Cybersecurity Studies

Online Master of Science in Cybersecurity Studies (MS)

Save @ APU

$0 Application Fee
$0 Transfer Credit Evaluation

0 Entrance Exams
No GRE/GMAT Required

About Our Cybersecurity Master's Program

The online cybersecurity master's degree at American Public University provides you with an advanced understanding of large-scale cyber threats and cyber attack prevention, detection, and response. Build on your foundation in network security, cloud security, information assurance, risk management, information technology, cybercrime, and digital forensics with a master of science in cybersecurity studies.

Become familiar with the issues, policies, practices, and perspectives of various sectors, agencies, and disciplines, such as national security, intelligence, criminal justice, and emergency management through this master of science in cybersecurity studies. Expand your understanding of how cyberthreats impact human behaviors, public confidence, stock markets, economic sectors, and critical infrastructures.

What You Will Do in our Online Master's in Cybersecurity

  1. Understand emerging computer security theats and cybersecurity challenges arising from both external attackers and insider threats
  2. Study the legal, social, regulatory, ethical, and technical issues related to securing information systems and national critical infrastructures
  3. Comprehend interdisciplinary policies, practices, perspectives, and products required to address the cyber threats to information systems and critical infrastructures
  4. Master the fundamental skills involved with vulnerability assessment, risk mitigation, auditing, and certification of information systems and critical infrastructures

View Program Outcome Assessment Results

Degree at a Glance

Number of Credits
36
Cost Per Credit
$455 | $250*
$386.75** | $409.50***
Courses Start Monthly
Online
  • Want to Learn More?

    Contact student support if you're a current student and need assistance.

    Step One: Introduce Yourself
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here

Program Requirements Printable Catalog Version

Must take all courses for this section.

Course ID: 4562

|
A healthy cyberinfrastructure is the foundation of emergency and disaster management. It provides emergency and disaster management agencies the ability to effectively address and respond to natural disasters, terrorist attacks, and law enforcement issues. Technology has leveled the global playing field, and the impact on the cyberinfrastructure must be assessed among all relevant communities. This means implementing cybersecurity awareness into all levels of emergency and disaster management through: knowledge management, task behavior, dissemination of information, cyberinfrastructure impact awareness, communication, and deterrence. Students will be exposed to planning, management, response, and recovery factors related to cyberinfrastructure, as well as analyze economic, social, and technical aspects of cybersecurity associated with public emergencies and disasters.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 4522

|
This course introduces students to risk management components including plans and strategies to mitigate risk. Students in this course will examine the role of risk management at the strategic and enterprise levels in the prevention of loss and mitigation of consequences through risk identification and control. This course will allow students to develop and apply risk management techniques to include selection of risk management measures and implementation of those measures.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 4528

|
This course provides a comprehensive introduction to the cyber intelligence field and is intended to equip students with the essential knowledge and skills often needed to navigate the complex world of cyber threats, vulnerabilities, and risks. Students will explore the full range of cyber capabilities from exploitation to defense, including several case studies that demonstrate the challenges and benefits of cyber intelligence operations. Through discussion forums and a research project, students will gain a deeper understanding of the role cyber intelligence plays in national security and the protection of critical infrastructures.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 3860

|
This course examines information concealment techniques, technologies, hardware, software, and relevant legislation for cyber forensics to reveal and track legal and illegal activity. The course examines the process for investigation and introduces the tools and procedures required to legally seize and forensically evaluate a suspect machine. Also covered are the rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities, and revealing concealed information using cyber forensics.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 4099

|
The global reach of the Internet, the low cost of online activity, and the relative anonymity of users has led to an increase in computer related crimes. This course focuses on cybercrime investigation and prevention; it appraises the legal issues related to on-line criminal conduct, the collection of electronic evidence, and the onslaught of new technology. This course also analyzes the phases, processes, and challenges of cybercrime investigations, and it examines technical, legal, and social issues relating to the search and seizure of digital evidence and computer forensics. Students will encounter the challenges of the latency between technology and the law.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 3871

