Online

Pathways & Curriculum

Cyber Security Pathway

Military Friendly School Badge

Request More Info

"*" indicates required fields

Name*

FREE BROCHURE

LEAD THE FIGHT AGAINST CYBER THREATS WITH STRATEGIC, IN-DEMAND EXPERTISE

The Cyber Security pathway within the MS in Information Technology Leadership (MS-ITL) program is designed for IT professionals and aspiring leaders who want to lead cyber security initiatives, not just implement them.

These elective courses draw on the expertise, curriculum and faculty of USD’s federally recognized Cyber Security Engineering program, which has been designated a National Center of Academic Excellence in Cybersecurity.

By taking elective courses built on USD’s recognized excellence in cybersecurity education, you’ll be ready to step into leadership roles that help organizations defend against cyber threats through forward-thinking solutions. The Cyber Security elective courses emphasize real-world applications of cybersecurity leadership, helping you build technical fluency and the high-level leadership skills to:

Course of Study

The Master’s of Information Technology Leadership Cyber Security pathway offers a customizable foundation to cyber leadership. The degree consists of 10 courses total (3 units each) for 30 units of coursework. You have the freedom to complete this pathway in one of two tracks:

Both approaches build technical depth and expertise in cybersecurity and provide a strong foundation in IT leadership development. In either track, the program concludes with a Capstone Seminar, where you’ll apply what you’ve learned from both core and elective courses to real-world challenges.

The flexible course requirements, combined with the 100% online format and the steady pace of the program (seven weeks per course, each taken one at a time) make it accessible to working professionals.


At a Glance

Earn your master’s degree online in just 20 months.

Summer, Fall and Spring Start Dates

20 Months
30 Units
$925
September 2
July 7

PROGRAM COURSE CURRICULUM

MS-ITL is a 30-unit program consisting of 10 courses. Courses are offered year-round with three semesters every year: spring, summer and fall. Each semester lasts 14 weeks with courses running for seven weeks each. Students take two courses per semester with a one or two week break between semesters.

This concentrated format enables students to focus on one course at a time and still complete the degree program in 20 months. Students are advised to spend 15-20 hours per week on each course in order to be successful.

The curriculum of this specialized track blends IT leadership core courses with cybersecurity-focused electives and consists of the following:

Core ITL Courses

Course Units

Introduction to the IT Leadership program. Spotlights on fundamental financial management concepts: expense, capital, depreciation, budgets,…

Read More
3

Project Management is the application of knowledge, skills, tools and techniques to project-oriented activities to meet project requirements…

Read More
3

Server operations with emphasis on design and deployment of large-scale computing environments using cloud services (e.g., Amazon Web Servic…

Read More
3

The role of IT in the continuous process of software development (engineering), staging (QA), and production deployment (IT operations). Inc…

Read More
3

IT Service Management (ITSM) is the set of activities by which IT organizations manage the end-to-end delivery of IT services to customers. …

Read More
3

This course focuses on a big-picture overview of the economic and social role of IT professionals. IT professionals are a strategic workforc…

Read More
3

Cyber Security Electives

Course Units

This course will feature a comprehensive overview of concepts and tools essential to cybersecurity for IT professionals. Students will learn…

Read More
3

This course discusses and explains the fundamentals of risk governance, the processes to follow, compliance regulation, and the security con…

Read More
3

This course provides students with an introduction to and discusses the relationship between cybersecurity, cybersecurity law and privacy la…

Read More
3

An introduction to the fundamentals of cybersecurity, including the notion of policy as the definition of “security” for a system and th…

Read More
3

This course is an introduction to fundamental concepts of computer network security and defense, including planning, architecture, system de…

Read More
3

This course is a prerequisite for the MS in Cyber Security Engineering program. Students without specific training in cyber engineering and/…

Read More
6

Capstone Course

Course Units

The program capstone focuses on developing a proposal for a significant IT infrastructure initiative, e.g., implementation of a new enterpri…

