M.S. in Cybersecurity
Credit Hours
Month Completion
Class Type
100% online
Next Start Date
Aug 19, 2024
Placement Tests
GMAT/GRE not required for admission

Enhance your skills in emerging technologies with an online master’s in cybersecurity

Every 39 seconds one computer with internet access is attacked. With over 2,000 attacks every day, we are constantly under the threat of the next cyberattack. In a rapidly growing industry like cybersecurity, curious and well-trained professionals have the opportunity to make an immediate impact. Franklin’s M.S. in Cybersecurity equips you with theory-based knowledge and application-oriented security skills to institute cybersecurity measures as a standard business process. At Franklin, you’ll earn a comprehensive degree that enables you see the big picture, translate technical issues to all audiences, and develop solutions that minimize risk. 

Finish in as Few as 16 Months

Earn your degree and prepare for advancement faster.

$2,000 Smart Start Scholarship

New students in the M.S in Cybersecurity program qualify for an automatic $2,000 scholarship.

100% Online Coursework

Balance earning your degree with other work-life commitments.

Hands-On Learning

Use industry-leading tools to build your skills in the fast-growing field of cybersecurity.

No GRE/GMAT Required

Bypass expensive, time consuming tests and get started sooner.

M.S. in Cybersecurity Program Overview

Prepare yourself for a cybersecurity career at the operational, tactical or strategic level

Whether you want to advance your career in cybersecurity or transition into more cyber-focused roles, Franklin’s M.S. in Cybersecurity is a great way to broaden your knowledge and skills. Aligned with industry-leading certifications, the program’s inclusion of emerging technologies like cloud, containers and Blockchain will make you an asset in government or a wide variety of industries including insurance, retail, or banking and finance.

By applying your technical and critical thinking skills, you’ll be able to help organizations navigate cybersecurity challenges at the operational, tactical and strategic levels. With these sought-after abilities your marketability will increase, as demand for cybersecurity professionals is projected to grow 9% through 2031.*

Throughout the 16-month M.S. in Cybersecurity program, you’ll build a strong foundation in the basics with courses in cryptography, advanced network security, ethical hacking and security governance. You’ll learn from credentialed experts and gain in-depth understanding of relevant concepts, theories and techniques.

Build your competencies in cyber defense through hands-on coursework

At Franklin, experiential learning is an essential part of the cybersecurity curriculum. You’ll apply what you learn in order to prepare you to overcome real-life challenges. You’ll have an opportunity to mimic common security threats – hacking websites and wireless networks, sniffing networks to capture passwords, and spoofing network packages – in order to secure networks and prevent data theft and intrusion. 

However, cybersecurity is not only a technical domain; it also has organizational, legal, ethical and managerial aspects. In addition to technical expertise, you’ll gain management-level knowledge by examining strategic aspects of cybersecurity such as ethics, privacy, and information security policy and governance. 

As part of your transformation into a well-rounded cybersecurity professional, you’ll also build the soft skills employers desire. Throughout the program you’ll sharpen your communication, presentation and listening skills to differentiate yourself, whether you are working as part of a team or you want to position yourself as a solutions-oriented leader. 

Shorten your time to completion and lower your degree cost 

Because the M.S. in Cybersecurity coursework is aligned with industry competencies, you can get credit toward the degree for prior learning. A current EC-Council Certified Ethical Hacker (CEH) credential aligns with Ethical Hacking (ISEC 670), which translates into 4 credit hours toward your degree and $2,680 in tuition savings. Other credentials with prior learning credit pathways into the cybersecurity master’s include ISACA CRISC as 4 hours of credit for Information Risk Management (ISEC 630), (ISC)2 CISSP as 4 hours of credit for Information Assurance (ISEC 610) and (ISC)2 CSSLP, which has been evaluated to be equivalent to Software and App Security (ISEC 620), also a 4-credit-hour course.

