MS in Cybersecurity
Tackle digital threats with an interdisciplinary MS in cyber security
Defend key pillars of our society—government, law, health, finance, defense, and more—when you learn to assess and manage ongoing information security risks with a Master of Science in Cybersecurity (MSCY). At Northeastern University’s Khoury College of Computer Sciences, the cybersecurity program is uniquely interdisciplinary, breaking down silos and blind spots. You’ll build a foundation in law, forensics, criminology, social sciences, policy, and management alongside technical skills in information security technology and computing.
Tackle digital threats with an interdisciplinary MS in cyber security
Defend key pillars of our society—government, law, health, finance, defense, and more—when you learn to assess and manage ongoing information security risks with a Master of Science in Cybersecurity (MSCY). At Northeastern University’s Khoury College of Computer Sciences, the cybersecurity program is uniquely interdisciplinary, breaking down silos and blind spots. You’ll build a foundation in law, forensics, criminology, social sciences, policy, and management alongside technical skills in information security technology and computing.
Designing new cryptosystems that allow the cloud to perform secure computations with encrypted and authenticated data
Funding: National Science Foundation
Associate Professor Daniel Wichs
Designing new cryptosystems that allow the cloud to perform secure computations with encrypted and authenticated data
Funding: National Science Foundation
Associate Professor Daniel Wichs
Designing new cryptosystems that allow the cloud to perform secure computations with encrypted and authenticated data
Funding: National Science Foundation
Associate Professor Daniel Wichs
Designing new cryptosystems that allow the cloud to perform secure computations with encrypted and authenticated data
Funding: National Science Foundation
Associate Professor Daniel Wichs
Lean into your strengths with technical and contextual tracks
The MS in cyber security program prepares you for a key information security position in either a technical or management role. There are options for students with a strong foundation in computer science as well as those with more contextual knowledge, such as military, health, finance, government, and more. You will take courses across both tracks and then choose to deepen your expertise in either the technical track or contextual track, depending on your interests.
Lean into your strengths with technical and contextual tracks
The MS in cyber security program prepares you for a key information security position in either a technical or management role. There are options for students with a strong foundation in computer science as well as those with more contextual knowledge, such as military, health, finance, government, and more. You will take courses across both tracks and then choose to deepen your expertise in either the technical track or contextual track, depending on your interests.
Advance your skills to fill one of the most pressing needs in tech
Employers are in need of skilled cybersecurity professionals. In one large study, 63% of surveyed enterprises have unfilled cybersecurity jobs (State of Cybersecurity 2022, ISACA). On average, cybersecurity roles take 21% longer to fill than other IT jobs (Cyberseek.org). Literally no state in the United States has a surplus of cybersecurity professionals (TechGenix).
Advance your skills to fill one of the most pressing needs in tech
Employers are in need of skilled cybersecurity professionals. In one large study, 63% of surveyed enterprises have unfilled cybersecurity jobs (State of Cybersecurity 2022, ISACA). On average, cybersecurity roles take 21% longer to fill than other IT jobs (Cyberseek.org). Literally no state in the United States has a surplus of cybersecurity professionals (TechGenix).
TechGenix
Cybercrime Magazine
TechGenix
Cybercrime Magazine
TechGenix
TechGenix
TechGenix
Cybercrime Magazine
TechGenix
Cybercrime Magazine
TechGenix
TechGenix
USBLS
USBLS
USBLS
USBLS
USBLS
USBLS
USBLS
USBLS
USBLS
USBLS
USBLS
USBLS
Demand for cybersecurity professionals is high everywhere
In the United States
Every state in the United States is seeking cybersecurity professionals. Roughly 200,000 senior and midlevel positions and 25,000 entry-level positions are currently available, and demand is only growing (TechGenix). Furthermore, there is a large pool of important government and Department of Defense positions open to U.S. citizens due to security clearance requirements.
Internationally
Cybersecurity professionals are also in high demand globally. The global workforce gap for cybersecurity professionals has grown twice as much as the workforce, with a 26.2% year-over-year surge. In fact, 3.4 million cybersecurity professionals are needed globally (ISC2).
