Master of Cyber Security


Prospective students must have a bachelor’s degree in a computer science or related field. For other STEM graduates, prerequisite undergraduate-level foundation courses in computer programming, computer networks, data structures, and operating systems are required. University of Toledo equivalent courses are shown below.  Admissions are made on an individual basis and take into consideration the applicant's previous academic record, test results, the intended area of study, and the needs and capacity of the College of Engineering.

Application requirements: 

  • Degree: Applicants must hold a four-year bachelor's degree from a regionally accredited college or university 

  • GPA: Applicants must have at least a 2.8/4.0 grade point average from previous undergraduate coursework or a 3.0/4.0 for previous graduate coursework 

  • Application: UToledo application is required 

  • GRE: Required for applicants whose degree is from a non-US institution. 

  • Transcripts: Required 

  • Statement of Purpose: Required (in response to a cyber security prompt)

  • Letters of Recommendation: 3 (with at least one from an employer or a professor)

  • Proof of English language proficiency: Required for students from non-English speaking countries. See University graduate admissions for minimum test score requirements and exceptions.

  • Resume: Required 

Application priority deadlines for admission decisions: 

  • Fall:  No deadline

  • Spring:   No deadline 

  • Summer:  Contact program

For non-computer science STEM applicants, University of Toledo prerequisite coursework equivalencies for program admission are listed below.

Programming - one course or equivalent
Object Oriented Programming and Data Structures
Introduction To Object Oriented Programming
Computer Networks - one course or equivalent
Computer Networks And Data Communication
Data Communications
Data Structures and Algorithms - one course or equivalent
Introduction to Algorithms
Non-Linear Data Structures
Operating Systems - one course or equivalent
Operating Systems
Systems And Systems Programming


Core Courses(10 cr hr)
Fundamentals of Cyber Security
Network Security
Hardware Oriented Security and Trust
Engineering Elective Courses(14 cr hr)
Inside Cryptography
Computer Security
Computer Hacking and Forensic Analysis
Advanced Systems Programming
Wireless And Mobile Networks
Cyber Security Seminar
Independent Study in Cyber Security
Graduate Engineering Internship
Select up to two of the following:
Programming for the World Wide Web
Artificial Intelligence
Machine Learning
Biologically Inspired Computing
Data Compression For Multimedia Communication
Modern Communications Engineering I
Modern Communications Engineering II
Non-Engineering Elective Courses(3 cr hr)
Management of Information Systems Security
Law And The Legal System
Special Topics (Privacy and Data Security (College of Law, spring))
Capstone(3 cr hr)
Experiential Learning in Cyber Security
Plan of Study Grid
First Year
First TermHours
EECS 5720 Fundamentals of Cyber Security 3
EECS 5760 Computer Security 3
EECS 6650 Hardware Oriented Security and Trust 3
CYBR 5930 Cyber Security Seminar 0
Second Term
EECS 5640 Inside Cryptography 3
EECS 5790 Network Security 4
LAWT 6600 Special Topics (Privacy and Data Security) 2
CYBR 5930 Cyber Security Seminar 0
Second Year
First Term
EECS 5750 Machine Learning 3
CYBR 6990 Independent Study in Cyber Security 3
CYBR 6800 Experiential Learning in Cyber Security 3
CYBR 5930 Cyber Security Seminar 0
Second Term
EECS 5770 Computer Hacking and Forensic Analysis (Computer Hacking and Forensic Analysis) 3
CYBR 5930 Cyber Security Seminar 0
 Total Hours30
  • PLO 1. Understand the cyber security challenges in contemporary networks and software systems.
  • PLO 2. Demonstrate the proficiency in various tools and utilities used in cyber security.
  • PLO 3. Evaluate security mechanisms in terms of their effectiveness and appropriateness for computer and network systems.
  • PLO 4. Understand the ethical issues related to securing information systems and critical infrastructure.
  • PLO 5. Communicate effectively, both orally and in writing, with other security professionals.
  • PLO 6. Apply appropriate security methods and mechanisms to protect enterprise network systems.