Man working at a Computer Lab The Professor's Gate on the GWU Campus outdoor graduation ceremony at GWU soldier in uniform watching an online lesson on a tablet Informal stand-up meeting in a technology office space cherry blossoms surrounding a gazebo on the GWU Campus

Online Cybersecurity Master’s Degree — Cybersecurity Policy & Compliance

Program Fast Facts

  • Completion time: approximately 2 years
  • Delivery: 100% online
  • Total credits: 30
  • Total tuition: $32,850

Operationalize the Best Cybersecurity Practices

High-profile data breaches, phishing scams and malware attacks have made cybersecurity a top priority for organizations. In addition to needing professionals with the technical acumen to identify and mitigate these threats, employers today need leaders who can implement long-term strategies and operate cybersecurity solutions.

The Master of Engineering in Cybersecurity Policy and Compliance (M.Eng.[CPC]) prepares graduates to lead cyber practices that anticipate dangers and proactively manage risks. With a unique blend of engineering and computer science courses, the multidisciplinary curriculum equips students with the foundational technical skills they need to understand cybersecurity best practices and create long-term cybersecurity strategies, obtain operational solutions, and take command of organizational reporting as it relates to regulatory agencies.

Request Information

To learn more about GW’s online graduate programs in cybersecurity and cloud computing, and download a free brochure, fill out the fields below. If you have any additional questions, please call (833) 330-1454 to speak to an admissions counselor.

* All Fields Required. Your Privacy is Protected.

The George Washington University respects your privacy. By submitting this form, you consent to receive emails and calls, which may use automated technology, from a representative of GW. We need your consent to contact you, but you can enroll without consenting to our contacting you.

  Are you enrolling from outside the U.S.? Click Here for an international-friendly contact form.

A Cybersecurity Curriculum for Tomorrow’s Threats

The online master’s in cybersecurity policy and compliance offers an engineering leadership-focused course of study. Graduates will be able to gain the foundational technical knowledge necessary to understand cyber risks and make actionable recommendations for mitigating the damage caused by data breaches and other detrimental events.

The curriculum explores the complex intersections between policy, business and technology. As a result, students become familiar with industry-recognized frameworks and methodologies as they train to take charge in the fast-paced world of information security.

Graduates will be well-equipped to pursue or advance in a variety of cybersecurity careers and leadership roles, including compliance and information security managers, data protection officers and more.
Within the context of management and creating organizational policies and practices, the program introduces students to methods and industry best practices in:

  • Cryptography
  • Security systems
  • Algorithms
  • Software paradigms

Visit our cybersecurity policy and compliance curriculum page for more information.

Program Learning Objectives

GW faculty and other industry experts have collaborated to create a master’s program in cybersecurity policy and compliance which meets the challenge of constantly evolving global threats. The curriculum is designed to ensure graduates can:

  • Analyze cyber incident forensics; forecast cyberattacks using predictive analytics modeling; and devise specific, actionable solutions that exceed traditional IT practices to emphasize cyber intelligence and mitigate risk by managing threat vulnerabilities.
  • Formulate cybersecurity policies by developing cybersecurity situational awareness procedures, identifying laws and applying processes to safeguard sensitive data while sustaining enterprise operations.
  • Design an organization’s mobility solution that integrates mobile device management with industry best practices.

Interested in learning more? Fill out the form on this page to download a free brochure.