Template id = 976
Document id = 23182
Parent id = 23150

Master in Cyber Security

Get global Cyber Security recognition with the Master degree in Cyber Security!

Master in Cyber Security – Mode of Study

2- to 3-year international and part-time Master program through e-learning leading to the official US MS degree.

The demand for IT Security specialists is soaring

Cyber Security threats do not respect borders. With the dramatic rise in global Cybercrime,
Cyber Security has become one of the fastest growing IT disciplines in the world today. No organization wants to be a victim to Cybercrime. The fallout can take years to fix and in some instances, it can be hard to fully recover at all. The growing concern among decision makers at major organizations over Cybercrime is therefore boosting the demand for Cyber Security experts worldwide. According to the U.S. Bureau of Labor Statistics, IT Security Specialist employment will increase by 37% from 2012 to 2022, over 3-times faster than the 11% average for all occupations, placing this network security position among the nation's fastest growing positions. Be quick and get your global Master degree in Cyber Security now!

The Master degree in Cyber Security is one of the most current in demand graduate qualifications in the world

In collaboration with an outstanding American university we now offer you a Cyber Security specialization program on a Master level fully through e-learning. Various leading Cyber Security experts from all over the world will teach you. In only 2 to 3 years time, you will earn your Master degree in global Cyber Security.

Global Cyber Security recognition with the Master degree in Cyber Security!

The Master in Cyber Security will prepare you to take up challenging and rewarding career positions in various high-demand industries in the private and public sector. You can take on responsibilities that include the administration, operation and protection of mission-critical computer systems, information systems, networks, infrastructures and communication networks.

For this Master we are looking for high potentials with a global mindset. Your fellow students work as managers, consultants or researchers for organizations that specialize in Cyber Security or that heavily rely on IT security. Already offered live at a number of campuses in the USA, we now also offer you this Master in Cyber Security worldwide through e-learning. The university is one of the most diverse and global universities in the world. As a student you have the opportunity to study whenever and wherever you want while earning an accredited American Master degree.

Why study for a Master in Cyber Security with us?

We offer the international Master of Cyber Security in collaboration with an American university that is home to a variety of students from over 50 countries worldwide. You will be connected to a network of more than 170,000 alumni worldwide. Points of distinction of this Master are:

  • The Master in Cyber Security consists of 12 courses, spanning 9 weeks each. You can take a course at a time that personally suits you.
  • Each course lasts for 9 weeks and can be taken fully through e-learning.
  • You can perfectly combine this e-learning Master with your job.
  • You can choose to book and pay for each course separately (only € 2,400) instead of paying for the complete Master at once.
  • You can take a term off if necessary without any (financial) penalties involved.
  • There are 5 start dates a year, in January, March, May, August and October.
  • You can take 1 or 2 courses per semester at your choice.
  • As the term schedule is consistent with the U.S. campus, you may study at a physical location in the USA any time.
  • A personal academic advisor, who provides you with all the help you need and who really cares about your success, will assist you.
  • This Master offers a global perspective on Cyber Security from a global university.
  • You will earn the official American MS (Master in Cyber Security) degree, equivalent to the well-known European MSc degree.

Master in Cyber Security – Course material and examination

At the start of each course you will receive an elaborate syllabus outlining in detail what is expected of you. A course can consist of various components such as case studies, literature studies, group discussions and quizzes. The evaluation method differs per course and usually consists of at least 3 evaluation methods such as quizzes, midterms/papers and finals/final papers.

Master in Cyber Security – Language of Instruction

The language of instruction for the Master in Cyber Security program is English.

Master in Cyber Security – Admission Requirements

The Master in Cyber Security aims at professionals with a relevant Bachelor or Master's degree in the field of IT, Business or International Relations, an adequate proficiency in the English language and several years of professional experience, who wish to broaden or deepen their knowledge of Cyber Security. You will need to take an English proficiency test at the start of the Master in order to proceed (not included in the fee).

