Cybersecurity (M.S., C)

  • 4PLUS (bachelor's + master's)
  • Online
  • Certificate
  • Master's

About this Program

Our program provides a comprehensive education, preparing graduates for advanced technical and management positions in cybersecurity. It addresses the core subject areas and skill sets identified in the Cybersecurity Workforce Framework by the National Initiative for Cybersecurity Careers and Studies (NICCS).

Program Overview

Tuition & Fees

The Master of Science in Cybersecurity is a 30-credit program designed for both technical and non-technical students with a bachelor’s degree. Prior background in computing is desirable but not required to enter this program. Individuals without such background can enter the degree program by enrolling in two prerequisite foundation courses. The structure of the program allows students to enter from different disciplines, providing a common foundation and the robust subject matter training necessary in today’s cybersecurity job market.

The Master’s in Cybersecurity is designed to allow partnerships with local technology companies and government organizations. Students will be required and supported to pursue experiential learning and research opportunities during their studies. The program culminates with a team-based capstone project, linked to local industry and government partners. Students will work with faculty and partners to develop suitable research and project questions; collect data, design systems, develop software, protocols, methods, and techniques; synthesize their findings or work artifacts into a final product; and present their findings to the partners and scholarly venues.

Program Outcomes and Student Learning Objectives

The Master of Science in Cybersecurity is designed with specific Program Learning Outcomes (PDF). The program is also aligned with the Hood College Graduate School Outcomes.

Explore current IT issues

The curriculum deepens knowledge of the procedures, tools and standards used in cybersecurity. Students learn systems and network security, computer forensics, cryptography, ethical hacking, and contemporary technologies and techniques in web, wireless and mobile security. They also explore current trends and issues, gaining valuable insights into cybersecurity’s role and impact in day-to-day business operations.

Boost professional marketability

Grounded in a thorough understanding of the technical and managerial aspects of cybersecurity, graduates leave Hood ready to tackle the complex cyber challenges in business, industry, government, education, health and other fields. For students who want cyber training, but not the full master’s degree, there is a stand-alone certificate in cybersecurity.

Part-time or full-time

By taking one or two courses a semester, students can complete the 30-credit program in three years. As full-time students, they can take on-campus classes and graduate in 15 months. Both formats provide instruction from highly qualified faculty and adjunct instructors with proven cybersecurity experience.

The Cybersecurity Capstone

The Cybersecurity Capstone is the culmination of the master's program. The Capstone invites students to further develop and demonstrate their ability to engage both broadly and in-depth with a specific topic in the discipline. It draws diverse modes of learning into one focused area that can enhance the student’s informed practice of cybersecurity. This learning and engagement with a specific topic are expected to be of high scholarly standard. Students are encouraged to begin discussing with faculty potential areas of interest and topics for their Capstone after completing 21 credits in the program.

The Cybersecurity Capstone Guidelines are posted under the Graduate School's site (Sec. Final Thesis, Projects, Capstones and Research, Departmental Guidelines).

The following are the titles of past Cybersecurity Capstone Projects:

Note: Because the work may have been conducted in industry or a government setting, or it is based on private or internal, company-sponsored research, copies of the capstone projects are not made available. It is the prerogative of the author to decide if they will share their project and you must contact them directly to request a copy. Neither the Program, the Department, or the College are allowed to provide contact information of former students.


  • S. J. Alhajry, "Comparison of Malware Detection Techniques"
  • A.M. Almatthmi, "Evaluation of User Interfaces in Security Information and Event Management Systems"
  • P. Burnett, "Cybersecurity Maturity Assessment for Identification and Remediation of Insider Threats"
  • M. Calafos, "The Dark Side of Cryptocurrency: Laundering Money and Financing Criminality"
  • J. M. Downing, "The Implications of Huawei 5G on the Five Eyes Intelligence Sharing Alliance"
  • S. Lange, "Development of Automated Penetration Testing Tool with Push Notifications"
  • M. D. Sabeeh, "A Survey on the State of Bots, Associated Threats, and Detection Techniques"
  • G. Mbouna, "Internet-based Voting Security: The Case of the African Continent Transitioning to E-voting"
  • F. F. Qazzazee, "Comparison and Performance Evaluation of VPN Technologies"


