Skip to content

Online Master’s in Cybersecurity Law and Policy

graphic of binary code

Lead the Future of Cybersecurity Law and Policy

100% online

12 months

30 credit hours

$1,000 per credit

Request More Information

Complete this form to receive information about coursework, admissions, tuition, and more.

Build Your Cybersecurity Law Expertise at Illinois Tech

The online master’s in cybersecurity law program from Illinois Tech prepares you to navigate the complex intersection of law, technology, and digital security. Through a unique blend of legal and technical coursework, you will explore topics like privacy in the age of surveillance, blockchain regulation, and internet contracting. The program is taught by field experts and includes participation in J.D.-level law classes for a rigorous, real-world legal education. Offered in a 100 percent online format, it can be completed in as few as 12 months, equipping you to lead in legal, policy, and compliance roles across industries.

Online Master’s in Cybersecurity Law and Policy Details

Request Info

Cybersecurity Law and Policy Curriculum

In the online cybersecurity law and policy program with Illinois Tech, you will explore the evolving relationship between law, technology, and digital privacy. Examine legal frameworks surrounding emerging technologies such as facial recognition, genetic engineering, and AI, while gaining a deep understanding of intellectual property, privacy law, and constitutional rights. This program’s interdisciplinary approach blends legal theory with real-world tech applications to prepare you for roles at the intersection of cybersecurity, regulation, and public policy.

M.A.S. Cybersecurity – Law and Policy Required Courses

Choose Six:

This course will introduce essential programming concepts and techniques used in analytics. Students will learn and make use of industry standard programming languages widely used in application programming for data and statistical analysis in cybersecurity as well as other purposes. Students will understand and use various libraries for data manipulation, preparation, and analysis, and will be equipped to use the programming languages covered in real-world scenarios and circumstances upon completion.

This course is designed to equip students with knowledge and skills necessary to understand, implement, and leverage artificial intelligence (AI) techniques in the realm of cybersecurity. In an era where cyber threats continue to evolve and grow in complexity, AI has emerged as a powerful tool to defend against and mitigate these threats. This course explores the intersection of AI and cybersecurity, providing a comprehensive understanding of how AI technologies can be used to protect computing systems. By the end of this course, students will be well-equipped to leverage the power of AI to enhance cybersecurity efforts, making them valuable assets in the ever-evolving landscape of digital security. Join us on this exciting journey into the world of “AI for Cybersecurity” and prepare to defend against the digital threats of tomorrow. The course is intended for students with a basic understanding of computing and cybersecurity concepts.

This course introduces the applied theories relevant to human factors in information security, digitalization, and sociotechnical environments. It examines the human element through a comprehensive approach that explores human errors, new technologies, and cybersecurity incidents. The course investigates human-related aspects that have an impact on the practices, policies, and procedures that are in place in an organization to secure the firm’s information. Topic areas include human behavior, ethics, psychology, social engineering, the culture of hacking, cybercrimes, security fatigue, and burnout. The analysis covers techniques to prevent intrusions and attacks that threaten organizational data and methods to identify potential insider threats.

This course addresses hands-on ethical hacking, penetration testing, and detection of malicious probes and their prevention. It provides students with in-depth theoretical and practical knowledge of the vulnerabilities of networks of computers, including the networks themselves, operating systems, and important applications. Integrated with the lectures are laboratories focusing on the use of open-source and freeware tools; students will learn in a closed environment to probe, penetrate, and hack other networks.

Prepares students for a role as a network security administrator and analyst. Topics include viruses, worms, other attack mechanisms, vulnerabilities and countermeasures, network security protocols, encryption, identity and authentication, scanning, firewalls, security tools, and organizations addressing security.

This course includes in-depth examination of topics in the management of information technology security, including access control systems and methodology, business continuity and disaster recovery planning, legal issues in information system security, ethics, computer operations security, physical security and security architecture, and models using current standards and models.

