Choose a college
The Master of Science in Cybersecurity and Information Assurance
prepares security professionals to protect an organization's operations
in the cyberspace by providing them with the tools, techniques, and
standards required to prevent, detect, and counteract cyberattacks.
The program not only focuses on keeping infrastructure safe but also
the assurance of information covering subjects ranging from
cryptography to business continuity planning and disaster recovery.
This course introduces you to the real-world battlefield of cyberspace. It covers the history of cyberwarfare and the variety
of new concerns its emergence has fostered. This course explores how cyberwarfare has become an important part of the
modern military arsenal and provides strategies for protecting a threatened network, as well as strategies for dealing with
specific cyber war actors and threats. It then concludes with an exploration of the future of cyberwarfare considering the
evolution of cyber-related capabilities, current threats, and emerging technology.
Secure Software Design
This course provides a practical guide to establish proactive software security that focuses on analyzing risks,
understanding likely points of attack, and deciding how software responds to future attacks. Students learn how to
construct software that can deal with known and unknown attacks preemptively by examining systemic threats in various
deployment environments and discussing vulnerabilities of software applications.
Content focuses on categorizing levels of risk and understanding how risk can impact the operations of the business
through a scenario involving the creation of a risk management program and business continuity program for a company
and a business situation reacting to a crisis/disaster situation affecting the company.
Cyberlaw, Regulations, and Compliance
Cyberlaw, Regulations and Compliance prepares students to participate in legal analysis of relevant cyberlaws and address
governance, standards, policies, and legislation. Students will conduct a security risk analysis for an enterprise system. In
addition, students will determine cyber requirements for third‐party vendor agreements. Students will also evaluate
provisions of both the 2001 and 2006 USA PATRIOT Acts.
Secure Network Design
This course provides an in-depth look at organizational challenges and threats to networks that are connected to the public
Internet. Network security will be discussed in the context of how hackers gain access to networks and the use of Firewalls
and VPNs to provide security countermeasures. Also covered are methods and technologies to prepare the student to
disarm threats, plan for emerging technologies and future attacks.
Security Policies and Standards - Best Practices
This course focuses on the practices of planning and implementing organization-wide security
and assurance initiatives as well as auditing assurance processes.
Ethical Hacking builds the skills necessary to protect an organization's information system from unauthorized access and
system hacking. Topics include security threats, penetration testing, vulnerability analysis, risk mitigation, business-related
issues, and countermeasures. Students will learn how to expose system vulnerabilities, solutions for eliminating and/or
preventing them, and how to apply hacking skills on different types of networks and platforms. This course prepares
students for the following certification exam: EC-Council’s Ethical Hacker certification exam (312-50). This course has no
Topics include computer forensics in today’s world; media and operating system forensics; data and file forensics; audits
and investigations; and device forensics. This course prepares students for the following certification exam: EC-Council
Computer Hacking Forensic Investigator.
Disaster Recovery Planning, Prevention and Response
This course prepares students to plan and execute industry best practices related to conducting organization-wide
information assurance initiatives and to preparing an organization for implementing a comprehensive Information
Assurance Management program.
Students will be able to choose from three areas of emphasis, depending on personal and
professional interests. Students will complete a capstone project that deals with a significant
real-world business problem that further integrates the components of the degree. Capstone
projects will require an oral defense before a committee of WGU faculty.
Send me more information about WGUand a $65 application fee waiver code.
By submitting you will receive emails from WGU and can opt-out at any time.
We're emailing you the app fee waiver code and otherinformation about getting your degree from WGU.
Have questions about applying?Get application help from an Enrollment Counselor.Complete a request for more info and we'll contact you shortly.
You’re using an unsupported version of your browser..
You’ll still have full access to the site, but some functionality may be lost. For the best wgu.edu experience, upgrade your browser by following the links below.