cybersecurity

Cybersecurity (M.S., Certificate)

Graduate
  • 4PLUS (bachelor's + master's)
  • Online
  • Certificate
  • Master's

About this Program

Our program provides comprehensive education and hands-on training, preparing graduates for technical and management roles in cybersecurity.

Program Overview

Stem-Designated-Logo

Tuition & Fees 
Funding Opportunities



The National Security Agency (NSA) and the Department of Homeland Security have designated Hood College and the Center of Computer Security & Information Assurance as a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE) and a member of the CAE in Cybersecurity Community.

Hood College Designated as National Center of Academic Excellence in Cyber Defense

The MS in Cybersecurity also addresses the core subject areas and skill sets identified in the Cybersecurity Workforce Framework by the National Initiative for Cybersecurity Careers and Studies (NICCS).

The Master of Science in Cybersecurity is a 30-credit program for technical and non-technical students with a bachelor’s degree. Prior background in computing is desirable but not required to enter this program. Individuals without such a background can enter the degree program by enrolling in two prerequisite foundation courses. The program's structure allows students to enter from different disciplines, providing a common foundation and the robust subject matter training necessary in today’s cybersecurity job market.

The program provides a thorough understanding of cybersecurity's technical and managerial aspects. Graduates leave Hood ready to tackle the complex cyber challenges in business, industry, government, education, health, and other fields. For students who want cyber training but not a complete master’s degree, there is a stand-alone certificate in cybersecurity.

The Cybersecurity certificate requires five courses (three core and two electives) if the applicant has a background in computing or information technology. For applicants who do not have a computing background, the program offers a two "bridge" (foundation) courses that will prepare them to succeed in the certificate. The certificate courses and options are available in this planner.

News Flash! Hood College is ranked #13 in the Top 18 most affordable online Cybersecurity programs by Cybersecurityguide.org.

View Hood Talks Elections and Cybersecurity: Myths, Risks and Realities webinar with Dr. Dimitoglou.

Boost professional marketability

The demand for qualified cybersecurity professionals is strong. In the Washington, DC-Baltimore area alone, there are over 90,000 unfilled positions (Source: Cyberseek.org, 2023).

The Master’s in Cybersecurity is designed to prepare and train students to enter the cybersecurity workforce. The program is set up to enable partnerships with local technology companies and government organizations. Students are encouraged and supported to pursue experiential learning and research opportunities during their studies. The program culminates with a capstone thesis project with either a scholarly or applied focus linked to the needs of local industry and government partners. Students also work with faculty mentors and partners to develop relevant research and project questions; collect data, design systems, develop software, protocols, methods, and techniques; synthesize their findings or work artifacts into a final product; and present their findings to the partners and scholarly venues.

Explore current IT issues

The curriculum deepens knowledge of cybersecurity procedures, tools, and standards. Students learn systems and network security, computer forensics, cryptography, ethical hacking, and contemporary technologies and techniques in web, wireless, and mobile security. They also explore current trends and issues, gaining valuable insights into cybersecurity’s role and impact in day-to-day business operations.

The advisory board for this program includes members of companies such as Leidos, the NSA, Microsoft Federal, and Red Hat.  

Part-time or Full-time, On-Campus or Online

Students can complete the 30-credit program in three years by taking one or two courses a semester. As full-time students, they can take on-campus classes and graduate in 15 months. Both formats provide instruction from highly qualified faculty and adjunct instructors with proven cybersecurity experience.

The program is available in an on-campus format or entirely online. Students can choose the modality per course, providing excellent scheduling flexibility. The online access is asynchronous to accommodate students who travel or reside in different time zones. 

NC Sara
Hood College participates in the State Authorization Reciprocity Agreements.

4Plus Program

The 4PLUS program is designed for highly motivated students who have the desire to build career options into their undergraduate curriculum and earn a master's degree in cybersecurity.

