About the Program
Become a cybersecurity leader with expertise in strategy, governance, and hands-on security operations.
RSUโs Master of Science in Cybersecurity Policy, Governance and Training equips you to manage risk, lead cyber teams, and communicate effectively across business and IT. In just 12 months, youโll complete 30 credit hours fully online in eight-week terms, gaining practical experience in securing systems and developing proactive cybersecurity strategies.
This STEM-designated program blends technical know-how with leadership skillsโideal for professionals looking to step into or advance in high-demand cybersecurity roles. You’ll cover risk management, policy creation, legal frameworks, cyber operations, and enterprise training program design, all with real-world applications and live simulations.
Program Features
- 100% online, accelerated 12-month format
- STEM-designated program with real-world simulations
- Training for cybersecurity operations, risk management, and enterprise governance
- Aligned with industry demand and advanced career pathways
Strong foundation for doctoral studies or teaching
Program Snapshot
Program Type
Masterโs Degree
Degree Type
Master of Science
Department
Duration
12 months
Program Location
Claremore, Online (Full), Online (Hybrid)
Credit Hours
30
Why RSU?
Experience our student-first approach in any of Rogers State Universityโs degree programs. Attentive faculty and an average student-to-faculty ratio of 16:1 position you to succeed academically and professionally.
Our cybersecurity curriculum is based on the Committee on National Security Systems National Training Standard and Department of Homeland Security Essential Body of Knowledge for IT Securityโmeaning that youโll receive cybersecurity training thatโs recognized for meeting the highest standards for excellence in national and homeland defense.
What is cybersecurity without the latest methods and software to prevent, fight, and resolve issues caused by cyberattacks? RSUโs cybersecurity program gives you access to the state-of-the-art hardware and software professionals use every day.
When you study cybersecurity at RSU, youโll be prepared for a broad range of jobs in cybersecurity and network administration, as well as for graduate education in cybersecurity or a related field. The expert cybersecurity training youโll receive here will set you apart from every candidate.

Fast Facts
16:1
student-to-faculty ratio
99%
small classes, with some labs even limited to 15 students
80%+
of students who apply for financial aid receive it
Master of Science in Cybersecurity Policy, Governance and Training
DEGREE REQUIREMENTS
The course rotation is set for this program, offering two courses every eight weeks for 12 months. You may start your program of study at any of these convenient โon and off rampsโ throughout the academic year.
EDUT 5113 – Security Policies and Training Plans – 3 Credit Hour(s)
This course offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. It presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this course allows security officers, auditors, and risk leaders to implement sets of security policies and frameworks.
EDUT 5223 – Managing Risk and Training in Information Systems – 3 Credit Hour(s)
This course is a comprehensive overview of risk management and its implications on IT infrastructures and compliance. Students will address risk across entire information systems, including data, people, processes, and technology. The course incorporates hands-on activities to walk the student through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk. As an applied learning course with live virtual machines and real software, students will learn and practice the foundational information security skills they will need to excel in their future careers.
IT 5012 – Access Control and Identity Management – 3 Credit Hour(s)
This course will define the components of access control, provide a business framework for implementation, and present legal requirements that impact access control programs. It focuses on identity and security management, reviewing the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them by providing procedures on implementing access control systems as well as managing and testing those systems.
IT 5033 – Cyberwarfare: Operations and Organizational Security – 3 Credit Hour(s)
This course addresses the role of cyberwarfare in modern operations. Students will discuss the history of cyberwarfare and the variety of new concerns its emergence has fostered from tactical considerations to the law of armed conflict and protections. The rise of the advanced persistent threat has changed the face of cyberwarfare, and planners must now be conscious of a series of cyberwarfare actions and the concept of defense-in-depth. As an applied learning course, it provides immersive mock IT infrastructures where students will learn and practice cybersecurity skills.
MGMT 5243 – Enterprise Resource Mgmt Systems – 3 Credit Hour(s)
Strategic management of technology and information systems in the business environment. Includes challenges in innovation and change management with a strategic focus on enterprise systems.
TECH 5443 – Data and Information Management – 3 Credit Hour(s)
A study of data structures and database applications in business processes. Students will create a variety of database queries, develop custom database views and functions, and build and execute stored procedures.
TECH 5533 – Artificial Intelligence for Business – 3 Credit Hour(s)
An exploration of artificial intelligence applied to business processes. Students will build machine learning models utilizing modern programming languages and embed those models in database applications.
BADM 5143 – Business Analytics I – 3 Credit Hour(s)
Examines the extraction and utilization of management and logistics data to produce automated analytical reports applying current database and reporting technologies.
EDUT 5333 – Legal, Privacy, & Training Issues in Information Security – 3 Credit Hour(s)
This course addresses the complex relationship between the law and the practice of information security. Students will address Information systems security and legal compliance required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike. Students will also build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. As an applied learning course, it provides a fully immersive mock IT infrastructure with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers.
IT 5023 – Information Security Management – 3 Credit Hour(s)
This course provides students with a fully immersive mock IT infrastructure with live virtual machines and real software. It covers operations-the job of day-to-day cybersecurity tasks-regulations, compliance, laws and policies, research and development, and the creation of software and cyber defenses for security training initiatives.

Graduates are well prepared for roles such as:
- Cybersecurity Analyst
- Information Security Manager
- Risk & Compliance Officer
- Digital Forensics Analyst
- IT Project Manager
- Security Training Specialist
- Cybersecurity Analyst
- Digital Forensics Analyst
- Information Security Manager
- IT Project Manager
- Risk & Compliance Officer
- Security Training Specialist
Working in Cybersecurity
Information Security Manager
typically make
$120k /yr
Cybersecurity Analyst
typically make
$95k /yr
Digital Forensics Analyst
typically make
$85k /yr
Next Steps

Schedule a Visit
See our beautiful campus for yourself and experience firsthand what life is like when you can proudly call yourself a Hillcat.

Start Your Application
Learn the steps to apply and check out admission requirements.

Talk to Admissions
Our Admissions team is here to help you with questions about applying, getting admitted, and applying for financial aid.
Get more info
Help us get to know you! Fill out the form to receive more information about Rogers State University.
By clicking Submit, I agree to receive university reminders and updates by the method specified above.