Skip To Main Content
Cyber security professor at UTSA teaches class

Why Pursue a Master's Degree in Cyber Security

Learn how to protect data, gather and examine digital evidence, perform security risk assessments, develop secure software and protect computer networks. As part of this 33-credit-hour degree program in the Carlos Alvarez College of Business, you will develop specialized expertise in the area of cyber security.

Take advantage of the cyber security research centers and institutes housed at UTSA and contribute to cutting-edge research in artificial intelligence, cyber analytics, digital forensics, industrial control system security, Internet of Things (IoT) and more. Through a rigorous applied curriculum, you’ll gain a unique combination of technical and business knowledge to assess, manage and become a leader in the cyber security industry.

Students Attending an Info Session

Register for an Information Session

Interested in learning more about UTSA’s Carlos Alvarez College of Business Master of Science in Cyber Security – Information Technology program? Register to attend an upcoming Information Session where you’ll have the opportunity to review application procedures, learn admissions requirements and ask questions.

NSA, DHS, and CAE logos

National Endorsements

UTSA has been designated as a Center for Academic Excellence (CAE) by the National Security Agency and the Department of Homeland Security in the areas of CAE-Education, CAE-Operations and CAE-Research and is one of only 10 institutions in the nation to achieve all three designations.

STEM Designated Degree Program

This program in the UTSA Carlos Alvarez College of Business is included on the U.S. Department of Homeland Security’s STEM Designated Degree Program list.

STEM Designated Degree Programs provide several benefits, including:

  • High career growth potential and competitive salaries
  • Development of transferrable skills such as adaptability, critical thinking, research and analysis
  • International students on an F-1 visa are eligible for up to 24 months of Optional Practical Training (OPT)

Admission & Application Requirements

Applications are submitted through the UTSA Graduate Application. Please upload all required documents (listed below) on your UTSA Graduate Application. It is the applicant’s responsibility to ensure completion and submission of the application, a nonrefundable application fee, and all required supporting documents are on file with UTSA by the appropriate application deadline.

Cyber Security – Information Technology (MS)
  Required Degree Bachelor's Degree from an accredited college or university in the United States or have proof of equivalent training at a foreign institution.
  Minimum GPA 3.0 (on a 4.0 scale) Departments may consider GPA of last 60 semester credit hours. Otherwise qualified individuals with a GPA below 3.0 may still be eligible for admission consideration. For further information, please contact Graduate.Business@utsa.edu.
  Coursework Completed adequate credit hours or foreign institution equivalent coursework as preparation for the program.
  Transcripts* Required from all institutions attended; international transcripts must be recorded/translated to English
  Credential Evaluation Required if you have earned university-level credit from foreign institutions. Submit an evaluation of your transcripts from Educational Credential Evaluators (ECE) directly from the graduate admission application platform
  English Language Proficiency 23-24 App: Scores are currently waived for this program through the 2023-24 academic year.
24-25 App: 550 TOEFL Paper / 79 TOEFL Internet / 6.5 IELTS / Duolingo 100
  Purpose Statement Required
*Unofficial transcripts will be taken into consideration for admissions; however, if admitted into the program, you must submit official transcripts to the University.
Apply 2024-25 Application Apply 2025-26 Application

Application Deadlines

Applicants are encouraged to have their admission file completed as early as possible. All applications, required documents and letters of recommendation, if applicable, must be submitted by 5:00 PM U.S. Central Time on the day of the deadline. Deadlines are subject to change.

Cyber Security – Information Technology (MS)
Timing on Admission Decision: Completed applications will be reviewed for admission on a rolling basis. Decisions generally will be made and sent to applicants within 4 to 6 weeks of receiving the application.
Application Deadlines for: Priority International Domestic
Spring 2025 November 1 December 1
Summer 2025 March 1 May 1
Fall 2025 June 1 August 1
Spring 2026 November 1 December 1
Summer 2026 March 1 May 1

Funding Opportunities

Resources Assistantships

Career Options

UTSA prepares you for future careers that are in demand. The possible careers below is data pulled by a third-party tool called Emsi, which pulls information from sources like the U.S. Bureau of Labor Statistics, U.S. Census Bureau, online job postings, other government databases and more to give you regional and national career outlook related to this academic program.


  • Accenture
  • Apple
  • Baptist Health System
  • Boeing
  • Booz Allen Hamilton
  • Chevron
  • Cyber Range Solutions
  • Cyber Range Solutions
  • Dell
  • Exxon Mobil
  • Frost Bank
  • Google
  • H-E-B
  • Microsoft Corporation
  • National Security Agency
  • Rackspace
  • SWBC
  • Target
  • U.S. Air Force
  • Valero Energy Corporation
  • Computer Forensics
  • Introduction to Data Mining
  • Introduction to Voice and Data Security
  • Secure Incident Response
  • Secure Network Designs
  • Secure Software Design
  • Security and Risk Analysis
Leslie Brilliant, UTSA Senior Program Manager, Carlos Alvarez College of Business

Senior Program Manager

Leslie Brilliant

210-458-7301

Graduate.Business@utsa.edu