Program Codes:
MSCYBSC
Master of Science
Availability: online, campus
Mission Statement
Mercyhurst’s Master's program in Cybersecurity is built upon the firm belief that the evolving digital landscape necessitates welcoming people from a diverse background and disciplines. The program aims to prepare the next generation of cybersecurity experts and practitioners in this vital field, armed with the skills, knowledge, and perspectives necessary to safeguard the integrity of our increasingly interconnected world. The program provides a comprehensive, state-of-the-art, and technically rigorous education that aligns with current industry standards and future trends.
This program is designed for students who are passionate about understanding and addressing the sophisticated digital security threats that businesses, governments, and individuals face every day. Through a combination of theory, practical learning, and innovative research, we strive to equip our graduates with the technical, strategic, and managerial skills necessary to excel in their professional endeavors and become leaders in the field of cybersecurity.
Technical and practical skills form the cornerstone of our program. We provide a robust foundation in areas such as advanced cryptography, network security, threat detection, risk management, ethical hacking, cloud security, web security, and data privacy. These technical competencies are supplemented with the development of cyber-ethics understanding, legal and regulatory compliance, and effective communication skills.
Our program integrates simulated real-world scenarios and hands-on laboratory exercises using cutting-edge technologies and tools. This gives students the opportunity to apply learned theoretical concepts to practical problems, fostering creativity and critical thinking. Additionally, our curriculum prepares students for various industry-recognized certifications, including those from our academic partner Ec-Council such as Certified Ethical Hacker (CEH) and others such as ISC2 Certified Information Systems Security Professional (CISSP), and Certified Cloud Security Professional (CCSP), which are crucial for enhancing their career prospects. Through our Master's Degree in Cybersecurity program, we are committed to developing cybersecurity professionals who can anticipate, prevent, and mitigate cyber threats, ensuring the digital security of organizations and societies around the globe.
Computing & Information Science studies the design, application, use, impact, and ethical implications of computational principles and technology. This foundational class prepares students for advanced courses in Data Sciences, Cyber Secutity, and Cyber Risk Management. Topics covered include: computer organization, data structures, computer programming, networking concepts, computer security, and ethics.
This course introduces students to the principles and techniques of penetration testing and ethical hacking. Course topics include, reconnaissance, scanning, exploitation, and result reporting. The students will learn how system vulnerabilities can be exploited and the way to avoid such problems.
This course introduces students to fundamental concepts of computer programming. Topics include: algorithms, abstract data types, linear and non-linear data structures, and software engineering. Students will get hands-on experience with the use of a high level programming language to search and sort data.
This foundational course prepares students to better understand today's cyber networks and how they can support the requirements of organizations. It introduces networking basics and demonstrates how networks can support the increasing demands of advanced communications. The course examines networking standards, protocols, architectures, management and security.
Provides a comprehensive overview of essential concepts to better understand cyber security. This course explores the risks, threats, and vulnerabilities associated with the digital world and introduces students to the principles of risk management, security standards, access controls, security audits, cryptography, compliance laws and privacy issues.
This course intorduces students to the principles and practice of digital forensics that includes computer crime, intellectual property, privacy issues, legal codes; risks, vulnerabilities, and countermeasures; methods and standards for data extraction, preservation, analysis and deposition of legal evidence in a court of law.
This course introduces students to network security and information security. The student will be introduced to network vulnerabilities and threats and how to safeguard computer networks from those vulnerabilities and threats. This course will expose the student to network security planning, network security technology, network security organization, confidentiality and authentication protocols, botnets, firewalls, intrusion detection systems, and communication privacy and anonymity.
This course examines the legal aspects of the information security triad of availability, integrity, and confidentiality and prepares students to address areas where law and cyber security concerns meet. Topics include: risk analysis and incident response, intellectual property law, contracts in online transactions, tort law issues in cyberspace, the concept of privacy and its legal protections and the governance of information within organizations.
This course focuses on the security aspects of systems that are compose of components and connections and use software. It addresses the security issues of connecting components and using them within larger systems. It covers the principles, models and techniques of access control, authentication, secure communication and audit, system's virtualization, real-time systems, software and OS security.
This course will describe the Cloud security architecture and explore the guiding security design and development principles, security patterns, industry standards, applied technologies and will address regulatory compliance requirements critical to design, implement, deliver and manage secure cloud-based services.
This course provides students an overall understanding of the most common web attacks and their countermeasures. This course deals with web security issues, such as web authentication, directory traversal, SQL injection, cross site scripting, and other web vulnerabilities.