|
Telecommunications networks are a critical component of the global economic and social infrastructures. Securing critical infrastructure is an established priority within Information Security Management. This course examines the field of secure telecommunications networks, including emerging threats, system vulnerability, network evolution, and network defense mechanisms.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 3872

|
This course examines the tenets of Intrusion Detection, Intrusion Prevention, and Incident Handling. Intrusion Detection focuses on the methods to detect attempts (attacks or intrusions) to compromise the confidentiality, integrity or availability of an information system. Also included is an analysis of the principles and practices of intrusion detection, intrusion prevention, and incident handling; network-based, host-based, and hybrid intrusion detection; identifying attack patterns; deployment of resources and responses to handle the incident, surveillance, damage assessment, risk assessment, data forensics, data mining, attack tracing, system recovery, and continuity of operation.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 3873

|
The course analyzes computer and systems security measures by examining a model for information assurance; it also examines the components of a comprehensive Information Assurance plan. Topics included are: asset identification, human factors, compliance with regulations, personnel security, risk assessment and ethical considerations, IA policy, as well as computer and network security tools.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 4095

|
This course focuses on the research methods, tools, instruments, and devices used in Information Sciences and Information Technology; it appraises the logic of the scientific method, research design, qualitative and quantitative analysis of data for the purpose of conducting and reporting basic research in a scholarly and academic setting. Through concentration-based case studies, it investigates current trends, legal and ethical issues, global and societal impact, policies, and applications in the fields of information technology, information security, cyberlaw, digital forensics, and media management. This course evaluates methods to collect, classify, categorize, evaluate, assess, and report research data, to formulate valid research questions, and to derive logical conclusions. The principles, practices, tools, and methodologies presented in this course are applicable throughout the program of graduate studies.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 4490

|
This course focuses on the ways that law, ethics and cybersecurity overlap and intersect. Besides laws related to cybersecurity, the course examines laws related to intellectual property, civil litigation, criminal prosecutions, and privacy. This examination will provide the means to identify and analyze the policies reflected in those laws. Those policies could guide the creation of policies on a business-level, using qualitative risk assessment and planning. An exploration of ethics and cybersecurity, as well as of workplace ethics, will involve the use of an ethical framework.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 4514

|
This course will provide an overview of current cyber policy and strategy for non-practitioners in a national security framework. Students will study the cyber threat environment; laws and policies that govern cyber security; current and historical structure, functions, and capabilities of private and governmental agencies comprising the cyber community; and future trends that affect national security
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
Select any courses that have not been used to fulfill major requirements. Credits applied toward a minor or certificate in an unrelated field may be used to fulfill elective credit for the major.

Choose 3 credit hours from this section.

Course ID: 4935

|
This Cybersecurity Studies: Capstone Practical course integrates the knowledge, skills, and posture acquired in the program courses. This course is the capstone course of studies completed toward the graduate degree in Cybersecurity Studies. This course will only be offered in 16-week sessions. Students will complete an applied project design that demonstrates mastery and application of advanced research and analytic skills related to the learning outcomes of this degree program. This course may not be taken until all other courses are COMPLETED and student has a 3.0 GPA.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 04/27/25 Winter 2025 Session A 16 Week session
08/26/24 - 01/31/25 02/03/25 - 05/25/25 Winter 2025 Session K 16 Week session
09/30/24 - 02/28/25 03/03/25 - 06/22/25 Winter 2025 Session C 16 Week session
10/28/24 - 04/04/25 04/07/25 - 07/27/25 Spring 2025 Session A 16 Week session
11/28/24 - 05/02/25 05/05/25 - 08/24/25 Spring 2025 Session K 16 Week session

Course ID: 4564

|
This Master’s degree capstone course in Cybersecurity Studies is an integrative, multi-disciplinary course that applies the knowledge, skills, and attitudes obtained in the core courses. NOTE: This course may not be taken until all other courses are COMPLETED and student has a 3.0 GPA. THIS COURSE IS 16 WEEKS.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 04/27/25 Winter 2025 Session A 16 Week session
08/26/24 - 01/31/25 02/03/25 - 05/25/25 Winter 2025 Session K 16 Week session
09/30/24 - 02/28/25 03/03/25 - 06/22/25 Winter 2025 Session C 16 Week session
10/28/24 - 04/04/25 04/07/25 - 07/27/25 Spring 2025 Session A 16 Week session
11/28/24 - 05/02/25 05/05/25 - 08/24/25 Spring 2025 Session K 16 Week session

Frequently Asked Questions

Why Pursue a Master of Science in Cybersecurity?

