Skip to content
Home
Degree Programs
BROWSE BY
Online
Online Programs
Master of Education
M.S. in Applied Artificial Intelligence
M.S. in Applied Data Science
M.S. in Cyber Security Engineering
M.S. in Cyber Security Operations and Leadership
M.S. in Engineering Management and Leadership
M.S. in Engineering, Sustainability and Health
M.S. in Health Care Informatics
M.S. in Humanitarian Action
M.S. in Information Technology Leadership
M.S. in Innovation, Technology and Entrepreneurship
M.S. in Law Enforcement and Public Safety Leadership
M.S. in Learning Design and Technology
M.S. in Nonprofit Leadership & Management
Master of Theological Studies – Franciscan Theology
View All Online Programs
On-Campus
On Campus Programs
M.S. in Cyber Security Engineering
M.S. in Health Care Informatics
View All On-Campus Programs
Areas of Study
Area of Study
Artificial Intelligence
Criminal Justice
Cyber Security
Data Science
Education
Healthcare
Humanitarian Action
Innovation, Technology and Entrepreneurship
Learning, Design and Technology
Sustainability and Engineering
Theology
View All Programs
Admissions
How to Apply
International Students
Military & Veteran Students
Tuition & Financial Aid
Tuition
Financial Aid
Additional Funding Options
About
How Online Learning Works
Graduate Learning Outcomes
State Authorization Status
General Policies
FAQ
Blog
Artificial Intelligence
Cyber Security
Data Science
Education
Healthcare
Humanitarian Action
Innovation, Technology and Entrepreneurship
Learning Design and Technology
Nonprofit Leadership and Management
Police Leadership
Sustainability and Engineering
Theology
Student Login
Blackboard
Canvas
MySanDiego
Search for:
Request Info
Request More Info
Fill out the form below and a member of our team will reach out right away!
Name
*
*First Name
*Last Name
Email
*
Phone
*
What program are you interested in?
*
Select Program
M.S. in Applied Artificial Intelligence
M.S. in Applied Data Science
M.S. in Cyber Security Engineering
M.S. in Cyber Security Operations and Leadership
Master of Education
M.S. in Engineering Management and Leadership
M.S. in Engineering, Sustainability and Health
M.S. in Health Care Informatics
M.S. in Humanitarian Action
M.S. in Information Technology Leadership
M.S. in Innovation, Technology, and Entrepreneurship
M.S. in Law Enforcement & Public Safety Leadership
M.S. in Learning Design and Technology
M.S. in Nonprofit Leadership and Management
Master of Theological Studies
Program Format
*
Online
On Campus
How did you hear about us?
Select One
Banner ad - another website
Billboards/Outdoor Signs
Conference or trade show
Brochure/flier
Email message
Enrollment advisor presentation
Internet search
Print advertisement
Radio ad
Referral - friend/colleague
Social media
Please check the primary influencer of your inquiry.
Advisor unavailable. Please select a different advisor
Best time to call
Select One
Morning
Afternoon
Evening
*
By submitting this form I accept the
privacy policy
and understand that University of San Diego may contact me about educational programs using an automated technology.
Email
This field is for validation purposes and should be left unchanged.
Δ
Cybersecurity Quiz
Which of the following job responsibilities seem most interesting to you?
Monitor the network and configure/test equipment
Plan and implement security measures to protect computer networks and systems
Provide comprehensive audits of online security systems
Identify threats and vulnerabilities in systems and software and then develop and implement high-tech solutions to defend against hacking, malware and all types of cybercrime
Guard protected information or assets from unauthorized use
Plan, design, test, implement and maintain an organization’s computer and network security infrastructure
Monitor for security breaches and investigate when one occurs
Identify security weaknesses in both systems and policies
Manage the development and implementation of security policy, standards, guidelines and procedures; also, lead operational risk management activities to enhance the value of the company or brand
Varied responsibilities that could include working as a hacker, defender (or both), firewall safety and management, monitoring systems, risk analysis and much more
Which of the following courses seem the most interesting to you?
Network Visualization and Vulnerability Detection
Cyber Security Operational Policy
Cyber Security Risk Management
Secure Systems Engineering
Foundations of Cyber Security
Secure Systems Architecture
Cyber Security Risk Management Information Security Analyst
Penetration Tester
Chief Information Security Officer
Cybersecurity Consultant
How would you describe your undergraduate degree and professional experience?
Associate or bachelor’s degree in computer science or information technology
Bachelor’s degree in computer science, information assurance, programming or a related field
Bachelor’s degree preferably in IT, computer science or a related technical field; also, likely at least 5 years of IT department experience
At least 3 years of professional experience
3-5 years of related information security or cybersecurity experience
A bachelor’s degree and at least 5 years of experience in information security roles
A bachelor’s degree in a computer-related field
Experience as a programmer or systems administrator
A bachelor’s degree and experience managing security professionals; a high-level understanding of corporate guidance, risk and compliance
A bachelor’s degree in a technology-related field and 3-5 years of industry experience
How would you describe your technology experience?
2+ years of networking troubleshooting or technical experience
Experience with information security, information systems, Linux and network security
3-5 years of experience in general information technology or IT security
Excellent understanding of technology infrastructures using firewalls, VPN, data loss prevention, IDS/IPS, web-proxy and security audits
Some knowledge of information security, information systems, information assurance, network security, Linux, and security operations
Experience with Windows, UNIX and Linux operating systems
Previous experience in an information technology department
Comprehensive knowledge of computer security, including forensics, systems analysis and more
Background in information security, specifically in a business or corporate context; proven track record in both technical and functional competencies in security
3-5 years of industry experience; deep familiarity with operating systems and scripting and programming languages; knowledge of encryption techniques and capabilities
Which of the following tools, resources or hard skills are you most familiar with?
Local Area Network (LAN), Wide Area Network (WAN) and Virtual Private Network (VPN)
Linux
Sarbanes-Oxley Act (SOX) or Control Objectives for Information and Related Technology (COBIT)
Python, C, C++, Java, Ruby, Node, Go and/or Power Shell
Intrusion detection and malware analysis and mitigation
VB.NET, Java/J2EE, ColdFusion, API/web services, scripting languages
Firewalls and data encryption programs
Coding skills required to infiltrate any system
Security information and event management (SIEM) software
Programming know-how, building a well-rounded skillet, cloud security and overall security analysis
Which of these sounds close to your dream career?
Assessing an employer’s IT needs and helping design, implement and maintain hardware and software
Researching the latest trends in IT and security and investigating breaches when they occur
Executing cybersecurity audits
Planning, implementing, managing, monitoring and upgrading security measures for the protection of the organization’s data, systems and networks.
The ability to think like a hacker
The ability to think like a malicious hacker and a big-picture business IT executive
Researching the latest IT security trends and developing best practices for your organization
Infiltrating computer systems to detect and address vulnerabilities as you try to outsmart very savvy hackers
The chief guardian of information technology, protector of data and defender against cyber criminals
An independent contractor employed by companies across all industries to safeguard systems, networks and valuable data
Name
First Name
Last Name
Phone
Email
If you would like to receive and email with your quiz results please provide your email address!
Email
This field is for validation purposes and should be left unchanged.
Δ