Master of Science in Cybersecurity
Request More Information
Ready to start a conversation about UW Cybersecurity? Fill out the form below and an Enrollment Adviser will be in touch.
One master’s degree. Two tracks. 100% online.
Cyber threats are more than a business issue; they are a national security issue. Across the country, private businesses and government agencies are searching for cybersecurity professionals at an increasingly high rate, yet there is a significant shortage of candidates that have the skills to protect organizations against cyber attacks. Now is the time to discover your path to a secure future and a rewarding career in cybersecurity.
The 100% online University of Wisconsin Master of Science in Cybersecurity will provide you with skills that meet current market demands. The program’s core curriculum addresses the fundamentals of cybersecurity, featuring courses in security planning, risk assessment, and communication. Once you complete your core courses, you will choose to pursue a unique track of study. You may choose to complete one or both tracks. The program’s two tracks of study give you the opportunity to tailor your degree to match your interests and career ambitions. The tracks are:
- Secure Systems Design
- Digital Forensics and Security Management
Universities of Wisconsin Collaboration
The Master of Science in Cybersecurity is a partnership of UW-Green Bay, UW-La Crosse, UW-Oshkosh, UW-Parkside, UW-Platteville, UW-River Falls, UW-Stevens Point, and UW-Superior. Learn more about our campus partners and choosing a home campus.
Accreditation
Whether online or on campus, University of Wisconsin programs have a reputation for delivering world-class education and student support. Accreditation is your assurance that you will graduate with skills that are relevant to your field and valued by employers. The Master of Science in Cybersecurity is approved by the University of Wisconsin Board of Regents and is fully accredited by the Higher Learning Commission.
Admission Requirements
- Bachelor’s degree with, at minimum, a 3.0 undergraduate GPA
- Prerequisite coursework in Introduction to Computer Science—which must include programming content, and prerequisite coursework in Calculus or Statistics. If you are in need of prerequisite coursework, please contact an enrollment adviser for details.
- Your resume
- Two letters of recommendation (can be professional or academic) *Note: starting in Fall 2026 letters of recommendation will no longer be required
- Up to 1,000 word statement of personal intent describing your decision to pursue the degree and what you believe you will bring to the cybersecurity field
No GRE or GMAT required
*Campuses may waive some of these requirements as part of the comprehensive application process.
Application Deadlines
Application materials must be completed two weeks prior to the semester start to be considered for admission.
Starting your application early will help ensure you have plenty of time to gather required materials (such as transcripts), transfer credits, apply for financial aid, and complete the University of Wisconsin System Online Admission Application.
Find program start dates and registration dates on our important dates page. To see course offerings by semester, see the Course Schedule.
How to Apply
Step 1: Decide which home campus you’d like to apply to. Campus partners for the cybersecurity program include UW-Green Bay, UW-La Crosse, UW-Oshkosh, UW-Parkside, UW-Platteville, UW-River Falls, UW-Stevens Point, and UW-Superior.
Step 2: Visit the University of Wisconsin System Online Admission Application. Login or create an account, apply to the home campus of your choice, and select “Cybersecurity-Collaborative” as the program. A nonrefundable $56 application fee is required for most graduate degree-seeking students applying to a UW institution.*
- Starting with the Spring 2027 semester, students applying for this program through UW-Green Bay will use a different Graduate Application form. Please refer to these instructions on how to apply.
*We’re waiving the application fee for Summer and Fall 2026 semesters. To redeem, use coupon code APPLY26 on the UW Online Application payment page.
Step 3: Send your resume, personal statement, and letters of recommendation; and arrange to have your official college transcripts (from each institution you attended) sent to the graduate student admissions office of the home campus to which you applied. *Note: starting in Fall 2026 letters of recommendation will no longer be required
International Guidelines
This program welcomes online students from around the world. Online students do not qualify for an F-1 Student Visa to travel to the U.S. but instead can participate in our online courses remotely. If your native language is not English and/or you attended school outside of the U.S., you will likely need to provide proof of English language proficiency and an official translation or evaluation of academic transcripts. Requirements will vary based on a student’s academic history and home campus policies. For guidance about these requirements and how they apply to your specific situation contact your preferred home campus admissions office.
If you would like to apply as an International Student for an on-campus program in the UW System please refer to these resources through UW-HELP.
Questions?
