A professor speaking with students in front of a large monitor depicting a world map.

Master of Science  in
Cybersecurity and Risk
Online or On Campus

Program of Study

programofstudy

This program includes 36 credits of coursework in your selected concentration, followed by a 3-6-credit internship or thesis in which you solve real-world problems.

The program offers flexibility to tailor your path based on your interests—whether in technical, risk and compliance, or managerial and strategic roles.

The technical Cyber Risk Management & Compliance concentration focus covers areas like network security, application security, threat analysis, digital forensics and security operations. The non-technical concentration Cybersecurity & Privacy of Health Information emphasizes cybersecurity policy, risk management, compliance, governance, and legal frameworks.

Study Options: Full-time or part-time; available online, in-person or hybrid.

A professor working with two students at computers.
Concentrations
Cyber Risk Management & Compliance
Cyber Risk Management & Compliance

This track covers policy and risk management, with a focus on how cyber incidents and cybersecurity programs impact the security of organizations and government. It also incorporates a focus on homeland security.

By the end of the program, you will be equipped for occupations such as security manager, IT project manager, emergency management director, document control/management specialist or cybersecurity analyst.

 

Core Courses (21 credits)

  • Advanced Networking and Security OR Advanced Networking
  • Information Security and Privacy OR Introduction to Information and Cybersecurity
  • Human Aspects of Cybersecurity OR Psychology of Security
  • Information Security Compliance Auditing
  • Core Electives - Choose three from the following:
    • Principles and Practices of Cybersecurity
    • Computer and Network Security
    • IT and Homeland Security
    • Cybersecurity Risk and Policy
    • Cybersecurity: Long Term Planning and Risk Management


Cybersecurity Tool (3 credits)

Choose one:

  • Hacking for Penetration Testers
  • Computer Forensics
  • Incident Handling
  • Fundamentals of Information Technology (3 one-credit modules)


Electives (9 credits)

Choose three:

  • Cybersecurity Policy, Law and Institutions
  • Prevention and Protection Strategies in Cybersecurity
  • Cyber Threats and Intelligence
  • Cybersecurity Practicum
  • Cyberlaw & Ethics
  • Cyber Vulnerability Exploitation
  • Other elective as advised


Internship OR Master's Thesis (3 credits)

Cybersecurity & Privacy of Health Information
Cybersecurity & Privacy of Health Information

This track prepares you to apply security analytics, risk assessment and policy management to protecting health information.

By the end of the program, you will be equipped for occupations such as health information security director, health IT project manager or cybersecurity analyst for medical records.


Core Courses (21 credits)

  • Advanced Networking and Security OR Advanced Networking
  • Information Security and Privacy OR Introduction to Information and Cybersecurity
  • Health Information Technology
  • Topics in Health Policy & Mgt: Health Analytics
  • Core Electives - Choose three from the following:
    • Information Security Compliance Auditing
    • Principles and Practices of Cybersecurity
    • Cybersecurity Risk and Policy
    • Computer and Network Security
    • Cyber Vulnerability Exploitation


Cybersecurity Tool (3 credits)

Choose one:

  • Hacking for Penetration Testers
  • Computer Forensics
  • Incident Handling
  • Fundamentals of Information Technology (3 one-credit modules)


Electives (9 credits)

Choose three:

  • Cybersecurity Policy, Law and Institutions
  • Human Aspects of Cybersecurity OR Psychology of Security
  • Prevention and Protection Strategies in Cybersecurity
  • Cybersecurity Practicum
  • Other elective as advised


Internship OR Master's Thesis (3 credits)

Career Paths


Virtually every enterprise in operation today relies on computer systems and digital networks to stay in business. 

This means that millions of trained cybersecurity and digital forensics experts are needed to set up and maintain protected information systems across all industries and in global corporations, small companies, nonprofit organizations, and federal, state, and local government offices. 

Because national security depends on corporations and governments preventing criminal access to large-scale industrial and critical infrastructure systems, graduates of this program enjoy many employment opportunities in public utilities companies, nuclear power plants, water distribution departments, medical facilities, health insurance companies and communication networks.

 

 

Potential job titles with a cybersecurity and risk master’s degree:

  • Cybersecurity Analyst
  • Risk Analyst
  • GRC Specialist
  • Security Auditor
  • Data Privacy Officer
  • Cybersecurity Program Manager
  • Policy Advisor
  • Chief Information Security Officer (CISO)
career

Why should I enroll in this program?

enroll

Many students completing their undergraduate studies at UAlbany and other colleges and universities see the value in earning this specialized master’s before they join the workforce.

