Help Protect Technical Infrastructures
The Master of Science in Information Security at City University of Seattle is a multi-disciplinary program offering professionals an opportunity to develop a broad understanding of the technical, business, management, and policy aspects of information security. When graduating from this program, you will be able to make critical business decisions for your organization when it counts.
The master’s in information security online program is a highly focused, 16-course program you complete at a pace you determine with the help of a CityU advisor.
In the MS Information Security program, you will study a core of basic information security standards and practices, which include courses such as Information Security Overview; System Administration for Information Security, Privac and Open Systems, The Senior Manager and Information Security, and Ethical Obligations of Information Security. In addition to taking these core courses, you can specialize in the following areas:
- Cybersecurity Environment
- Information Security Audit
CityU was designated a National Center of Academic Excellence in Cyber Defense Education by the National Security Agency and Department of Homeland Security.
Center for Information Assurance Education
City University of Seattle operates a special center whose mission is to conduct programs, courses, research, and consulting in Information Assurance. Learn more about the Center.
A bachelor’s degree from an accredited university is required to enroll in this program.
Throughout the Master of Science in Information Security program, you’ll learn:
- Changes in information security management
- Security implementations for digital networks, platforms, and applications
- The responsibilities of senior managers for ensuring the security of processes and information systems used in their organizations
- Risks and rewards of using information systems
- Ethical frameworks and their application to particular areas influencing and affecting information security
- Forms that cyber crimes can take, and the factors that make victims vulnerable to cyber crimes
- Warfare in the cyber domain
- Challenges in managing and enforcing security standards
Information Security Overview (3)
This course will cover changes in information security management and understanding. The age of information security as technology alone has passed, people currently involved with information security need to understand the entire information security landscape, from rules, laws, corporate laws and rules, decision making, working in teams, leadership, and other ways that information security is changing people and the work place.
System Administration for Information Security (3)
In this course students discuss security implementations for digital networks, platforms, and applications. Areas of study involve identifying and examining security risks, security solutions, and tools available for various Windows platforms and applications.
The Senior Manager and Information Security (3)
This course studies the responsibilities of senior managers for ensuring the security of processes and information systems used in their organizations. Given a request for an approval to operate an information system at a specified level of trust, the senior manager will analyze and judge the information provided for validity and reliability to ensure the system will operate at the proposed level of trust. This judgment will be predicated on an understanding of system architecture, system security measures, systems operations policy, system security management plan, legal and ethical considerations, and provisions for system operator and end user training. Students taking this course will learn to integrate their knowledge in these areas to make effective security decisions.
Privacy and Open Systems (3)
Cloud Computing, Web 2.0, open systems, federated identity, and other systems present both an opportunity and a source of potential misuse of data and systems. This course looks at the risks and rewards of using information systems, federated identity, encryption, and other resources, and the particular issues which will impact upon information security and privacy, so that risk in these systems can be managed.
Ethical Obligations in Information Security (3)
This course is a study of the ethical issues that arise in information security. The course explores ethical frameworks and their application to particular areas influencing and affecting information security. Topics explored include privacy, anonymity, confidentiality, intellectual property, and other areas impacted by information and communications technology. Students completing the course will be aware of the many issues they can expect to confront, understand how others have addressed similar issues, and possess a toolkit to aid them as they confront those issues.
Depth Block (21)
Cyber Crime (3)
Cyber crime has become a pervasive reality in society. Students in this course investigate the forms that cyber crimes can take, and examine the factors that make victims vulnerable to cyber crimes. The course also looks at theories of criminology and how they are impacted by trends in the cyber environment. Understanding cyber crime allows students to avoid and detect it, as well as minimize the impact of cyber crime on its victims and contribute to the investigation of cyber crimes.
Cyber Warfare (3)
Cyber Space has joined air, land, sea, and space as the latest domain of warfare. This course examines warfare in the cyber domain beginning with an understanding of how it fits within the context of traditional theory of war. The course examines how countries prepare and apply capabilities and strategies, the impacts of non-state actors, and the future development of cyber warfare. Students participate in a Cyber Warfare Strategic Exercise (CWSX). Students are prepared to understand the impact of the extension of warfare into the cyber domain.
