{"id":380,"date":"2020-04-27T13:09:04","date_gmt":"2020-04-27T13:09:04","guid":{"rendered":"https:\/\/home.hamptonu.edu\/online\/?page_id=380"},"modified":"2026-02-05T11:11:54","modified_gmt":"2026-02-05T16:11:54","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/home.hamptonu.edu\/online\/cyber-security\/","title":{"rendered":"Master of Science in Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"380\" class=\"elementor elementor-380\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1ccb5501 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1ccb5501\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-68eaf65\" data-id=\"68eaf65\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dcfcef0 elementor--h-position-right elementor--v-position-middle elementor-arrows-position-inside elementor-pagination-position-inside elementor-widget elementor-widget-slides\" data-id=\"dcfcef0\" data-element_type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;transition&quot;:&quot;slide&quot;,&quot;transition_speed&quot;:500}\" data-widget_type=\"slides.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-slides-wrapper elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\" dir=\"ltr\" data-animation=\"fadeInUp\">\n\t\t\t\t<div class=\"swiper-wrapper elementor-slides\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-repeater-item-292104b swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><a class=\"swiper-slide-inner\" href=\"https:\/\/apply.hamptonu.edu\/apply\"><div class=\"swiper-slide-contents\"><div class=\"elementor-slide-description\">Master of Science in Cyber Security<\/div><div  class=\"elementor-button elementor-slide-button elementor-size-sm\">Apply Now<\/div><\/div><\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-44564bf2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"44564bf2\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-18963f28\" data-id=\"18963f28\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73e5bb09 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73e5bb09\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-69ab9c19 elementor-hidden-tablet elementor-hidden-phone\" data-id=\"69ab9c19\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29f80a7e elementor-widget elementor-widget-spacer\" data-id=\"29f80a7e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-707aa7c8\" data-id=\"707aa7c8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b182124 elementor-widget elementor-widget-heading\" data-id=\"3b182124\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Master of Science in Cyber Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bb1fd1e elementor-widget elementor-widget-text-editor\" data-id=\"6bb1fd1e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Master of Science in Cyber Security focuses on providing a broad interdisciplinary information assurance education that prepares graduates to successfully defend, protect, design, implement and maintain secure information and information systems.<\/p><p>Graduates of the M.S. degree program in Cyber Security have the requisite expertise to:<\/p><ul><li>Function in the world-at-large as productive and ethical professionals and as responsible citizens. They will have a very good understanding of ethical issues and their applications<\/li><li>Understand and employ current trends and adapt to advances in the technology of the Information Assurance profession<\/li><li>Develop and implement security strategies to improve the security posture of organizations<\/li><li>Work in teams, to apply theoretical and analytical methods and principles of software development to address security issues in software development<\/li><li>Apply techniques, methodologies, tools and skills to build high-quality security systems that function effectively and reliably in the emerging information infrastructure<\/li><li>Communicate effectively, both orally and in writing, with other security and computing professionals<\/li><\/ul><p>The MS IA program is designed for prospects with an undergraduate degree in Computer Science or a degree in engineering, science or mathematics with a strong background in computer science. For prospects without the appropriate qualifications, a set of bridge courses provide the necessary background for regular admission to the MS program<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6351266 elementor-hidden-widescreen elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra elementor-widget elementor-widget-heading\" data-id=\"6351266\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Curriculum<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33783f5 elementor-hidden-widescreen elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile elementor-widget