-
Degrees
- Program Finder
-
Bachelor's Degrees
- Accounting
- Analytics
- Applied Management
- Business Administration
- Business Forensics
- Cloud Computing
- Communications
- Computer Science
- Criminal Justice Administration
- Cybersecurity
- Education
- Exercise Science
- Financial Management
- Financial Planning
- Forensic Accounting
- Health Information Management
- Healthcare Administration
- Human Resources Management
- Information Systems
- Information Technology
- Interactive Media Design
- Management & Leadership
- Marketing
- Nursing (RN-BSN)
- Operations & Supply Chain Management
- Psychology
- Public Health
- Public Safety Management & Leadership
- Social Sciences
- Sport Management
- User Experience & Graphic Design
-
Master's Degrees
- Accounting
- Business Analytics
- Business Psychology
- Computer Science
- Criminal Justice Administration
- Cybersecurity
- Data Analytics
- Education
- Health Informatics
- Healthcare Administration (MHA)
- Human Resource Management
- Information Systems
- Information Technology
- Instructional Design & Learning Technology
- MBA Programs
- MSN Programs
- Professional Sales Leadership
- Public Administration (MPA)
-
Doctoral Degrees
- Associate Degrees
-
Online Degrees
- Online Learning at Franklin
- Accounting Programs
- Business & Leadership Programs
- Computer Science Programs
- Criminal Justice & Public Safety Programs
- Cybersecurity Programs
- Data & Analytics Programs
- Education Programs
- Finance Programs
- Healthcare Programs
- Human Resources Programs
- Information Technology Programs
- Marketing & Communications Programs
- Nursing Programs
- Operations & Project Management Programs
- Psychology Programs
- Public & Social Sciences Programs
- Online Learning Facts
- Degrees By Location
- Degrees By College
- Minors
- Degree Completion Programs
- Second Bachelor's Degrees
-
Microcredentials & Certificates
- Microcredentials
-
- Accounting Data Analytics
-
- Cyber Defense
- Cyber Governance
- Criminal Justice Leadership
- Data Analytics
- Nurse Educator
- Instructional Design
-
- Adult-Gerontology Primary Care Nurse Practitioner
- Family Nurse Practitioner
- Psychiatric Mental Health Nurse Practitioner
-
- Adolescence to Young Adult Education (7-12)
- Primary Education (PK-5)
- Intervention Specialist: Mild/Moderate (K-12)
- Middle Childhood Education (4-9)
- Advanced Accounting Microcredential
-
Admissions
- Undergraduate Students
- Graduate Students
- Partnership Students
-
- Study in the U.S.
- Earn Your Degree Online
- Community College Students
- College Credit Plus
-
-
- Air Force
- Army
- Coast Guard
- Marines
- Navy
-
- Montgomery GI Bill® - Selected Reserves
- Montgomery GI Bill®
- Post-9/11 GI Bill®
- Vocational Rehabilitation and Employment VetSuccess Program
- Yellow Ribbon Program
- Spouses & Family
-
- Online Open House
-
- Associate Degrees
-
- General Bachelor's Degree
- Nursing (RN-BSN)
-
- Accounting
- Business Administration (MBA)
- Business Analytics
- Business Psychology
- Computer Science
- Criminal Justice Administration
- Cybersecurity
- Data Analytics
- Health Informatics
- Healthcare Administration (MHA)
- Human Resource Management
- Information Technology
- Instructional Design & Learning Technology
- Nurse Administrator (MSN-ADM)
- Nursing-Adult-Gerontology Primary Care Nurse Practitioner
- Nursing-Family Nurse Practitioner (MSN-FNP)
- Nursing-Generalist (MSN)
- Nursing-Psychiatric Mental Health Nurse Practitioner
- Public Administration
-
- Business Administration (DBA)
- Healthcare Administration (DHA)
- Instructional Design Leadership (DPS)
- Nursing Practice-Family Nurse Practitioner (DNP-FNP)
- Nursing Practice-Leadership Track (DNP)
- Organizational Leadership (Ed.D.)