Hood College students from all majors are eligible to participate in a 4PLUS program that allows for a combined, and in some cases accelerated, master’s degree in cybersecurity after the completion of their undergraduate program. The program is especially relevant to computer science majors, but it is also available to students from other disciplines.

Frequently Asked Questions

What can I do with this degree? 
A cybersecurity degree from Hood prepares you for high-demand roles such as Information Security Analyst, Software Security Engineer, Network Architect, and Computer Forensics Examiner. With cyber threats on the rise across every industry, graduates find opportunities in government, healthcare, finance, tech, and more. 

Is this program flexible for working professionals? 
Absolutely. You can choose to study full-time or part-time, attend classes fully online or in person. This flexible structure makes it easy to balance your studies with work and personal commitments. 

How is this program different from others? 
Hood’s program blends technical training with real-world experience. Through partnerships with local businesses and government agencies, students engage in hands-on projects and a capstone thesis. You'll also benefit from small class sizes and faculty who are active practitioners in the field. 

Will I have support during and after the program? 
Yes! Hood offers personalized attention from faculty, career development services, and access to a strong professional network in the region. Alumni success stories highlight the lasting value of this support. 

Is this program accredited? 
Yes. The program is recognized as a Center of Excellence in Cyber Defense by the National Security Agency and the Department of Homeland Security. 

Degrees Offered

  • MS

For students applying to the master's or certificate in cybersecurity program, please submit the following to the Graduate School:

  • One copy of official transcripts from each institution attended.
  • Résumé/CV that provides educational and professional experience (required only for master's program).

This program is designed for students with a background in computer science or related area that has prepared the students in core computing subjects, such as programming, computer architecture, operating systems, networking, data management systems and applications. Students who do not have the necessary background will be required to complete one or both of the foundation courses to ensure they are well prepared for the required coursework. The determination to take the foundation courses is based on a thorough evaluation of student transcripts and other supporting documents during the application review.

Transfer credit policy for admitted students

Students may transfer a maximum of 6 graduate credits from an external, accredited institution, or another Hood graduate program prior to the first semester of study in the current program. Please review the full graduate transfer credit policy in the College catalog.

The Master of Science in Cybersecurity, for students with undergraduate preparation in computer science or related area, requires the completion of 30 credits: 24 credits of core courses, one 3 credit elective course, and 3 credits of a Cybersecurity Capstone.

Students, without undergraduate preparation in computer science or related area, will be required to complete one or two foundation courses, designed to provide the appropriate background knowledge and foundation to succeed in the program.

Foundation Courses

Any foundation courses required are in addition to the 30 credits required for program completion.

IT 510Computing Hardware & Software Systems3.0
CSIT 512Elements of Computer Programming3.0

Core Requirements

CYBR 555Information Systems Security3.0
CYBR 548Telecommunications & Networking3.0
IT 530Applied Database Concepts3.0
CYBR 534Network and Internet Security3.0
CYBR 521Information Assurance & Risk Assessment3.0
CYBR 532Computer Forensics3.0
CYBR 535Security Policies, Ethics and Law3.0
CYBR 556Ethical Hacking3.0
CYBR 560Cybersecurity Capstone3.0

Elective

One from the following:

CYBR 537Applied Encryption & Cryptology3.0
CYBR 599Special Topics3.0
CYBR 597Cybersecurity Practical Training1-6

 

CyberBlazers

Cybersecurity students are invited to participate in CyberBlazers, the program's ethical hacking student team. Students who join this welcoming group of students and faculty learn together, practice together, and compete in regional and national cybersecurity and capture the flag (CTF) competitions.

WiCyS Chapter

At WiCyS, a global community of women, male allies, and advocates, we are dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. Explore the Global WiCyS Membership Benefits page.

The Cotton Cyber Lecture Series

Janet Hobbs Cotton ’59 and her husband, John Cotton, have given the new cybersecurity master’s program a generous gift by establishing the Cotton Cyber Lecture Series, bringing nationally and internationally recognized leaders in cybersecurity to campus to speak.

