Curriculum: Cybersecurity
The MS in Cybersecurity degree program is a 36-credit, online, asynchronous program that can be completed in 2 years.
| Credits | Courses | Duration | Program Director |
|---|---|---|---|
| 36 | 12 | 2 years | Cagil Albayrak |
Core Coursework (24 Credits)
The following courses are 3 credits each and are required to complete the degree:
- Cybersecurity Principles: Explore the foundational principles of cybersecurity, including confidentiality, integrity, availability, and risk management. By the end of this course, students will be able to analyze and apply these core concepts to protect digital environments from evolving threats.
- Network Security: This course equips students with the fundamental understanding and abilities to design secure physical and logical network structures for both wired and wireless networks. Students learn to design, implement, and manage secure network infrastructures to defend against internal and external cyber threats.
- Cryptography and Data Privacy: Delve into the principles of cryptography and strategies for ensuring data privacy in the digital age. Through hands-on activities, students learn to implement cryptographic solutions and develop frameworks to protect sensitive information.
- Defending Critical Infrastructure and Resilience: Examine the unique challenges of securing critical infrastructure and building resilience against cyber threats. Students will be equipped with the skills to assess vulnerabilities and develop defense strategies for essential services like energy and healthcare.
- Cyber Policy and Emerging Threats:This course explores the development and implementation of global cybersecurity policies and strategies, with a focus on international cooperation and diplomacy. You’ll learn to critically evaluate and influence cybersecurity policies that address global threats.
- Cyber-Physical Defense: How can organizations defend their industrial control systems and operational technology from cyber-physical threats? Explore the unique world of operational technology (OT) — the hardware, software, and networks that run critical infrastructure from manufacturing lines to power grids. You’ll gain foundational knowledge of OT terminology, architectures, and components (PLCs, SCADA, historians, sensors/actuators), then dive into the protocols, network designs, and segmentation strategies that keep these environments running—and secure. Along the way, you’ll study real-world attack patterns (Stuxnet, Ukraine grid intrusions), learn to apply MITRE ATT&CK for ICS, and navigate the regulatory and compliance frameworks that govern the electric sector and other process-driven industries.
- Cyber Warfare: Review the latest trends in emerging cyber threats and the dynamics of cyber warfare. Students learn to assess advanced persistent threats and state-sponsored attacks and develop strategies to defend against these sophisticated threats.
- Cybercrime, Risk, and Compliance: Understand the landscape of cybercrime, risk management, and compliance with cybersecurity regulations. This course equips students with the skills to manage cybercrime risks and ensure adherence to legal and regulatory standards.
Cyber Defense and Intelligence Track (9 Credits)
Learn to gather and analyze data on cybersecurity threats to safeguard important infrastructure and national assets through these three courses.
- Cyber Threat Intelligence: Master the collection, analysis, and dissemination of cyber threat intelligence to protect against evolving cyber threats. By the end of this course, students will be able to develop threat profiles and intelligence reports that enhance organizational security strategies.
- Security Operations: Gain the skills to manage security operations, detect incidents, and improve an organization’s security posture. This course offers hands-on experience with security information and event management (SIEM) tools and incident response processes to prepare them for the dynamic field of security operations.
- Security Technology Labs: This course provides a platform for students to gain hands-on experience with security technologies through lab-based exercises, focusing on tools like firewalls and vulnerability scanners. The course prepares students to effectively configure and manage security technologies in real-world scenarios.
Practicum
- Cybersecurity Practicum: Apply your cybersecurity knowledge in a real-world setting through project-based work and collaboration with industry professionals. This practicum aims to offer practical experience to bridge the gap between theory and practice, enhancing readiness to work in the cybersecurity field. Eligible students can complete the capstone where they currently work.
Program Structure
The program consists of 12 courses (36 credit hours). Each term (summer, fall, or spring) has two sessions (A and B). You will take one course at a time in each session (7 weeks).
Courses are 100% online and asynchronous (no required live class meetings), but you will have deliverables due each week. You’ll learn in interactive online classes where you virtually meet students from around the world.