-
- Criminal Justice Leadership
- Instructional Design
-
Tuition & Financial Aid
- Tuition & Fees
- Cost Estimate Calculator Tool
- Tuition Guarantee
- Undergrad Tuition Comparison
- Federal Aid & State Aid
- Institutional Aid & Private Loans
- Applying for Aid
- Community College Students
- Scholarships
- Payment Options
- Financial Aid Resources
-
Transferring Credit
- Estimate Your Transfer Credit
- How to Transfer Credits
-
- Previously Earned College Credit
- Certificates + Professional Training Credit
- Military Training Credit
- Testing Credit
-
- Partner Schools
- Pathway Portal
- Transfer into a Bachelor’s Degree
- Transfer into a Master’s Degree
- Transfer into a Doctoral Degree
- Transfer into an Associate Degree
-
The Franklin Experience
- Built For Working Adults
- Transfer Friendly
- Accredited University & Quality Degrees
- Fast & Affordable
- Student Success Stories
- Valued By Employers
- Nonprofit
- Student Support
- Career Development
-
About Us
-
-
- Columbus
-
-
-
- Become a Partner
- Current Partners
- Teachers
-
-
- Benefits for Community Colleges
- Benefits for Businesses
-
- Employer Partnerships
-
- Solutions
-
- Al Baha University
- MCBS
- Saudi Electronic University
- Current Partnerships
- Medical School Partnerships
- Nurse Preceptor
- Ohio School District Partnerships
-
-
- Board of Trustees
- University Leadership
- University Directory
- Faculty Profiles
- President's Welcome
- Admission Advisors
-
-
- CCNE Accreditation
- IACBE Accreditation
- State Authorization & Professional Licensure Information
- Our Mission & Values
- The Four Cornerstones
- Our History
- Consumer Information
- Safety & Security
- Bookstore
- Assessment
- Map & Directions
-
-
-
- Students
- Faculty & Staff
- Future Students
- Events
- News
- Request an Expert
- Presentations & Awards
- Faculty Awards and Recognitions
- Speakers' Bureau
- Event Hosting
-
-
- Title IX
- Discrimination Harassment & Sexual Misconduct
- Anti-Hazing Policy
- Drug Free School & Communities Act
- Franklin Intervention & Awareness Team
- Filing Complaints
-
-
- Application & Review Process
- Cayuse
- CITI Training
- Research Review Categories
- Committee & Policies
- Documents, Resources & FAQs
- Research at Franklin University
- Programs & Support
- Resources
- Research Opportunities
- About Us
-
- Office of Accessibility Services
- Combating Copyright Infringement
- Financial Aid Statement
- Influenza Information
- Information Technology Acceptable Use
- Notice of Privacy Rights (FERPA)
- Privacy Statement
- Student Parking
- Tuition Refund Policy
- Vaccinations
- Inclement Weather Policy
- Transfer Credit Policy & Procedures
- Community Engagement
- Request Your Franklin Transcripts
- Urbana University Resources
- Give to Franklin
-
Class TypeFace-to-face, Online courseworkSee state availability
Next Start Date
About Start Dates
Additional future start dates include:
Fall 2024
Sep 30, 2024Spring 2025
Jan 27, 2025Feb 17, 2025
Summer 2025
May 19, 2025Fall 2025
Sep 29, 2025Spring 2026
Jan 5, 2026Feb 16, 2026
Summer 2026
May 18, 2026Start dates for individual programs may vary and are subject to change. Please request free information & speak with an admission advisor for the latest program start dates.