A cybersecurity graduate program expands your expertise in a dynamic field where you can solve challenges that make a real difference. According to the 2023 ISC2 Cybersecurity Workforce Study, 70% of cybersecurity professionals report being very or somewhat satisfied with their job, with 73% noting that they have a passion for the discipline. 

Thriving in the science of cybersecurity means being a lifelong learner to stay ahead of the latest means of attack. Information technology is constantly evolving, and these changes result in hackers and other bad actors shifting their tactics for infiltrating and disrupting systems. Through core courses and in-depth discussions with cybersecurity and network security professionals, you’ll gain a deeper understanding of how to proactively build strategies that fortify against hazards. 

My education with American Public University has given me fresh perspective, has given me hope. I see myself making a difference to the world.
Bryan Mogaru
Cybersecurity graduate
Hear from American Public University program alumnus and senior cybersecurity engineer Armando Guerrero about protecting the vulnerable from cyberattacks.

The Growing Cybersecurity Field

The recent PwC Global Economic Crime and Fraud Survey found cybercrime reported as the largest threat across organizations of all sizes. This spike in cyber threats is driving a surge in investment in risk management tools as well as an increase in demand for cybersecurity talent. 

According to Gartner, Inc., global spending on security and risk management is expected to reach $215 billion in 2024. Meanwhile, the Bureau of Labor Statistics reports information security analyst employment is expected to increase 32 percent between 2022-2032. 

Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, [career information accessed January 2024] https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm Employment conditions in your area may vary. 

 

Skills for Cybersecurity Advancement

Savvy cyber professionals continually hone their skills to adapt to ever-changing threats. Here are some of the areas of knowledge typically considered desirable in the cybersecurity field: 

  • Cloud security: The nature of cloud security and the cyber operations needed to secure a cloud environment differ from traditional network environments. 
  • Application security: Developers often forgo security when building new applications but including these features from the start helps prevent future breaches. 
  • Threat analysis: As cyber threats become more sophisticated, professionals need to become adept at assessing risk and using threat intelligence tools
  • Penetration testing: A type of ethical hacking, penetration testing involves professionals working to breach their organization’s infrastructure to help their organization understand and address existing security gaps.
  • Compliance management: More data privacy regulations are being passed, and security professionals need to ensure their organization complies with the latest rules.

 

What You Will Gain in our Cybersecurity Master's Degree Program

Graduate students in our cybersecurity degree program will acquire:

  • A broad view of how cybersecurity is applied across different sectors
  • A greater understanding of cybersecurity specialties such as cyber intelligence 
  • Technical and policy skills as well as soft skills like communication
  • Academic and professional development support from experienced faculty
My master’s degree really helped me to look at things a little bit differently. It’s increased my critical thinking skills and really helped take my career to the next level.
Aaron Brodniak
Master's degree program alum

Digital Forensics Helps Crack Cold Cases

The prevalence of technology like GPS-enabled devices and IP cameras has changed the way crimes are solved. Digital forensics professionals analyze countless pieces of disparate data to piece together a story. Digital forensics isn’t just used to solve cyber crime. It also has become a key part of evidence in all types of criminal cases. Cases in point:

  • Meta data on a disk helped investigators discover the identity of the BTK serial killer who had eluded police for decades. 
  • GPS data from the phones of three suspects accused of murdering a man named Jahseh Onfroy placed the suspects at the crime scene.
  • Incriminating Google search data from the iPad of a suspect proved to be crucial evidence in the case of murder suspect Brian Walshe.
  • Digital forensics tools helped the Pasadena homicide department access a locked cellphone to provide crucial data in a cold case murder.
cybersecurity

Why Earn your Cybersecurity Master's Degree at American Public University?

