Cybersecurity Studies

Online Master of Science in Cybersecurity Studies (MS)

Save @ AMU

$0 Application Fee
$0 Transfer Credit Evaluation

72%Have Graduated with No APUS-incurred Student Loan Debt2

About Our Cybersecurity Master's Program

Help lead the fight against cyber threats. Organizations need an advanced understanding of large-scale cyber attacks as well as threat prevention, detection, and response to defend themselves.

A cybersecurity master's degree from American Military University (AMU) boosts your knowledge and skills. You will:

  • Build your foundation in network security, information assurance, risk management, information security, cybercrime, and digital forensics 
  • Become familiar with the issues, policies, practices, and perspectives of various sectors, agencies, and disciplines in the classes you take for AMU’s online master’s in cybersecurity
  • Understand how cyber threats impact human behaviors, public confidence, stock markets, economic sectors, and other critical infrastructures
     

What You Will Do in our Master's in Cybersecurity Program

  1. Understand homeland security and cybersecurity challenges arising from both external attackers and insider threats
  2. Study the social, regulatory, legal, and ethical issues related to securing information technology and national critical infrastructures
  3. Comprehend interdisciplinary policies, practices, perspectives, and products required to address the cyber threats to information technology and critical infrastructures
  4. Learn the methods of vulnerability assessment, risk mitigation, auditing, and certification of information technology and critical infrastructures

View Program Outcome Assessment Results

Degree at a Glance

Number of Credits
36
Cost Per Credit
$425 | $250*
$382.50**
Courses Start Monthly
Online
  • Want to Learn More?

    Contact student support if you're a current student and need assistance.

    Step One: Introduce Yourself
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here

Program Requirements Printable Catalog Version

Must take all courses for this section.

Course ID: 4562

|
A healthy cyberinfrastructure is the foundation of emergency and disaster management. It provides emergency and disaster management agencies the ability to effectively address and respond to natural disasters, terrorist attacks, and law enforcement issues. Technology has leveled the global playing field, and the impact on the cyberinfrastructure must be assessed among all relevant communities. This means implementing cybersecurity awareness into all levels of emergency and disaster management through: knowledge management, task behavior, dissemination of information, cyberinfrastructure impact awareness, communication, and deterrence. Students will be exposed to planning, management, response, and recovery factors related to cyberinfrastructure, as well as analyze economic, social, and technical aspects of cybersecurity associated with public emergencies and disasters.
Registration Dates Course Dates Session Weeks
11/27/23 - 05/03/24 05/06/24 - 06/30/24 Spring 2024 Session I 8 Week session
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 4522

|
This course introduces students to risk management components including plans and strategies to mitigate risk. Students in this course will examine the role of risk management at the strategic and enterprise levels in the prevention of loss and mitigation of consequences through risk identification and control. This course will allow students to develop and apply risk management techniques to include selection of risk management measures and implementation of those measures.
Registration Dates Course Dates Session Weeks
11/27/23 - 05/03/24 05/06/24 - 06/30/24 Spring 2024 Session I 8 Week session
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 4528

|
This course provides a comprehensive introduction to the cyber intelligence field and is intended to equip students with the essential knowledge and skills often needed to navigate the complex world of cyber threats, vulnerabilities, and risks. Students will explore the full range of cyber capabilities from exploitation to defense, including several case studies that demonstrate the challenges and benefits of cyber intelligence operations. Through discussion forums and a research project, students will gain a deeper understanding of the role cyber intelligence plays in national security and the protection of critical infrastructures.
Registration Dates Course Dates Session Weeks
11/27/23 - 05/03/24 05/06/24 - 06/30/24 Spring 2024 Session I 8 Week session
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 3860

|
This course examines information concealment techniques, technologies, hardware, software, and relevant legislation for cyber forensics to reveal and track legal and illegal activity. The course examines the process for investigation and introduces the tools and procedures required to legally seize and forensically evaluate a suspect machine. Also covered are the rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities, and revealing concealed information using cyber forensics.
Registration Dates Course Dates Session Weeks
11/27/23 - 05/03/24 05/06/24 - 06/30/24 Spring 2024 Session I 8 Week session
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 4099

|
The global reach of the Internet, the low cost of online activity, and the relative anonymity of users has led to an increase in computer related crimes. This course focuses on cybercrime investigation and prevention; it appraises the legal issues related to on-line criminal conduct, the collection of electronic evidence, and the onslaught of new technology. This course also analyzes the phases, processes, and challenges of cybercrime investigations, and it examines technical, legal, and social issues relating to the search and seizure of digital evidence and computer forensics. Students will encounter the challenges of the latency between technology and the law.
Registration Dates Course Dates Session Weeks
11/27/23 - 05/03/24 05/06/24 - 06/30/24 Spring 2024 Session I 8 Week session
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 3871