Master in Cyber Security – Course Load

The Master in Cyber Security program consists of 7 core courses and 5 elective courses that deal with basic, advanced and specialized Cyber Security aspects. These include emphasis on various kinds of threat resolution and problem solving measures. One course grants you 3 credit hours and spans 9 weeks. You must gain a total of 36 credit hours to successfully accomplish this graduate program. Per week you should count on approx. 20 hours of self study, including the online sessions.

Who should you contact for more information?

Please contact Sonja Boelhouwer MSc for more information at +31 (0)40 246 0220 or send her an e-mail (s.boelhouwer@imfacademy.com).


Would you like your logo/banner to be displayed here and are you interested in becoming a partner? Join us now and you and your business will have exposure during our monthly courses, on our website, in our brochures and through our newsletters. Contact us for more information!


Master in Cyber Security – Program Curriculum
To successfully accomplish this Master and to earn the official American MS (Master in Cyber Security) degree, you must gain a total of 36 credit hours by taking 12 courses altogether. These include 7 core courses and 5 elective courses. Each course gives you 3 credit hours and spans 9 weeks. Per week you should count on approx. 20 hours of self study, including the online sessions.

Master in Cyber Security – 7 Core Courses
You will need to take all 7 core courses (mandatory).

  • Introduction to Cyber Security
  • Cyber Security Communications
  • Cyber Security Infrastructures
  • Cyber Security Intelligence/Counter-intelligence
  • Cyber Security Strategic Operations
  • Encryption Methods and Techniques
  • Practical Research in Cyber Security

These courses combined will grant you 21 credit hours.

Master in Cyber Security – 5 Elective Courses
In addition you need to take 5 elective courses. You can choose from:

  • Cyber Security Law and Policy
  • Cyber Security Threat Detection
  • Cyber Security Forensics
  • Pre-emptive Deterrence
  • Use and Protection of Space Assets
  • Cyber Security in Cloud Computing
  • Social Engineering
  • Cyber Security Risk Management Framework
  • Cyber Security Internship
  • Advanced Topics in Cyber Security

From these 5 elective courses, you may - in agreement with your academic advisor - choose another course offered by the university in a complementary field/from a different Master.
With 5 elective courses you will attain the 15 remaining credit hours.

All courses are described below. You can choose which course and how many courses to take at what moment, in agreement with your academic advisor. There is only one requirement; you must always start with core course 1, 'Introduction to Cyber Security'.


1. Introduction to Cyber Security
The first course is designed to provide you with an overview of the major core areas of study you will encounter throughout the Master program.

  • Introduction to Computer System Architectures
  • Vulnerabilities
  • Critical Infrastructures
  • The growing threat of Social Networks
  • Intelligence and Counter Intelligence
  • International laws
  • Security Policies
  • Privacy and Information Liability
  • Cyber Attacks and Counter Cyber Attacks
  • Encryption
  • Risk Assessment
  • Cyber Security Forensics including data gathering and recovery
  • Future Cyber Technology developments

2. Cyber Security Communications (3 credit hours)
Digital communications have grown rapidly and provide increased opportunities to access information, share and disseminate knowledge, create new innovative services and compete in a global environment. It presents new opportunities and a growing threat posed by a connected society that can impact critical interests.

  • The basics of Communication Systems
  • The ISO Layer Model
  • Topologies such as Local Area Networks (LAN's), Wide Area Networks (WAN's), the World Wide Web (WWW) and the Internet
  • Space-based communications used by the Department of Defense and commercial entities
  • Fiber-optics
  • Rapidly developing personal Mobile Communication Technologies such as Wireless Local Area Network (WLAN) and Wifi

3. Cyber Security Infrastructures (3 credit hours)
The impact of 9/11 in 2001 cemented our attention on physical attacks on critical infrastructures. Although still a concern, a growing Cyber Security threat requires additional focus on potential virtual attacks on these same critical infrastructures. Both physical and virtual in capacitance of a critical infrastructure such as the power grid, communications and financial transactions can have a great or greater impact on our society. Cyber Attacks have and can cripple an industry and the services they provide to millions of users. In this course, the critical infrastructures are examined from a Cyber Security perspective.