In addition to awarding prior learning credit for credentials, the University also awards transfer credit for credit earned at other accredited institutions. You can transfer up to 12 credits – a 30% cost savings – toward your degree, through certifications, previous coursework or a combination. 

To see if your previous coursework can be used for course-for-course credit to satisfy degree requirements, you’ll need to submit a syllabus for the course(s) you’d like to have evaluated for transfer credit and/or your credential documentation. Your admissions advisor will be happy to assist you in any way.  

Have another credential not listed here? Check our prior learning database to see if it has been evaluated for credit. 

Choose an online cybersecurity master’s degree that’s built for busy adults

As an accredited, nonprofit university, our focus at Franklin is on you. Our team of academic advisors will help ease your transition to becoming a student, while our flexible course schedules and 100% online coursework help to balance your education with work, family and life. 

Students rate our faculty members as top-notch for the real-world expertise they are able to bring to the coursework. When you need help, your instructor is just a phone call or email away. You can also rely on support resources from the Learning Commons, like workshops, tutoring sessions and library services. Get started on your future today.


*Source information provided by Economic Modeling Specialists International (EMSI)

Read more >

Jayashree Ramanathan

M.S. Cybersecurity '23

"I am grateful to 鶹ýɫƬ for providing me with the necessary tools and support to succeed in my academic endeavors. My professors were always available to answer my questions and provide guidance when needed, which led me to earn badges and certifications that further solidified my knowledge of cybersecurity. I am proud of what I have accomplished, and I believe that my journey at 鶹ýɫƬ can inspire others."

Future Start Dates

Start dates for individual programs may vary and are subject to change. Please request free information & speak with an admission advisor for the latest program start dates.

Fall 2024
Recommended Register By:
Aug 9
Fall 2024
Recommended Register By:
Sep 20
Spring 2025
Recommended Register By:
Dec 27
Spring 2025
Recommended Register By:
Feb 7
Summer 2025
Recommended Register By:
May 9
Fall 2025
Recommended Register By:
Aug 8
Fall 2025
Recommended Register By:
Sep 19
Spring 2026
Recommended Register By:
Dec 26
Spring 2026
Recommended Register By:
Feb 6
Summer 2026
Recommended Register By:
May 8

Your Best Value M.S. in Cybersecurity

Choose Franklin's Master in Cybersecurity and get a high-quality degree that fits your life and your budget.

Affordable Tuition


Affordable tuition rates for the M.S. in Cybersecurity provide value and quality.

Automatic Smart Start Scholarship

Total Tuition
Automatic Scholarship
Tuition with Scholarship

Franklin’s competitive tuition rate and our Smart Start Scholarship puts your degree within reach.

Partner? Pay Less.

Search below to see if you could save tuition through an employer or professional organizations.

Total Tuition
(After Partner Discount)

Finish Fast


Realize your career goals sooner.

Tuition Guarantee

Inflation-proof your degree cost by locking-in your tuition rate from day one through graduation.

Highly Recommended


98% of graduating students would recommend Franklin to their family, friends and/or colleagues.

Source: 鶹ýɫƬ, Office of Career Development Student Satisfaction Survey (Summer 2023)


Master's in Cybersecurity Courses & Curriculum

36 Semester Hours
Major Area Required
CYSC 610 - Information Assurance (4)

This course covers the fundamentals of security in the enterprise environment. Included are coverage of risks and vulnerabilities, threat modeling, policy formation, controls and protection methods, encryption and authentication technologies, network security, cryptography, personnel and physical security issues, as well as ethical and legal issues. This foundational course serves as an introduction to many of the subsequent topics discussed in depth in later security courses. Note, this course has proctored exam(s). This exam requires additional technology, if student uses online proctoring.

