Skip navigation
A cybersecurity presentation: Explore Regent's online master's in cyber security - cybersecurity policy program.

M.S. in Cybersecurity – Cybersecurity Policy

Be a Change Maker in Cybersecurity

The Master of Science (M.S.) in Cybersecurity – Cybersecurity Policy focuses on cyber issues within society, politics, theology, international relations, and the military. For this highly marketable degree, you will develop, implement and maintain a digital security strategy for the protection of organizational data.

Online
30+
August 22, 2022
Download PDF

Expand Your Expertise

Learn about systems security, identity management, network defense, disaster recovery, and more.

Advance Your Knowledge

Understand cybersecurity compliance requirements for organizations to ensure laws, policies, and regulations are met.

Keep Abreast of Issues

Explore policy and ethical issues in the fast-growing field of public information systems.

Gain a Competitive Edge

Study the National Infrastructure Protection Plan including key resource and critical infrastructure protection roles and responsibilities.

Presented from a Christian worldview, these cybersecurity courses are offered online and supported by faculty in Virginia Beach.

To learn more about this program, please complete the Request Information form on this page.

On completing the M.S. in Cybersecurity – Cybersecurity Policy degree, you will be able to:

  • Apply international relations theory paradigms to the analysis of cyber conflict and cyber international relations.
  • Compare traditional military tactics and strategies with those used in cyberspace.
  • Employ essential principles for network security and risk management.
  • Develop business continuation and disaster recovery strategies.

Career Opportunities

  • Cybersecurity Policy Specialist
  • Cybersecurity Network Analyst
  • Compliance Analyst
  • Information Security Manager
  • Cyber Risk Analyst
  • Cybersecurity Engineer
16%
Higher Earnings with a Master's Degree Bureau of Labor Statistics

Ethical principles, issues and responsibilities associated with information systems security, cyber warfare and ethical hacking.

Development of information systems security and assurance frameworks, policies, roles, responsibilities, practices and procedures. Prerequisite: CYBR 610.

Investigation of Internet and network architectures and procedures for preventing and addressing security vulnerabilities, threats and attacks. Prerequisite: CYBR 610.

Techniques of systems design and analysis and best practices in digital forensics. Prerequisite: CYBR 610.

Examination of information security management issues for government, corporations, and other organizations, including the planning, designing, implementing, managing, and auditing security at all levels. Cross-listed with GOV 530.

Essential principles for network security and risk management. Prepares students for relevant industry certification. Prerequisite: Must be taken as the final course in the program.

Considers applicability of traditional IR theory paradigms to description and analysis of cyber conflict and cyber international relations. Considers issues of political economy associated with globalization and cryptocurrencies. Introduces cyberspace actors and institutions and prospects for global conflict and conflict resolution.

Introduces major operational concepts as applied to cyberspace; compares and contrasts traditional military doctrines, tactics and strategies with those used in cyberspace; presents institutions involved in cyberconflict and their functions domestically and internationally, and describes prospects for peace-building and international cooperation in cyberspace.

The application of information systems concepts and tools to challenges and opportunities in the public sector focusing on information system trends; managerial use of information systems; hardware, software, and telecommunications; systems development processes and practices; strategic and policy issues in IS, and ethical and moral issues surrounding information system management.

Addresses the all hazard approach to critical infrastructure protection with a specific focus on cybersecurity and the use of cyber/IT tools in progressing concepts of risk management, mitigation, preparation, and response and recovery efforts. Includes current National Infrastructure Protection Plan Critical Infrastructure/ Key Resource Sector Specific Plans and the use of the Incident Command System in all hazard emergency management disaster response as per the current National Response Framework.

2022-23 Semester Check-In Deadlines

All new students are expected to check-in for the semester two weeks before the session start date. Students should apply, be accepted, enroll in their first courses, and confirm a plan to pay for their courses prior to this date.

SessionSemester Check-InSession Start Date
Session AFriday, August 12Monday, August 22
Session MFriday, September 9Monday, September 19
Session BFriday, October 14Monday, October 24
Session CWednesday, January 4Monday, January 9
Session TFriday, January 27Monday, February 6
Session DFriday, March 3Monday, March 13
Session EFriday, April 28Monday, May 8
Session FFriday, June 9Monday, June 19

Admissions Requirements

Step 1: Apply to Regent University

Step 2: Complete Your Admissions Questionnaire

  • After you submit your application, you will receive a link to complete the required admissions questionnaire.

Step 3: Submit Your Unofficial College Transcripts

  • Email your unofficial college transcripts to apply@regent.edu using the subject line: Unofficial Transcripts.
  • Upon conditional acceptance, Regent University will attempt to obtain your official transcripts from your U.S. degree-granting institution.
  • International transcripts must be evaluated by an NACES-approved company.

Step 4: Submit Your Government-Issued ID

  • Email a photo of your government-issued ID to apply@regent.edu using the subject line: Government ID.
  • Please note that all items submitted as part of the application process become the property of Regent University and cannot be returned.

Part-Time Students

DegreeTuition Cost Per Credit HourAverage Credit Hours Per SemesterAverage Tuition Per Semester
MS in Cybersecurity$6956$4,170

Full-Time Students

DegreeTuition Cost Per Credit HourAverage Credit Hours Per SemesterAverage Tuition Per Semester
MS in Cybersecurity$6959$6,255

Student Fees Per Semester

University Services Fee (On-Campus Students)$800
University Services Fee (Online Students)$650

Student Fees Per Semester

University Services Fee (Online Students)$650

Part-Time Students

DegreeTuition Cost Per Credit HourAverage Credit Hours Per SemesterAverage Tuition Per Semester
MS in Cybersecurity$6756$4,050

Full-Time Students

DegreeTuition Cost Per Credit HourAverage Credit Hours Per SemesterAverage Tuition Per Semester
MS in Cybersecurity$6759$6,075

Student Fees Per Semester

University Services Fee (On-Campus Students)$800
University Services Fee (Online Students)$650

Student Fees Per Semester

University Services Fee (Online Students)$650

*Rates are subject to change at any time.

Estimated Cost of Attendance: View the estimated cost of attendance to see an example of the total cost of tuition and fees.

“Regent's M.Ed. in TESOL program has prepared me to organize and run the ESL courses at my school. Regent's TESOL professors assign the most applicable projects, which have helped me with planning lessons, selecting curriculum and creating assessments, as well as with conducting several teacher-in-service sessions for my school.”

Katherine Tipton, M.Ed., 2011 Teacher

“Looking back, I can take almost every single facet of my daily work and tie it to my training at Regent. ”

Thomas "Randy" Brunk, M.Ed., 1989 Head of School, Cincinnati Hills Christian Academy

“The professors here never allowed me to settle for good, always pushing me towards giving my best.”

Padmakshi "Paddy" Parkhe, M.A., 2011 Journalism

“My time at RSG was a rewarding experience! I was enlightened about the various ideas that influence the political, economic, and social agendas of the world. In addition, I built relationships with faculty, staff, and students and benefited from several RSG-sponsored opportunities.”

Takeshia Stokes, M.A., 2010

“Unlike other schools I considered, Regent lets you customize projects around real-life work issues. The professors challenge you and genuinely want you to succeed.”

Kari Jacobs, MBA, 2013 President and General Manager at WVEC-TV ABC 13