  • F.Y. Aljammaz, "A Comparative Analysis of Threat and Risk Modeling of Consumer IoT Devices"
  • A. Alzahrani, "Detection and Prediction of Insider Threats"
  • C. Carrington, "Evaluation and Comparison of Cyber vs. Non-Crime and Punishment in the Criminal Justice System"
  • J. Flagg, "Impact and Risk Evaluation of Medical Equipment on The Security Posture of Healthcare Organizations"
  • H. Rivas, "Security and Risk Evaluation of Cloud Storage and Cloud Infrastructure"
  • S. Wilson, "Evaluation of the Cybersecurity Posture in Emergency Services Organizations"
  • A. J. Woodring, "E-Voting Platforms: Are They Secure?"
  • A. Abdulmajeed,  "Threat Analysis of E-voting"
  • N. Alosaimi, "Vulnerability Analysis of Smart Contracts"
  • C. Brown,  "The Dilemma, Ethics, and Impact of Responsible Disclosure"
  • R. de Cespedes,  "Security Operations Center (SOC) Threat Visualization"
  • H. Ghasemi,  "Reducing Crime Related to Cryptocurrency Transactions"
  • N. Kalva,  "Framework for the Evaluation of Privacy in IoT Devices"
  • L. Lepi,  "A Comprehensive Survey of Threat Modeling Techniques and Their Applied Uses"
  • J. Whipp,  "Enterprise Cybersecurity Plans, Policies, and Procedures"


  • A. Olanrewaju,  "Establishment of a Security Operations Center (SOC)"
  • S. Soni,  "Protection by adversaries while using TheOnionRouter(TOR)"
  • F. Alamri,  "Threat and Risk Modeling for IoT device(s)"
  • F. Alatawi,  "Best practices in defending against DDoS attacks"
  • O. Aloufi,  "Measuring Security"


  • A. Alsenaidi, "Cyber Security and the 4th Industrial Revolution"
  • D. Hill, "Retaliation to cyber attacks. Should the US respond to cyberattacks by national adversaries?"
  • J. Brewer, III, "Vehicle/Automotive Hacking"
  • M. Giambruno, "Do Smart Houses Make for Safe Homes?"
  • E. Hamad, "Development of a Firewall with Randomly Generated Service ports"
  • S. Jewett, "Cyberwafare, cyber weapons, and cyber attacks"
  • P. Abayomi, "User interface for server firewall management

3MT Competition

Cybersecurity students are invited to present their Capstone and compete at the Graduate School's Three Minute Thesis (3MT) competition, held annually at the end of the Spring semester. We are proud of the participation of past participants:

  • 2021: Suiltan Alhajry |  AhmedAlmatthmi | Patrick Burnett | Michael Calafos | JuliaDowning | HamidGhasemi | Sanket Lange | GastienMbouna | FadiQazzazee | Harold Rivas | Mohammed Sabeeh | Seth Wilson
  • 2020:  Connor Brown | Rob de Cespedes | NikhilKalva | LuanLepi | JeffWhipp
  • 2019: Eddie Hamad


Cybersecurity students are invited to participate in CyberBlazers, the program's ethical hacking student team. Students who join this welcoming group of students and faculty, learn together, practice together, and compete in regional and national cybersecurity and capture the flag (CTF) competitions.

WiCyS Chapter

At WiCyS, a global community of women, male allies and advocates, we are dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. Join us to move the needle in women's underrepresentation in cyber! Explore the Global WiCyS Membership Benefits page and register here to become part of our WiCyS chapter at Hood.

The Cotton Cyber Lecture Series

Janet Hobbs Cotton ’59 and her husband John Cotton have given the new cybersecurity master’s program a generous gift by establishing the Cotton Cyber Lecture Series, bringing nationally and internationally recognized leaders in cybersecurity to campus to speak.