Demand for cybersecurity professionals is high everywhere
In the United States
Every state in the United States is seeking cybersecurity professionals. Roughly 200,000 senior and midlevel positions and 25,000 entry-level positions are currently available, and demand is only growing (TechGenix). Furthermore, there is a large pool of important government and Department of Defense positions open to U.S. citizens due to security clearance requirements.
Internationally
Cybersecurity professionals are also in high demand globally. The global workforce gap for cybersecurity professionals has grown twice as much as the workforce, with a 26.2% year-over-year surge. In fact, 3.4 million cybersecurity professionals are needed globally (ISC2).
See how graduate-level expertise in cybersecurity pays off
Research demonstrates that an MS in cyber security increases your earning potential.
See how graduate-level expertise in cybersecurity pays off
Research demonstrates that an MS in cyber security increases your earning potential.
USBLS
ComputerScience.org
USBLS
ComputerScience.org
USBLS
USBLS
USBLS
ComputerScience.org
USBLS
ComputerScience.org
USBLS
USBLS
Burning Glass Technologies
Survey of alumni after graduation
Burning Glass Technologies
Survey of alumni after graduation
Burning Glass Technologies
Burning Glass Technologies
Burning Glass Technologies
Survey of alumni after graduation
Burning Glass Technologies
Survey of alumni after graduation
Burning Glass Technologies
Burning Glass Technologies
Leverage uniquely experiential learning for real career results
You’ll tackle the current data challenges of corporate partners via project work, research opportunities, optional paid co-op and internship opportunities, and a capstone project. Khoury College of Computer Sciences has 700+ industry partners, from established corporations and government organizations to unique startups and nonprofits.
As a student, you’ll complete a capstone project for companies like Rapid 7, MITRE, Partners Healthcare, Fidelity, or Raytheon. Most Khoury College cybersecurity graduates get jobs in cybersecurity immediately after graduation, frequently through their co-op or internship company or capstone project partner.
Leverage uniquely experiential learning for real career results
You’ll tackle the current data challenges of corporate partners via project work, research opportunities, optional paid co-op and internship opportunities, and a capstone project. Khoury College of Computer Sciences has 700+ industry partners, from established corporations and government organizations to unique startups and nonprofits.
As a student, you’ll complete a capstone project for companies like Rapid 7, MITRE, Partners Healthcare, Fidelity, or Raytheon. Most Khoury College cybersecurity graduates get jobs in cybersecurity immediately after graduation, frequently through their co-op or internship company or capstone project partner.
U.S. News & World Report
U.S. News & World Report
In the cybersecurity program, you’ll have the option to hold a paid, full-time co-op or internship of 4–8 months during your program in fields as varied as traditional tech, healthcare, and defense. Or you can opt to complete it at your current company.
U.S. News & World Report
In the cybersecurity program, you’ll have the option to hold a paid, full-time co-op or internship of 4–8 months during your program in fields as varied as traditional tech, healthcare, and defense. Or you can opt to complete it at your current company.
U.S. News & World Report
U.S. News & World Report
U.S. News & World Report
In the cybersecurity program, you’ll have the option to hold a paid, full-time co-op or internship of 4–8 months during your program in fields as varied as traditional tech, healthcare, and defense. Or you can opt to complete it at your current company.
U.S. News & World Report
In the cybersecurity program, you’ll have the option to hold a paid, full-time co-op or internship of 4–8 months during your program in fields as varied as traditional tech, healthcare, and defense. Or you can opt to complete it at your current company.
