Man working at a Computer Lab The Professor's Gate on the GWU Campus outdoor graduation ceremony at GWU soldier in uniform watching an online lesson on a tablet Informal stand-up meeting in a technology office space cherry blossoms surrounding a gazebo on the GWU Campus


The online Master of Engineering in cybersecurity policy and compliance at George Washington University is designed for students who are working professionals—blending live class sessions with coursework that can be completed around other obligations. Students who are employed full-time can complete the program in approximately 2.5 years all the while applying what they learn in their online cybersecurity courses directly to their current and future jobs.

The program requires a minimum of 30 credit hours of graduate-level coursework. The program consists of four computer science courses and six others, focusing on policy, management, compliance and risk management—a blend that is designed to develop a well-rounded skillset in graduates.

Upon graduation, M.Eng(CPC) students will be able to:

  • Implement appropriate forensic analysis of cyber incidents, and use predictive analytics modeling to forecast cyberattacks, to devise solutions that go beyond traditional IT practitioners’ practices to delineate specific and actionable cyber intelligence.
  • Formulate short- and long-term cybersecurity strategies and policies for their enterprises by identifying compliance laws and applying the industry’s best practices.
  • Design an organization’s mobility solution that integrates mobile device management and the industry’s best practices.
  • Develop and implement a comprehensive cybersecurity situational awareness procedure for an organization to safeguard sensitive data and sustain fundamental operations.
  • Implement methods of mitigating risk by managing threat vulnerabilities and exploits.

M.Eng(CPC) Required Courses

  • CSCI 6012 Cybersecurity and Privacy (3 credits)
    Overview of cybersecurity and privacy, including cryptography, authentication, malware, viruses, network security, anonymity, privacy and online privacy, risk management. Common cyberattacks and techniques for detection and defense. Policy and legal perspectives for managing cybersecurity missions supporting private sector and government. Cyber technologies as applied to the stability of global information and communications infrastructure; government cybersecurity policies.
  • CSCI 6532 Information Policy (3 credits)
    Roles, issues, and impacts of computer-based information systems in national and international arenas, focusing on privacy, equity, freedom of speech, intellectual property, and access to personal and governmental information. Professional responsibilities, ethics, and common and best practices in information use.
  • EMSE 6540 Management of Information and Systems Security (3 credits)
    Development and management of effective security systems. Includes information, personnel, and physical security. Emphasis on risk analysis for information protection.
  • CSCI 6013 Security in Mobile Computing (3 credits)
    Relationship between security strategic plan and business strategic plan. Mobile Device Solutions (MDS) to access enterprise corporate data. Bring Your Own Device (BYOD) paradigm. Mobile Device Management (MDM) best practices, policies, network controls to identify countermeasures and risk mitigation strategies against common threats. Overview of mobile security solutions for classified processing and communications. Prerequisite: CSCI 6012.
  • CSCI 6534 Information Security in Government (3 credits)
    Information assurance policies and standards in the federal government as mandated by legislation; security processes following NIST standards; technical tests and validation methods used in the federal government; review of federal threats and vulnerabilities; and government positions in information assurance.
  • ECE 6132 Secure Cloud Computing (3 credits)
    Security and privacy issues in cloud computing systems. Confidentiality, integrity, and availability of data and computations. Examination of cloud computing models, threat models, outsourcing, and security issues. Practical applications of secure cloud computing.
  • EMSE 6542 Cybersecurity Risk Management and Compliance (3 credits)
    Cybersecurity threats and other risks to an organization’s core business relative to people, processes, data, facilities, technology. Risk-based planning and risk management of cybersecurity at the enterprise level. Creating risk assessment and modeling approaches to cybersecurity issues that enable an enterprise to build security structures, sustain healthy cybersecurity posture, satisfy compliance with risk frameworks such as NIST’s. Prerequisite: EMSE 6540.
  • EMSE 6543 Managing the Protection of Information Assets and Systems (3 credits)
    Advanced topics in protection of information assets and systems, including authentication, asset control, security models and kernels, physical security, personnel security, operational security, administrative security, security configuration management, and resource control. Prerequisite: EMSE 6540.
  • EMSE 6544 Auditing, Monitoring, and Intrusion Detection for Information Security Managers (3 credits)
    Methods for detecting problems with unauthorized activity in information systems and management challenges associated with those activities. Prerequisite: EMSE 6540.
  • EMSE 6546 Cybercrime for Information Security Managers (3 credits)
    Legal issues regarding information security actions related to and in response to criminal activity, including industrial espionage, back-hacking, cracking, and cyberterrorism. Transnational issues, cybercrime treaties and conventions, and cyberwar issues.

Request Information

To learn more about GW’s online graduate program in cybersecurity policy and compliance and download a free brochure, fill out the fields below. If you have any additional questions, please call (877) 246-4824 to speak to an admissions counselor.

* All Fields Required. Your Privacy is Protected.

The George Washington University respects your privacy. By submitting this form, you consent to receive emails and calls, which may use automated technology, from a representative of GW. We need your consent to contact you, but you can enroll without consenting to our contacting you.

  Are you enrolling from outside the U.S.? Click Here for an international-friendly contact form.