elementor-widget-toggle\" data-id=\"33783f5\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-5391\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-5391\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Core Courses (24 Hours + Comprehensive Examination 1 Hour)<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-5391\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-5391\">[table \u201c\u201d not found \/]<br \/>\n<br \/>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da83c8a elementor-hidden-widescreen elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile elementor-widget elementor-widget-toggle\" data-id=\"da83c8a\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2291\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2291\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Elective Courses (12 Hours)\u200b<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2291\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2291\">[table \u201c\u201d not found \/]<br \/>\n<br \/>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bf3ada8 elementor-widget elementor-widget-heading\" data-id=\"7bf3ada8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Bridge Program In Information Assurance (Non-Degree Program)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31eec2b7 elementor-widget elementor-widget-text-editor\" data-id=\"31eec2b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Bridge Program in Cyber Security prepares students for graduate work in the Master of Science program. The main goal of this program is to provide students from other disciplines with the necessary background to pursue a Master&#8217;s degree in Cyber Security. A secondary goal is to provide formal training for people in various technical disciplines who need significant background in computing. The Bridge Program consists of comprehensive courses at the 500-level that provide the equivalent of the core undergraduate computer science curriculum. This core set of courses is listed in the curriculum for the Association of Computing Machinery (ACM) which sets the standards for undergraduate curricula. The following minimum requirements must be met before a student can be admitted to the program:<\/p><ul><li>A bachelor&#8217;s degree of higher<\/li><li>Two semesters of calculus and one semester of discrete mathematics<\/li><li>Formal training or experience in programming to the level of Computer Science 501<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bf4b1cd elementor-hidden-widescreen elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"1bf4b1cd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Bridge Program Requirement (if applicable)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d04189 elementor-hidden-widescreen elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile elementor-widget elementor-widget-shortcode\" data-id=\"1d04189\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">[table \u201c\u201d not found \/]<br \/>\n<br \/>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a0d977 elementor-widget elementor-widget-heading\" data-id=\"4a0d977\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Admissions Requirements<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30401e0 elementor-widget elementor-widget-text-editor\" data-id=\"30401e0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Online application for admission<\/li><li>GRE (ENG 503-English Composition for Graduate Students will be required if the GRE verbal score is below 150 or a 4.0 in Analytical Writing)<\/li><li>Personal statement (indicating self reflection and career goals; not to exceed 1,000 words)<\/li><li>2 Letters of Recommendation<\/li><li>All College\/University transcripts<\/li><li>A copy of your State or Federal ID<\/li><\/ul><p>Please forward all admissions packages and supplemental documentation to:<\/p><p><strong>HamptonU Global<\/strong><br \/><strong>Attn: HUO Graduate Admissions<\/strong><br \/><strong>PO Box 6227<\/strong><br \/><strong>Hampton, Virginia\u00a0 23668<\/strong><\/p><p>Official Transcripts sent through a transcript network may be sent to <strong>hutranscripts@hamptonu.edu<br \/><\/strong>Unofficial\/Opened\/Scanned transcripts will not be accepted for graduate programs<strong><br \/><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a8ae5c elementor-widget elementor-widget-heading\" data-id=\"7a8ae5c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Application Deadlines<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e903d8 elementor-widget elementor-widget-text-editor\" data-id=\"0e903d8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Starting Session: <span style=\"color: #182f5e\"><strong>Spring\u00a0<\/strong><\/span><br \/>Deadline: <strong><span style=\"color: #182f5e\">November 15th<\/span><\/strong><\/p><p>Starting Session: <span style=\"color: #182f5e\"><strong>Fall<\/strong><\/span><br \/>Deadline: <strong><span style=\"color: #182f5e\">June<\/span><span style=\"color: #182f5e\">\u00a015th<\/span><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-837e10b elementor-widget elementor-widget-heading\" data-id=\"837e10b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Financial Aid<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc19cde elementor-widget elementor-widget-text-editor\" data-id=\"fc19cde\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li>Available to those who qualify<\/li>\n \t<li>Apply for financial aid at <a href=\"https:\/\/studentaid.gov\/h\/apply-for-aid\/fafsa\">US Office of Student Aid<\/a>.