Why Pursue a Master's Degree in Cyber Security
Learn how to protect data, gather and examine digital evidence, perform security risk assessments, develop secure software and protect computer networks. As part of this 33-credit-hour degree program in the Carlos Alvarez College of Business, you will develop specialized expertise in the area of cyber security.
Take advantage of the cyber security research centers and institutes housed at UTSA and contribute to cutting-edge research in artificial intelligence, cyber analytics, digital forensics, industrial control system security, Internet of Things (IoT) and more. Through a rigorous applied curriculum, you’ll gain a unique combination of technical and business knowledge to assess, manage and become a leader in the cyber security industry.
Register for an Information Session
Interested in learning more about UTSA’s Carlos Alvarez College of Business Master of Science in Cyber Security – Information Technology program? Register to attend an upcoming Information Session where you’ll have the opportunity to review application procedures, learn admissions requirements and ask questions.
National Endorsements
UTSA has been designated as a Center for Academic Excellence (CAE) by the National Security Agency and the Department of Homeland Security in the areas of CAE-Education, CAE-Operations and CAE-Research and is one of only 10 institutions in the nation to achieve all three designations.
STEM Designated Degree Program
This program in the UTSA Carlos Alvarez College of Business is included on the U.S. Department of Homeland Security’s STEM Designated Degree Program list.
STEM Designated Degree Programs provide several benefits, including:
- High career growth potential and competitive salaries
- Development of transferrable skills such as adaptability, critical thinking, research and analysis
- International students on an F-1 visa are eligible for up to 24 months of Optional Practical Training (OPT)
Admission & Application Requirements
Applications are submitted through the UTSA Graduate Application. Please upload all required documents (listed below) on your UTSA Graduate Application. It is the applicant’s responsibility to ensure completion and submission of the application, a nonrefundable application fee, and all required supporting documents are on file with UTSA by the appropriate application deadline.
Cyber Security – Information Technology (MS) | ||
---|---|---|
Required Degree | Bachelor's Degree from an accredited college or university in the United States or have proof of equivalent training at a foreign institution. | |
Minimum GPA | 3.0 (on a 4.0 scale) Departments may consider GPA of last 60 semester credit hours. Otherwise qualified individuals with a GPA below 3.0 may still be eligible for admission consideration. For further information, please contact Graduate.Business@utsa.edu. | |
Coursework | Completed adequate credit hours or foreign institution equivalent coursework as preparation for the program. | |
Transcripts* | Required from all institutions attended; international transcripts must be recorded/translated to English | |
Credential Evaluation | Required if you have earned university-level credit from foreign institutions. Submit an evaluation of your transcripts from Educational Credential Evaluators (ECE) directly from the graduate admission application platform | |
English Language Proficiency | 23-24 App: Scores are currently waived for this program through the 2023-24 academic year. 24-25 App: 550 TOEFL Paper / 79 TOEFL Internet / 6.5 IELTS / Duolingo 100 |
|
Purpose Statement | Required | |
*Unofficial transcripts will be taken into consideration for admissions; however, if admitted into the program, you must submit official transcripts to the University. |
Application Deadlines
Applicants are encouraged to have their admission file completed as early as possible. All applications, required documents and letters of recommendation, if applicable, must be submitted by 5:00 PM U.S. Central Time on the day of the deadline. Deadlines are subject to change.
Cyber Security – Information Technology (MS) | |||
---|---|---|---|
Timing on Admission Decision: Completed applications will be reviewed for admission on a rolling basis. Decisions generally will be made and sent to applicants within 4 to 6 weeks of receiving the application. | |||
Application Deadlines for: | Priority | International | Domestic |
Spring 2025 | November 1 | December 1 | |
Summer 2025 | March 1 | May 1 | |
Fall 2025 | June 1 | August 1 | |
Spring 2026 | November 1 | December 1 | |
Summer 2026 | March 1 | May 1 | |
Career Options
UTSA prepares you for future careers that are in demand. The possible careers below is data pulled by a third-party tool called Emsi, which pulls information from sources like the U.S. Bureau of Labor Statistics, U.S. Census Bureau, online job postings, other government databases and more to give you regional and national career outlook related to this academic program.
- Accenture
- Apple
- Baptist Health System
- Boeing
- Booz Allen Hamilton
- Chevron
- Cyber Range Solutions
- Cyber Range Solutions
- Dell
- Exxon Mobil
- Frost Bank
- H-E-B
- Microsoft Corporation
- National Security Agency
- Rackspace
- SWBC
- Target
- U.S. Air Force
- Valero Energy Corporation
- Computer Forensics
- Introduction to Data Mining
- Introduction to Voice and Data Security
- Secure Incident Response
- Secure Network Designs
- Secure Software Design
- Security and Risk Analysis