policy relating to cyber security. These include both national and international policies by governments and organizations. The program does require that you become familiar with computer and network technologies at a foundational level.
This program is for people who want to become managers working with policies and procedures to protect networks and computer assets within a private or public organization. It is also for those who want to work with national and international cyber security policy.
This program is open to anyone. You do not need any specific background in IT. However, if you have no background in IT, you may find it helpful to take a non-credit preparation course in information technology that will give you some basic IT foundation.