With goals of transparency, efficiency, responsiveness to and empowerment of their citizens, political entities at all levels and around the world have increasingly implemented e-government initiatives. E-government introduces challenges in managing and enforcing security standards. This is happening in a time when all governments face an ever-decreasing budget process complicated by political pressures, cyber warfare, cybercrime, and the unpredictable behavior of users. This course will examine the challenges governments face implementing, managing, and securing initiatives while studying the implementation of multiple types of e-government systems. Students will take away from this course an ability to understand the complex relationship between people, budget, implementation, security, and standards when building or analyzing an e-government initiative.
Intellectual Property and Espionage (3)
Intellectual property is the core currency of the digital economy. Patents, copyrights, trademarks, and trade secrets represent the formal designation and protection of many intellectual properties. Other information is protected through classification and encryption. In this course students study how intellectual property is protected as well as how those protections are circumvented. The course will also study the role of espionage in obtaining trade secrets, classified data, and other valuable information.
Information Security Audit
Auditing Techniques (3)
This course focuses on the methodology for auditing system controls and provides the fundamental concepts of auditing to help students explore the opportunities and challenges of being an information system auditor. Students will study auditing processes and technology involved with modern computer systems as well as obtain an understanding of risks, control objectives, and standards. The course examines the importance of internal controls and audit planning to obtain appropriate evidence to prepare an audit report.
Information Security Auditing (3)
This course focuses on the methodology for auditing information security system controls and assists students in exploring the opportunities and challenges of being an information system auditor. The course explains the technology and auditing involved with securing modern computer systems, as well as providing an understanding of risks, control objectives and standards. This course examines how companies ensure information security is protecting their information assets from hackers and others who desire to harm the organization.
Maintaining the Technology Infrastructure (3)
Designing, developing, implementing, and installing a technology infrastructure is a complex process, however the real challenge is in maintaining that infrastructure in a manner that provides a high level of reliability and availability while providing effective support for the end users. This course examines how ITIL and other frameworks combine best practices and standardized processes and procedures to enable an effective service infrastructure. Students will gain experience in the planning, coordination and management skills needed to manage or work with an IT service organization.
Capstone Courses (3)
Computer Science Capstone (3)
This course emphasizes the practical application of information security concepts gained throughout the Master of Science in Information Security program. This class uses a case study as a basis for an applied research project. Students will have an opportunity to identify a real-world problem and apply concepts learned to show ways to resolve, mitigate, or prevent effects from an information security issue. Students will engage in research activities designed to prepare the student to work within companies and organizations as information security professionals. As students are exposed to situations likely to be encountered professionally, they are allowed to apply and refine theories, principles, and skills learned during their program to solve real-world problems.
In today’s technology-driven world, the need for skilled technological experts is ever-prevalent. Additionally, this field is more competitive than ever. A master’s degree in information security will give you the edge needed to compete for high-level positions in this industry.
Upon completion of this master’s program, you’ll be qualified to work as a systems security expert who can ensure the security of complex data and hardware networks in industries as varied as:
- Information technology
- International business
Common job titles for alumni with an MS in Information Security may include:
- Senior cybersecurity engineer
- Information security consultant
- Chief information officer
At CityU, you’ll have the opportunity to expand your professional network by connecting with faculty working in your field, students from around the globe, and alumni employed at Seattle’s top companies. Plus, you’ll be part of a supportive community that’s dedicated to helping you reach your career goals.
Learn more about tuition and fees for our undergraduate, graduate, and doctoral programs.
Financial Aid Opportunities
At CityU, we’re committed to helping students achieve their academic goals no matter their economic situations. Our financial aid counselors are here to find the resources you need to pay for your education, including grants, loans, work study, and scholarships.
Military Tuition Benefits
As a Yellow Ribbon school, CityU is proud to serve those who have served in the military. We offer military tuition discounts for active-duty servicemembers and their spouses and accept military benefits such as the Post 9/11 GI Bill® and Tuition Assistance.
Learn more about military tuition benefits, VA benefits, and military partnership programs designed to help you reach your military and career goals.