The Master of Science in cybersecurity management and policy at University of Maryland Global Campus can help you gain the tools you need to join the management track in cybersecurity so that you can establish, implement, and oversee a cybersecurity structure for an organization. Learn how to create a security approach that combines technology, governance, and compliance perspectives. Gain advanced knowledge in organizational structures, communication, operational business processes, and the legal framework for cybersecurity policy.
UMGC was named a National Center of Academic Excellence in Cyber Defense Education by the National Security Agency and the Department of Homeland Security.
These requirements are for students who enroll in the 2020–2021 academic year. For prior year academic requirements, visit our catalog archive.
About the Cybersecurity Management and Policy Master's Degree
What You'll Learn
Through your coursework, you will learn how to
- Understand multinational compliance requirements for cybersecurity
- Apply risk analysis concepts and models to a variety of organizations
- Incorporate cybersecurity into numerous organizations, including healthcare and financial services organizations
- Create and establish cybersecurity frameworks in both the public and private sectors
- Develop complete cybersecurity incident response plans
- Play the role of a new chief financial officer tasked with performing a comprehensive analysis of a new S&P 500 company
- Present a paper to a chief executive officer
Coursework Examples
In past projects, students have had the opportunity to
- Develop a cyber security program for a government entity private-sector organization
- Create cyber security policies for a government entity or private-sector organization
- Perform a cyber security threat analysis, including a vulnerability assessment, and develop a risk management approach for a government entity or private-sector organization
- Develop and determine cyber incident response procedures based on management best practices
Industry Certification
This program can help prepare you for the following certification exam(s):
Cybersecurity Management and Policy Master's Degree Requirements
Our curriculum is designed with input from employers, industry experts, and scholars. You'll learn theories combined with real-world applications and practical skills you can apply on the job right away.
Master's Courses
Foundation Course
- CBR 600
Core Courses
- CMP 610
- CMP 620
- CMP 630
- CMP 640
- CYB 670
Course Rules and Program Progression
- All courses must be taken in the order listed.
- You must complete each course with a grade of B or better to advance to the next course. The grade of C is not available for these courses.
- The courses in this program will have seven-day and 60-day options for the grade of Incomplete.
Vertical Pathway
If you completed your undergraduate degree at UMGC with a major in computer networks and cybersecurity, a vertical pathway between UMGC's graduate and undergraduate degree programs in that field allows you to reduce your total coursework for this program by up to 6 credits.
Other Requirements
- You must maintain a GPA of 3.0 or higher at all times.
- All degree requirements must be fulfilled within five consecutive years.
- Any transfer credits must have been earned within the five-year time frame to be applied toward a graduate degree.
Please review our overview of overall master's degree requirements for additional considerations.
Career Preparation
This program is designed to help you prepare to join the management team in a public- or private-sector cybersecurity organization and develop and oversee cybersecurity policy. Potential career fields include cybersecurity and policy, data protection, and information security.
Experience Recommended for Success in the Program
If you do not have work experience in information technology, an IT academic background, or IT certifications, we strongly recommend you take ASC 605, ASC 609, and ASC 611. These courses will give you a foundation that will help you succeed in the program. We recommend ASC 601 if you'd like to improve your graduate writing skills.
Facts & Figures
Source: CyberSeek | "Cybersecurity Career Pathway," Cyber Seek, June 2016. | 2016
Source: Burning Glass International | Job Market Intelligence: Cyber Security Jobs 2015 | 2015
Source: Burning Glass International | Job Market Intelligence: Cyber Security Jobs 2015 | 2015

I chose UMGC because it was one of the few cyber security policy programs and because of their reputation in the cyber world.
Tyler Carlin
Cybersecurity Consultant, Deloitte
Master of Business Administration
Cybersecurity Management and Policy Master's Degree

The curriculum has a flexibility about it that I haven’t seen from other academic institutions. UMGC, I think, has cracked the code in terms of allowing it to be very agile and very much focused on the changing dimensions of cyber security.
Robert Lentz
President and CEO, Cyber Security Strategies