You’ll never be without support while pursuing your degree and can expect to meet individually with the program director to discuss your goals and class options. In addition, all faculty members hold open office hours. Throughout the program, you can access Middlebury’s remote library resources, mental and medical health support services, technologies, and more.
Projected Course Availability
This table outlines anticipated offerings for the coming academic year. Please note that the projected course availability may be subject to change at any time, and, depending on the circumstances, the Institute may not be able to provide advance notice of changes. Enrolled students should consult the Course Schedule for additional course details.
-
Course
CYBR8501 - Cybersecurity Principles (3 Credits)
- Offered in:
- Spring 27
offered in: Summer 26 ()offered in: Fall 26 ()offered in: Spring 27offered in: Summer 27 ()Course Description
What are the foundational principles that safeguard our digital world? In this fully asynchronous course, students will explore key knowledge, skills, and competencies associated with the fundamental concepts of cybersecurity, including confidentiality, integrity, availability, and risk management. Activities will include engaging readings, video lectures, discussion boards with peers, and practical case studies that highlight real-world applications of cybersecurity principles. By the end of the course, you will be able to analyze and apply core cybersecurity principles to real-world scenarios in order to understand and assess risks in various digital environments. You will demonstrate your learning by completing a capstone project, where you’ll explore a specific topic within cybersecurity and present your research. -
offered in: Summer 26 ()offered in: Fall 26 ()offered in: Spring 27 ()offered in: Summer 27 ()
Course Description
What role do global policies and strategies play in shaping cybersecurity on an international scale? In this fully asynchronous course, students will explore key knowledge, skills, and competencies associated with the development and implementation of global cybersecurity policies and strategies. You’ll examine the geopolitical landscape, international regulations, and the role of diplomacy in addressing cyber threats across borders. Activities will include thought-provoking readings and reports from think-tanks and academia, video panels of global experts, analysis of international case studies, and discussion boards that foster debate on the complexities of emerging global cyber governance. By the end of the course, you will be able to critically evaluate and influence the creation of cybersecurity policies and strategies that address the global nature of cyber threats, while balancing national interests and international cooperation. You will demonstrate your learning by completing a policy analysis paper, where you’ll assess the effectiveness of a current international cybersecurity policy and propose strategic recommendations for improvement. -
Course
CYBR8520 - Cryptography & Data Privacy (3 Credits)
- Offered in:
- Spring 27
offered in: Summer 26 ()offered in: Fall 26 ()offered in: Spring 27offered in: Summer 27 ()Course Description
How do cryptography and data privacy shape the security of our digital information? In this fully asynchronous course, students will explore key knowledge, skills, and competencies associated with the principles of cryptography and the strategies for ensuring data privacy. You’ll learn about data privacy compliance, solutions, transport and storage encryption, gaining insights into best practices to protect sensitive information in today’s digital landscape. Activities will include in-depth readings, IPSec, File System Encryption, Enterprise Encryption Policy and many more labs and problem-solving exercises, and discussion boards where you can analyze and debate the latest trends in cryptography and data privacy. By the end of the course, you will be able to implement cryptographic solutions and develop privacy frameworks to protect data across various platforms and environments. You will demonstrate your learning by completing a capstone project that involves designing and justifying a cryptographic and data privacy plan for a hypothetical organization, ensuring the protection of its most critical assets. -
Course
CYBR8530 - Network Security (3 Credits)
- Offered in:
- Summer 27
offered in: Summer 26 ()offered in: Fall 26 ()offered in: Spring 27 ()offered in: Summer 27Course Description
How secure is your network, and are you prepared to defend it against evolving threats? In this fully asynchronous course, students will explore key knowledge, skills, and competencies associated with protecting and securing network infrastructures. You’ll delve into topics like firewalls, intrusion detection systems, and VPNs, gaining a deep understanding of how to defend against internal and external network threats. Activities will include comprehensive readings, video tutorials, interactive labs, and discussion boards where you can share insights and strategies with peers. By the end of the course, you will be able to design, implement, and manage robust network security solutions that effectively mitigate risks and ensure the integrity of network communications. You will demonstrate your learning by completing a network security audit, where you’ll assess the security posture of a network and propose enhancements to protect against potential vulnerabilities. -
