Stay ahead of blackhat hackers
and master
offensive and defensive strategies

Earn your master's degree in cyber security leadership and policy
with stratford university!


cyber security
leadership and policy

The Master of Science in Cyber Security Leadership and Policy program is designed to build on a strong technical foundation, to provide graduates with the knowledge, skills, and dispositions to lead cyber security teams; and manage digital security within organizations. The program seeks to integrate learning of an enterprise’s business needs, relevant policy and legal issues, and the management of both physical and digital oversight of systems.

The key areas of focus

  • Leadership
  • Management
  • Standards
  • Research
  • Analysis
  • Problem-solving
  • Planning
  • Recovery
  • Prevention
  • Security culture
  • Auditing
  • Compliance
  • Protection
  • Strategic roadmapping
  • Coordination
  • Physical security
  • Policy development
  • Incident response
  • Communication
  • Digital security
Security breaches
that could have been prevented
  • 2001 & 2014
    Sony

    Sony's popular PlayStation Network found itself under attack between April 17 and April 19, 2011 from an "external intrusion." Personal details from approximately 77 million accounts were compromisted, forcing Sony to turn off the network on April 20. The outage lasted 23 days. Then in December 2014, Son was hacked again. The original aggressor had believed to had been North Korea, but upon closer investigation, qualified hackers ranged from disgruntled employees to profit-seeking hackers.

    game controller
  • 2013
    Target

    During Black Friday, one of the busiest days of the year for retailers, cyber criminals cracked into Target's system, but the hack went unannounced for three weeks. "We recognize this has been confusing and disruptive during an already busy holiday season," Target CEO Gregg Steinhafel stated. "Our guests' trust is our top priority at Target and we are committed to making this right." Target, the nation's second largest general merchandise retailer in the United States discovered that their ATM-style cards used at brick-and-mortar locations were the intended targets of the hack and were, most likely, compromised.

    credit cards
  • 2016
    Yahoo!

    Yahoo Inc suffered a breach that compromised at least 500 million of its user accounts in 2014, but the breach was not reported until 2016. Yahoo identified the lost data as names, email addresses, telephone numbers, dates of birth, and encrypted passwords but that more valuable data such as payment card data and bank account information did not appear to have been stolen. "This is the biggest data breach ever," noted cryptologist and security expert, Bruce Schneier.

    smartphone

complete your
Master of Science in Cyber Security Leadership and Policy

through classroom instruction at one of our Virginia campuses, online instruction, or a combination of both.

total required for graduation

54
credits

12
classes

Earn Your Degree
on Your Time
CampusOnline

On Campus or online

Where our classes are offered

Time

5 - 10 weeks

Time needed to complete a class

Calander

15 Months

Time needed to finish a master’s degree

Admissions Requirements: Students with an accredited undergraduate degree in computer science, information systems, or other related field, may be deemed to have acquired competency in the core areas. All the courses must have been passed with a grade of C or better. Students with an undergraduate degree in an unrelated field are required to demonstrate competency in the IT core areas. Competency can be demonstrated by completing necessary coursework prior to beginning graduate studies at Stratford University, by completing the appropriate bridge courses offered through the Stratford University on-campus or online program, or through Prior Learning Assessment.
Competency Requirements

  • CIS390- Basic Computer Technology, Applications, and Security Bridge
  • CIS391- Server/OS, Relational Databases, and Software Security Bridge
  • CIS392- Networking Bridge

Program Requirements

Complete Your Degreeby meeting the following program requirements
  • Complete Core Requirements

Core Requirements

Complete the following core requirements for the Master of Science in Cyber Security Leadership and Policy

Core Requirements

Complete all following courses

CIS615
Cyber Security Prevention and Protection
CIS655
Strategies in Cyber Conflict
CIS660
Culture of Security
CIS665
Physical Security
CIS622
Cyber Security Methods of Analysis
CIS624
International Cyber Policy and Standards
CIS626
Developing Cyber Security Policy
CIS628
Cyber Security Policy Implementation
CIS650
Cyber Security Leadership Capstone
CIS631
Cyber Law and Compliance
CIS694
Auditing and Incident Response
CIS632
Cyber Security Leadership

Cooperative Education

In this optional program area, students benefit from the opportunity to apply the skills learned in the classroom in a real world environment. Students may incorporate cooperative education courses throughout the program instead of waiting until program completion. These optional courses are in addition to the program outline above.

CIS599
Cooperative Education: Computer Information Systems
  • Core
    Requirements

    Core
    Requirements

    In this optional program area, students benefit from the opportunity to apply the skills learned in the classroom in a real world environment. Students may incorporate cooperative education courses throughout the program instead of waiting until program completion. These optional courses are in addition to the program outline above.

    • Core Requirements

      Complete all following courses

      CIS615
      Cyber Security Prevention and Protection
      CIS655
      Strategies in Cyber Conflict
      CIS660
      Culture of Security
      CIS665
      Physical Security
      CIS622
      Cyber Security Methods of Analysis
      CIS624
      International Cyber Policy and Standards
      CIS626
      Developing Cyber Security Policy
      CIS628
      Cyber Security Policy Implementation
      CIS650
      Cyber Security Leadership Capstone
      CIS631
      Cyber Law and Compliance
      CIS694
      Auditing and Incident Response
      CIS632
      Cyber Security Leadership
  • Cooperative Education

    Cooperative Education

    In this optional program area, students benefit from the opportunity to apply the skills learned in the classroom in a real world environment. Students may incorporate cooperative education courses throughout the program instead of waiting until program completion. These optional courses are in addition to the program outline above.

    • Cooperative Education

      CIS599
      Cooperative Education: Computer Information Systems