Boost your career by gaining the skills and knowledge to address cyber security threats from a management perspective.

The Master of Science in cybersecurity management and policy at University of Maryland Global Campus can help you gain the tools you need to join the management track in cyber security so that you can establish, implement, and oversee a cyber security structure for an organization. Learn how to create a security approach that combines technology, governance, and compliance perspectives. Gain advanced knowledge in organizational structures, communication, operational business processes, and the legal framework for cyber security policy.

These program requirements are for students who enroll in the 2019–2020 academic year. For prior year academic requirements, visit the catalog archive in the Current Students section.

About the Cybersecurity Management and Policy Master's Degree

Coursework in the cybersecurity management and policy master's degree program features emerging topics in the field. Additionally, a board of industry leaders and employers advises our faculty to make sure our cybersecurity programs are covering emerging areas that are relevant to your career growth.


What You'll Learn

Through your coursework, you will learn how to

  • Understand multinational compliance requirements for cyber security
  • Apply risk analysis concepts and models to a variety of organizations
  • Incorporate cyber security into numerous organizations, including healthcare and financial services organizations
  • Create and establish cyber security frameworks in both the public and private sectors
  • Develop complete cyber security incident response plans

Coursework Examples

In past projects, students have had the opportunity to

  • Develop a cyber security program for a government entity private-sector organization
  • Create cyber security policies for a government entity or private-sector organization
  • Perform a cyber security threat analysis, including a vulnerability assessment, and develop a risk management approach for a government entity or private-sector organization
  • Develop and determine cyber incident response procedures based on management best practices

Cybersecurity Management and Policy Master's Degree Requirements

Our curriculum is designed with input from employers, industry experts, and scholars. You'll learn theories combined with real-world applications and practical skills you can apply on the job right away.

Master's Courses

Core Courses

  • CBR 600
  • CMP 610
  • CMP 620
  • CMP 630
  • CMP 640
  • CYB 670

All courses must be taken in the order listed. 

You must complete each course with a grade of B or better to advance to the next course. The grade of C is not available for these courses. 

The courses in this program will have seven-day and 60-day options for the grade of Incomplete.

Other Requirements

  • You must maintain a GPA of 3.0 or higher at all times.
  • All degree requirements must be fulfilled within five consecutive years.
  • Any transfer credits must have been earned within the five-year time frame to be applied toward a graduate degree.

Career Preparation

This program is designed to help you prepare to join the management team in a public- or private-sector cyber security organization and develop and oversee cyber security policy. Potential career fields include cyber security and policy, data protection, and information security.

Experience Recommended for Success in the Program

If you do not have work experience in information technology, an IT academic background, or IT certifications, we strongly recommend you take ASC 605, ASC 609, and ASC 611. These courses will give you a foundation that will help you succeed in the program. We recommend ASC 601 if you'd like to improve your graduate writing skills.

Facts & Figures

Student Clubs and Organizations

    Type: Student organization
    Available To: Undergraduate and Graduate

    The Computing Club aims to create a dynamic environment where members can work collaboratively, share innovative ideas, enhance their career-readiness, and gain marketable experience in their respective fields.

    Type: Student organization
    Available To: Undergraduate and Graduate

    The Cyber Competition Team represents UMGC at various cybersecurity events and highly competitive tournaments nationwide. Being a member of the team allows students to develop their cybersecurity skills and to network with other students with similar interests.

Additional Information

Technology Requirements

The cyber security curriculum requires that you use a computer with the following:

  • Microphone and speakers or headset with microphone or equivalent device
  • 5 GB of free hard drive space
  • 2 GB RAM or higher
  • A high-speed internet connection
  • Computer processor running at speeds of at least 1 GHz
  • Windows 7 or Mac OS X 10.6 or higher for an operating system (Linux operating systems can also be used but require more technical knowledge from the user)

Get a Head Start on a Cybersecurity Master's Degree or Certificate

Students who complete the bachelor's degree in computer networks and cybersecurity may be eligible to reduce their total coursework for the following graduate degree and certificate programs by 6 credits:

  • Cybersecurity management and policy
  • Cybersecurity technology
  • Digital forensics and cyber investigation

To be eligible, you must have completed CMIT 495 no earlier than spring 2019. If eligible, you may be awarded credit for CBR 600. This the only course for which credit may be granted through this educational relationship.

Admission requirements and time limits for degree completion apply to all applicants.

Frequently Asked Questions About the Program

What will I get from the Master of Science in cybersecurity management and policy? +

As the name of the program suggests, this program will help you develop your skills and competencies in management and policy. The focus of the program is on policies, procedures, and management approaches that keep networks and computer assets safe from intrusions as well as public policy relating to cyber security. These include both national and international policies by governments and organizations. The program does require that you become familiar with computer and network technologies at a foundational level.

Whom is the Master of Science in cybersecurity management and policy geared toward? +

This program is for people who want to become managers working with policies and procedures to protect networks and computer assets within a private or public organization. It is also for those who want to work with national and international cyber security policy.

What do I need to do to succeed in the Master of Science in cybersecurity management and policy? +

This program is open to anyone. You do not need any specific background in IT. However, if you have no background in IT, you may find it helpful to take a non-credit preparation course in information technology that will give you some basic IT foundation.