|
Telecommunications networks are a critical component of the global economic and social infrastructures. Securing critical infrastructure is an established priority within Information Security Management. This course examines the field of secure telecommunications networks, including emerging threats, system vulnerability, network evolution, and network defense mechanisms.
Registration Dates Course Dates Session Weeks
11/27/23 - 05/03/24 05/06/24 - 06/30/24 Spring 2024 Session I 8 Week session
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 3872

|
This course examines the tenets of Intrusion Detection, Intrusion Prevention, and Incident Handling. Intrusion Detection focuses on the methods to detect attempts (attacks or intrusions) to compromise the confidentiality, integrity or availability of an information system. Also included is an analysis of the principles and practices of intrusion detection, intrusion prevention, and incident handling; network-based, host-based, and hybrid intrusion detection; identifying attack patterns; deployment of resources and responses to handle the incident, surveillance, damage assessment, risk assessment, data forensics, data mining, attack tracing, system recovery, and continuity of operation.
Registration Dates Course Dates Session Weeks
11/27/23 - 05/03/24 05/06/24 - 06/30/24 Spring 2024 Session I 8 Week session
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 3873

|
The course analyzes computer and systems security measures by examining a model for information assurance; it also examines the components of a comprehensive Information Assurance plan. Topics included are: asset identification, human factors, compliance with regulations, personnel security, risk assessment and ethical considerations, IA policy, as well as computer and network security tools.
Registration Dates Course Dates Session Weeks
11/27/23 - 05/03/24 05/06/24 - 06/30/24 Spring 2024 Session I 8 Week session
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 4095

|
This course focuses on the research methods, tools, instruments, and devices used in Information Sciences and Information Technology; it appraises the logic of the scientific method, research design, qualitative and quantitative analysis of data for the purpose of conducting and reporting basic research in a scholarly and academic setting. Through concentration-based case studies, it investigates current trends, legal and ethical issues, global and societal impact, policies, and applications in the fields of information technology, information security, cyberlaw, digital forensics, and media management. This course evaluates methods to collect, classify, categorize, evaluate, assess, and report research data, to formulate valid research questions, and to derive logical conclusions. The principles, practices, tools, and methodologies presented in this course are applicable throughout the program of graduate studies.
Registration Dates Course Dates Session Weeks
11/27/23 - 05/03/24 05/06/24 - 06/30/24 Spring 2024 Session I 8 Week session
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session
04/29/24 - 10/04/24 10/07/24 - 12/01/24 Fall 2024 Session B 8 Week session

Course ID: 4490

|
This course focuses on the ways that law, ethics and cybersecurity overlap and intersect. Besides laws related to cybersecurity, the course examines laws related to intellectual property, civil litigation, criminal prosecutions, and privacy. This examination will provide the means to identify and analyze the policies reflected in those laws. Those policies could guide the creation of policies on a business-level, using qualitative risk assessment and planning. An exploration of ethics and cybersecurity, as well as of workplace ethics, will involve the use of an ethical framework.
Registration Dates Course Dates Session Weeks
11/27/23 - 05/03/24 05/06/24 - 06/30/24 Spring 2024 Session I 8 Week session
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 4514

|
This course will provide an overview of current cyber policy and strategy for non-practitioners in a national security framework. Students will study the cyber threat environment; laws and policies that govern cyber security; current and historical structure, functions, and capabilities of private and governmental agencies comprising the cyber community; and future trends that affect national security
Registration Dates Course Dates Session Weeks
11/27/23 - 05/03/24 05/06/24 - 06/30/24 Spring 2024 Session I 8 Week session
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session
Select any courses that have not been used to fulfill major requirements. Credits applied toward a minor or certificate in an unrelated field may be used to fulfill elective credit for the major.

Choose 3 credit hours from this section.