4. Cyber Security Intelligence/Counter-intelligence (3 credit hours)
In this course you will examine:

  • Methods, ethics, policies and procedures for accessing and gathering information for positive or negative use
  • How to apply counter intelligence to evade, trick or trap individuals, agencies, or national entities who wish to steal, damage or deny access to valid users of critical information and its sources
  • Active measures, passive counter measures, intelligence gathering processes
  • How to determine the validity and success of gathering information

5. Cyber Security Strategic Operations (3 credit hours)

  • Specific methods, ethics, laws, policies and procedures for conducting strategic operations and counter measures
  • How to identify critical infrastructures, communication channels, and information protection schemes?
  • How to detect threats?
  • How to assess vulnerabilities?
  • How to penetrate and exploit Cyber targets?
  • How to monitor, spoof, redirect and deny access?
  • How to protect critical assets?

6. Encryption Methods and Techniques (3 credit hours)

  • Detailed examination of the history and application of ciphers, codes and encryption/decryption methods and techniques
  • Public and private keys and other advanced methods
  • Encryption and communications systems
  • Storage of data
  • Methods employed for decryption, verification and authentication
  • The role of ethics and information privacy when security is applied to public systems and e-mail content as well as higher levels of security for corporations' proprietary and government classified information
  • The Data Protection Act

7. Practical Research in Cyber Security
The student is expected to synthesize and integrate the learning experiences acquired throughout the Master in Cyber Security and to evaluate current and future topics relative to this Master. Specific papers, projects, or other methodologies must include Cyber Security related technical and management areas than span this entire degree emphasis. Prerequisite: successful completion of all other required core courses.


1. Cyber Security Law and Policy

  • The laws and policies dealing with Cybercrime, Cyber warfare, privacy and international perspectives
  • In-depth look at the U.S. National Security Act, the U.S. Cyber Security Electronic Security Act, the Cyber Security Enhancement Act, the Protecting Cyber Security as a National Asset Act, the Communications Assistance for Law Enforcement Act (CALEA)
  • (International) Cyber crime laws
  • Review of other current laws and policies

2. Cyber Security Threat Detection

  • Various methods used to threaten our Cyber system such as viruses, spoofing, denial of service, fraud, theft, phishing, spy bots, spam, Trojan horses, e-mail and active malware attachments, viral applications, hardware (computers and portable storage devices) with built-in viruses or trap-doors, fake websites
  • Eaves dropping via wireless networks
  • Criminal access to national, corporate or personal data
  • The growing loss of privacy over social networks

3. Cyber Security Forensics
This course covers methods and procedures for the identification and recovery of damaged or erased digital data.

  • Tracing information access (web history, cookies, cache memory and internet source identification)
  • Determination of system vulnerabilities (e.g. TEMPEST), communication ports and computer system architectures and encryption methods
  • Incident monitoring and response

4. Pre-emptive Deterrence

  • Planning and executing pre-emptive Cyber Security deterrence operations and force application
  • Specific methods
  • Ethics, laws
  • Policies and procedures

5. Use and Protection of Space Assets

  • Space, ground and use of fixed and mobile communication
  • Global Positioning System (GPS) assets and their attributes
  • Examination of secure and non-secure systems to show the breadth of capabilities along with the pros and cons
  • Uplink and downlink signal characteristics, signal bouncing and relaying capabilities
  • Frequency hopping
  • Spread spectrum
  • Interception and overpowering of signals through the use of steerable beams
  • Application of laser and fiber-optics
  • Encryption techniques

6. Cyber Security in Cloud Computing
This course begins with an introduction to cloud computing and security and then provides an examination of cloud security architecture. The essential characteristics of cloud computing are discussed using the National Institute of Standards and Technology (NIST) Cloud Computing Model, SPI cloud service models and the different cloud delivery models. With this background, key strategies and best practices for cloud security are developed, including data protection methods, cloud security controls and countermeasures, virtualization, security management, and securing of data in rest and in motion. In addition, legal and regulatory considerations for different types of clouds are presented. Based on the cloud security requirements, the course defines the steps for an organization to use in selecting an external cloud service provider (CSP). In addition to commercial selection requirements, the U.S. Department of Defense Enterprise Cloud Service Broker Cloud Security Model, which specifies what controls the CSP must implement in the military environment, is reviewed. Prerequisite: successful completion of the course 'Cyber Security Communications'.

