Why WashU

There are about 4,000 unfilled cybersecurity positions in St. Louis and 350,000 across the U.S. Cybersecurity Ventures estimates there will be 3.5 million unfilled jobs by 2021.

Request Information Upcoming Information Sessions Resources for International Students Expert Courses



The 30-unit master of cybersecurity management is a part-time program for working professionals.

A 15-unit graduate certificate in cybersecurity management is also offered and can be transferred into the degree program at any time. This program also offers the option to enroll in up to 9 units in program approved courses with the Computer Science Department. (*) Courses required to earn the certificate.

Debra Williams
Director of Professional Education Marketing

Registration, Tuition Fees & Payment Policies

Qualified veterans: WashU McKelvey School of Engineering and the VA will cover 100 percent of your graduate tuition.


Required Courses

Cybersecurity Technical Fundamentals (T83-560)*
3 Units

This course presents a comprehensive survey of cybersecurity technology including basic theory and concepts. Students will gain hands-on familiarity of cybersecurity technology through lab exercises, in-class studios, and scenarios. Topics covered include security considerations surrounding operating systems, the web, email, databases, wireless, the cloud, and the Internet of Things. Also addressed are cryptography, secure software design, physical security, and human factors in cybersecurity.

Oversight for Excellence: Cybersecurity Management and Governance (T83-561)*
3 Units

This course takes a comprehensive approach to the management of the organizational cybersecurity function. It also explores the principles of information technology governance. Coursework provides a deeper understanding of best practices for managing cyber security processes and meeting multiple needs of enterprise management by balancing the void between business risks, technical issues, control needs, and reporting metrics. Toward this end, the course addresses a range of topics necessary for success, including the elements of and how to establish a governance program, cybersecurity management frameworks, developing and implementing a cybersecurity strategy, deploying cybersecurity policy and controls, ensuring standards and regulatory compliance, functional and budgetary advocacy, interfacing with the C-Suite and Board, and talent acquisition and development. 

Efficient and Effective Cybersecurity Operations (T83-562)*
3 Units

In this course, students will gain understanding of what it takes to manage the people, process, and technology for effective and efficient day-to-day cybersecurity operations. Using the Cybersecurity Operations Center (CSOC) as the fundamental exemplar, students will learn the functions and processes that comprise a typical CSOC with an underlying focus on continually optimizing operations for agility and performance. Options for structuring the CSOC will be examined along with core CSOC functions and processes such as threat intelligence; monitoring, detection, and threat assessment; vulnerability management; incident response; prevention, including awareness training; partner and third-party coordination; analytics, metrics, and reporting; training; and CSOC technologies and instrumentation.

Cybersecurity Risk Management (T83-566)*
3 Units

In this course, students will gain deeper appreciation of the challenges faced by enterprises when addressing cybersecurity risks. The course will cover evolution of cyber threats, including attacker methods and their targets across different industries. Students will be able to understand the differences between enterprise, operational and cybersecurity risk management and the role that each play (or should play) in managing risks to an organization. Students will gain technical understanding of industry leading frameworks (COSO, ISO, NIST, FAIR) and become conversant with their strengths and weaknesses as well as the applicability and practicality of their implementation. 

The Hacker Mindset: Cyber Attack Fundamentals (T83-567)*
3 Units

This course is designed to provide an introductory understanding of how offensive security techniques practically operate. During this course students will use hacking techniques to compromise systems, collect data, and perform other tasks that fall under the generally understood use of the term “hacker.” These techniques will be related to risk-based defensive security practices with a view toward enhancing the student’s understanding of what it takes to be a successful “defender.” By the conclusion of the course, students will have a baseline technical understanding of hacking techniques, will have executed offensive security operations, and will have increased technical understanding of what it takes to deal with cyber threats. 

Meet our faculty

Che Bhatia VP Stroz Friedberg, 20 years of IT, security and risk management experience

Che Bhatia

  • Adjunct Instructor
Bill Blankenship Expert in Security Operations. United States Air Force Veteran

Bill Blankenship

  • Adjunct Instructor
Craig Byrkit Craig has expertise directing complex computer intrusion network incident response for global corporations.

Craig Byrkit

  • Adjunct Instructor
Eric Kruse Diverse background in the Fortune 500, Government, and Military leading information security teams and complex technical product security strategies

Eric Kruse

  • Adjunct Instructor
Mike Jenkins Former Chief Information Security Officer at the United States Transportation Command. ISC2, CISSP, ISSEP, ISSMP and ITIL certified

Mike Jenkins

  • Adjunct Instructor
Rehman Khan Cloud Security, Data Analytics and Technology Innovator with experience in Financial Services, Biotechnology, & Hospitality Domains. Speaker at RSA Conference, CISSP & CCSP, MSSE, BSCS

Rehman Khan

  • Adjunct Instructor
Jarrett Kolthoff President/CEO of SpearTip, former Special Agent – U.S. Army Counterintelligence

Jarrett Kolthoff

  • Adjunct Instructor
Scott Krause Senior Consultant, Security Risk Management, Mastercard – CISSP, CISA

Scott Krause

  • Adjunct Instructor
Anatoli Lataria Cybersecurity professional with comprehensive record of managing risk, governance, data protection and strategy for a variety of Fortune 500 companies

Anatoli Lataria

  • Adjunct Instructor
Steve Loftus Professional white hat hacker

Steve Loftus

  • Adjunct Instructor
Mike McDermid Retired Air Force Lieutenant Colonel, IT leadership speaker

Mike McDermid

  • Adjunct Instructor
Lamont Orange Chief Information Security Officer for Vista Equity Partners and member of the Security Advisor Alliance (SAA) and the Cybersecurity Forum Initiative

Lamont Orange

  • Adjunct Instructor
Gil Schmitt Senior manager of Network Engineering within Enterprise Holdings, Inc. (formerly Enterprise Rent-A-Car) IT Department

Gil Schmitt

  • Adjunct Instructor
Rick Sunner Strategy and Technology Consultant in Cybersecurity for the United States Air Force

Rick Sunner

  • Adjunct Instructor

Graduate Tuition

 Please visit Tuition and Financial Assistance for Graduate Students for tuition information.


Johanna Sengheiser
Graduate Financial Aid Analyst & Accountant

Engineering Graduate Admissions


Free Lectures & Webinars 

Learn more