Online Master of Applied Science in Cybersecurity
Prepare for High-Demand Cybersecurity Roles
- Apply By: 12/29/25
- Start Class: 01/12/26
Earn your online master’s in cybersecurity degree from Illinois Tech in as few as 12 months. Choose from three specialized tracks and learn from top cybersecurity experts. The 100 percent online format gives you the flexibility to balance work and life while gaining real-world skills. Designated as a National Center of Academic Excellence in Cyber Defense Education by the NSA and DHS, Illinois Tech prepares you to lead in a rapidly evolving field and pursue key industry certifications. The College of Computing, which offers this program, is a Top 100 Best Graduate School in Computer Science according to U.S. News & World Report (2025).
Program Details
- Fully online courses allow you to create a schedule that meets your needs.
- Specialize your degree with three industry-specific tracks.
- Prepare for ISACA, ISC2, and CompTIA industry certification exams with appropriate electives.
- With multiple start dates per year, it’s always a good time to apply.
Cybersecurity Tracks
Illinois Tech’s online cybersecurity master’s degree programs offer uniquely tailored tracks that let you specialize in the area that best fits your career goals. Each track blends core cybersecurity knowledge with focused, real-world applications, giving you the flexibility to build deep expertise in your chosen area while learning from faculty with interdisciplinary experience.
M.A.S. Cybersecurity – Computer Engineering
- 100% Online
- 12 months
- 30 credits
Bridge computer engineering and cybersecurity with online training in secure systems, architecture, and hardware-level threat protection.
View ProgramM.A.S. Cybersecurity – Management
- 100% Online
- 12 months
- 30 credits
Develop the leadership, risk management, and strategic planning expertise needed to manage cybersecurity operations in any organization.
View ProgramM.A.S. Cybersecurity – Technology
- 100% Online
- 12 months
- 30 credits
Develop cutting-edge skills in cybersecurity technologies, from secure systems design to threat mitigation, digital forensics, and active cyber defense.
View ProgramMore Information About This Program
Click on each tab below to learn additional details regarding the program requirements and features.
Curriculum
Online Cybersecurity Master’s Degree Courses
30 credits
10 courses
Learn fully online with flexible tracks that blend a strong cybersecurity foundation with specialized, real-world training. Taught by expert faculty, courses explore emerging tech and prepare you for industry certifications through targeted electives, so you can lead with confidence in a rapidly evolving field.
Build Expertise in the Cyber Domain
Unique Cybersecurity Tracks
Customize your cybersecurity education with flexible online tracks that align with in-demand roles in cyber defense, tech, and digital policy.
Tech-driven Curriculum
Courses feature innovative technologies like AI, facial recognition, and blockchain to equip you to tackle real-world cybersecurity challenges.
Expert Faculty
Our expert faculty are shaping the future of cybersecurity through cutting-edge research, innovation, and practical experience.
Admissions Requirements
Admission Requirements
Application Deadline 12/29/25
Start Date 01/12/26
Apply to your online cybersecurity master’s degree program at Illinois Tech today. We’ve streamlined the application process, and you can save your progress as you work. Multiple start dates are offered year-round, so there’s always time to take the next step. Reach out to an enrollment counselor with any questions along the way.
Online Application Form | Apply Now |
---|---|
Degree and Minimum GPA | Bachelor’s degree from a regionally accredited institution with a minimum cumulative undergraduate GPA of 3.0* on a 4.0 scale |
Prerequisite Courses | Students with a bachelor’s degree that is not in computer science may need to take prerequisite courses |
Transcripts | Official transcripts are required for all previous undergraduate and graduate study |
Transfer Credits | You may transfer up to nine applicable credits to your graduate degree program |
Entrance Exams | GMAT/GRE not required |
Additional Requirements | Resume or CV Personal statement |
*Applicants with a lower GPA will be considered based on work experience and time since degree completion.
Illinois Tech strives to make higher education accessible to everyone. We’ve made it easier to apply by not requiring test scores or an application fee. We also accept applicable transfer credits toward your graduate program. With multiple start dates offered year-round, you can begin when it fits your schedule. Plus, our enrollment advisers are here to support you.
AdmissionsTuition and Aid
Discover How Our Program Can Fit into Your Budget
Calculate your cost for attending Illinois Tech Use our tuition calculator to help you estimate your total tuition costs.
Explore the costs of your online cybersecurity master’s degree program and connect with our team to find the best payment options for your situation.
Cost per Credit Hour | $1,000 |
---|---|
Total Number of Credit Hours | 30 |
Total Estimated Tuition | $30,000 |
Other Costs to Budget For | The estimated tuition cost does not include factors like textbooks, fees, or other expenses |
Military Students at Illinois Tech
Illinois Tech proudly processes United States Department of Veterans Affairs (VA) benefits for admitted veteran and active-duty students. Veterans admitted to Illinois Tech are eligible to apply for these VA benefits: the Montgomery GI Bill, the Post-9/11 Program, the Yellow Ribbon Program, the Reserve Educational Assistance Program (REAP), the Survivors’ and Dependents’ Educational Assistance (DEA), and the Veterans Educational Assistance Program (VEAP).
Tuition and Financial Aid
At Illinois Tech, we are committed to making your educational journey both enriching and accessible. We encourage you to complete the Free Application for Federal Student Aid (FAFSA) to access federal and state financial assistance and explore external scholarships to maximize your funding opportunities.
