Skip to content

Online Master’s in Cybersecurity Management

group of cybersecurity students at laptops reviewing code

Build Cybersecurity Leadership Skills Completely Online

100% online

12 months

30 credit hours

$1,000 per credit

Request More Information

Complete this form to receive information about coursework, admissions, tuition, and more.

Earn an Online Master’s in Cybersecurity Management From Illinois Tech

Prepare to advance your cybersecurity career with Illinois Tech’s online applied cybersecurity management degree program. Designed for professionals aiming to lead, this program blends technical knowledge with strategic leadership and risk management skills. Learn from experienced faculty and industry experts in a flexible 100 percent online format. Complete your degree in as few as 12 months while preparing for key certifications. Gain the tools to manage teams, shape policy, and defend critical systems with confidence.

Online Master’s in Cybersecurity Management Details

Request Info

Cybersecurity Management Curriculum

The online master’s in cybersecurity management program from Illinois Tech blends advanced cybersecurity knowledge with leadership and risk management training. Unlike many technical-only programs, it prepares you to lead teams, shape policy, and align security strategies with business goals. With the appropriate electives, you can prepare for industry-recognized certification exams such as CISSP or CISM, enhancing your credentials and positioning you for advanced roles in cybersecurity leadership and risk management.

Prepare for These In-Demand Certification Exams

  • ISACA Certified Information Security Manager (CISM)
  • ISC2 Certified Information Systems Security Professional (CISSP)
  • ISACA Certified Information Systems Auditor (CISA)
  • ISACA Certified in Risk and Information Systems Control (CRISC)
  • ISACA Certified in the Governance of Enterprise IT (CGEIT)
  • PCI Security Standards Council Payment Card Industry Professional (PCIP)

M.A.S. Cybersecurity – Management Required Courses

New technologies have increasingly enabled corporations and governments to collect, analyze, and share huge amount of data related to individuals. Today, the challenge is enabling the legitimate use of the collected data without violating privacy and security. In this course, we are going to analyze the fundamental models of ensuring data privacy and security, and explore potential theoretical models, algorithms, and technologies that can enhance data privacy and security in different contexts, such as market basket, search engine, location-based services, social network, cloud computing, cryptocurrencies, and smart grid. We will also design and implement different techniques (e.g., cryptographic protocols, secure computation, and data sanitization) as well as examine their performance in terms of three critical properties (privacy/security, utility, and efficiency).

This course gives students a clear understanding of computer and cybersecurity as threats and defense mechanisms backed by mathematical and algorithmic guarantees. Key topics covered include introductory number theory and complexity theory, cryptography and applications, system security, digital forensics, software and hardware security, and side-channel attacks. Course projects will provide hand-on experiences on languages, libraries, and tools supporting state-of-the art cryptography applications.

LAW 252 Privacy Law
Privacy may be one of the most pervasively discussed issues in this decade as a result of the increased concerns for security in travel, the openness of the internet, the consolidation of information in massive databases both by corporations and by governments, high incidence of identity theft, and the development of more and more highly sophisticated “listening and viewing” devices. This class examines privacy as protected by statute B through a patchwork of privacy acts B and the concomitant freedom of information requirements of a democratic government, as developed through tort doctrine in the courts, and as articulated through the Constitution of the United States and those of the various states. All aspects of privacy are considered, including wiretapping, government-required personal and business information, personal, family, and reproductive autonomy, the “right to be let alone,” and the right of publicity.

OR

LAW 478 Computer and Network Privacy
More and more, both practice and the job market require lawyers who understand the interface between law and technology. This course provides a unique opportunity to understand that interface. No technical knowledge is required. Everything is explained in plain English. The course addresses the issue of privacy in an age of surveillance. How much privacy should we demand? Why does privacy matter? How is privacy to be defined? The course addresses security issues because in the internet age there is no privacy without security and security failures may yet lead to the end of the internet age. The course provides a unique opportunity to really understand the interface between law and technology.