While you are free to apply on your own, many prospective students find it helpful to speak with an enrollment adviser first. Our staff is here to answer your questions, talk with you about your career goals, and help you decide if this program is a good choice for you.
Cybersecurity Master’s Curriculum
The Master of Science in Cybersecurity curriculum is comprised of 11 courses, for a total of 31 credits. As a student in the program, you will take five core courses from which you will gain a breadth of knowledge in the fundamental areas of cybersecurity. You will then choose to pursue a track of study and complete four required courses within this track, providing you with a depth of understanding in a specific area of the field. You will also complete a one-credit capstone preparation course and a final project-based capstone course. Students who joined the program prior to fall 2026 can access the curriculum here.
Tracks of Study
Digital Forensics and Security Management
Digital forensics and security management unite digital evidence investigation with the governance and leadership needed to manage enterprise risk. Students learn how to collect and analyze digital evidence, plan and implement cybersecurity programs, and align security operations with business objectives, regulations, and incident response, building the capabilities to prevent, detect, and decisively respond to threats across the organization.
Secure Systems Design
Secure systems design ensures the confidentiality, integrity, and availability of modern digital environments. This track explores the foundations of cryptography, secure software engineering, and system architecture, highlighting how security principles shape resilient applications and enterprise‑scale infrastructures. Students gain insight into how cryptographic tools, secure programming practices, and architectural safeguards work together to protect data and make sure the system meets the organization’s security requirements.
Curriculum - View Printable Version
Core Courses
Course title note: Course titles and content may vary by catalog year. Students should refer to the curriculum associated with their start term and work with their Academic Director to ensure they are meeting requirements.
| Course | Credits |
|---|---|
This course introduces fundamental concepts and design principles in cybersecurity. Students will understand what needs protection and why it is essential. Topics include CIA (Confidentiality, Integrity, and Availability), threats, attacks, defense, secure design principles, access control and password management, security policies, critical controls, incident-handling and contingency planning, risk assessment and management. | 3 Credits |
This course introduces students to fundamental concepts of modern computing environments and their security implications. Students will explore information technology components including computer hardware, networks, and operating systems while developing practical knowledge of endpoint protection, vulnerability management, and security controls. Emphasis is placed on both technical understanding and security awareness. | 3 Credits |
This course offers the basic knowledge of architectures, cyber threats, vulnerabilities, and defensive techniques for securing networks. The course addresses firewall functionalities, configurations, and managements. Different Architectures of VPNs for securing communication assets are presented with various implementation considerations. Students learn essentials of network analysis tools, monitoring, and policy development.
| 3 Credits |
This course explores the landscape of cyberspace, focusing on cyber threats, actors, and attacks. Students will examine privacy issues, legal frameworks, and protective measures at individual, organizational, and governmental levels. Topics include cyber crime, cyber-stalking, and the effectiveness of cybersecurity strategies in preventing digital abuse and criminal activity. | 3 Credits |
This course is a study of the ways that communication, ethics, and cybersecurity intersect in relation to employment. In addition to ethical frameworks, students will learn to present technical information to audiences with varying goals and technical needs. Presentations and projects will emulate professional scenarios in cybersecurity. | 3 Credits |
Digital Forensics and Security Management
| Course | Credits |
|---|---|
Instruction on the process used to develop and maintain appropriate security levels for an organization with a focus on implementing a comprehensive security program, a documented set of security policies, procedures, guidelines, and standards. Topics include security planning, strategies, controls, and metrics for measuring the effectiveness. Prerequisites: CYB 700 | 3 Credits |
Master risk management processes by focusing on risk assessment methodologies to perform comprehensive security risk analyses. Categorize and evaluate technological, individual, and enterprise risks, effectively communicate these risks, and recommend appropriate responses. Understand how risk relates to system security policies to develop system-specific security programs by choosing optimal methodologies. | 3 Credits |
This course provides instruction on the investigative and forensics processes of digital evidence with a focus on identifying indicators of compromise, the use of common forensics tools, and the preservation of forensics tools. Topics include forensics iconology, and the analysis of disk, memory, chip-off, mobile device, and OS artifacts. Prerequisites: CYB 701 | 3 Credits |