CYSC 620 - Software and App Security (4)

Today, software is at the heart of the business processes of nearly every business from finance to manufacturing. Software pervades everyday life in expected places like phones and computers but also in places that you may not consider such as toasters, thermostats, automobiles, and even light bulbs. Security flaws in software can have impacts ranging from inconvenient to damaging and even catastrophic when it involves life-critical systems. How can software be designed and built to minimize the presence of flaws or mitigate their impacts? This course focuses on software development processes that identify, model, and mitigate threats to all kinds of software. Topics include threat modeling frameworks, attack trees, attack libraries, defensive tactics, secure software development lifecycle, web, cloud, and human factors.

CYSC 630 - Information Risk Management (4)

When audits, technology, or compliance become the driver for security initiatives the resulting program is strategically fragmented, reactive, and rigid. Moreover, there are few, if any, assurances that the biggest threats are being addressed. On the other hand, risk assessment places values on assets, evaluates the current controls, and provides data to improve the protection in a controlled, proactive, and flexible manner. This course teaches an approach to security that combines operational security, risk assessment, test and review and mitigation such that value can be demonstrated. A project-based approach to risk assessment is followed including, project definition and preparation, data gathering, technical information, physical data gathering, analysis, mitigation, recommendations, and reporting. Note, this course has proctored exam(s).

CYSC 640 - Cryptography (4)

The cryptographic primitives of enciphering/deciphering and hashing are the two main methods of preserving confidentiality and integrity of data at rest and in transit. As such, the study of cryptographic techniques is of primary interest to security practitioners. This course will cover the important principles in historical and modern cryptography including the underlying information theory, mathematics, and randomness. Important technologies such as stream and block ciphers, symmetric and asymmetric cryptography, public key infrastructure, and key exchange will be explored. Finally, hashing and message authentication codes will be examined as a way of preserving data integrity.

CYSC 650 - Advanced Network Security (4)

Networks connecting disparate devices, services, and users have been among the most ubiquitous technologies that have led to the spectacular economic and technical success of the Internet. Today, networks seem to disappear, only to receive attention when they fail or are breached by attackers. While firewalls and virtual private networks are mainstays of network security, a strategy built on these alone is insufficient. This course covers a more comprehensive and systematic approach to network security including monitoring, incident response, forensics, virtualization and cloud, secure protocols, cryptography, and web services

CYSC 660 - Cybercrime, Ethics, and Privacy (4)

The prevalence of data breaches, identity theft, and the dark net today makes the study of digital cybercrime, ethics, and compliance highly relevant to information security. Laws related to intellectual property, privacy, and criminal and civil proceedings will be discussed. Ethical behavior and frameworks for navigating between customer and business concerns in the workplace are also emphasized.

CYSC 670 - Ethical Hacking (4)

When most people think of information security the images that come to mind are those of hackers: secretive people who, for political or profit motives, illegally break into computer systems to steal data or cause mayhem. While that kind of criminal element does exist, ethical hackers provide a needed service to organizations seeking to test and refine their security plans and technologies. This course takes an in-depth approach to ethical hacking including reconnaissance, scanning, vulnerability analysis, exploitation, and reporting. Students will employ current tools and methods in a hands-on approach that also prepares them for the Certified Ethical Hacker (CEH) exam. Note, this course has proctored exam(s).

CYSC 680 - Information Security Policy & Governance (4)

As organizations have fallen victim to the proliferation of cyberattacks in recent years, many have responded reactively, thereby developing a posture that "wins the previous war." However, regulations and laws are now necessitating a more proactive stance. Organizations that can develop an effective security strategy stand to gain as they balance business with security. This course is about leading organizations in developing an effective information security program via policies, frameworks, architecture, standards, organizational hierarchies, controls and metrics with the end goal being a proactive security posture tailored to the specific business needs.

CYSC 690 - Security Research and Capstone (4)

This course, the final one in the program, challenges students to research a current topic of interest in information security and produce an original paper and presentation on the topic. Alternately, students may complete a capstone project in which they engage a real-world client for the purpose of security assessment, governance, audit, testing, risk analysis, or remediation. The course will also cover current and emerging issues in information security and privacy. Complete course in final term of program.