This course is an in-depth examination of topics in information technology/information security governance, risk, and compliance including information assurance policies, standards, and compliance, as well as the examination of security risk analysis and the performance of systems certification and accreditation.

Current legal issues in information technology are addressed, including elements of contracting, payment systems and digital signatures, privacy concerns, intellectual property, and business torts, as well as criminal liability, including hacking, computer trespass, and fraud. Examination of ethical issues, including privacy, system abuse, and ethical practices in information technology, equip students to make sound ethical choices and resolve legal and moral issues that arise in information technology.

Students learn to design and manage key business information security functions, including incident response plans, incident response teams disaster recovery plans, and business continuity plans. Reporting, response planning, and budgeting are all addressed. Students working in teams will prepare an incident response, disaster recovery, or business continuity plan for a real-world organization such as a business or a government body or agency.

Required Track Courses:

This course covers internet contracting both domestically and internationally; payment systems and related privacy concerns; internet business torts and anti-trust in e-commerce. Legal issues are examined against the background of the nature of e-commerce.

Privacy may be one of the most pervasively discussed issues in this decade as a result of the increased concerns for security in travel, the openness of the internet, the consolidation of information in massive databases both by corporations and by governments, high incidence of identity theft, and the development of more and more highly sophisticated “listening and viewing” devices. This class examines privacy as protected by statute B through a patchwork of privacy acts B and the concomitant freedom of information requirements of a democratic government, as developed through tort doctrine in the courts, and as articulated through the Constitution of the United States and those of the various states. All aspects of privacy are considered, including wiretapping, government-required personal and business information, personal, family, and reproductive autonomy, the “right to be let alone,” and the right of publicity.

This is an applied course designed to introduce students to the emerging social, economic, and legal issues associated with blockchain and crypto-enabled technologies. The course is a survey designed for students with little or no prior experience with these technologies. The course is divided into three modules: (1) an introduction to blockchain and crypto technologies; (2) applications of the technologies; and (3) the law applicable to the technologies.

Description coming soon!

View Program Curriculum

Secure the Digital World Through Law and Policy

As a graduate of the online master’s in cybersecurity law and policy program, you will have the legal and technical fluency to lead in cybersecurity, privacy, and digital policy. This online program equips you to navigate emerging tech with real-world legal insight, preparing you for roles in law firms, government, and corporate compliance.

Information security analyst roles are projected to grow 33% by 2033.1 A law-focused background enhances your ability to manage legal risk, ensure compliance, and shape cybersecurity policy.

Lawyer with Cybersecurity Expertise $164,155 per year2

Cybersecurity Analyst $124,910 per year3

Program Outcomes

Develop expertise in cybersecurity, law, and policy as you:

Explore More Online Cybersecurity Tracks

Tailor your degree to your career goals with unique cybersecurity degree tracks from Illinois Tech. No matter what your focus is, each track blends technical depth with real-world application. This flexible structure helps you build specialized expertise while preparing for leadership roles in a rapidly evolving field.

M.A.S. in Cybersecurity: Computer Engineering

Discover how to secure digital systems from the ground up, with a focus on both hardware and software protection. 

4 Tracks Available

M.A.S. in Cybersecurity: Management

Prepare to lead in the evolving digital security landscape by gaining technical knowledge and strategic leadership skills. 

4 Tracks Available

M.A.S. in Cybersecurity: Technology

Become empowered to design, implement, and manage advanced security solutions across multiple systems and environments. 

4 Tracks Available

Sources

  1. U.S. Bureau of Labor Statistics. “Information Security Analysts.” Retrieved July 8, 2025, from https://www.bls.gov.
  2. Payscale.com. “Lawyer with Cybersecurity Expertise.” Retrieved July 8, 2025, from https://www.payscale.com/.
  3. Payscale.com. “Cybersecurity Analyst.” Retrieved July 8, 2025, from https://www.payscale.com/.