This course is an introduction to cybersecurity program management and compliance. Students will explore the development, implementation, and evaluation of security programs taking relevant legal and regulatory requirements into account. Topics include security policies, incident response, federal regulations, and emerging security challenges in today’s digital landscape. Prerequisites: CYB 700 | 3 Credits |
Secure Systems Design
| Course | Credits |
|---|---|
This course introduces the fundamentals of applied cryptography, including a survey of relevant mathematical concepts and elementary number theory, encryption and decryption, symmetric and asymmetric systems, block ciphers, hash functions, common attacks, digital signatures, key exchange, message authentication, public key cryptography, and implementation of cryptographic systems. | 3 Credits |
Focuses on security architectures for the protection of information systems and data. Master identifying potential vulnerabilities in system architectures and design robust, secure architectures tailored to specific applications. Topics include common enterprise and security architectures, secure cloud computing, virtualization platforms, and the application of industry standards like the Zero Trust model. Prerequisites: CYB 703 | 3 Credits |
An in-depth study of modern cryptography. Topics include public key and private key cryptography, identity-base cryptography, types of attacks, key management, perfect secrecy, hashing, digital signatures, virtual private networks, and quantum key cryptography. Topics from number theory and discrete probability and statistics necessary for understanding current cryptosystems and their security will be covered. Prerequisites: CYB 710 | 3 Credits |
This course emphasizes on both proactive and reactive measures and systematic evaluation techniques for identifying and mitigating vulnerabilities and potential flaws in software systems that could be exploited by malicious actors. The unit focuses on the examination of software structure and behavior, either by directly reviewing code or observing its execution in controlled environments such that vulnerabilities are caught early in the development lifecycle or during regular security assessments. The objective is to integrate security into the entire software development process, minimizing risks and enhancing the overall resilience of software systems against cyber threats.
| 3 Credits |
Capstone Courses
| Course | Credits |
|---|---|
Prepares students for the capstone experience. Drawing on skills learned, students will submit a written project proposal – with organization, timeline, learning objectives, and specific deliverables identified – for faculty approval. This course is a pre-requisite for the capstone course. Prerequisites: All core courses must be completed
| 1 Credits |
Students present project identified in Capstone Preparation and submit a written report plus oral presentation to both faculty and host organization. Students will be assessed on clarity and content of written report and presentation. Host evaluation will account for a significant percentage of student’s final grade. Prerequisites: CYB 789
| 3 Credits |
This schedule shows all courses offered for students starting Fall 2026 or later.
Students starting Summer 2026 and prior should follow this course schedule.
Course availability for the Master of Science in Cybersecurity program varies each semester. If you are a current student, please consult with your campus adviser prior to registration.
Summer 2026
Request Permission NumberCourse Preview Week: May 19 - May 25, 2026
Semester Dates: May 26 - August 07, 2026
Summer 2026 - View Printable Version
Core Courses
Course title note: Course titles and content may vary by catalog year. Students should refer to the curriculum associated with their start term and work with their Academic Director to ensure they are meeting requirements.
This course offers the basic knowledge of architectures, cyber threats, vulnerabilities, and defensive techniques for securing networks. The course addresses firewall functionalities, configurations, and managements. Different Architectures of VPNs for securing communication assets are presented with various implementation considerations. Students learn essentials of network analysis tools, monitoring, and policy development.
This course explores the landscape of cyberspace, focusing on cyber threats, actors, and attacks. Students will examine privacy issues, legal frameworks, and protective measures at individual, organizational, and governmental levels. Topics include cyber crime, cyber-stalking, and the effectiveness of cybersecurity strategies in preventing digital abuse and criminal activity.
Secure Systems Design
This course emphasizes on both proactive and reactive measures and systematic evaluation techniques for identifying and mitigating vulnerabilities and potential flaws in software systems that could be exploited by malicious actors. The unit focuses on the examination of software structure and behavior, either by directly reviewing code or observing its execution in controlled environments such that vulnerabilities are caught early in the development lifecycle or during regular security assessments. The objective is to integrate security into the entire software development process, minimizing risks and enhancing the overall resilience of software systems against cyber threats.
Fall 2026
Request Permission NumberCourse Preview Week: September 01 - September 07, 2026
Semester Dates: September 08 - December 18, 2026
Fall 2026 - View Printable Version
Core Courses
Course title note: Course titles and content may vary by catalog year. Students should refer to the curriculum associated with their start term and work with their Academic Director to ensure they are meeting requirements.