Course
CYBR8540 - Defending Critical Infrastructure & Resilience (3 Credits)
- Offered in:
- Summer 27
offered in: Summer 26 ()offered in: Fall 26 ()offered in: Spring 27 ()offered in: Summer 27Course Description
How prepared are we to protect our most vital systems from cyber threats? In this fully asynchronous course, students will explore key knowledge, skills, and competencies associated with defending critical infrastructure and enhancing resilience against cyber attacks. You’ll delve into the unique challenges of securing essential services like energy, transportation, and healthcare, and learn strategies to build resilience in the face of disruptions. Activities will include targeted readings, expert-led video lectures, case studies on real-world incidents, and discussion boards that encourage collaboration on best practices for infrastructure defense. By the end of the course, you will be able to assess the vulnerabilities of critical infrastructure systems and develop comprehensive defense strategies that prioritize resilience and continuity. You will demonstrate your learning by completing a threat analysis and response plan, where you’ll evaluate a critical infrastructure sector and propose measures to enhance its security and resilience against cyber threats. -
offered in: Summer 26 ()offered in: Fall 26 ()offered in: Spring 27 ()offered in: Summer 27 ()
Course Description
How can organizations defend their industrial control systems and operational technology from cyber-physical threats? In this fully asynchronous, 7-week course, you will explore the unique world of operational technology (OT) — the hardware, software, and networks that run critical infrastructure from manufacturing lines to power grids. You’ll gain foundational knowledge of OT terminology, architectures, and components (PLCs, SCADA, historians, sensors/actuators), then dive into the protocols, network designs, and segmentation strategies that keep these environments running—and secure. Along the way, you’ll study real-world attack patterns (Stuxnet, Ukraine grid intrusions), learn to apply MITRE ATT&CK for ICS, and navigate the regulatory and compliance frameworks that govern the electric sector and other process-driven industries. -
Course
CYBR8513 - Cyber Warfare (3 Credits)
- Offered in:
offered in: Summer 26 ()offered in: Fall 26 ()offered in: Spring 27 ()offered in: Summer 27 ()Course Description
Are you prepared to face the next generation of cyber threats? In this fully asynchronous course, students will explore key knowledge, skills, and competencies associated with identifying and defending against emerging cyber threats and understanding the dynamics of cyber warfare. You’ll examine advanced persistent threats (APTs), state-sponsored attacks, and the latest trends in cyber weaponry, gaining insights into how these threats evolve and how to counter them effectively. Activities will include cutting-edge readings, video briefings on recent cyber warfare incidents, scenario-based exercises, and discussion boards that foster critical analysis of emerging threats and their implications for global security. By the end of the course, you will be able to assess the impact of emerging cyber threats, develop strategies to counteract sophisticated attacks, and understand the geopolitical factors that influence cyber warfare. You will demonstrate your learning by completing a strategic analysis report, where you’ll evaluate a recent case of cyber warfare, assess its broader implications, and propose strategies for mitigating future threats. -
offered in: Summer 26 ()offered in: Fall 26 ()offered in: Spring 27 ()offered in: Summer 27 ()
Course Description
How can organizations effectively manage cybercrime risks while ensuring compliance with regulations? In this fully asynchronous course, students will explore key knowledge, skills, and competencies associated with understanding cybercrime, managing associated risks, and ensuring compliance with relevant regulations and standards. You’ll investigate various types of cybercrime, risk management frameworks, and compliance requirements that impact organizational security. Activities will include detailed readings, video lectures on regulatory standards, risk assessment exercises, and discussion boards that facilitate collaborative analysis of compliance challenges and risk management strategies. By the end of the course, you will be able to identify and assess cybercrime risks, implement effective risk management practices, and ensure adherence to cybersecurity regulations and standards. You will demonstrate your learning by completing a risk and compliance assessment project, where you’ll evaluate an organization’s cybersecurity practices against regulatory requirements and propose measures to address any gaps. -
Course
CYBR8650 - Security Operations (3 Credits)
- Offered in:
- Summer 26