COMP 501 - Foundations of Programming (4)

This course covers fundamental programming principles. Students will learn about the basic elements of a computer program, such as data types, assignments, conditional branching, loops, functions, recursion, basic data structures, program debugging, and testing.

OR ITEC 136 - Principles of Programming (4)

This course introduces programming to individuals with little or no programming background. The goal of this course is to introduce the fundamentals of structured programming, problem solving, algorithm design, and software lifecycle. Topics will include testing, data types, operations, repetition and selection control structures, functions and procedures, arrays, and top down stepwise refinement. Students will design, code, test, debug, and document programs in a relevant programming language.

OR COMP 111 - Introduction to Computer Science & Object-Oriented Programming (4)

This course provides an introduction to software construction using an object-oriented approach. The student learns and reflects on problem analysis, object-oriented design, implementation, and testing. To support the concepts and principles of software construction, the student will design, code, test, debug, and document programs using the Java programming language. Basic data types, control structures, methods, and classes are used as the building blocks for reusable software components. Automated unit testing, programming style, and industrial practice are emphasized in addition to the object-oriented techniques of abstraction, encapsulation, and composition. Note, this course has proctored exam(s).

ITEC 504 - Foundations of Networks and Systems (4)

This course will provide the knowledge and hands-on skills necessary for the function, design, administration, and implementation of computer networks and basic administration of the Linux operating system. The first half of the course covers the fundamentals of computer networks, OSI networking model, TCP/IP protocol suite, fundamental protocols, wireless networks, virtualization, cloud computing, monitoring, and troubleshooting. The second half covers Linux operating system concepts, including installation, package, file, process, disk & user management, logging, and system security.

(COMP 204 - Principles of Computer Networks AND ITEC 400 – Linux Administration) OR ITEC 350 - Windows Administration is equivalent to ITEC 504. Graduate prerequisite courses must be completed with a grade of "C" or better. Undergraduate prerequisite courses must be completed with a grade of "C" or better.


Free Master's Toolkit

Eliminate guesswork by comparing schools and calculate the ROI of a master’s degree.

Industry Aligned

National CyberWatch Center

Through our Center for Public Safety and Cybersecurity Education, a member of the National CyberWatch Center, the University collaboratively engages in efforts to advance cybersecurity education and strengthen the nation’s cybersecurity workforce. In service to communities and individuals, we provide access to the latest research impacting the industry, as well as innovations in cybersecurity education and training.   

Center for Public Safety and Cybersecurity Education

鶹ýɫƬ’s Center for Public Safety and Cybersecurity Education provides the skills necessary to prepare professionals to effectively prevent, solve and investigate cybersecurity issues and challenges. The Center’s offerings leverage its faculty – who are both thought leaders and practitioners – along with 鶹ýɫƬ’s reputation for excellence in curriculum and course development to create learning experiences that address prevailing security concerns within industries and communities.

Learn More

Microcredentials Align with Job Essentials

In today's dynamic work environments, adaptive professionals thrive. A microcredential - either as a stand-alone course or integrated into your degree program - is a short, skill-specific recognition that enables you to demonstrate your competency in a distinct area. Like Franklin's degree programs, microcredentials are aligned with market and industry demand to ensure what you learn can be put to use right away. Microcredentials are easily shared via digital badges and can be stacked to create a unique portfolio of in-demand skills.

M.S. in Cybersecurity Program Details

Request Free Information!

Want to learn more about 鶹ýɫƬ? Complete the simple form - it just takes a minute!

  • Invest in yourself by finishing your degree.

  • Take advantage of flexible courses that fit your busy schedule.

  • Finish faster. Save more. Franklin fits your life.

  • Get in-demand knowledge that helps Franklin grads stand out with top employers.