Course ID: 4935

|
This Cybersecurity Studies: Capstone Practical course integrates the knowledge, skills, and posture acquired in the program courses. This course is the capstone course of studies completed toward the graduate degree in Cybersecurity Studies. This course will only be offered in 16-week sessions. Students will complete an applied project design that demonstrates mastery and application of advanced research and analytic skills related to the learning outcomes of this degree program. This course may not be taken until all other courses are COMPLETED and student has a 3.0 GPA.
Registration Dates Course Dates Session Weeks
11/27/23 - 05/03/24 05/06/24 - 08/25/24 Spring 2024 Session K 16 Week session
12/25/23 - 05/31/24 06/03/24 - 09/22/24 Spring 2024 Session C 16 Week session
01/29/24 - 06/28/24 07/01/24 - 10/20/24 Summer 2024 Session A 16 Week session
02/26/24 - 08/02/24 08/05/24 - 11/24/24 Summer 2024 Session K 16 Week session
03/25/24 - 08/30/24 09/02/24 - 12/22/24 Summer 2024 Session C 16 Week session

Course ID: 4564

|
This Master’s degree capstone course in Cybersecurity Studies is an integrative, multi-disciplinary course that applies the knowledge, skills, and attitudes obtained in the core courses. NOTE: This course may not be taken until all other courses are COMPLETED and student has a 3.0 GPA. THIS COURSE IS 16 WEEKS.
Registration Dates Course Dates Session Weeks
11/27/23 - 05/03/24 05/06/24 - 08/25/24 Spring 2024 Session K 16 Week session
12/25/23 - 05/31/24 06/03/24 - 09/22/24 Spring 2024 Session C 16 Week session
01/29/24 - 06/28/24 07/01/24 - 10/20/24 Summer 2024 Session A 16 Week session
02/26/24 - 08/02/24 08/05/24 - 11/24/24 Summer 2024 Session K 16 Week session
03/25/24 - 08/30/24 09/02/24 - 12/22/24 Summer 2024 Session C 16 Week session

Why Enroll in a Master's in Cybersecurity Program?

Gain the knowledge to fight cyber crime. Cyber defense education immerses you in an exciting field where you’re constantly kept on your toes. Students in our master of science in cybersecurity program discover how to make the online world safer. Through the program, you’ll apply leadership abilities as well as deeper expertise in specialized cybersecurity skills. This knowledge prepares you to fight hostile forces with a combination of strategic, communication, and technical skills.

The best cybersecurity managers need not just technical skills but the vision to outmaneuver hackers and the ability to communicate up the chain of command. A cybersecurity master's program takes people beyond the keyboard, learning the tactical and people relation skills to navigate evolving cyber situations.
Andre Slonopas
 PhD, CISA, CISM, CISSP, PMP, Department Chair and Faculty Member, Cybersecurity Department

The Future for Cybersecurity Professionals

Government agencies and major corporations are under siege from well-financed cyber threats. The World Economic Forum has warned that cybercrime and cyber insecurity are among the world’s top 10 global risks. With cyber attacks against national security targets on the rise, the Department of Defense reported a need to build up its cyber workforce to fortify against attacks by adversaries.  

Effective cybersecurity is necessary for protecting everything from the integrity of elections to the safety of food supplies. U.S. Army officials have been speaking up about the need for military personnel to be equipped with cyber defense education.

Likewise, defense leaders have reported a shift from warfighting power to battling cyber forces to protect national security.

The National Security Agency and the Department of Homeland Security have launched initiatives to grow their cybersecurity workforces. The demand remains high across the public and private sector, with a pressing need for cybersecurity talent existing nationwide. Employment of information security analysts, for example, is projected to increase 32 percent between 2022-2032, according to the U.S. Bureau of Labor Statistics. 

Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, [career information accessed January 2024] https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm Employment conditions in your area may vary.

 

What You Will Gain in our Cybersecurity Graduate Program

Cybersecurity master's degree programs provide an opportunity to hone and focus your cybersecurity knowledge. While a bachelor’s degree teaches students the fundamentals of cybersecurity, the master’s degree program deepens your knowledge of topics such as digital forensics, secure networking protocols, and cloud security.

Taught by highly experienced practitioners in the cybersecurity field, the master’s degree program offers academic and professional development for those looking to expand their knowledge. Learning from diverse faculty provides exposure to what’s happening across the industry. This broadens your learning of how cybersecurity programs are applied in different environments. 

cybersecurity

Cybersecurity Master's Degree Program Highlights

Cybersecurity master’s degree program graduates will gain the knowledge to analyze the national cyber threat landscape and cybersecurity challenges from both external entities and domestic sources. Students learn about a range of topics, such as cyber intelligence, cybercrime analysis, information assurance, risk assessment, network security, and more. 

Cybersecurity graduates gain the knowledge to assess risk management approaches, understand the application of security solutions, and adapt to changing cyber threats. In addition to understanding the technical aspects of security solutions, you will explore information security policies and practices and how they are applied in different sectors. 

