Niagara’s ISDF program equips students to manage and react to cybersecurity threats that have presented challenges across all industries. Students will be trained in brand new, state-of-the-art computer labs, allowing them to gain skills that can be used in professional areas such as computer and mobile forensics, network security, defensive security, and data privacy. The program is appropriate for students of many backgrounds, including computer and information sciences, business, criminal justice, accounting, and healthcare. For those who are interested, this program will provide the knowledge necessary to obtain the Certified Information Systems Security Management Professionals (CISSP) certification.
The Information Security and Digital Forensics Program (ISDF) at Niagara University meets the validation criteria for the National Center of Academic Excellence in Cyber Defense (CAE-CD).
Our M.S. in information security and digital forensics is designed to prepare individuals for exciting and rewarding careers in cybersecurity.
Our innovative curriculum combines a theoretical foundation with a hands-on learning approach in state of the art labs. The program requires 36 total credit hours, and will explore courses in data privacy, ethical hacking, software security, modern cryptography, mobile forensics and security, and computer forensics. Students will also complete a capstone research project, allowing them to use scholarly research methods to develop analytics and problem-solving skills that can be applied to solving real-world information security issues.
CSO Student Learning Outcome | Upon successful completion of the MS ISDF curriculum, students will be able to: |
---|---|
CSO SLO 1 | Demonstrate the ability to understand and apply cybersecurity terms, concepts, threats, actors, and events with excellent written and oral communication skills. |
CSO SLO 2 | Demonstrate the ability to analyze business conditions for optimal applications of information security tools, models, cybersecurity methodologies, planning, and policies to protect people, process, and technology. |
CSO SLO 3 | Demonstrate the ability to conduct professional cybersecurity research that includes accurate modeling, analysis, and design of CD processes, systems, and relevant laws, regulations, and agencies. |
CSO SLO 4 | Demonstrate the ability to apply best practices of responding to external or internal cybersecurity incidents through incident response through forensic imaging and emergency preparedness. |
The need for cybersecurity experts is rapidly increasing, faster than organizations can hire – the demand is expected to continue. The number of unfilled cybersecurity positions worldwide grew 350% between 2013 and 2021 (1 million to 3.5 million). Research suggests that over the next five years, the same number of openings will remain unfilled. Breaches are on the rise and cybersecurity talent is becoming scarce, Niagara University invites you to become part of the future in cybersecurity.
Niagara University offers a graduate degree in cybersecurity (Information Security and Digital Forensics, ISDF) to prepare learners for an exciting career in the cybersecurity field. Because of Niagara’s focus and course offerings, most graduates have been able to secure immediate employment at major tech companies, banks and financial institutions, healthcare agencies, and government agencies.
Complete your studies in one year (or at your own pace) — with a flexible schedule that includes on campus, online, hybrid, and weekend course offerings.
Graduate assistantships, scholarship opportunities, and over 60 different awards for well-qualified matriculated graduate students exist to make graduate school more affordable.
Students will benefit from learning in brand new, state-of-the-art facilities in an area of study that is constantly changing to meet industry demands.
The Information Security and Digital Forensics Program (ISDF) at Niagara University meets the validation criteria for the National Center of Academic Excellence in Cyber Defense (CAE-CD).
Along with the standard application for requirements shown above, you will need to submit the following items in order for your application to be complete.
For visa questions, information regarding the I-20 and the I-20 application, please go to the International website.
Computer and Mobile Forensics Analyst
Cybersecurity Administrator
Cybersecurity Analyst
Defensive Security
Information Security Research