Request Information

Step 1 of 3
Get Started >< BackNext >Submit
In submitting my contact information, I understand that I will receive phone calls, text messages and email about attending 鶹ýɫƬ. I may opt out of these communications at any time.

Your privacy is important to us. Privacy Policy

Cybersecurity Career Opportunities

Cybersecurity Manager

Cybersecurity managers monitor operations and infrastructure, maintain security tools and technology, ensure policy and regulation compliance and work within the organization to reduce risk. 

Cybersecurity Engineer

Cybersecurity engineers maintain system integrity by defining access privileges, identifying problems and reporting violations, implementing security improvements and conducting periodic system audits.

Cybersecurity Architect

Cybersecurity architects evaluate business strategies and requirements to determine security requirements, conduct system security and vulnerability analysis and risk assessments, and evaluate technology options to plan security systems. 

Network Engineer

Network engineers design system configurations, direct system installation, and define, document and enforce system standards in order to establish an organization’s networking environment. 

Penetration Tester

Penetration testers perform and review tests on a wide range of systems (web, infrastructure and wireless) to identify security risks and communicate findings and solution strategies to technical staff and business stakeholders.

IT Auditor

IT auditors may work independently or as part of a team to test and document procedures in order to communicate results and recommend process improvements that mitigate risks to key business and IT stakeholders.

Cybersecurity Employment Outlook


For 2021-2031 jobs in Cybersecurity are expected to increase by 9%

All Occupations

4,174,602 jobs
4,565,120 jobs
Show Details >

Web Developers and Digital Interface Designers

198,907 jobs
222,454 jobs

Computer Systems Analysts

622,728 jobs
677,941 jobs

Database Administrators and Architects

141,582 jobs
156,869 jobs

Network and Computer System Administrators

361,626 jobs
385,521 jobs

Source information provided by Lightcast.

Cybersecurity Knowledge & Skillsets

Gain in-demand skills sought by employers with curriculum that teaches you:

Which Cybersecurity Program is Best for You?

Find the Cybersecurity Program That Fits Your Goals

If you’re interested in advancing your cybersecurity career, Franklin has several great options. Compare programs and identify your perfect match.

section_icons/si-document_info-color Created with Sketch.
section_icons/si-document_info-white Created with Sketch.
M.S. in Cybersecurity
icon_tiles/it-computer-color Created with Sketch.
icon_tiles/it-computer-white Created with Sketch.
M.S. in Computer Science - Cybersecurity
Widget Assets / Tab Icon / Documents - Color Created with Sketch.
Widget Assets / Tab Icon / Documents - White Created with Sketch.
M.S. in Information Technology - Cybersecurity

Grow your knowledge and experience with emerging cybersecurity technologies, methodologies and strategies.

Build leadership and technical skills along with cutting-edge application of cyber defense strategies and tactics.
Put your M.S. in Cybersecurity to work delivering risk-based, business-driven security strategies and action plans.
How many courses are in the program?
Nine courses (three 6-week courses and six 12-week courses)
How quickly can I complete the program?
16 months

Expand your technology capabilities to include identifying and developing security-focused software solutions.
Advance your software development skills and expand your understanding of cryptography.
Use your M.S. in Computer Science-Cybersecurity to lead the development of software solutions that prevent catastrophic loss.
How many courses are in the program?
Nine 12-week courses
How quickly can I complete the program?
20 months

Develop expertise in the areas of risk management, network security and ethical hacking.
Deepen your understanding of operational security, risk assessment, mitigation and incident response.
Leverage your M.S. in IT-Cybersecurity to become a driving force in systems and data protection.
How many courses are in the program?
Nine 12-week courses
How quickly can I complete the program?
16 months

Get 鶹ýɫƬCredit for What You Already Know

The certificates and training listed below are relevant to this degree program. Search our database to view pre-evaluated credentials and see how a license, certification or professional training saves you time and money toward your degree.

Master's in Cybersecurity Frequently Asked Questions

Back to 鶹ýɫƬBlog

Related Programs