At the completion of the online master’s degree program, you will undertake a Capstone project demonstrating mastery of cybersecurity and information assurance knowledge. 

Why Earn your Cybersecurity Degree at American Military University?

Gain a cutting-edge cyber defense education. The National Security Agency has recognized American Military University as a National Center of Academic Excellence in Cyber Defense. This designation validates that our cybersecurity degree programs provide students with the critical skills to lead effective missions in both government and business.

Complete cybersecurity courses entirely online. With a 100% online degree program, you have the flexibility to attend courses and complete weekly assignments when it works best for you. This allows you the freedom to learn while managing your other military, work, and life responsibilities. Plus earning your master’s degree in cybersecurity online eliminates the need for commuting to and from a physical classroom.

Earn your master’s degree in an affordable way. As part of our commitment to make quality education affordable, we offer a Preferred Military Rate1 for master's degree courses, a grant program for veterans and family members2, no-cost admission applications, no-cost review of transfer credit opportunities, as well as low- or no-cost ebooks.

Build your professional network. When you attend our cybersecurity master's degree program, you’ll build a network of students and faculty working across cybersecurity in different capacities. This can help you to expand your knowledge, gain industry insights, and learn about new opportunities.  

Make a smooth transition. Becoming a full-time student can be an adjustment, whether you’re used to the structure of the military or are coming from another professional role. Our advisors are here to make this transition easier. They can help you access military benefits and financial aid, maximize transfer credits, manage your academic schedule, and more. Our military education managers also support active-duty servicemembers and spouses stationed at bases around the country and can meet virtually with servicemembers stationed overseas.

Leverage career support. American Military University participates in the U.S. Department of Defense’s Military Spouse Employment Program, which offers connections to hundreds of employers looking to hire military spouses. Learn more about program-specific career services at American Military University.

1All U.S. active-duty servicemembers, National Guard members, Reservists, and military families, (parents, spouses, legal partners, siblings, and dependents) are eligible for the Preferred Military Rate for undergraduate and master’s-level courses. The Preferred Military Rate, which is applied automatically, supersedes all other university grants and special rates, and cannot be combined with any other special promotions.

2All veterans and family members (parents, spouses, legal partners, siblings, and dependents) are eligible to receive a Veteran Grant on standard undergraduate and master’s-level tuition. Tuition grants cannot be combined with any other special rates, promotions, or grants and only one can be applied per course.

I chose American Military University because it was the most effective platform to leverage my military education benefits into a meaningful degree. The school's flexibility and asynchronous platform allowed me to shape my educational journey to my professional and personal life in a way that I would not have been able to accomplish otherwise… I now hold a management position in a top 10 Fortune 500 company and have the opportunity to succeed alongside some of the brightest young business minds in the world thanks to my degree from American Military University.
Dylan Burel,
American Military University graduate and Marine Corps veteran

Cybersecurity Master's Program Faculty

American Military University is discerning in its selection of faculty. All faculty members teaching our master’s degree in cybersecurity courses have a terminal degree in their field as well as a decade or more of experience working in the field. Our faculty members have included leaders in cyber intelligence, cybersecurity, cyber warfare, network security, risk management, computer forensics, computer science, computer security, and homeland security across corporations as well as all branches of the military. 

Faculty with military experience bring unique insights into the needs of active-duty and veteran students. They’re accustomed to teaching and mentoring students who are actively deployed or looking to transition into professional life after their military career. 

The professors know what we go through when we’re deployed. They understand. That really was important to me because it makes it a lot easier to be able to take your classes.
Joseph Gray
American Military University alumni and U.S. Army veteran

Making the Most of Military and Other Tuition Assistance

Our financial advisors bring a depth of experience helping students make the most of tuition assistance and other financial aid programs. Ways to pay for your cybersecurity master’s degree include:

Scholarship and grant highlights include:

Learn more about additional scholarships through Military.com.