  • Apr 05, 2018 (INAUGURAL LECTURE): General (Ret) Keith Alexander (bio)Founder and CEO, IronNet Cybersecurity
  • Oct 18, 2018: Ronald S. Ross (bio), Fellow,  National Institute of Standards and Technology
  • Apr 09, 2019: Hector Monsegur (bio), Director of Assessment Services,  Rhino Security Labs
  • Oct 03, 2019: Melissa Hathaway (bio), President, Hathaway Global Strategies
  • Apr 06, 2021: Kevin Stine (bio), Chief,  Applied Cybersecurity Division, National Institute of Standards and Technology. 
  • Oct 14, 2021 : Vinton G. Cerf (bio), Vice president and chief Internet evangelist for Google

Visit our Cotton Lecture Series website for more information.


Degrees Offered

  • MS

For students applying to the master's or certificate in cybersecurity program, please submit the following to the Graduate School:

  • One copy of official transcripts from each institution attended.
  • Résumé/CV that provides educational and professional experience (required only for master's program).

This program is designed for students with a background in computer science or related area that has prepared the students in core computing subjects, such as programming, computer architecture, operating systems, networking, data management systems and applications. Students who do not have the necessary background will be required to complete one or both of the foundation courses to ensure they are well prepared for the required coursework. The determination to take the foundation courses is based on a thorough evaluation of student transcripts and other supporting documents during the application review.

The Master of Science in Cybersecurity, for students with undergraduate preparation in computer science or related area, requires the completion of 30 credits: 24 credits of core courses, one 3 credit elective course, and 3 credits of a Cybersecurity Capstone.

Students, without undergraduate preparation in computer science or related area, will be required to complete one or two foundation courses, designed to provide the appropriate background knowledge and foundation to succeed in the program.

Core Requirements

CYBR 555Information Systems Security


CYBR 548Telecommunications & Networking


IT 530Applied Database Concepts


CYBR 534Network and Internet Security


CYBR 521Information Assurance & Risk Assessment


CYBR 532Computer Forensics


CYBR 535Security Policies, Ethics and Law


CYBR 556Ethical Hacking


CYBR 560Cybersecurity Capstone



One from the following:

CYBR 537Applied Encryption & Cryptology


CYBR 599Special Topics


CYBR 597Cybersecurity Practical Training


Foundation Courses

Any foundation courses required are in addition to the 30 credits required for program completion.

IT 510Computing Hardware & Software Systems


CSIT 512Elements of Computer Programming




  • How do I apply for admission?
    • Students apply for admission following the directions here.
  • What are the admission criteria for the program?
    • You can find the admission criteria here.
  • Do you offer probationary or conditional admission if I don't meet one or more of the admission criteria?
    • We don't offer probationary or conditional admission. After admission, if a student’s GPA falls below 3.0, the student must restore their GPA to a 3.0 within 9 credit hours to avoid dismissal from the program. The application review is designed to ensure that admitted students will be well prepared to succeed in the program. Based on an applicant’s background, the program director may require registration in specific foundational coursework and/or limit the number of credits for enrollment during the student’s first semester.


  • How many courses do I need to complete for the MS in Cybersecurity?
  • Is the program offered part-time or full-time?
    • Both. Students may study in the program either part-time or full-time.
      NOTE: International students in the US with a student visa are required to be full-time.
  • Is the program offered on-campus or online?
    • Both. Students may study in the program either on-campus or online.
      NOTE: International students in the US with a student visa are not allowed to take any online courses.
  • What is the typical course structure in the program?
    • Students can expect a carefully integrated mix of lectures, hands-on laboratory assignments, computer-based simulations, individual and small group projects and discussions along with guest lectures by local cybersecurity government and industry leaders and world-renowned experts (see: Cotton Lecture Series).
  • What is the typical class size?
    • Most classes have an average of 14-16 students; however, there are some very popular courses that average 24 students. At Hood College, in person or online, you will never be in a class where your instructor doesn't know your name or how you are doing in class.