  • Apr 05, 2018 (INAUGURAL LECTURE): General (Ret) Keith Alexander (bio)Founder and CEO, IronNet Cybersecurity
  • Oct 18, 2018: Ronald S. Ross (bio), Fellow,  National Institute of Standards and Technology
  • Apr 09, 2019: Hector Monsegur (bio), Director of Assessment Services,  Rhino Security Labs
  • Oct 03, 2019: Melissa Hathaway (bio), President, Hathaway Global Strategies
  • Apr 06, 2021: Kevin Stine (bio), Chief,  Applied Cybersecurity Division, National Institute of Standards and Technology.
  • Oct 14, 2021: Vinton G. Cerf (bio), Vice president and chief Internet evangelist for Google

Visit our Cotton Lecture Series website for more information.

*Active duty Fort Detrick soldiers are eligible for a full tuition waiver for this program or any other graduate certificate and master's program at Hood College per our special Hood/Fort Detrick MOU.

3MT Competition

Cybersecurity students are invited to present their Capstone and compete at the Graduate School's Three Minute Thesis (3MT) competition, held annually at the end of the Spring semester. We are proud of the participation of past participants:

  • 2023:Khalid Alatawi | Logan Besch | Paige Langmead
  • 2022:David Aidoop | Nasser Alharthi | Martin Owusu-Antwi
  • 2021: Suiltan Alhajry |  Ahmed Almatthmi | Patrick Burnett | Michael Calafos | Julia Downing | Hamid Ghasemi | Sanket Lange | Gastien Mbouna | Fadi Qazzazee | Harold Rivas | Mohammed Sabeeh | Seth Wilson
  • 2020:  Connor Brown | Rob de Cespedes | Nikhil Kalva | Luan Lepi | Jeff Whipp
  • 2019: Eddie Hamad

The Cybersecurity Capstone Thesis

The Cybersecurity Capstone is the culmination of the master's program. The Capstone invites students to develop further and demonstrate their ability to engage broadly and in-depth with a specific topic in the discipline. It draws diverse modes of learning into one focused area that can enhance the student’s informed cybersecurity practice. This learning and engagement with a specific topic are expected to be highly scholarly. Students are encouraged to begin discussing areas of interest and topics for their Capstone with potential faculty thesis advisors after completing 21 credits in the program.

The Cybersecurity Capstone Guidelines are posted on the Graduate School's site (Sec. Final Thesis, Projects, Capstones and Research, Departmental Guidelines).

The following are the titles of past Cybersecurity Capstone Projects.

Note: Because the work may have been conducted in an industry or a government setting, or it is based on private or internal, company-sponsored research, copies of the capstone projects are not made available. It is the author's prerogative to decide if they will share their project, and you must contact them directly to request a copy. Neither the Program, the Department, nor the College can provide former students' contact information.

2025

  • Addepalli, S.T., "SQL Injection Prevention for Legacy Code Systems"
  • D’Abbraccio, N., "Navigating CMMC Compliance: Challenges and Strategies for Small Businesses
    Under DFARS and NIST SP 800-171"
  • Fuentes, L., "Threat Modeling Credit Card Transaction Processing"
  • Snyder, J., "Detection Effectiveness of Child Sexual Abuse Material (CSAM) Systems"

2024

  • Abed, K., "Analysis and Visualization of Attack Signatures from Honeypots"
  • Albukhari, B., "Cost of Security by Design"
  • Alshehri, A., "Network Stress Test & Visualization Simulator"
  • Alothman, M., "A Comparative Analysis of Firewalls: Traditional vs. Next-Generation Firewalls (NGFWs)"
  • Amoah, E., "Comparative Analysis of Machine Learning Algorithms for Cyber Fraud Detection"
  • Bojja, N., "Secure Software Development in the Agile Software Development Lifecycle"
  • Chekuri, P., "Exploration of Cryptographically secure Pseudo Random Number Generation for Symmetric Encryption"
  • Gottumukkala, M. V., "Implementation of a local, secure DNS Server"
  • Greene, S.A., "Risk Management and Cybersecurity Insurance"
  • Hanna, M., "Child Sexual Abuse Material Detection Systems"
  • Kumar, J.,"Comparative Analysis of Convolutional Neural Networks in Regards to Deepfake Detection"
  • Urban, J., "A Comparative Analysis of Data Privacy-Preserving Methods for Sharing Protected Health Information"