This course introduces fundamental concepts and design principles in cybersecurity. Students will understand what needs protection and why it is essential. Topics include CIA (Confidentiality, Integrity, and Availability), threats, attacks, defense, secure design principles, access control and password management, security policies, critical controls, incident-handling and contingency planning, risk assessment and management.
Digital Forensics and Security Management
Master risk management processes by focusing on risk assessment methodologies to perform comprehensive security risk analyses. Categorize and evaluate technological, individual, and enterprise risks, effectively communicate these risks, and recommend appropriate responses. Understand how risk relates to system security policies to develop system-specific security programs by choosing optimal methodologies.
Secure Systems Design
This course introduces the fundamentals of applied cryptography, including a survey of relevant mathematical concepts and elementary number theory, encryption and decryption, symmetric and asymmetric systems, block ciphers, hash functions, common attacks, digital signatures, key exchange, message authentication, public key cryptography, and implementation of cryptographic systems.
Capstone Courses
Prepares students for the capstone experience. Drawing on skills learned, students will submit a written project proposal – with organization, timeline, learning objectives, and specific deliverables identified – for faculty approval. This course is a pre-requisite for the capstone course.
Prerequisites: All core courses must be completed
Students present project identified in Capstone Preparation and submit a written report plus oral presentation to both faculty and host organization. Students will be assessed on clarity and content of written report and presentation. Host evaluation will account for a significant percentage of student’s final grade.
Prerequisites: CYB 789
Spring 2027
Registration Opens: November 09, 2026
Course Preview Week: January 19 - January 25, 2027
Semester Dates: January 26 - May 07, 2027
Spring 2027 - View Printable Version
Core Courses
Course title note: Course titles and content may vary by catalog year. Students should refer to the curriculum associated with their start term and work with their Academic Director to ensure they are meeting requirements.
This course introduces students to fundamental concepts of modern computing environments and their security implications. Students will explore information technology components including computer hardware, networks, and operating systems while developing practical knowledge of endpoint protection, vulnerability management, and security controls. Emphasis is placed on both technical understanding and security awareness.
This course is a study of the ways that communication, ethics, and cybersecurity intersect in relation to employment. In addition to ethical frameworks, students will learn to present technical information to audiences with varying goals and technical needs. Presentations and projects will emulate professional scenarios in cybersecurity.
Digital Forensics and Security Management
Instruction on the process used to develop and maintain appropriate security levels for an organization with a focus on implementing a comprehensive security program, a documented set of security policies, procedures, guidelines, and standards. Topics include security planning, strategies, controls, and metrics for measuring the effectiveness.
Prerequisites: CYB 700
This course provides instruction on the investigative and forensics processes of digital evidence with a focus on identifying indicators of compromise, the use of common forensics tools, and the preservation of forensics tools. Topics include forensics iconology, and the analysis of disk, memory, chip-off, mobile device, and OS artifacts.
Prerequisites: CYB 701
Secure Systems Design
Focuses on security architectures for the protection of information systems and data. Master identifying potential vulnerabilities in system architectures and design robust, secure architectures tailored to specific applications. Topics include common enterprise and security architectures, secure cloud computing, virtualization platforms, and the application of industry standards like the Zero Trust model.
Prerequisites: CYB 703
An in-depth study of modern cryptography. Topics include public key and private key cryptography, identity-base cryptography, types of attacks, key management, perfect secrecy, hashing, digital signatures, virtual private networks, and quantum key cryptography. Topics from number theory and discrete probability and statistics necessary for understanding current cryptosystems and their security will be covered.
Prerequisites: CYB 710
Capstone Courses
Prepares students for the capstone experience. Drawing on skills learned, students will submit a written project proposal – with organization, timeline, learning objectives, and specific deliverables identified – for faculty approval. This course is a pre-requisite for the capstone course.
Prerequisites: All core courses must be completed
Students present project identified in Capstone Preparation and submit a written report plus oral presentation to both faculty and host organization. Students will be assessed on clarity and content of written report and presentation. Host evaluation will account for a significant percentage of student’s final grade.
Prerequisites: CYB 789
Summer 2027
Registration Opens: March 08, 2027
Course Preview Week: May 25 - May 31, 2027
Semester Dates: June 01 - August 13, 2027
Summer 2027 - View Printable Version
Core Courses
Course title note: Course titles and content may vary by catalog year. Students should refer to the curriculum associated with their start term and work with their Academic Director to ensure they are meeting requirements.