offered in: Summer 26offered in: Fall 26 ()offered in: Spring 27 ()offered in: Summer 27 ()Course Description
How do you maintain robust security operations in the face of constant threats? In this fully asynchronous course, students will explore key knowledge, skills, and competencies associated with the day-to-day management and operation of security systems. You’ll gain insights into security monitoring, incident response, threat hunting, and the use of Security Information and Event Management (SIEM) tools to safeguard organizations against cyber attacks. Activities will include detailed readings, hands-on lab simulations, video walkthroughs, and discussion boards where you can share and refine operational strategies with your peers. By the end of the course, you will be able to effectively manage security operations, detect and respond to incidents, and implement processes to continuously improve an organization’s security posture. You will demonstrate your learning by completing an incident response scenario, where you’ll lead a simulated security operations team through the identification, containment, and remediation of a cyber incident. -
Course
CYBR8610 - Security Technology Labs (3 Credits)
- Offered in:
- Summer 26
offered in: Summer 26offered in: Fall 26 ()offered in: Spring 27 ()offered in: Summer 27 ()Course Description
How can hands-on experience with security technologies enhance your cybersecurity skills? In this fully asynchronous course, students will explore key knowledge, skills, and competencies associated with using and managing a variety of security technologies through practical, lab-based exercises. You’ll gain hands-on experience with tools such as firewalls, intrusion detection systems, and vulnerability scanners, and learn how to apply these technologies in real-world scenarios. Activities will include interactive lab exercises, guided tutorials, and video demonstrations that provide practical experience with security technologies. Discussion boards will allow you to reflect on your lab experiences and share insights with peers. By the end of the course, you will be able to effectively configure, deploy, and manage security technologies to protect against and respond to cyber threats. You will demonstrate your learning by completing a series of lab assignments, where you’ll apply your knowledge to configure security tools, conduct vulnerability assessments, and respond to simulated security incidents. -
Course
CYBR86XX - Cyber Threat Intelligence (3 Credits)
- Offered in:
- Fall 26
offered in: Summer 26 ()offered in: Fall 26offered in: Spring 27 ()offered in: Summer 27 ()Course Description
How can understanding cyber threats before they strike help secure an organization? In this fully asynchronous course, students will explore key knowledge, skills, and competencies associated with the collection, analysis, and dissemination of cyber threat intelligence (CTI). You’ll delve into the methodologies for identifying threat actors, understanding their tactics, techniques, and procedures (TTPs), and developing actionable intelligence to preemptively protect digital assets. Activities will include specialized readings, video tutorials from CTI experts, interactive threat analysis exercises, and discussion boards to collaboratively evaluate emerging threats and intelligence strategies. By the end of the course, you will be able to conduct comprehensive threat intelligence analysis, develop threat profiles, and create intelligence reports that inform and enhance an organization’s security strategies. You will demonstrate your learning by completing a threat intelligence dossier, where you’ll analyze a specific cyber threat group, assess their potential impact on a chosen sector, and provide strategic recommendations for mitigating these threats. -
Course
CYBR89XX - Cybersecurity Practicum (3 Credits)
- Offered in:
- Fall 26 Spring 27 Summer 27
offered in: Summer 26 ()offered in: Fall 26offered in: Spring 27offered in: Summer 27Course Description
How can real-world experience bridge the gap between theory and practice in cybersecurity? In this fully asynchronous course, students will engage in a practical, hands-on experience designed to apply the knowledge and skills you’ve acquired throughout your cybersecurity program. You’ll work on real-world projects, collaborate with industry professionals, and address actual cybersecurity challenges to gain valuable insights and experience. Activities will include project-based assignments, mentorship sessions, and periodic check-ins with your practicum supervisor to ensure alignment with professional goals and academic requirements. Discussion boards will provide a platform to share experiences and receive feedback. By the end of the course, you will be able to demonstrate the ability to apply cybersecurity concepts and techniques in a professional setting, effectively manage security projects, and contribute to solving complex cybersecurity problems. You will demonstrate your learning by completing a comprehensive practicum report, where you’ll document your projects, reflect on your experiences, and evaluate the impact of your contributions within the context of the cybersecurity field.