Stop cyber attacks before they happen.
Attacks are plenty, but defenders are few. Protecting data in a technology-filled society is essential for running any business or organization, but too few individuals accept the challenge of ensuring the safety of private information. What we’re saying is, INFOSEC needs you! With a Master of Science in Information Systems Security from University of the Cumberlands, you will become an expert in information preservation and restoration. Because of your expertise, you will be set apart in the job market, guaranteeing the chance for success no matter where you go. From security analyst to systems manager, you will have your pick of careers.
By the Numbers
Programs & Requirements
Master of Science in Information Systems Security
Our online MSISS program is intended for those who have earned their baccalaureate degree and already work in the information technology field. If you’re interested in continuing your education and enhancing your credentials, you’ll find that UC’s online information systems security degree program is built to help you achieve your goals. You’ll learn how to prevent or mitigate data loss by:
- Developing and implementing security policies
- Managing compliance with federal regulations for information security
- Creating disaster prevention and recovery plans
- Finding and preventing problems related to hardware, software, and networks
- Achieving availability, integrity, and confidentiality of information
- Implementing physical security measures to restrict access
- And much more!
The program is mapped directly to Department of Homeland Security (DHS) and National Security Agency (NSA) cyber security education standards. It also aligns with the (ISC)2 CISSP Common Body of Knowledge. CISSP (Certified Information Systems Security Professional) is an industry-leading professional certification for cyber security experts such as security practitioners, managers, and executives. Earning a Master of Science in Information Security Systems will equip you to take the CISSP certification exam. You’ll also graduate ready to pursue a new career path in INFOSEC or apply the latest information assurance and cyber security principles in your current role.
University of the Cumberlands has been named a National Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency (NSA) and the Department of Homeland Security (DHS). There are just over 200 universities nationwide with CAE-CD designation, and only two other universities in Kentucky included in this elite group.
Course Requirements
- ISOL 531 - Access Control
- ISOL 532 - Telecommunications and Network Security
- ISOL 533 - Information Security and Risk Management
- ISOL 534 - Application Security
- ISOL 535 - Cryptography
- ISOL 536 - Security Architecture and Design
- ISOL 631 - Operations Security
- ISOL 632 - Business Continuity Planning and Disaster Recovery Planning
- ISOL 633 - Legal Regulations, Compliance, and Investigation
- ISOL 634 - Physical Security
- ISOL 699 - Info Security Project
Take the Next Step
Mission and Goals
UC’s information security program strives for excellence in creating, applying, and imparting knowledge in IT through comprehensive educational programs, research, dissemination, and service to professional societies, communities, states, and the nation.
Department of Homeland Security (DHS) & National Security Agency (NSA)University of the Cumberlands has been named a National Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency (NSA) and the Department of Homeland Security (DHS). There are just over 200 universities nationwide with CAE-CD designation, and only two other universities in Kentucky included in this elite group.
Information Systems Security Careers & Outcomes
All stats from U.S. Bureau of Labor Statistics
Information Security Analyst: $102,600
Information Security Analyst: $102,600
Information security analysts analyze current security measures and plan, organize, and implement new security protocols.
Computer and Information Systems Manager: $159,010
Computer and Information Systems Manager: $159,010
Computer and information systems managers lead teams of information systems personnel, organize projects, and direct teams for projects.
IT Security Manager: $159,010
IT Security Manager: $159,010
IT security managers lead teams of information security personnel, organize projects, and direct teams for cyber security projects.
Database Administrator: $101,000
Database Administrator: $101,000
Database administrators create, maintain, optimize, and secure databases to hold data for an organization.
Network and Computer Systems Administrator: $80,600
Network and Computer Systems Administrator: $80,600
Network and computer systems administrators are responsible for the daily operations of all network and computer systems under their direction.
Computer Network Architect: $120,520
Computer Network Architect: $120,520
Computer network architects design and build networks for communications. These may include LANs, WANs, and Intranets.
Common Questions
Information systems security, also known as INFOSEC, involves keeping data safe, confidential, and available for access. The field centers on protecting both computer information and communications data, such as telephone conversations. Since storing, processing, or moving data can present a risk to businesses and organizations, INFOSEC is critical to ensuring private information stays safe from unauthorized access.
The field of information systems security is often broken down into two areas:
- Cyber Security. This is the discipline of protecting computer systems and networks from threats like malware, phishing attacks, and hackers.