<\/li>\n \t<li>FAFSA School Code: 003714<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f3b6a1b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f3b6a1b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1386c20\" data-id=\"1386c20\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-f5d6798\" data-id=\"f5d6798\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e1319b8 elementor-widget elementor-widget-image\" data-id=\"e1319b8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.affordablecollegesonline.org\/online-colleges\/virginia\/\" target=\"_blank\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/home.hamptonu.edu\/online\/wp-content\/uploads\/sites\/53\/2020\/04\/aco_badge_2018.png\" title=\"Best Online Colleges in Virginia\" alt=\"Best Online Colleges in Virginia\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a984cf elementor-widget elementor-widget-text-editor\" data-id=\"2a984cf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">HamptonU Global is recognized as one of <strong>Virginia&#8217;s Top Affordable Online Colleges<\/strong> by <a href=\"https:\/\/www.affordablecollegesonline.org\/online-colleges\/virginia\/\">Affordable Colleges Online.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-07c6960\" data-id=\"07c6960\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Master of Science in Cyber SecurityApply Now Master of Science in Cyber Security The Master of Science in Cyber Security focuses on providing a broad interdisciplinary information assurance education that prepares graduates to successfully defend, protect, design, implement and maintain secure information and information systems. Graduates of the M.S. degree program in Cyber Security have [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-380","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Master of Science in Cyber Security - HamptonU Global<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/home.hamptonu.edu\/online\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Master of Science in Cyber Security - HamptonU Global\" \/>\n<meta property=\"og:description\" content=\"Master of Science in Cyber SecurityApply Now Master of Science in Cyber Security The Master of Science in Cyber Security focuses on providing a broad interdisciplinary information assurance education that prepares graduates to successfully defend, protect, design, implement and maintain secure information and information systems. Graduates of the M.S. degree program in Cyber Security have [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/home.hamptonu.edu\/online\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"HamptonU Global\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-05T16:11:54+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/home.hamptonu.edu\/online\/wp-content\/uploads\/sites\/53\/elementor\/thumbs\/aco_badge_2018-p2s6e09zrrmkxv7rzilo1kxej8dhrpyzihhbsaimm0.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/cyber-security\\\/\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/cyber-security\\\/\",\"name\":\"Master of Science in Cyber Security - HamptonU Global\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/home.hamptonu.edu\\\/online\\\/wp-content\\\/uploads\\\/sites\\\/53\\\/elementor\\\/thumbs\\\/aco_badge_2018-p2s6e09zrrmkxv7rzilo1kxej8dhrpyzihhbsaimm0.png\",\"datePublished\":\"2020-04-27T13:09:04+00:00\",\"dateModified\":\"2026-02-05T16:11:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/cyber-security\\\/#primaryimage\",\"url\":\"http:\\\/\\\/home.hamptonu.edu\\\/online\\\/wp-content\\\/uploads\\\/sites\\\/53\\\/elementor\\\/thumbs\\\/aco_badge_2018-p2s6e09zrrmkxv7rzilo1kxej8dhrpyzihhbsaimm0.png\",\"contentUrl\":\"http:\\\/\\\/home.hamptonu.edu\\\/online\\\/wp-content\\\/uploads\\\/sites\\\/53\\\/elementor\\\/thumbs\\\/aco_badge_2018-p2s6e09zrrmkxv7rzilo1kxej8dhrpyzihhbsaimm0.