Merry Christmas & Happy New Year!

Campus will close on December 18 for the holidays and will reopen on January 2.

Stop cyber attacks before they happen.

Attacks are plenty, but defenders are few. Protecting data in a technology-filled society is essential for running any business or organization, but too few individuals accept the challenge of ensuring the safety of private information. What we’re saying is, INFOSEC needs you! With a Master of Science in Information Systems Security from University of the Cumberlands, you will become an expert in information preservation and restoration. Because of your expertise, you will be set apart in the job market, guaranteeing the chance for success no matter where you go. From security analyst to systems manager, you will have your pick of careers.

Anchor: Stats
Anchor: Programs & Requirements
Programs & Requirements

Programs & Requirements

Master of Science in Information Systems Security

Our online MSISS program is intended for those who have earned their baccalaureate degree and already work in the information technology field. If you’re interested in continuing your education and enhancing your credentials, you’ll find that UC’s online information systems security degree program is built to help you achieve your goals. You’ll learn how to prevent or mitigate data loss by: 

  • Developing and implementing security policies 
  • Managing compliance with federal regulations for information security 
  • Creating disaster prevention and recovery plans 
  • Finding and preventing problems related to hardware, software, and networks 
  • Achieving availability, integrity, and confidentiality of information 
  • Implementing physical security measures to restrict access 
  • And much more!

The program is mapped directly to Department of Homeland Security (DHS) and National Security Agency (NSA) cyber security education standards. It also aligns with the (ISC)2 CISSP Common Body of Knowledge. CISSP (Certified Information Systems Security Professional) is an industry-leading professional certification for cyber security experts such as security practitioners, managers, and executives. Earning a Master of Science in Information Security Systems will equip you to take the CISSP certification exam. You’ll also graduate ready to pursue a new career path in INFOSEC or apply the latest information assurance and cyber security principles in your current role. 

University of the Cumberlands has been named a National Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency (NSA) and the Department of Homeland Security (DHS). There are just over 200 universities nationwide with CAE-CD designation, and only two other universities in Kentucky included in this elite group. 

Anchor: Mission & Goals

Mission and Goals

UC’s information security program strives for excellence in creating, applying, and imparting knowledge in IT through comprehensive educational programs, research, dissemination, and service to professional societies, communities, states, and the nation.

Knowledge to properly secure facilities, equipment and software.
Ability to create and implement a plan to provide for disaster prevention and recovery.
Practice using proper techniques for implementing security plans that ensure compliance with various laws.
Practice identifying and investigating breaches in compliance.
Confidence to address specific needs and challenges in the field of information security.

University of the Cumberlands has been named a National Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency (NSA) and the Department of Homeland Security (DHS). There are just over 200 universities nationwide with CAE-CD designation, and only two other universities in Kentucky included in this elite group.

Department of Homeland Security (DHS) & National Security Agency (NSA)
Anchor: Career Outcomes

Information Systems Security Careers & Outcomes

All stats from U.S. Bureau of Labor Statistics

Information Security Analyst: $102,600

Information Security Analyst: $102,600

Information security analysts analyze current security measures and plan, organize, and implement new security protocols. 

Computer and Information Systems Manager: $159,010

Computer and Information Systems Manager: $159,010

Computer and information systems managers lead teams of information systems personnel, organize projects, and direct teams for projects. 

IT Security Manager: $159,010

IT Security Manager: $159,010

IT security managers lead teams of information security personnel, organize projects, and direct teams for cyber security projects. 

Database Administrator: $101,000

Database Administrator: $101,000

Database administrators create, maintain, optimize, and secure databases to hold data for an organization. 

Network and Computer Systems Administrator: $80,600

Network and Computer Systems Administrator: $80,600

Network and computer systems administrators are responsible for the daily operations of all network and computer systems under their direction.  

Computer Network Architect: $120,520

Computer Network Architect: $120,520

Computer network architects design and build networks for communications. These may include LANs, WANs, and Intranets.

Anchor: FAQs

Common Questions

A master’s in information systems security is a graduate degree that focuses on protecting data and information systems from cyber threats. It covers topics such as data protection, risk management, and compliance with security laws. Graduates are trained to prevent, detect, and respond to information security incidents.

A master’s in information systems security typically takes about two years to complete. This duration can vary depending on whether the program is pursued full-time or part-time.

Yes, you can get a master’s in information systems security online. Many universities offer flexible online programs that allow you to complete your degree remotely while balancing work and other commitments.

A master’s in information systems security is worth it for those looking to advance their careers in the growing field of cybersecurity. Graduates often find well-paying jobs and have strong job security due to the increasing demand for skilled information security professionals.

With a master’s in information systems security, you can pursue various career paths such as information security analyst, IT security manager, computer and information systems manager, database administrator, network and computer systems administrator, and computer network architect.

A master’s in information security is closely related to cybersecurity but focuses more on protecting data and information systems specifically. Cybersecurity is a broader field that encompasses protecting all aspects of the digital world, including networks, systems, and data from various types of cyber threats.

The Master of Science in Information Security at University of the Cumberlands focuses on information security challenges relating to mitigating the risk of loss or disclosure of data. With the combination of the ubiquitous nature of electronic information and the associated security risks, the field of information security has become a critical need for every organization. The graduate degree in cybersecurity is comprised of the following the following Program Goals and Program Level Outcomes (PLOs):

  • PLO 1.1. Students manage access controls using best practices and technologies to help secure the network.   (ISOL 531 Access Control)
  • PLO 1.2. Students secure an application by applying proper security methods and parameters. (ISOL 534  Application Security)
  • PLO 1.3. Students apply cryptography techniques to secure data. (ISOL 535 – Cryptography)
  • PLO 1.4. Students recommend security strategies to minimize operational attacks. (ISOL 631 Operations Security)
  • PLO 1.5. Students provide action plans and recommendations to secure a facility. (ISOL 634 Physical Security)
  • PLO 2.1. Students justify techniques for securing networks to minimize operational impacts when cyber-attacks occur.  (ISOL 532 Telecommunications and Network Security)
  • PLO 2.2. Students evaluate an organization’s infrastructure to prevent future security attacks. (ISOL 536 – Security Architecture and Design)
  • PLO 2.3. Students examine risk management strategies for protecting assets. (ISOL 533 Information Security and Risk Management)
  • PLO 2.4. Students develop a comprehensive plan to reduce the risks of a loss of business continuity. (ISOL 632 Business Continuity Planning and Disaster Recovery Planning)
  • PLO 3.1. Students determine which laws apply to different types of business environments. (ISOL 633 Legal Regulations, Compliance, and Investigations)
  • PLO 4.1. Students clearly assess IS security needs for an organization. (ISOL 699 Information Security Project)
Anchor: Faculty

Faculty Experts

Get to know more about your future INFOSEC professors.

Dr. Raed Sbeit

Dr. Raed Sbeit

Associate Professor
School of Computer Information Sciences
Information Systems Security

Dr. Raed Sbeit

Contact Information

raed.sbeit [at] ucumberlands.edu

Request Information

Wondering if a master's in information systems security is for you? We're ready to help by answering your questions, whatever they may be!

Loading...