MSIA 672: Managing a Secure Enterprise
Enterprise and physical security, disaster recovery planning and business continuity planning as part of designing and managing a secure enterprise.
Cyberattacks are an inevitable part of the modern world — luckily, we know how to handle them. If you’re interested in developing your cybersecurity skills, there’s never been a better time. Businesses are investing billions of dollars in information technology, meaning cybersecurity experts are more employable and in demand than ever before.
At Regis, you’ll have the opportunity to learn from the best in the business. Our experienced faculty are excited to share their knowledge of information and cyber security with you, helping you gain skills in network and computer forensics, offensive cybersecurity, malware analysis and response, and enterprise-level information assurance. Course work is integrated with hands-on simulations and experiential learning, preparing you for industry exams such as (ISC)2, Cisco, ISACA, CISSP and more.
As a nationally-ranked university, Regis has been designated a National Center of Academic Excellence in Cyber Defense by the National Security Agency (NSA) and the Department of Homeland Security (DHS). In 2018, Regis received a U.S. government grant of nearly $1 million to focus on cybersecurity and develop an innovative curriculum that has since been applied across the country.
Know what you're looking for? This is for you:
Merit Scholarship AvailableEvery new, eligible M.S. in Information and Cyber Security student starting at Regis University will receive a Dean’s Scholarship of up to $12,000 for online students or $13,200 for full-time, on-campus students. Learn more and see eligibility requirements here. |
Program Format
Online courses
8-week terms
Time Commitment
12-36 months
Start Dates
January, March, May, July, August and October
Program Format
Full-time, on campus
8-week terms
Time Commitment
12-36 months
Start Dates
January and August
Information Security Analysts are responsible for the management of all computer networks to prevent security breaches, implementing security features and investigating all cyber security incidents.
Develop recovery plans for disaster situations, create and enforce company-wide security standards and protect sensitive company information through the use and implementation of security measures.
Detect and investigate compromised networks that have been accessed maliciously and determine the origin and scope of the attack to prevent future intrusions.
Risk Management Specialists are involved in all elements of a company's business processes and provide insights and expertise on minimizing technological risk.
Informations Systems Managers oversee all aspects of information technology in a company or organization and plan the installation of new software and maintenance of all technology with security in mind.
Analyze and evaluate the security infrastructure of a company's information technology architecture, and provide recommendations to avoid security breaches and data loss.
Name: Sara Monares
Class: 2023
Title: Systems Integration and Verification Engineer
Hometown: Longmont, CO
“Every professor I’ve had has a passion for computer science and cybersecurity.”
Name: Robert Bowles
Title: Director, Center for Information Assurance Studies
Hometown: Conway, SC
*Bureau of Labor Statistics, information security analyst, 2023
Start with a certificate program and see what you think. Check out our Graduate Certificate in Cybersecurity to get started. Or, see how all classes in our Graduate Certificate in Cybersecurity Essentials program can be applied to the M.S. in Information and Cybersecurity. This allows you to divide your master's course work into manageable chunks while completing a certificate credential in the meantime.
Enterprise and physical security, disaster recovery planning and business continuity planning as part of designing and managing a secure enterprise.
Hands-on tactics used by cyber defense professionals such as reconnaissance, hijacking, vulnerability exploitation and malware deployment.
Current security standards and best practices as part of the basic Information Assurance (IA) model examining the security of the database, the application and the system.
To apply to the M.S. in Information and Cyber Security program, you will need:
Real people. Really invested in you. Contact your admissions counselor today and learn how we help you each step of the way.
Tuition for the 2024-2025 academic year: $976 per credit hour
Total program credits: 36
Tuition is one part of the overall cost of attendance, which includes all expenses students may have, including basic living costs. For more information about tuition, fees and your estimated cost of attendance, visit our Cost of Attendance for Adult Undergraduates and Graduate Students page. Tuition and fees are subject to change.
Earning your Master of Science in Information and Cyber Security sets you apart and expands your professional network — think of it as an investment in your future. Between scholarship opportunities and financial aid packages, advancing your education is within reach. Explore our Investing in Your Future graduate financing guide or visit our Office of Financial Aid on the web.
Want to learn more? Here's something for you:
The M.S. Information and Cyber Security is offered by the Computer Science and Information Systems Department within the Anderson College of Business and Computing.