  • Join a university known for academic excellenceAmerican Public University is part of American Public University System, which is  accredited by the Higher Learning Commission (hlcommission.org), an institutional accreditation agency recognized by the U.S. Department of Education. This accreditation demonstrates our focus on providing academic excellence. Also, the National Security Agency has recognized American Public University System as a National Center of Academic Excellence in Cyber Defense, a distinction held by select universities.
  • Earn your cybersecurity degree in an affordable way. American Public University features low tuition cost, no-cost applications, no-cost transfer evaluations, and low- or no-cost ebooks, providing a very cost-effective means to get your master’s degree in cybersecurity.
  • Get a strong return on your investment. The American Public University System has ranked as one of the top universities for return on educational investment.*
  • Access personalized career services. As you near completion of your graduate degree program, you have one full year of access to one-on-one career and life coaching through LifeRamp’s coaching app.
  • Expansive student organizations. Students often mistakenly believe they’ll miss out on a rich student experience with an online program. At American Public University, you can build your community through all kinds of student clubs, from honor societies to faith-based organizations, social clubs, and more.

* Georgetown University Center on Education and the Workforce report,  Ranking 4,500 Colleges by ROI (2022), based on a 20-year return on investment, or net present value.

Why Earn Your Master’s in Cybersecurity Online?

Named a top online university for working adults by ZDNET, American Public University offers many 100% online master’s degree programs. Take advantage of rolling admissions and monthly class starts for this fully online program. Designed for busy professionals, the cybersecurity master’s degree program offers the flexibility to sign in anytime to complete your weekly assignments. 

With access to a vast network of fellow students and faculty across the country working in cybersecurity and computer science, you’ll benefit from diverse perspectives to build your knowledge base and your professional network. 

 

Faculty Highlights

Holding terminal degrees in their field, program faculty are highly experienced professionals leading cybersecurity efforts at government agencies and in the private sector. Many are known for their contributions to the cybersecurity field. Our faculty members have served as chief compliance officers, chief information security officers, chief technology officers, cybersecurity consultants, data scientists, cybersecurity planners, and security directors at major brands as well as government agencies. In addition to teaching courses, they are passionate about serving as graduate advisors to students looking to excel in the cybersecurity realm.

Thriving in cybersecurity courses means having the analytical curiosity to solve problems, the technical skills to employ security tools, and the leadership skills to marshal resources to safeguard your organization. Our faculty don’t just bring the theory of cybersecurity. They’re at the forefront of their field and help students to acquire the real-world knowledge to crack down on cyber threats.
Andre Slonopas
PhD, CISA, CISM, CISSP, PMP, Department Chair and Faculty Member, Cybersecurity Department

Understanding Tuition and Financial Aid for your Master of Science Degree

Our goal is to help you earn your online master’s degree in the most cost-effective way possible. That’s why we connect you with many resources to help pay for school, such as:

 



 

Frequently Asked Questions

Although some people with a master’s degree in computer science go on to work in cybersecurity, earning a cybersecurity master’s degree is best to help prepare you for the rigors of this ever-shifting field.

It’s common for those leading cybersecurity efforts, including chief information security officers, to have cybersecurity master’s degrees. The master’s degree program looks beyond the technical elements of cybersecurity, touching on ethics, legal policies, national security, and risk management. To that end, graduates gain knowledge in the managerial aspects of cybersecurity.

Cybersecurity graduate programs offer a depth of knowledge in evolving areas such as cloud security, incident response, and network forensics. This prepares you not only for what’s occurring in cybersecurity today but how to respond to increasingly sophisticated threats. Graduate-level cybersecurity courses also offer the opportunity to make valuable connections with fellow students working across the field as well as faculty who bring their real-world experiences to your learning. 

You should consider your personal and professional goals when choosing between the two options. An MBA is not as specialized and could be used across different fields, whereas a cybersecurity master's degree is more concentrated, building knowledge and skills specific to information security and the mitigation of cyberthreats. 

Cybersecurity appeals to many people looking for an opportunity to make a difference and be continually challenged with new security situations. Additionally, many career sites show it’s common for cybersecurity roles to have flexibility to work from home. 

