Close up of padlock icon on circuitboard

STUDY CYBERSECURITY IN THE USA

Why Study Cybersecurity?

Cybersecurity programs combine information technology, security infrastructure design, and risk assessment to form one of the fastest-growing fields of the 21st Century. Cybersecurity graduates can go on to work for companies, governments or consult across many industries.

  • Intakes
    Undergraduate: Fall, Winter, & Spring
    Graduate: Fall, Winter, Spring, Summer
  • Length
    Undergraduate: 4 years
    Graduate: 2 years

Check our academic and English language entry requirements

Visit the Fees page for full details.

Reasons to Study Cybersecurity at DePaul

Cybersecurity is taught in the Jarvis College of Computing and Digital Media’s (CDM) School of Computing, located in Central Chicago. This area is also known as the Loop, where may global corporations have established their headquarters. This makes it the perfect place to build a network with those working in the field and reach out for work experience.

Employability within Cybersecurity is high, with 94% of Bachelor’s graduates and 94% of Master’s graduates of the School of Computing employed, continuing education or not seeking employment within six months of education. Master's graduates reported a median salary of $87,500 (2023 data).

Degrees and Courses

Choose from a range of programs to suit your interests and develop your career in your chosen direction.

SAMPLE COURSES

  • Applied Networks and Security
  • Computer Forensic and Incident Response
  • Cryptology
  • Data Structures
  • Database Systems
  • Discrete Mathematics
  • Finance for Non-Business Majors
  • Information Systems Security Engineering
  • Legal, Ethical and Social Issues in Information Security
  • Network Interconnection Technologies
  • Python for Programmers
  • Telecommunication and Network Security Practicum

International students may earn their Cybersecurity MS from DePaul University with a concentration in Networking and Infrastructure, Computer Security, or Governance, Risk Management, and Compliance.

SAMPLE COURSES

Computer Security concentration

  • Computer Security
  • Cryptology
  • Data Structures
  • Digital Forensic Techniques
  • Discrete Structures for Computer Science
  • Information Security Management
  • Introduction to Programming
  • Network Security
  • Object-Oriented Software Development
  • Software Security Architecture
  • Systems

Governance, Risk Management and Compliance concentration

  • Computer Networks and Data Systems
  • Digital Forensic Techniques
  • Governance Policies in Information Assurance
  • Introduction to Computer and Network Systems
  • Introduction to Lan Technologies
  • Introduction to Host Security
  • IT Auditing
  • Network Fundamentals

Networking and Infrastructure concentration

  • Computer Networks and Data Systems
  • Digital Forensic Techniques
  • Enterprise Security Infrastructure Controls and Regulatory Compliance
  • Governance Policies in Information Assurance
  • Introduction to Computer and Network Systems
  • Introduction to Host Security
  • Introduction to Lan Technologies
  • Information in Security Management
  • Network Fundamentals
  • Network Security
  • Security Testing and Assessment