  • What are the foundation courses?
    • Foundation courses aim to help students with partial or no preparation in computing or information technology get ready to be successful in the program. There are two such courses: IT 510 Computing Hardware & Software Systems and CSIT 512 Elements of Computer Programming (Python).
  • How many courses can I take each semester?
    • In graduate school, three courses (9 credits) is considered a full-time load. Part-time students may take anywhere from one to three courses each semester. Full-time students must take three courses each semester. NOTE: International students are required to maintain a full-time course load in order to comply with US student visa requirements.
  • Can I transfer courses from another graduate program?
    • Yes. You may request to transfer up to 6 graduate credits (two courses) from another accredited institution. The courses to be transferred must have been completed with a grade of B or higher and must match course(s) in our program. The final decision to approve any transfer credits is made by the Program Director.
  • Can I substitute courses in the program with other courses (e.g., CS, IT, ITMG)?
    • Generally, no. Particularly if it is a core course, and therefore an accreditation requirement for our program. We may have some latitude in counting a relevant course from another computing discipline as an elective. However, to do so, the student must provide an unofficial transcript, a course syllabus, and a course description. The final decision to count such a course is made by the Program Director.
  • How much time can I expect to spend on each course per week?
    • On average, you will spend about three hours each week in the classroom for each course. The rule of thumb is that you should estimate spending no less than three hours per week for each hour you are in the classroom to study, do homework and work on projects.
  • What are the easy courses in the program?
    • All the courses are challenging in their own way. There are courses some students find more enjoyable than others, but it is subjective and mostly based on personal interests and prior background. If a student is admitted to the program, we make sure they have the right preparation to succeed.
  • Do I need to always follow the course prerequisites?
    • Yes, the course prerequisites have been carefully designed to meet the program's goals.
  • What is the CYBR 560 Cybersecurity Capstone about?
    • Read a sample syllabus (PDF) that explains the Capstone, the process, and the student responsibilities and methods of evaluation.
  • What is the CYBR 599 Special Topics elective course about?
    • This is a designation for courses covering specialized topics that are not taught on a regular basis. When a CYBR 599 course is offered, students will see it on the schedule along with a meaningful title describing the course.
  • What is the CYBR 597 Cybersecurity Practical Training elective course about?
    • This course is designed to provide cybersecurity students with a working knowledge and practical application of the topics covered in our cyber courses. Students will apply current research and accepted practices in the cybersecurity field in a variety of professional settings and will perform work supervised by both a professional adviser and a Hood adviser. Based on the description for the external position, students will craft an appropriate research/professional plan in consultation with their adviser. This course will help students synthesize previous concepts and training as they transition to the role of a professional. Students should contact the Hood College Career Center to get help with locating potential relevant positions that could be used to serve as Practical Training sites.
  • Will the M.S. in Cybersecurity prepare me to obtain professional certificates?
    • Our curriculum provides a comprehensive background and practical, hands-on skills to succeed in cybersecurity. Several courses (e.g., CYBR 555, CYBR 521, CYBR 566, and others) cover the same (and more in-depth) topics required by many popular certificates so our students are well prepared when they decide to pursue them. However, our courses are not designed to prepare students for a particular certificate or “teach to the test.” Students interested in a specific certificate should obtain information about the contents, criteria, and testing from the administering organization.
  • Why do employers ask for professional certificates? Isn't my degree enough?
    • Your degree is more than enough from the perspective of what you have learned and what you can do. But cybersecurity is a fairly new field and employers are asked to review job applications from candidates with vastly different academic preparation and experience. Professional certificates are a convenient way for employers to quickly and easily understand a job candidate's level of expertise.
  • Do I need to earn professional certificates (e.g., Security+, CISSP, CEH, etc.)?
    • It depends. Application requirements in the job market vary across industries and employers. There are employers that do not ask for any professional certificates for candidates holding a graduate degree in cybersecurity. Other employers hire graduate degree holders with the expectation for professional certificates to be obtained within a certain period of time while employed. There are also employers that make certificates a requirement to be even considered for a position. Your academic degree will prepare you to tackle any certificate if you begin to see employers asking for them. After you begin working in the field of cybersecurity, obtaining certificates is considered in the industry as a type of professional development, similar to attending workshops or getting training.

Assistantships/Financial Aid

  • Are there any Teaching or Research Assistantships available? 
    • There are only a couple of assistantship (Graduate Assistant) opportunities but they are very limited and require completion of about 50% of their courses to be eligible. Assistantships are very competitive to get, and we strongly advise that no student should make any financial decision assuming that they will be selected and receive the assistantship. The reason we have limited assistantship is that we are able to keep the cost of the MS program affordable for every student in the program -- and we have one of the most affordable programs.