2023

  • Adetona, A. O., "Threat Analysis and Visualization of Common Vulnerabilities and Exposures (CVE) Data"
  • Alqahtani, R.,  "A System for the Prevention of SQL Injection Attacks"
  • Babaei, A.,  "Cloud-Based Infrastructure as Code (IaC) Security Framework: Strategies for Identification, Mitigation, and Maintenance of Configuration"
  • Besch, L., "Survey and Classification of Social Engineering Attacks"
  • Chandula, I.R., "Development and Analysis of a Machine Learning Intrusion Detection System"
  • Gaddam, R., "Unauthorized User Access Detection Based on Mouse Dynamics"
  • Kutey, A., "Comparative Analysis for Security Architecture Framework"
  • Langmead, P., "Comparative Evaluation of Cybersecurity Certifications (CMMC and ISO 27001)"
  • Malipeddi, S., "Routing Summarization for Firewall and Network Perimeter Protection"
  • Owusu-Antwi, M., "Cost-benefit Analysis of Security by Design"
  • Sarangal, H., "Plagiarism Detection Systems and Privacy: Balancing Academic Integrity and User Data Protection"
  • Wyld, D., "Cybersecurity Governance & Compliance: Mitigating Risk In Telehealth Smart Home Integration"

2022

  • D. Aidoo, "Analysis and Comparative Performance of Open-Source Intrusion Detection Systems"
  • K. Alatawi, "Cybersecurity Insurance and Risk"
  • N. Alharthi, "Comparative Malware Analysis of Ransomware"
  • S. Alqatani, "Comparative Analysis and Criteria for Evaluating Ransomware Malware"
  • B. Felts, "Cyber Security Risk Quantification Based on Limited or Unknown Information"

2021

  • S. J. Alhajry, "Comparison of Malware Detection Techniques"
  • A.M. Almatthmi, "Evaluation of User Interfaces in Security Information and Event Management Systems"
  • P. Burnett, "Cybersecurity Maturity Assessment for Identification and Remediation of Insider Threats"
  • M. Calafos, "The Dark Side of Cryptocurrency: Laundering Money and Financing Criminality"
  • J. M. Downing, "The Implications of Huawei 5G on the Five Eyes Intelligence Sharing Alliance"
  • S. Lange, "Development of Automated Penetration Testing Tool with Push Notifications"
  • M. D. Sabeeh, "A Survey on the State of Bots, Associated Threats, and Detection Techniques"
  • G. Mbouna, "Internet-based Voting Security: The Case of the African Continent Transitioning to E-voting"
  • F. F. Qazzazee, "Comparison and Performance Evaluation of VPN Technologies"