U.S. News & World Report
- Amazon/AWS
- Akamai
- Raytheon
- MITRE
- Wayfair
- Fidelity
- U.S. Navy
- U.S. Air Force
- Synopsys
- Amazon/AWS
- Akamai
- Raytheon
- MITRE
- Wayfair
- Fidelity
- U.S. Navy
- U.S. Air Force
- Synopsys
- Amazon/AWS
- Akamai
- Raytheon
- MITRE
- Wayfair
- Fidelity
- U.S. Navy
- U.S. Air Force
- Synopsys
- Amazon/AWS
- Akamai
- Raytheon
- MITRE
- Wayfair
- Fidelity
- U.S. Navy
- U.S. Air Force
- Synopsys
- Application security
- Security analyst
- Chief information security officer
- Cyber security compliance officer
- Cyber risk analyst
- Cloud security engineer
- Systems administrator
- Application security
- Security analyst
- Chief information security officer
- Cyber security compliance officer
- Cyber risk analyst
- Cloud security engineer
- Systems administrator
- Application security
- Security analyst
- Chief information security officer
- Cyber security compliance officer
- Cyber risk analyst
- Cloud security engineer
- Systems administrator
- Application security
- Security analyst
- Chief information security officer
- Cyber security compliance officer
- Cyber risk analyst
- Cloud security engineer
- Systems administrator
Select a program with governmental recognition and exceptional faculty
Northeastern is designated as a National Center of Academic Excellence for Cyber Operations by the Department of Defense and National Security Agency. Your MS in cyber security courses are taught by world-class faculty who lead across all aspects of cybersecurity: research, policy, and practice.
Select a program with governmental recognition and exceptional faculty
Northeastern is designated as a National Center of Academic Excellence for Cyber Operations by the Department of Defense and National Security Agency. Your MS in cyber security courses are taught by world-class faculty who lead across all aspects of cybersecurity: research, policy, and practice.
People
People
Faculty security and privacy work is influential and widely covered in the news
Faculty security and privacy work is influential and widely covered in the news
Advanced facilities and resources of a top-tier R1 research institution
Cybersecurity is a key area of study for Khoury College. Benefit from the research facilities and resources of an R1 institution. Northeastern is ranked in the top 2.4% of institutions across the country for research activity by Carnegie Classification of Higher Education Institutions.
Advanced facilities and resources of a top-tier R1 research institution
Cybersecurity is a key area of study for Khoury College. Benefit from the research facilities and resources of an R1 institution. Northeastern is ranked in the top 2.4% of institutions across the country for research activity by Carnegie Classification of Higher Education Institutions.
The institute brings together faculty across the university, with strong collaboration between Khoury College and the School of Law, as well as with other leading universities, tech companies, and defense contractors in Boston and across the globe.
Faculty and students research, develop, and enhance world-changing technologies. Faculty accomplishments range from helping to establish fields like medical device security to holding key positions in the White House’s Office of Science and Technology Policy.
ISEC is a hub for collaborative research inside a 220,000-square-foot innovation ecosystem that brings disciplines together and dissolves the lines between industry, government, communities, and universities worldwide.
PhD program
The cybersecurity program provides a natural path to the PhD in Cybersecurity for students who want to pursue research in the field and careers involving research.
The institute brings together faculty across the university, with strong collaboration between Khoury College and the School of Law, as well as with other leading universities, tech companies, and defense contractors in Boston and across the globe.
Faculty and students research, develop, and enhance world-changing technologies. Faculty accomplishments range from helping to establish fields like medical device security to holding key positions in the White House’s Office of Science and Technology Policy.
ISEC is a hub for collaborative research inside a 220,000-square-foot innovation ecosystem that brings disciplines together and dissolves the lines between industry, government, communities, and universities worldwide.
PhD program
The cybersecurity program provides a natural path to the PhD in Cybersecurity for students who want to pursue research in the field and careers involving research.
The institute brings together faculty across the university, with strong collaboration between Khoury College and the School of Law, as well as with other leading universities, tech companies, and defense contractors in Boston and across the globe.
Faculty and students research, develop, and enhance world-changing technologies. Faculty accomplishments range from helping to establish fields like medical device security to holding key positions in the White House’s Office of Science and Technology Policy.
ISEC is a hub for collaborative research inside a 220,000-square-foot innovation ecosystem that brings disciplines together and dissolves the lines between industry, government, communities, and universities worldwide.
PhD program
The cybersecurity program provides a natural path to the PhD in Cybersecurity for students who want to pursue research in the field and careers involving research.
The institute brings together faculty across the university, with strong collaboration between Khoury College and the School of Law, as well as with other leading universities, tech companies, and defense contractors in Boston and across the globe.
Faculty and students research, develop, and enhance world-changing technologies. Faculty accomplishments range from helping to establish fields like medical device security to holding key positions in the White House’s Office of Science and Technology Policy.