Placement Tests
Placement Information
Customize your M.S. in computer science with a focus in cybersecurity
Properly functioning software boosts an organization’s efficiency and effectiveness, while unsecure solutions spell disaster in terms of lost time and productivity. Security-minded computer science professionals make the difference. With Franklin’s 100% online M.S. in Computer Science with a focus in Cybersecurity, you’ll learn how to design systems that align with organizational needs and security best practices. Building on the core principles of Franklin’s forward-thinking master’s-level computer science program, the cybersecurity focus enables you to customize your degree to your career aspirations.
Finish Fast
Finish your master's in as few as 20 months.
Leading Industry Tools
Get hands-on experience with Netlab+, Burp Suite, Metasploit and openssl.
Customizable Program
Tailor your master's degree program to your interests.
Real-World Practitioners
Learn from experienced technology leaders.
100% Online Classes
Take classes that fit with your busy life.
Game-Changing Skills
Play an important role in communicating emerging technologies to stakeholders.
M.S. in Computer Science - Cybersecurity Focus Overview
Gain essential knowledge in software delivery, verification and testing
As part of your M.S. in Computer Science-Cybersecurity, you’ll earn a Software Security digital badge that demonstrates your knowledge of software verification and testing and your competency to deliver high-quality software, especially in large complex systems. Through hands-on coursework, you’ll learn how to design and build software to minimize the presence of flaws or mitigate their impacts. You’ll also gain an understanding of important principles in historical and modern cryptography.
Learn to preserve the confidentiality and integrity of information
You’ll dive into the fundamentals of security including risks and vulnerabilities, threat modeling, policy formation, controls and protection methods, encryption and authentication technologies, network security, cryptography, personnel and physical security issues, as well as ethical and legal issues. You’ll emerge with the ability to prescribe defenses against intrusion, recommend access control plans for systems and software, and perform qualitative and quantitative risk assessments.
Explore principles in historical and modern cryptography
The cryptographic primitives of enciphering/deciphering and hashing are the two main methods of protecting information, so mastery of cryptographic techniques is an important skill. You’ll learn to differentiate between basic cryptographic functionality, including symmetric and asymmetric cryptography, block versus stream ciphers, digital signatures and hash functions. Upon completion of the cryptography course, you’ll also be able to combine different cryptographic functions to secure algorithms, contrast various modes of cryptographic algorithms, choose appropriate cryptographic techniques for specific scenarios and summarize attacks on cryptographic primitives.
Get course credit for (ISC)2 CSSLP certification
Because Franklin’s M.S. in Computer Science is aligned with industry competencies, you can get credit toward your degree for relevant certifications. Current (ISC)2 CSSLP certification has been evaluated to be equivalent to ISEC 620, which is a required course for the cybersecurity focus area. The (ISC)2 CSSLP certification provides you with 4 hours of graduate level credit and saves you 12 weeks and $2,680 in tuition. Your admissions advisor can provide guidance on how to submit your credential documentation to receive credit.
Dimitri V.
M.S. Computer Science '22
"My professors taught me many valuable topics including applications of AI, testing, software architecture as well as industry best practices and insights. My classmates also helped me to learn and put the knowledge to use, and as a result, my experience at Franklin has shaped a complete perspective of the field of Computer Science for me."
Future Start Dates
Start dates for individual programs may vary and are subject to change. Please request free information & speak with an admission advisor for the latest program start dates.
Your Best Value M.S. Computer Science
Choose Franklin's M.S. Computer Science and get a high-quality degree that fits your life and your budget.
Non-Profit = Student Focused
Unlike for-profit universities, Franklin invests in student success, not shareholder gain.
Partner? Pay Less.
Search below to see if you could save tuition through an employer or professional organization partnership.
(After Partner Discount)
Tuition Guarantee
Inflation-proof your degree cost by locking-in your tuition rate from day one through graduation.
Highly Recommended
98% of graduating students would recommend Franklin to their family, friends and/or colleagues.