Read More
3

TEACHING AND LEARNING Methods

MADS/AAI Recorded Lectures Icon
Recorded Lectures
icon of video playing on desktop
Recorded Computer Programming Videos
a group of people with a man in the middle
Live Weekly Office Hours*
a hand building a puzzle
Channel-based Messaging Platform
clipboard with gear icon and pencil
Supervision of Final Projects
globe icon
Real-world Dataset Applications

*Not required or part of the final grade

Assessment Methods

icon of papers with check marks
Programming-based Assignments
icon of a pencil writing in a book
Interactive Discussions
a line drawing if a clock, check mark, and paper
Project Based Assignments
document with pencil icon
Writing Professional Reports
icon of a light bulb and gears
A Comprehensive Capstone

DEGREE PLAN

Degree candidates are admitted throughout the year to begin their program during one of three semesters (spring, summer or fall). Students will take two courses during each 14-week term, focusing on one seven-week course at a time with short breaks between semesters. 

This master’s degree program can be completed, on average, in five semesters (20 months).

Cyber Security Example Degree Plan

TermCourse 1 (7 weeks)Course 2 (7 weeks)
Spring 1ITL 540ITL 502
Summer 1ITL 535ITL 530
Fall 1ITL 501ITL 525
Spring 2CYBR 505*CYBR 505
Summer 2ITL 590ITL 595 (Capstone)

*CYBR 505 comprises 6 total units. Other courses are 3 units apiece.

Because this degree plan is designed for flexibility to accommodate working professionals, courses and sequence may vary based on your start term and chosen electives.


Success Stories

The support structure with the school itself, with the professors, was excellent. They were always available to answer questions and, more than that, their feedback on assignments was really invaluable.

It has been a rewarding experience. I’m able to put my new knowledge to work right away, and the faculty and staff are there to help you. This program has helped me be a better leader for my team and I would like to be a CIO someday.


Frequently Asked Questions

Do I need an undergraduate degree in IT or a related field?

MS-ITL applicants don’t need an IT degree, but they must have a bachelor’s degree (BS or BA) from an accredited institution. It is preferable to have at least two years of work experience in the information technology field.

What kind of IT experience do you need to have for this program?

Applicants should have at least two years of experience in an IT-related field, such as network and systems support, server operations, DevOps, etc. Examples of relevant experience can include computer user support specialists, database administrators and architects, computer systems analysts and network and computer systems administrators.

Are classes scheduled to accommodate working professionals?

Yes. Master of Science in Information Technology Leadership courses as well as Cyber Security pathway courses are designed specifically with working professionals in mind. The online program can be completed on your own schedule (as long as deadlines are met).

What’s the difference between the MS-ITL Cyber Security pathway and the full Cyber Security master’s degree?

The differences between the MS-ITL Cyber Security pathway and the MS in Cyber Security Engineering (MS-CSE) and MS in Cyber Security Operations and Leadership (MS-CSOL) programs are matters of emphasis. Graduates of CSE are poised to develop and deploy engineering solutions, graduates of CSOL are trained to turn cybersecurity theory into practice, while ITL graduates who have chosen the Cyber Security pathway are positioned to influence cybersecurity solutions within different information technology contexts.

Does the program have to be completed within 20 consecutive months?

No. Students have a total of five years to finish the full course. The curriculum schedule functions on a rotational system, meaning that if a student skips a course, they will have to wait for the rotation to complete before jumping back in. We encourage individuals interested in the program to speak with an enrollment advisor or to work with their program coordinator, who is available to help every step of the way.

Does the program require applicants to take the GRE or GMAT?

Candidates who have a GPA above 2.75 are not required to take a GRE or GMAT; however, a standardized test such as GRE or GMAT is recommended for applicants with a GPA under 2.75.

For further admissions and financial aid information, please refer to the University of San Diego’s main FAQ page.