ISEC is a hub for collaborative research inside a 220,000-square-foot innovation ecosystem that brings disciplines together and dissolves the lines between industry, government, communities, and universities worldwide.
PhD program
The cybersecurity program provides a natural path to the PhD in Cybersecurity for students who want to pursue research in the field and careers involving research.
Interdisciplinary Science and Engineering Complex
Interdisciplinary Science and Engineering Complex
Designing analytics-based security services within an organization perimeter that analyze security logs in real time and generate prioritized alerts of suspicious activities
Associate Professor Alina Oprea
Designing analytics-based security services within an organization perimeter that analyze security logs in real time and generate prioritized alerts of suspicious activities
Associate Professor Alina Oprea
Designing analytics-based security services within an organization perimeter that analyze security logs in real time and generate prioritized alerts of suspicious activities
Associate Professor Alina Oprea
Designing analytics-based security services within an organization perimeter that analyze security logs in real time and generate prioritized alerts of suspicious activities
Associate Professor Alina Oprea
Set yourself apart with an unusually comprehensive curriculum and network
As you work toward your Master of Science in Cybersecurity, you’ll be breaking down silos in the field of cybersecurity. Your dynamic cohort of student peers come from a wide variety of backgrounds, empowering you with a 360° perspective and strong network across industries. Course and project work is highly interdisciplinary.
- Gain a foundation in law, forensics, criminology, social sciences, policy, and management
- Develop both technical and contextual knowledge and experience in information security technology and computing
- Choose either the technical or contextual track for your elective courses
- Add optional qualifications like the Concentration in Criminology or a Graduate Certificate in Engineering Leadership
Learning outcomes
A Khoury College cybersecurity master’s degree enables you to:
- Analyze cybersecurity threats, vulnerabilities, and risks that affect information systems, as well as anticipate potential new challenges in these areas
- Plan and implement techniques and strategies to prevent, protect, and mitigate cyber risks of computer information systems, including IoT, mobile, and cloud
- Assist in the implementation of security plans for organizations in consideration of the proper risk analysis, required countermeasures, ethical issues, and ensuring compliance with laws, standards, and industry guidelines
- Explain and prioritize needs to maintain an effective organizational cybersecurity policy and assist in the elaboration and implementation of comprehensive incident response, business continuity, and disaster recovery plans
- Communicate effectively, verbally and in writing, with corporate management on cyber-related issues
Set yourself apart with an unusually comprehensive curriculum and network
As you work toward your Master of Science in Cybersecurity, you’ll be breaking down silos in the field of cybersecurity. Your dynamic cohort of student peers come from a wide variety of backgrounds, empowering you with a 360° perspective and strong network across industries. Course and project work is highly interdisciplinary.
- Gain a foundation in law, forensics, criminology, social sciences, policy, and management
- Develop both technical and contextual knowledge and experience in information security technology and computing
- Choose either the technical or contextual track for your elective courses
- Add optional qualifications like the Concentration in Criminology or a Graduate Certificate in Engineering Leadership
Learning outcomes
A Khoury College cybersecurity master’s degree enables you to:
- Analyze cybersecurity threats, vulnerabilities, and risks that affect information systems, as well as anticipate potential new challenges in these areas
- Plan and implement techniques and strategies to prevent, protect, and mitigate cyber risks of computer information systems, including IoT, mobile, and cloud
- Assist in the implementation of security plans for organizations in consideration of the proper risk analysis, required countermeasures, ethical issues, and ensuring compliance with laws, standards, and industry guidelines
- Explain and prioritize needs to maintain an effective organizational cybersecurity policy and assist in the elaboration and implementation of comprehensive incident response, business continuity, and disaster recovery plans
- Communicate effectively, verbally and in writing, with corporate management on cyber-related issues
Study online or in Boston
Complete 100% of the program online, or choose to join us in person at Northeastern’s flagship campus in Boston—a tech-forward city with high activity across sectors like military, finance, health, law, and policy, where cybersecurity is key.