**Source: Franklin University, Office of Career Development Student Satisfaction Survey (Summer 2023)
M.S. in Computer Science - Cybersecurity Focus Curriculum
This course covers key knowledge and skills for advanced software development using the object-oriented approach. The student learns, manipulates and reflects on nonlinear data structures such as trees and heaps. Recursive algorithms, sorting algorithms, algorithm efficiency, and advanced design patterns are addressed. To support the advanced concepts and principles of software development, the student will design, code, test, debug, and document programs with increased scale and complexity using industry's best practices (such as GitHub) and the Java programming language.
This course covers various algorithm design paradigms, mathematical analysis of algorithms, empirical analysis of algorithms and NP-completeness.
This course focuses on the fundamental design considerations in designing a database. Specific topics include performance analysis of design alternatives, system configuration and the administration of a popular database system. The course also offers an in-depth analysis of the algorithms and machine organizations of database systems. Note, this course has proctored exam(s). This exams requires additional technology, if student uses online proctoring.
This course provides a comprehensive understanding of distributed systems, encompassing both fundamental concepts and practical skills for building modern distributed applications. The course will explore the architecture, design goals, and challenges of distributed systems, covering core principles like processes, transparency, communication, consistency, fault tolerance, and security. Throughout the course, students will gain hands-on experience through labs and a team project, where they will design, develop, containerize and deploy a microservice-based cloud native application using industry-standard tools and technologies. Through this course, students will gain in-depth understanding of core concepts of distributed computing, including study of both abstract concepts and practical techniques for building modern distributed applications.
This course focuses on the issues of delivering high-quality software, especially in large complex systems. Topics covered include testing strategies (black box, white box, regression, etc.), unit testing, system integration, system verification and support tools. It also will reinforce the need for requirements that are testable and traceable from the early design stages.
This course, the final one in the Master of Science - Computer Science program, challenges students to research a current topic of interest in Computer Science and produce an original paper and presentation on the topic. In addition to the research paper, students are introduced to the economics of software development and the tools needed to estimate the cost of a software development project for management in a corporate environment. The last topic in the course is a discussion of ethics as it relates to Information Technology. Current topics in ethics will be discussed through the use of relevant case studies.
At least 12 credits from the following courses:
This course provides an introductory overview of methods, concepts, and current practices in the growing field of statistics and data analytics. Topics to be covered include data collection, data analysis and visualization as well as probability, statistical inference and regression methods for informed decision-making. Students will explore these topics with current statistical software. Some emphasis will also be given to ethical principles of data analytics.
This course focuses on collecting, preparing, and analyzing data to create visualizations, dashboards, and stories that can be used to communicate critical business insights. Students will learn how to structure and streamline data analysis projects and highlight their implications efficiently using the most popular visualization tools used by businesses today.
This course explores two main areas of machine learning: supervised and unsupervised. Topics include the fundamental concepts, roadmap of a machine learning project, classification algorithms, regression algorithms, dimensionality reduction, model evaluation, natural language processing, neural networks and deep learning, typical issues in real-world machine learning problems, and Python programming in data science.
This course surveys current practices in software development and software design, especially in the area of object-oriented design. The course will examine and contrast current and leading edge methodologies and practices, including agile, extreme programming, test-driven design, patterns, aspect-oriented programming, model-driven architecture, Unified Modeling Language, and integrated development environments.
This course covers topics in software systems engineering. Its scope is the design of the overall architecture for software systems with emphasis on distributed architectures. The issues in an architecture centered software development cycle and project management are addressed.
This course is an introduction to Artificial Intelligence (AI) from an applied perspective. After an introduction of some basic concepts and techniques (such as searching and knowledge representation), the course illustrates both the theoretical foundation and application of these techniques with examples from a variety of problems. The course surveys a wide range of active areas in AI such as machine learning, artificial neural networks, evolutionary computing, robotics, intelligent agents and bio-inspired AI approaches. It strikes a balance between engineering approaches and theory. Exercises include hands-on application of basic AI techniques as well as selection of appropriate technologies for a given problem. The principal topics in the selected areas are also coupled with projects where groups of students will participate in the creation of AI-based applications.