In Washington, D.C., especially, I think the unemployment rate for cyber security specialists is less than zero. They’re in great demand. And that’s true not just for government but for industry as well.
Elizabeth Hight
Veteran, Navy
Former Vice President of U.S. Public Sector Cybersecurity Practice, HP Enterprise Services
Student Clubs and Organizations
Type: Student organization
Available To: Undergraduate and Graduate
The Computing Club aims to create a dynamic environment where members can work collaboratively, share innovative ideas, enhance their career-readiness, and gain marketable experience in their respective fields.
Type: Student organization
Available To: Undergraduate and Graduate
The Cyber Competition Team represents UMGC at various cybersecurity events and highly competitive tournaments nationwide. Students hone their cybersecurity skills, learn to work effectively as a team, and network with other students, cyber professionals, and prospective employers.
Type: Honor society
Available To: Undergraduate and Graduate
Upsilon Pi Epsilon is the international honor society for the computing and information disciplines. Formed in 1967, the purpose of Upsilon Pi Epsilon is to promote the computing and information sciences and to encourage the enhancement of knowledge in the field. Upsilon Pi Epsilon is open to both undergraduate and graduate students who are pursuing a degree in the computing and information disciplines.
About the Faculty
Our world-class faculty members combine academic credentials with a wealth of experience in the field.
Faculty members in this program hold or have recently held positions including
- Assistant attorney general
- Assistant deputy undersecretary
- CIO
- Chief information security officer
- Chief technology officer
- Cryptologic manager
- Deputy chief, cyber security operations
- Director, server operations group
- IT director
- Team lead, cyber threat analysis
- Technical director, security engineering and testing
Our faculty work or have worked at organizations including
- Defense Information Systems Agency
- General Dynamics
- The Johns Hopkins University Applied Physics Laboratory
- Lucent Technologies
- National Biomedical Research Foundation
- National Security Agency
- Transportation Security Agency
- Science Applications International Corporation
- State of Maryland
- State University of New York
- U.S. Department of Defense
- U.S. Department of Homeland Security
- Verizon
Featured Faculty

Valorie Jackson King
Program Director and Professor, Cybersecurity Management and Policy
Additional Information
Technology Requirements
This program's curriculum requires that you use a computer with the following:
- Microphone and speakers or headset with microphone or equivalent device
- 5 GB of free hard drive space
- 4 GB RAM or higher
- A high-speed internet connection
- Computer processor (Intel Pentium 4 or AMD Athlon 64) running at speeds of at least 1 GHz
- Windows 8.1 or Mac OS X 10.6 or higher for an operating system (Linux operating systems can also be used but require more technical knowledge from the user)
Note: The higher the processor speed of your computer (e.g., 2.4–3.4 GHz), the larger the amount of available memory (e.g., 4–12 GB), and the larger the amount of available hard drive space (e.g., 5–20 GB), the better your computer will perform and the smoother your experience will be.
Frequently Asked Questions About the Program
What will I get from the Master of Science in cybersecurity management and policy? +
As the name of the program suggests, this program will help you develop your skills and competencies in management and policy. The focus of the program is on policies, procedures, and management approaches that keep networks and computer assets safe from intrusions as well as public policy relating to cyber security. These include both national and international policies by governments and organizations. The program does require that you become familiar with computer and network technologies at a foundational level.
Whom is the Master of Science in cybersecurity management and policy geared toward? +
This program is for people who want to become managers working with policies and procedures to protect networks and computer assets within a private or public organization. It is also for those who want to work with national and international cyber security policy.
What do I need to do to succeed in the Master of Science in cybersecurity management and policy? +
This program is open to anyone. You do not need any specific background in IT. However, if you have no background in IT, you may find it helpful to take a non-credit preparation course in information technology that will give you some basic IT foundation.