It’s likely anyone with a keen interest in technology as well as a knack for problem solving can excel in the cyber security world. It does require attention to detail and the discipline to continually learn to combat new cyber threats. 

All American Public University graduate studies require completion of a bachelor’s degree at an accredited university. Learn more about additional admission requirements

Although deep information technology (IT) knowledge isn’t required to enroll in our cybersecurity graduate program, having fundamental skills in IT is a helpful basis when pursuing a cybersecurity degree.  

Yes, we gladly welcome international students. If your bachelor's degree transcripts are from a university outside the U.S., you will need to submit them to be evaluated for U.S. equivalence. Learn more about admissions requirements for international students. 

Courses Start Monthly

Next Courses Start Jan 6
Register by Jan 3

Admission Requirements

All master's degree and graduate certificate programs require a bachelor’s degree (or higher) from an institution whose accreditation is recognized by the Council for Higher Education Accreditation (CHEA).

In order to be considered for the M.S. in Cybersecurity program, students should meet one of three admission requirement options.

Option A 
The student must have earned:

  • An undergraduate IT degree or a degree in a closely related field
  • One of the University’s IT-related certificates
  • An IT-related minor or concentration during an undergraduate program
  • 9 credits in cybersecurity, information technology, or other closely related courses

Option B 
The student must have acquired at least one of these IT or cybersecurity certifications:

  • CompTIA Security
  • CompTIA Network+® 
  • CompTIA A+® 
  • CompTIA Project+® 
  • CompTIA CySA+® 
  • CISSP® 
  • SSCP®
  • CEH (Certified Ethical Hacker)®
  • Cisco CCNA® Security

A student can also have earned a valid and current Project Management Professional (PMP) certification from the Project Management Institute.

Option C
The student must have acquired demonstrable knowledge acquired from another source, such as:

  • A combination of closely related field and relevant work experience in the industry of at least two years  
  • A completion of closely related education or certification (not listed in option A or B) coupled with relevant work experience

Important Notes

  • If the IT-specific requirements are not noted in the official bachelor's or master's transcript, you must provide official copies of your undergraduate transcripts that show the appropriate coursework.
  • The verification of the two years of work experience needs to be sent to the university via a formal resume or CV.
  • Preadmission courses must have been completed within the last 5 years and at the undergraduate level must be graded C or better; B or better at the graduate level. 

CEH® and Certified Ethical Hacker® are registered trademarks of EC-Council.
CompTIA Security+®, CompTIA Network+®, CompTIA A+®, CompTIA Project+®, and CompTIA CySA+® are all registered trademarks of the Computer Technology Industry Association, Inc.
CISSP® and SSCP® are registered trademarks of International Information Systems Security Certification Consortium, Inc.
CCNA® is a registered trademark of Cisco Technology, Inc.  

Please visit our graduate admission page for more information on institutional admission requirements.

Need help?
If you have questions regarding a program’s admission requirements, please contact an Admissions Coach at 877-755-2787 or [email protected].

Materials Cost

Most courses in this program use Open Educational Resources (OER). These teaching, learning, and research materials are made available to you at no cost, meaning there are minimal book costs associated with earning this degree.

Technology fee: $85 per course

Need Help?

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an APU admissions coach at 877-755-2787 or [email protected].

Quality Education Should Be Affordable

So you can focus on the opportunities ahead, without the financial burden of more expensive schools who are not as invested in your success. Learn more about paying for school.

Consumer Information

Disclosures

Maryland Residents learn more about costs, completion rates, median debt, and more.

 

1The University reserves the right to accept or deny credits according to policies outlined on our University website. Please see the University's transfer credit policy webpage for complete information.

*Cost Per Credit Hour

The Preferred Military Rate is $250 per credit hour for undergraduate and master's-level courses. This rate is available to all U.S. active-duty servicemembers, National Guard members, Reservists, and military families, including parents, spouses, legal partners, siblings, and dependents.

See all military student benefits.

Cost of Attendance

Learn more about American Public University's cost components and full cost of attendance