2020

  • F.Y. Aljammaz, "A Comparative Analysis of Threat and Risk Modeling of Consumer IoT Devices"
  • A. Alzahrani, "Detection and Prediction of Insider Threats"
  • C. Carrington, "Evaluation and Comparison of Cyber vs. Non-Crime and Punishment in the Criminal Justice System"
  • J. Flagg, "Impact and Risk Evaluation of Medical Equipment on The Security Posture of Healthcare Organizations"
  • H. Rivas, "Security and Risk Evaluation of Cloud Storage and Cloud Infrastructure"
  • S. Wilson, "Evaluation of the Cybersecurity Posture in Emergency Services Organizations"
  • A. J. Woodring, "E-Voting Platforms: Are They Secure?"
  • A. Abdulmajeed,  "Threat Analysis of E-voting"
  • N. Alosaimi, "Vulnerability Analysis of Smart Contracts"
  • C. Brown,  "The Dilemma, Ethics, and Impact of Responsible Disclosure"
  • R. de Cespedes,  "Security Operations Center (SOC) Threat Visualization"
  • H. Ghasemi,  "Reducing Crime Related to Cryptocurrency Transactions"
  • N. Kalva,  "Framework for the Evaluation of Privacy in IoT Devices"
  • L. Lepi,  "A Comprehensive Survey of Threat Modeling Techniques and Their Applied Uses"
  • J. Whipp,  "Enterprise Cybersecurity Plans, Policies, and Procedures"

2019

  • A. Olanrewaju,  "Establishment of a Security Operations Center (SOC)"
  • S. Soni,  "Protection by adversaries while using TheOnionRouter(TOR)"
  • F. Alamri,  "Threat and Risk Modeling for IoT Device(s)"
  • F. Alatawi,  "Best practices in defending against DDoS Attacks"
  • O. Aloufi,  "Measuring Security"

2018

  • A. Alsenaidi, "Cyber Security and the 4th Industrial Revolution"
  • D. Hill, "Retaliation to cyber attacks. Should the US respond to cyberattacks by national adversaries?"
  • J. Brewer, III, "Vehicle/Automotive Hacking"
  • M. Giambruno, "Do Smart Houses Make for Safe Homes?"
  • E. Hamad, "Development of a Firewall with Randomly Generated Service Ports"
  • S. Jewett, "Cyberwafare, Cyber Weapons, and Cyber Attacks"
  • P. Abayomi, "User interface for server firewall management

Upon successful completion of this program, students will be able to:
1. Apply sound theoretical and applied cybersecurity skills, methods, and techniques
for cyber defense.
2. Evaluate, develop, deploy and configure appropriate controls, countermeasures,
tools, and techniques to address threats, attacks, vulnerabilities, and protect
organizational assets and resources.
3. Identify, evaluate, and address ethical, legal, and social implications in
cybersecurity while complying with applicable laws, regulations, and following best
practices.
4. Communicate effectively technical, legal, and theoretical cybersecurity topics to
technical and non-technical audiences.

Academic Blazer Chat: Cybersecurity

George Dimitoglou, director of the cybersecurity program, and Michelle Giambruno, a cybersecurity student, discuss what cybersecurity is and what students can expect during the program and after graduation.

ABC graphic

$695 Per Credit

9-24 Months

Average Completion Time

33 Total Credits

Program Contact

Cheng-headshot

Program Director

Phone
301-696-3981
Christian Villarosa

Assistant Director of Graduate Admission

Phone
Office: 301-696-3604 Cell/WhatsApp: 240-615-4015

Fast Fact

100% expected cybersecurity employment rate through 2021.

All Faculty
George Dimitoglou

George Dimitoglou

  • Professor of Computer Science
  • Program Director, Master's in Cybersecurity and Director of the Center for Computer Science and Information Assurance
dong

Aijuan Dong

  • Department Chair of Computer Science & Information Technology
  • Professor of Computer Science
Carol Jim

Carol Jim

  • Associate Professor of Computer Science
Bill Pierce

Bill Pierce

  • Assistant Professor of Computer Science
  • Coordinator, Computer Science Minor
Ahmed Salem

Ahmed Salem

  • Associate Professor of Computer Science and Information Technology
  • Program Director, Master's in Information Technology and Cybersecurity Certificate
Sneha Soni

Graduate Alumni Spotlight | Sneha Soni, M.S.’20

“To me, Hood College is one of the best colleges in the U.S., and it provides all kinds of unique experiences to the student. The faculty, students and other staff members are very helpful and friendly. Hood is a place that gives equal chances to every student to enhance their knowledge and personal development.”