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Master of Science in Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/#website\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/\",\"name\":\"Hampton Univeristy Online\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/#organization\",\"name\":\"HU Online\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/wp-content\\\/uploads\\\/sites\\\/53\\\/2025\\\/01\\\/Screenshot-2025-01-10-at-9.57.29\u202fAM.png\",\"contentUrl\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/wp-content\\\/uploads\\\/sites\\\/53\\\/2025\\\/01\\\/Screenshot-2025-01-10-at-9.57.29\u202fAM.png\",\"width\":550,\"height\":160,\"caption\":\"HU Online\"},\"image\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/online\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Master of Science in Cyber Security - HamptonU Global","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/home.hamptonu.edu\/online\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Master of Science in Cyber Security - HamptonU Global","og_description":"Master of Science in Cyber SecurityApply Now Master of Science in Cyber Security The Master of Science in Cyber Security focuses on providing a broad interdisciplinary information assurance education that prepares graduates to successfully defend, protect, design, implement and maintain secure information and information systems. Graduates of the M.S. degree program in Cyber Security have [&hellip;]","og_url":"https:\/\/home.hamptonu.edu\/online\/cyber-security\/","og_site_name":"HamptonU Global","article_modified_time":"2026-02-05T16:11:54+00:00","og_image":[{"url":"http:\/\/home.hamptonu.edu\/online\/wp-content\/uploads\/sites\/53\/elementor\/thumbs\/aco_badge_2018-p2s6e09zrrmkxv7rzilo1kxej8dhrpyzihhbsaimm0.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/home.hamptonu.edu\/online\/cyber-security\/","url":"https:\/\/home.hamptonu.edu\/online\/cyber-security\/","name":"Master of Science in Cyber Security - HamptonU Global","isPartOf":{"@id":"https:\/\/home.hamptonu.edu\/online\/#website"},"primaryImageOfPage":{"@id":"https:\/\/home.hamptonu.edu\/online\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/home.hamptonu.edu\/online\/cyber-security\/#primaryimage"},"thumbnailUrl":"http:\/\/home.hamptonu.edu\/online\/wp-content\/uploads\/sites\/53\/elementor\/thumbs\/aco_badge_2018-p2s6e09zrrmkxv7rzilo1kxej8dhrpyzihhbsaimm0.png","datePublished":"2020-04-27T13:09:04+00:00","dateModified":"2026-02-05T16:11:54+00:00","breadcrumb":{"@id":"https:\/\/home.hamptonu.edu\/online\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/home.hamptonu.edu\/online\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/home.hamptonu.edu\/online\/cyber-security\/#primaryimage","url":"http:\/\/home.hamptonu.edu\/online\/wp-content\/uploads\/sites\/53\/elementor\/thumbs\/aco_badge_2018-p2s6e09zrrmkxv7rzilo1kxej8dhrpyzihhbsaimm0.png","contentUrl":"http:\/\/home.hamptonu.edu\/online\/wp-content\/uploads\/sites\/53\/elementor\/thumbs\/aco_badge_2018-p2s6e09zrrmkxv7rzilo1kxej8dhrpyzihhbsaimm0.png"},{"@type":"BreadcrumbList","@id":"https:\/\/home.hamptonu.edu\/online\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/home.hamptonu.edu\/online\/"},{"@type":"ListItem","position":2,"name":"Master of Science in Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/home.hamptonu.edu\/online\/#website","url":"https:\/\/home.hamptonu.edu\/online\/","name":"Hampton Univeristy Online","description":"","publisher":{"@id":"https:\/\/home.hamptonu.edu\/online\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/home.hamptonu.edu\/online\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/home.hamptonu.edu\/online\/#organization","name":"HU Online","url":"https:\/\/home.hamptonu.edu\/online\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/home.hamptonu.edu\/online\/#\/schema\/logo\/image\/","url":"https:\/\/home.hamptonu.edu\/online\/wp-content\/uploads\/sites\/53\/2025\/01\/Screenshot-2025-01-10-at-9.57.29\u202fAM.png","contentUrl":"https:\/\/home.hamptonu.edu\/online\/wp-content\/uploads\/sites\/53\/2025\/01\/Screenshot-2025-01-10-at-9.57.29\u202fAM.png","width":550,"height":160,"caption":"HU Online"},"image":{"@id":"https:\/\/home.hamptonu.edu\/online\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/home.hamptonu.edu\/online\/wp-json\/wp\/v2\/pages\/380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/home.hamptonu.edu\/online\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/home.hamptonu.edu\/online\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/home.hamptonu.edu\/online\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/home.hamptonu.edu\/online\/wp-json\/wp\/v2\/comments?post=380"}],"version-history":[{"count":49,"href":"https:\/\/home.hamptonu.edu\/online\/wp-json\/wp\/v2\/pages\/380\/revisions"}],"predecessor-version":[{"id":6380,"href":"https:\/\/home.hamptonu.edu\/online\/wp-json\/wp\/v2\/pages\/380\/revisions\/6380"}],"wp:attachment":[{"href":"https:\/\/home.hamptonu.edu\/online\/wp-json\/wp\/v2\/media?parent=380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}