Tuition Details
Shape the Future of Cybersecurity
Illinois Tech’s online cybersecurity master’s degree programs prepare you for dynamic careers in policy, management, technology, and engineering. Whether you’re aiming to lead security teams, shape digital policy, or design secure systems, each track equips you with in-demand skills and real-world experience. You will be ready for roles across industries, from government to global enterprise.
Gain the Cybersecurity Expertise for These Respected Certification Exams*
- CompTIA CySA+ (Cybersecurity Analyst)
- CompTIA Security+
- CompTIA Linux+
- CompTIA Network+
- ISC2 Certified Cloud Security Professional (CCSP)
- ISACA Certified in the Governance of Enterprise IT (CGEIT)
- ISACA Certified Information Systems Auditor (CISA)
- ISACA Certified Information Security Manager (CISM)
- ISC2 Certified Information Systems Security Professional (CISSP)
- ISACA Certified in Risk and Information Systems Control (CRISC)
- PCI Security Standards Council Payment Card Industry Professional (PCIP)
- EC-Council CEH (Certified Ethical Hacker)
- EITCI EITC/IS/OS Operating Systems Security
What You’ll Learn
As a graduate of Illinois Tech’s online cybersecurity master’s degree program, you will be equipped with essential skills in data protection, network defense, and cryptographic systems. This will prepare you for technical and leadership roles across a range of cybersecurity domains.
Program Outcomes
Develop cybersecurity expertise as you:
- Analyze the fundamental models of ensuring data privacy and security, and explore potential theoretical models, algorithms, and technologies that can enhance data privacy and security in different contexts, such as market basket, search engine, location-based services, social network, cloud computing, cryptocurrencies, and smart grid
- Understand cybersecurity threats and defense mechanisms supported by mathematical and algorithmic guarantees
- Learn to use industry-standard programming languages widely used in application programming for analysis
- Practice hands-on ethical hacking, penetration testing, and detection of malicious probes and their prevention
- Design and implement different techniques (e.g., cryptographic protocols, secure computation, and data sanitization) as well as examine their performance in terms of three critical properties (privacy/security, utility and efficiency)
- Explore modern topics in network and computer security, including DoS, malware, and network configuration and defense
- Understand introductory number theory and complexity theory, cryptography and applications, system security, digital forensics, software and hardware security, and side-channel attacks
- Examine topics relevant to roles in network security administration or cybersecurity management
Learn from Expert Faculty Who Are Here for You
Our faculty bring real-world experience from their professional fields and are passionate about building meaningful connections. They are here to mentor you, offer personalized support, and help you reach your goals.

Gurram Gopal, Interim Chair of Information Technology and Management, Affiliate Professor, Stuart School of Business
Faculty Spotlight: Gurram Gopal
Prior to becoming the Interim Chair and Professor of ITM, Gurram Gopal taught several courses in data analytics, e-commerce, and supply chain optimization at Illinois Tech. Prior to joining Illinois Tech, he was a Theophil W. Mueller Endowed Chair and Professor of Business Administration in the Department of Business at Elmhurst University and served as the University’s Fulbright Program Adviser.
Gopal’s professional career includes development of technology driven marketing strategies for some of the world’s largest pharmaceutical companies as a strategy consultant and manager for ZS Associates. He also worked in strategic marketing, supply chain management, and strategic quality at Tellabs, Inc. He holds professional certificates in ISO, CMM and Applied Statistics and Forecasting, and has published extensively in academic and professional journals.
Gopal has traveled extensively to present at conferences on global sourcing, supply chain, data synchronization, and customer relationship management in the logistics industry. In 2014 and 2015, Gopal presented at the Principles for Responsible Management Education (PRME) conference, sponsored by the UN Global Compact in New Delhi, India.
He has received many teaching awards and grants for his academic work and professional projects. In 2011–12, he received a Fulbright Scholarship to teach and conduct research at Galway Mayo Institute of Technology in Ireland. In 2022, he received another Fulbright Scholar Award to develop new courses at ISM University in Lithuania and develop University associated entrepreneurial efforts. In December 2023, he visited Bolivia as a Fulbright Specialist at the Universidad Privada Boliviana (UPB) to conduct seminars on digital transformation of the economy and work with local entrepreneurs. He is currently developing academic exchanges between Illinois Tech and UPB. Gopal has also led several student groups on trips to India, Ireland, and Turkey.
Professional Affiliations and Memberships
- Institute of Industrial and Systems Engineers (IISE)
- Production and Operations Management Society
- Institute for Supply Chain Management
- V.P., Education, Chicago Roundtable of the Council of Logistics Management (02–03)
- ISO Advanced Auditor
- Applied Statistical Forecasting by BFS
Awards
- Illinois Institute of Technology, School of Applied Technology, Excellence in Teaching Award (2017)
- ISM University of Management and Economics Lithuania, Distinguished Visiting Professor Award (2017)
- Elmhurst University, Sigma Kappa Faculty Appreciation Award (2006)
- Howard Willett Jr. Distinguished Chair for Research in Business and Economics (2005–08)
- Walter P. Murphy Fellowship, Northwestern University (1983)
Disclaimer
*Certifications are not earned directly through the master’s program. Students may choose to pursue certification separately from the program and must meet all requirements set by the certification provider.