This course offers the basic knowledge of architectures, cyber threats, vulnerabilities, and defensive techniques for securing networks. The course addresses firewall functionalities, configurations, and managements. Different Architectures of VPNs for securing communication assets are presented with various implementation considerations. Students learn essentials of network analysis tools, monitoring, and policy development.
Digital Forensics and Security Management
This course is an introduction to cybersecurity program management and compliance. Students will explore the development, implementation, and evaluation of security programs taking relevant legal and regulatory requirements into account. Topics include security policies, incident response, federal regulations, and emerging security challenges in today’s digital landscape.
Prerequisites: CYB 700
Secure Systems Design
This course emphasizes on both proactive and reactive measures and systematic evaluation techniques for identifying and mitigating vulnerabilities and potential flaws in software systems that could be exploited by malicious actors. The unit focuses on the examination of software structure and behavior, either by directly reviewing code or observing its execution in controlled environments such that vulnerabilities are caught early in the development lifecycle or during regular security assessments. The objective is to integrate security into the entire software development process, minimizing risks and enhancing the overall resilience of software systems against cyber threats.
Cybersecurity today requires more than technical skills. It requires people who can anticipate risk, respond under pressure, and help organizations make smarter security decisions. Designed with faculty expertise and industry advisory board insight to reflect the skills cybersecurity professionals use every day, this program prepares you to become the kind of cybersecurity professional organizations rely on.
What you will be able to do in the field
Find and fix vulnerabilities before they’re exploited
Understand how systems actually break and how to secure them.
- Identify weaknesses across systems, networks, and applications
- Apply real-world security controls
- Reduce risk before it becomes a breach
Respond when it matters most
Step into high-stakes situations with confidence.
- Detect suspicious activity and emerging threats
- Support incident response and recovery
- Investigate what happened and how to prevent it
Build security into systems from the start
Move beyond reactive security.
- Evaluate system and network design
- Apply secure architecture principles
- Help create environments that are harder to attack
Turn risk into action
Connect cybersecurity to real organizational decisions.
- Assess and prioritize risk
- Support resilience and continuity planning
- Help organizations focus on what matters most
Navigate policy, compliance, and real-world constraints
Operate where security meets regulation and responsibility.
- Apply cybersecurity laws and frameworks
- Understand the human side of security decisions
- Communicate risk clearly across teams
Work across teams and lead where needed
Cybersecurity doesn’t happen in a silo.
- Translate technical issues for non-technical audiences
- Collaborate across IT, leadership, and operations
- Contribute to security strategy and direction
Graduate Tuition
Tuition for the UW Master of Science in Cybersecurity is a flat fee per credit whether you live in Wisconsin or out of state. Cost per credit is $850.
Textbooks are purchased separately and are not included in tuition. Being an online program, there are no additional course or program fees such as segregated or technology fees. If software or special technology is required in one of your courses, it will be provided to you and is included in your tuition.
Financial Aid
Financial aid may be available to you and is awarded by your home campus. Contact your home campus financial aid office to see if you qualify for aid as a full or part-time student.
Visit our financial aid page to learn more about FAFSA and other sources of financial aid.
Grants and Scholarships
You may be eligible for a grant or scholarship as a student in a semester-based collaborative program. More information can be found here.
Veteran Benefits
Benefits are available to qualifying veterans and those currently serving. Contact your home campus veteran services office for details.
Teach-Out Curriculum for Current and Incoming Students
Students who begin the program in Summer 2026 or earlier will complete the previously approved curriculum, which offered four specialization tracks. All required courses will continue to be offered through Spring 2027 to support timely degree completion.
Students may have the option of switching to the two track curriculum. Your Enrollment Adviser and Success Coach can help find the best path for you.
If the current semester is open for enrollment, admitted students may request permission numbers.
Cybersecurity Program Curriculum Summer 2026 and prior
Course Schedule Spring 2026 – Teach-Out Curriculum
Course Schedule Summer 2026 – Teach-Out Curriculum
Course Schedule Fall 2026 – Teach-Out Curriculum
Course Schedule Spring 2027 – Teach-Out Curriculum
Course Schedule Summer 2027 – Teach-Out Curriculum
Experience UW Cybersecurity
Learn about the cybersecurity industry, program faculty, read student stories, and more. Explore the blog.