Master of Science in Information Assurance & Cybersecurity

Be at The Forefront of Cybersecurity Technology

As an enterprising industry expert, you’re not only interested in learning about the latest security technologies-you want to create them. By providing your organization with state-of-the-art cybersecurity policies and procedures you can set your career in motion. 

Your Master of Science in Information Assurance & Cybersecurity (MSIS) will allow you to take on the leadership role of developing, programming and designing technologies that secure information and systems and propel you to be a pioneer in the field.

This security program is recognized by the U.S. National Security Agency (NSA) and the Department of Homeland Security (DHS).

Take the next steps to success. Apply for NSU’s Master of Science in Information Assurance and Cybersecurity.

Quick Facts

Tuition for the degree program is $775 per credit hour. Discounted rates are available through our employer tuition program.
NSU’s M.S. in Information Assurance & Cybersecurity is 36 total credits (12 courses) to complete.
Application Deadlines
Applications for admission are accepted online and on a rolling basis for all graduate programs. Available start dates are in August, January, and May.
Delivery Options
Classes for the M.S. in Information Assurance & Cybersecurity program are offered online or at our Fort Lauderdale/Davie campus. Each on-campus class meets once a week in the evening for 16 weeks in the fall and winter terms and for 14 weeks in the summer term.

Career Outcomes

Security Engineer $115,946 Average Salary Per Year

7.5% Projected Employment Growth

Chief Information Officer $136,934 Average Salary Per Year

-0.1% Projected Employment Growth

Security Analyst $84,612 Average Salary Per Year

3.4% Projected Employment Growth

Source: 2017 Salary Report

Program Overview

About the M.S. in Information Assurance and Cybersecurity

This program addresses important areas, such as vulnerabilities, cryptography, authentication, security models, network security, trusted computer systems, distributed systems security, and applications security.

View Brochure (PDF)

Success Stories

Take The Next Step
Return to Top