Registration and Logistics

  • How do I register for the first semester?
    • Follow these steps. The always helpful staff of the Graduate School are also always eager and ready to help!

Knowledge of data analytics is mandatory for success in the current work climate across industries and disciplines. Hood College is offering an online accelerated training course this January to meet this need.

Who is eligible:

  • All fields and industries
  • All education backgrounds
  • All employment levels (entry to leader)
  • Must possess a bachelor's

By the end of this accelerated training, participants will:

  • Understand the opportunities and challenges in data analytics;
  • Apply approaches to real-world data sets; and
  • Be prepared to earn IBM Skills Academy Certification

Training opens January 3, 2022 and must be completed by January 21, 2022.

Training discount available for Ft. Detrick Alliance, military, and NeighborHOOD members.

Register for the Applied Data Analytics Training Course | ITMG 599A.

For questions about the IBM Data Analytics training course, email

The 4PLUS program is designed for highly motivated students who have the desire to build career options into their undergraduate curriculum and earn a master's degree in cybersecurity.

Hood College students from all majors are eligible to participate in a 4PLUS program that allows for a combined, and in some cases accelerated, master’s degree in cybersecurity after the completion of their undergraduate program. The program is especially relevant to computer science majors, but it is also available to students from other disciplines.

ABC graphic

Academic Blazer Chat: Cybersecurity

George Dimitoglou, director of the cybersecurity program, and Michelle Giambruno, a cybersecurity student, discuss what cybersecurity is and what students can expect during the program and after graduation.

Program Contact

George Dimitoglou

Program Director

Vanessa Solis

Assistant Director of Graduate Admission

Office: 301-696-3604 Cell/WhatsApp: 240-651-4015

Fast Fact

100% expected cybersecurity employment rate through 2021.

All Faculty
George Dimitoglou

George Dimitoglou

  • Associate Professor of Computer Science
  • Program Director, Master's in Cybersecurity and Director of the Center for Computer Science and Information Assurance
Carol Jim

Carol Jim

  • Assistant Professor of Computer Science
Bill Pierce

Bill Pierce

  • Assistant Professor of Computer Science
  • Coordinator, Computer Science Minor
Ahmed Salem

Ahmed Salem

  • Department Chair of Computer Science and Information Technology
  • Program Director, Master's in Information Technology and Cybersecurity Certificate
  • Associate Professor of Computer Science and Information Technology
David Aidoo

Military Graduate Student Focus | David Aidoo

David Aidoo, M.S. Cybersecurity Graduate School Graduate Student Military

"I feel like I advance everyday at Hood College. My professors challenge me in ways that ensure that learning is meaningful. They are all well-versed in their craft and I appreciate the firsthand knowledge and real-world experiences they draw from."

  • Academics
  • Math & Computer Sciences
Omar Aboul-Enein

Graduate Student Spotlight | Omar Aboul-Enein

Omar Aboul-Enein, M.S. Computer Science Graduate School Graduate Student

"I chose to pursue my Master’s in Computer Science at Hood College because I appreciated the welcoming staff and supportive student environment. Additionally, I appreciated the program providing a good balance of flexibility and structure well-suited to working professionals"

  • Academics
  • Student Engagement
Daniel Sierra-Sosa

Graduate Faculty Focus | Daniel Sierra-Sosa

Daniel Sierra-Sosa, Assistant Professor of Computer Science and Information Technology Faculty Graduate School Graduate Student

Daniel Sierra-Sosa is an assistant professor in the Department of Computer Science and Information Technology at Hood College.

He has been involved in multiple activities related to industry research and other partner academics. Dr. Sierra-Sosa engages in industrial initiatives with Kindred-Healthcare, which works on research projects in the development of mobile applications, virtual reality, medical images and predictive analysis.

He is the co-author and lead author of several manuscripts that have been published in recognized journals. Prof. Sierra-Sosa is also a Qiskit Advocate and instructor at IBM Skills Academy in Quantum Computing, Data Science and Artificial Intelligence.

  • Academics
  • Partnerships
  • Research
  • Math & Computer Sciences