This course will introduce essential programming concepts and techniques used in analytics. Students will learn and make use of industry standard programming languages widely used in application programming for data and statistical analysis in cybersecurity as well as other purposes. Students will understand and use various libraries for data manipulation, preparation, and analysis, and will be equipped to use the programming languages covered in real-world scenarios and circumstances upon completion.

This course introduces the applied theories relevant to human factors in information security, digitalization, and sociotechnical environments. It examines the human element through a comprehensive approach that explores human errors, new technologies, and cybersecurity incidents. The course investigates human-related aspects that have an impact on the practices, policies, and procedures that are in place in an organization to secure the firm’s information. Topic areas include human behavior, ethics, psychology, social engineering, the culture of hacking, cybercrimes, security fatigue, and burnout. The analysis covers techniques to prevent intrusions and attacks that threaten organizational data and methods to identify potential insider threats.

This course includes in-depth examination of topics in the management of information technology security, including access control systems and methodology, business continuity and disaster recovery planning, legal issues in information system security, ethics, computer operations security, physical security, and security architecture, and models using current standards and models.

This course is an in-depth examination of topics in information technology/information security governance, risk, and compliance including information assurance policies, standards, and compliance, as well as the examination of security risk analysis and the performance of systems certification and accreditation.

Current legal issues in information technology are addressed, including elements of contracting, payment systems and digital signatures, privacy concerns, intellectual property, and business torts, as well as criminal liability, including hacking, computer trespass, and fraud. Examination of ethical issues, including privacy, system abuse, and ethical practices in information technology, equip students to make sound ethical choices and resolve legal and moral issues that arise in information technology.

Industry standard practices and standards in the auditing of information technology in an organization are addressed, with a particular emphasis on examination of IT governance, assets, controls, and control techniques. Specific areas covered will include the audit process, IT governance, systems and infrastructure life cycle management, IT service delivery and support, protection of information assets, and business continuity and disaster recovery. Students will examine case studies and complete hands-on exercises.

Students learn to design and manage key business information security functions, including incident response plans, incident response teams disaster recovery plans, and business continuity plans. Reporting, response planning, and budgeting are all addressed. Students working in reams will prepare an incident response, disaster recovery, or business continuity plan for a real-world organization such as a business or a government body or agency.

View Program Curriculum

Cybersecurity Management Careers for Illinois Tech Grads

As a graduate of the master’s in cybersecurity management online program, you will be well-positioned for leadership roles in both the public and private sectors. Alumni have gone on to work at top companies like Amazon, Cisco, Motorola, and Accenture, as well as government agencies including the NSA and FBI.

With demand for computer and information systems managers projected to grow 17 percent from 2023 to 2033,1 this degree opens doors to high-impact roles in cybersecurity strategy, risk management, and IT leadership.

Cybersecurity Manager $171,200 per year2

Security Architect $144,377 per year3

Explore More Online Cybersecurity Tracks

Tailor your degree to your career goals with unique cybersecurity degree tracks from Illinois Tech. No matter what your focus is, each track blends technical depth with real-world application. This flexible structure helps you build specialized expertise while preparing for leadership roles in a rapidly evolving field.

M.A.S. in Cybersecurity: Computer Engineering

Bridge computer engineering and cybersecurity with online training in secure systems, architecture, and hardware-level threat protection.

M.A.S. in Cybersecurity: Technology

Develop cutting-edge skills in cybersecurity technologies, from secure systems design to threat mitigation, and digital forensics.

Sources

  1. U.S. Bureau of Labor Statistics. “Computer and Information Systems Managers.” Retrieved July 8,2025, from https://www.bls.gov.
  2. U.S. Bureau of Labor Statistics. “Computer and Information Systems Managers.” Retrieved July 8,2025, from https://www.bls.gov.
  3. Payscale.com. “Security Architects.” Retrieved July 8, 2025, from https://www.payscale.com/.