 

Frequently Asked Questions

Many cybersecurity professionals and information security professionals, including chief information officers, chief security officers, and chief technology officers, have a master's in cybersecurity. This specialized knowledge is typically sought by large corporations, military branches, as well as government agencies.
With a master’s in cybersecurity you can acquire the management practices needed to lead cybersecurity operations. Many director- and executive-level cybersecurity jobs on career sites like LinkedIn and Indeed.com list a master in cybersecurity or a related field as a requirement.
Cybersecurity jobs may involve working for a large organization, a military installation, a public entity, or striking out on your own to start a business. Many people are drawn to cybersecurity careers for the excitement of working in an ever-changing field or the work/life balance gained through many remote cybersecurity jobs.
With the right time and attention to detail, earning a master's in cybersecurity isn't overly difficult. The knowledge gained through cybersecurity master’s programs tends to come more easily to those with a passion for technology and an aptitude for problem-solving.
Having experience in IT or a similar field can help provide the foundational knowledge necessary to master cybersecurity courses. 
For all prospective students, we take into consideration experience, education, professional involvement, and other factors. Many students in our master’s of science in cybersecurity program have completed an associate or bachelor’s degree in IT or a related field such as computer science, have work experience, and/or IT certifications such as EC-Council’s Ethical Hacking. Learn more about our admissions requirements. 
Core courses in a cybersecurity graduate program typically include network security, cryptography, information security management, ethical hacking, and digital forensics. 
Most cybersecurity masters degree programs last one to two years. Time to completion can vary depending on how many hours you put in each week and whether you’re attending part- or full-time.

Courses Start Monthly

Next Courses Start May 6
Register by May 3

Admission Requirements

All AMU master's degree and graduate certificate programs require a bachelor’s degree (or higher) from an institution whose accreditation is recognized by the Council for Higher Education Accreditation (CHEA).

For this program, you must provide an official transcript of your previously completed bachelor's or master's degree and have ONE of the following:

  • Associate or bachelor's degree in information technology or a related field (ex: computer science, information systems, database development, etc.)
  • 2 years of work experience in the specific sub-field for this degree
  • Completion of one of our undergraduate IT certificates
  • Completion of 6 credits in IT-related courses
  • Completion of an IT-related minor or concentration during your undergraduate program
  • Certifications in at least one of the below:
    1. CompTIA Security+® (2010 to present recommended)
    2. CompTIA Network+® (2010 to present recommended)
    3. CompTIA A+® (2010 to present recommended)
    4. CompTIA Project+® (2010 to present recommended)
    5. CompTIA CySA+® (2010 to present recommended)
    6. CISSP® certification (valid up until the expiration date)
    7. SSCP®
    8. EC-Council Ethical Hacking
    9. Cisco CCNA® Security
    10. A valid and current Project Management Professional certification from the Project Management Institute

CompTIA Security+®, CompTIA Network+®, CompTIA A+®, CompTIA Project+®, and CompTIA CySA+® are all registered trademarks of the Computer Technology Industry Association, Inc.

CISSP® and SSCP® are registered trademarks of International Information Systems Security Certification Consortium, Inc.

CCNA® is a registered trademark of Cisco Technology, Inc. 

IMPORTANT NOTES

  • If the IT-specific requirements are not noted in the official bachelor's or master's transcript, you must provide official copies of your undergraduate transcripts that show the appropriate coursework.
  • The verification of the 2-years work experience needs to be sent to the university via formal resume/CV.
  • Preadmission courses completed at the undergraduate level must be graded C or better; B or better at the graduate level.

Please read all graduate admission requirements before applying to this program and be prepared to submit the required documentation.

An AMU admissions coach will contact you via email or phone to assist you with the enrollment process, review your documentation, and to notify you when you have been admitted into the program and may register for courses.

Materials Cost

Technology fee: $85 per course 

Need Help?

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an AMU admissions coach at 877-755-2787 or [email protected].

Quality Education Should Be Affordable

So you can focus on the opportunities ahead, without the financial burden of more expensive schools who are not as invested in your success. Learn more about paying for school.

Consumer Information

Disclosures

Maryland Residents learn more about costs, completion rates, median debt, and more.

2Alumni Graduated with No APUS-incurred Student Loan Debt As of December 31, 2021

Includes alumni who graduated with an associate, bachelor's, or master's degree from APUS. Student loan debt is defined as student loans and private education loans used for tuition, fees, living expenses, and book costs associated with courses taken at APUS. Many APUS students receive military tuition assistance and veterans education benefits, which are not student loan debt.

1The University reserves the right to accept or deny credits according to policies outlined on our University website. Please see the University's transfer credit policy webpage for complete information.

*Cost Per Credit Hour

AMU's Preferred Military Rate is $250 per credit hour for all undergraduate and master's-level courses. This rate is available to all U.S. active-duty servicemembers, National Guard members, Reservists, and military families, including parents, spouses, legal partners, siblings, and dependents.
See all military student benefits.

Cost of Attendance

Learn more about AMU’s cost components and full cost of attendance