7. Social Engineering
This course examines social engineering - the science of influencing a target to perform a desired task or divulge information. The course provides the student with current information defining the many methods of deception hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access; discusses actives toward preventing social engineering threats ranging from elicitation, pretexting, influence and manipulation. The elements of social engineering are presented, discussed and explained by using real-world examples, and the science behind them to unravel the mystery in social engineering.
To complement the social engineering threat, the course analyzes the ethical and social implications of computer technology. The course explores technological, social and philosophical issues to include the ramifications of automation, the ethical obligations of computer specialists, and the threats to privacy that come with increased computerization. Combining the criminal-centric role of social engineering with the ethical, legal and moral impacts of technology upon individuals results in a course that provides the student a comprehensive overview of the challenges, threats and issues of everyday life in the digital age.

8. Cyber Security Risk Management Framework
This course provides a detailed review and analysis of the six-step Risk Management Framework (RMF) process utilizing the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 Security and Privacy Controls for Federal Information Systems and Organizations. The course includes the process for risk analysis and categorizing Cyber risks for information systems, and the application of controls to minimize Cyber risks for managing information. It also presents an in-depth overview of each step of RMF along the framework path as well as the methodology for monitoring IT systems.

9. Cyber Security Internship
Students undertake, with the supervision of a qualified professional, an approved internship in a Cyber Security-related setting. The course includes work and academic experience. The work experience involves professional Cyber Security duties. The academic experience involves written assignments by the faculty advisor. The outline of duties and evaluative methods are established by the student and the internship mentor and approved by the faculty advisor prior to initiation of the program. Prerequisites: Completion of all of the required Cyber Security courses.

10. Advanced Topics in Cyber Security
This course is designed free-format to permit addressing advanced and emerging topics in Cyber Security. This means that the subject and content of this course differ each time the course takes place. You can think of topics like:

  • Cyberspace communications
  • Cyber warfare planning and execution
  • Ethics
  • Encryption/decryption
  • Future topics such as the application of quantum non-locality
Request brochure


The teaching staff are all lecturers from outstanding (inter)national universities, highly-skilled top consultants and top practitioners from private and public organizations.

Start date(s)

You can enroll for this e-learning Master 5 times a year. You should, however, always start with the core course 'Introduction to Cyber Security'. Thereafter you can take the courses in the order you wish, in agreement with your academic advisor. You can enroll for the complete Master in Cyber Security at once. You can also choose to enroll for the stand-alone Certificate in Cyber Security - Threat Detection or choose just one or more courses from the full Master. The core course 'Introduction to Cyber Security' starts on:

  • 30 May 2022
  • 15 August 2022
  • 17 October 2022
  • 9 January 2023
  • 20 March 2023

Fee / Registration

The total amount of the full Master in Cyber Security program is € 28,800 (VAT incl.). All books, reading materials, the online learning environment and the examinations are included in this fee. The costs for the English proficiency test - if required - are € 60 and willl be charged separately. You can choose to pay for the Master at once or you can pay per course. The fee for one course is € 2,400 (VAT incl.).

Step 1/4: Your selection *

Terms & Conditions
In the event that you wish to transfer your booking (either for the full Master, the Certificate in Cyber Security - Threat Detection or a single course) to a later starting date (if possible), you must notify us at least 4 weeks prior to the start date. In case you are not able to attend at all, delegate substitution may always be made. Of course, the new delegate must meet the admission requirements to maintain the quality of the group. Cancellations will be accepted up until the second course week of the Master, the Certificate or a course. If you cancel after the second week of the Master, the Certificate in Cyber Security - Threat Detection or a course, you will have to pay the full fee. All cancellations must be received in writing.
Payment of course fees must be received within 30 days of the invoice date, though always before the start of the course.

Master in Cyber Security

Register! Brochure IN-COMPANY