- Information Assurance. This is the discipline of making sure data is accessible and won’t be lost in the event of an incident.
Earning a degree in cyber security or information systems security could be a step toward a career with critical impact. Earning a degree in cyber security could be well worth it. For instance, you could...
- Boost your salary. Information security analysts earned a median annual salary of $102,600 in 2021. The 2021 median annual salary for computer and information technology careers, in general, was $97,430. That’s about twice the median salary for all other occupations.
- Take your career in a new direction. If you’re ready to go further in the IT field, earning your master’s in Information Systems Security could prepare you to advance your current career, lead your business’s IT security strategy, or pursue a new professional challenge.
- Learn in a flexible format. University of the Cumberlands’ master’s in Information Systems Security program can be earned online, offering maximum convenience. The program is designed for working students and offers the same high quality as a traditional campus program.
Earning an IT security degree may equip you with the skills needed to pursue an Information Security Analyst career path. Job opportunities in this occupation should grow 33 percent between 2021 and 2030—much faster than average. Security analysts keep businesses’ IT systems and critical data safe by:
- Monitoring for security breaches and investigating incidents
- Installing software like firewalls and data encryption programs
- Doing penetration testing to detect vulnerabilities before criminals find them
- Creating a disaster recovery plan in case of an emergency
- And much more
Security analysts must typically earn a minimum of a bachelor’s degree in information assurance or a related field. However, many earn a master’s degree in an area like information systems. Knowledge of IT security also comes into play in many other IT career paths, including:
- Computer and Information Systems Manager
- IT Security Manager
- Network and Computer Systems Administrator
- Database Administrator
No matter which direction you plan to pursue, earning a master’s in Information Systems Security from the University of the Cumberlands could help you build the skills you need to advance your career.
This degree is a 31-credit hour degree, and each class is worth 3 hours, except for the final project, which is worth 1 hour. Each class is offered in an 8-week term format, and you will be able to take classes at your own pace. If you take 12 hours per semester (2 classes each biterm), you could be able to finish this degree in as little as 3 semesters!
You will not need to come to campus for this degree. This degree is offered in a 100% online format, so you can earn your degree without ever coming to campus.
Each course lasts eight weeks, called a bi-term. There are two bi-terms per semester, and three semesters per year (fall, spring, and summer). Classes are asynchronous, meaning there is no set login time; you can work on schoolwork whenever you find time. Cumberlands provides free rental textbooks to online students as part of its One Price Promise.
The Master of Science in Information Security at University of the Cumberlands focuses on information security challenges relating to mitigating the risk of loss or disclosure of data. With the combination of the ubiquitous nature of electronic information and the associated security risks, the field of information security has become a critical need for every organization. The graduate degree in cybersecurity is comprised of the following the following Program Goals and Program Level Outcomes (PLOs):
- PLO 1.1. Students manage access controls using best practices and technologies to help secure the network. (ISOL 531 Access Control)
- PLO 1.2. Students secure an application by applying proper security methods and parameters. (ISOL 534 Application Security)
- PLO 1.3. Students apply cryptography techniques to secure data. (ISOL 535 – Cryptography)
- PLO 1.4. Students recommend security strategies to minimize operational attacks. (ISOL 631 Operations Security)
- PLO 1.5. Students provide action plans and recommendations to secure a facility. (ISOL 634 Physical Security)
- PLO 2.1. Students justify techniques for securing networks to minimize operational impacts when cyber-attacks occur. (ISOL 532 Telecommunications and Network Security)
- PLO 2.2. Students evaluate an organization’s infrastructure to prevent future security attacks. (ISOL 536 – Security Architecture and Design)
- PLO 2.3. Students examine risk management strategies for protecting assets. (ISOL 533 Information Security and Risk Management)
- PLO 2.4. Students develop a comprehensive plan to reduce the risks of a loss of business continuity. (ISOL 632 Business Continuity Planning and Disaster Recovery Planning)
- PLO 3.1. Students determine which laws apply to different types of business environments. (ISOL 633 Legal Regulations, Compliance, and Investigations)
- PLO 4.1. Students clearly assess IS security needs for an organization. (ISOL 699 Information Security Project)
Faculty Experts
Get to know more about your future INFOSEC professors.
Dr. Raed Sbeit
Request Information
Wondering if a master's in information systems security is for you? We're ready to help by answering your questions, whatever they may be!