The program is especially attractive to recent graduates with degrees in emergency preparedness, homeland security, cybersecurity, informatics, applied engineering, mathematics and computer science. 

If you’re earning your bachelor’s in cybersecurity at UAlbany, you’ll have an even greater advantage in the job market with this graduate degree on your resume. 

If you’re an early- or mid-career working professional wanting to advance your career, you can finish the program part-time by registering for evening classes.

Not ready to commit to a master's program? Get ahead by completing the Emergency Preparedness, Homeland Security and Cybersecurity certificate, and then apply your credits to the master’s program when you’re ready.

A student working on a computer in the UAlbany Cyber Cascade Risk Lab.
Center of Academic Excellence in Cybersecurity

UAlbany is a designated Center of Academic Excellence in Cybersecurity by the National Centers of Academic Excellence in Cybersecurity program at the National Security Agency (NSA). This designation recognizes our superior standards and abilities to educate the future cyber workforce.

Center of Academic Excellence in Cybersecurity Community logo

International Students

This degree is designated as a STEM program. International students maintaining F-1 status are allowed to apply for up to 12 months of post-completion Optional Practical Training (OPT) following completion/graduation from their degree program. Currently, this degree program is also designated by the Department of Homeland Security (DHS) as an eligible degree for the F-1 STEM OPT work authorization extension; students who secure qualifying employment may be eligible to apply for the STEM OPT extension for a cumulative total of up to 36 months of F-1 OPT work authorization.

Accelerated Undergraduate/Graduate Option

If you’re a current UAlbany undergraduate student with at least a 3.0 GPA, you may be eligible to begin your graduate degree coursework as early as your junior year. Save time and money by applying up to 12 academic credits, billed at the undergraduate rate, towards both degrees. By doing so, you may be able to complete your combined program in only 5 years and spend less than you would if you completed each program separately.

Contact your undergraduate advisor to see if you’re eligible and learn about your combined graduate program options.

UAlbany graduate with confetti at Commencement.
Admissions Requirements
Deadlines
Deadlines
  • Fall: Rolling
  • Spring: Rolling
  • Summer: Rolling

There may be opportunities to apply for graduate assistantships, please fill out the Graduate Assistantship Application portion in the general application to be considered.

Required Application Materials
Required Application Materials
  • Transcripts from all schools attended
  • Two Letters of recommendation
  • Resume
  • Personal Statement
Special Notes
Special Notes

If you are a UAlbany undergraduate student in the BS Informatics program or the BS Emergency Preparedness, Homeland Security and Cybersecurity (Cybersecurity Risk Management concentration) program, you can apply for the accelerated bachelor’s-master’s option in the MS in Cybersecurity and Risk to complete your combined program in only five years. You can save time and money by beginning your graduate degree coursework while still enrolled as an undergraduate student. 

This program requires an internship, field experience, study abroad component, or clinical experience requirement. Students who have previously been convicted of a felony are advised that their prior criminal history may impede their ability to complete the requirements of certain academic programs and/or to meet licensure requirements for certain professions. If you have concerns about this matter please contact the Dean’s Office of your intended academic program.

admissions
Student Learning Objectives


Learning objectives that UAlbany students are expected to attain through their course of study within their academic program.

Master of Science
Master of Science
  • Design and implement effective cybersecurity strategies to protect organizational assets.
  • Lead and manage cybersecurity teams and initiatives in diverse organizational settings.
  • Ensure compliance with regulatory standards and industry best practices.
  • Assess and mitigate cybersecurity risks through advanced risk management techniques.
  • Conduct in-depth security analytics to detect, analyze, and respond to cyber threats.
  • Develop and enforce policies that address cybersecurity challenges, privacy, and governance.
  • Perform network security, penetration testing and digital forensics to identify vulnerabilities and secure systems.
  • Apply cryptographic techniques to protect sensitive information and communications.
  • Understand and navigate legal, ethical and compliance frameworks within cybersecurity.
  • Contribute to the continuous improvement of security operations and organizational resilience.
  • Demonstrate comprehension of top five foundational concepts in information technology, including programming, operating systems, cryptography, databases and networking.
  • Have operational knowledge of cybersecurity tools in the domains of anti-virus, anti-malware, network defense, intrusion detection and encryption.
slo