Study online or in Boston
Complete 100% of the program online, or choose to join us in person at Northeastern’s flagship campus in Boston—a tech-forward city with high activity across sectors like military, finance, health, law, and policy, where cybersecurity is key.
Startup Genome, 2022
Glassdoor (March, 2023)
Startup Genome, 2022
Glassdoor (March, 2023)
Startup Genome, 2022
Startup Genome, 2022
Startup Genome, 2022
Glassdoor (March, 2023)
Startup Genome, 2022
Glassdoor (March, 2023)
Startup Genome, 2022
Startup Genome, 2022
Is this program right for you?
Are you a professional or recent graduate with some experience in coding/programming and basic mathematics? Do you believe we can develop technology to help build a more secure world?
This program has options for students with a strong foundation in computer science as well as for students with more contextual knowledge (e.g., military, health, finance, etc.) who need to strengthen their foundational tech knowledge.
Not sure if you qualify for the Master’s of Science in Cybersecurity? Reach out to us.
Is this program right for you?
Are you a professional or recent graduate with some experience in coding/programming and basic mathematics? Do you believe we can develop technology to help build a more secure world?
This program has options for students with a strong foundation in computer science as well as for students with more contextual knowledge (e.g., military, health, finance, etc.) who need to strengthen their foundational tech knowledge.
Not sure if you qualify for the Master’s of Science in Cybersecurity? Reach out to us.
How to Apply
- Application: Online
- Fall 2025 Deadline: August 1 for domestic students; April 15* for international students
- (*subject to change)
- Decision Dates: Rolling basis, as received, beginning at year’s end
- Questions: khoury-gradschool@northeastern.edu
Admissions requirements
GPA minimums for bachelor’s degree (any field)
- 3.0 on a 4.0 scale
- 8.0 on a 10.0 scale
- 80 on a 100 scale
Please upload a PDF copy of your transcripts to the application.
Note: Very few exceptions are made for otherwise outstanding students.
Questions?
Email khoury-gradschool@northeastern.edu
Letters of recommendation
- Applying directly from undergrad: 2 academic and 1 professional reference
- Applying from the workforce: 2 professional and 1 academic reference
Recommenders must submit letters via the ApplyYourself system.
Statement of purpose
Roughly 1,000 words
Didn’t find what you’re looking for? See the full application instructions.
Tuition and paying for your program
To make the program accessible, this program offers potential financial support through a combination of paid, full-time co-op or internship placements, teaching assistant and tutor positions, Federal Student Aid, and scholarships from Khoury College’s many philanthropic and corporate partners. Scholarship for Service is available for students from other fields.
You will need a total of 36–44 credits to complete your program. Check costs per credit.
How to Apply
- Application: Online
- Fall 2025 Deadline: August 1 for domestic students; April 15* for international students
- (*subject to change)
- Decision Dates: Rolling basis, as received, beginning at year’s end
- Questions: khoury-gradschool@northeastern.edu
Admissions requirements
GPA minimums for bachelor’s degree (any field)
- 3.0 on a 4.0 scale
- 8.0 on a 10.0 scale
- 80 on a 100 scale
Please upload a PDF copy of your transcripts to the application.
Note: Very few exceptions are made for otherwise outstanding students.
Questions?
Email khoury-gradschool@northeastern.edu
Letters of recommendation
- Applying directly from undergrad: 2 academic and 1 professional reference
- Applying from the workforce: 2 professional and 1 academic reference
Recommenders must submit letters via the ApplyYourself system.
Statement of purpose
Roughly 1,000 words
Didn’t find what you’re looking for? See the full application instructions.
Tuition and paying for your program
To make the program accessible, this program offers potential financial support through a combination of paid, full-time co-op or internship placements, teaching assistant and tutor positions, Federal Student Aid, and scholarships from Khoury College’s many philanthropic and corporate partners. Scholarship for Service is available for students from other fields.
You will need a total of 36–44 credits to complete your program. Check costs per credit.
Request Information about the MS in Cybersecurity
Complete this form to learn more about the MS in Cybersecurity program. One of our enrollment counselors will contact you soon.
Request Information about the MS in Cybersecurity
Complete this form to learn more about the MS in Cybersecurity program. One of our enrollment counselors will contact you soon.