This course provides MSCS students the opportunity to further their education with relevant work experience in the field of Computer Science. This internship is an ongoing seminar between the student, faculty and the employment supervisor. It involves a Learning Contract (Curricular Practical Training [CPT] Information, or other), periodic meetings with the faculty representative, and professional experience at a level equivalent to other electives of the MSCS program. Specification of the materials to be submitted is established in the learning contract. Participation cannot be guaranteed for all applicants.
Independent studies courses allow students in good academic standing to pursue learning in areas not covered by the regular curriculum or to extend study in areas presently taught. Study is under faculty supervision and graded on Pass/No Credit basis. For international students, curricular practiced training may be used as an independent study with approval of program chair. (See the "Independent Studies" section of the Academic Bulletin for more details.)
This course covers the fundamentals of security in the enterprise environment. Included are coverage of risks and vulnerabilities, threat modeling, policy formation, controls and protection methods, encryption and authentication technologies, network security, cryptography, personnel and physical security issues, as well as ethical and legal issues. This foundational course serves as an introduction to many of the subsequent topics discussed in depth in later security courses. Note, this course has proctored exam(s). This exam requires additional technology, if student uses online proctoring.
Today, software is at the heart of the business processes of nearly every business from finance to manufacturing. Software pervades everyday life in expected places like phones and computers but also in places that you may not consider such as toasters, thermostats, automobiles, and even light bulbs. Security flaws in software can have impacts ranging from inconvenient to damaging and even catastrophic when it involves life-critical systems. How can software be designed and built to minimize the presence of flaws or mitigate their impacts? This course focuses on software development processes that identify, model, and mitigate threats to all kinds of software. Topics include threat modeling frameworks, attack trees, attack libraries, defensive tactics, secure software development lifecycle, web, cloud, and human factors.
The cryptographic primitives of enciphering/deciphering and hashing are the two main methods of preserving confidentiality and integrity of data at rest and in transit. As such, the study of cryptographic techniques is of primary interest to security practitioners. This course will cover the important principles in historical and modern cryptography including the underlying information theory, mathematics, and randomness. Important technologies such as stream and block ciphers, symmetric and asymmetric cryptography, public key infrastructure, and key exchange will be explored. Finally, hashing and message authentication codes will be examined as a way of preserving data integrity.
Students may complete a focus area to fulfill the Major Elective requirement.
Students may complete a focus area to fulfill the Major Elective requirement.
OR
Data Analytics:
This course provides an introductory overview of methods, concepts, and current practices in the growing field of statistics and data analytics. Topics to be covered include data collection, data analysis and visualization as well as probability, statistical inference and regression methods for informed decision-making. Students will explore these topics with current statistical software. Some emphasis will also be given to ethical principles of data analytics.
This course focuses on collecting, preparing, and analyzing data to create visualizations, dashboards, and stories that can be used to communicate critical business insights. Students will learn how to structure and streamline data analysis projects and highlight their implications efficiently using the most popular visualization tools used by businesses today.
This course explores two main areas of machine learning: supervised and unsupervised. Topics include the fundamental concepts, roadmap of a machine learning project, classification algorithms, regression algorithms, dimensionality reduction, model evaluation, natural language processing, neural networks and deep learning, typical issues in real-world machine learning problems, and Python programming in data science.
OR
Cybersecurity:
This course covers the fundamentals of security in the enterprise environment. Included are coverage of risks and vulnerabilities, threat modeling, policy formation, controls and protection methods, encryption and authentication technologies, network security, cryptography, personnel and physical security issues, as well as ethical and legal issues. This foundational course serves as an introduction to many of the subsequent topics discussed in depth in later security courses. Note, this course has proctored exam(s). This exam requires additional technology, if student uses online proctoring.
Today, software is at the heart of the business processes of nearly every business from finance to manufacturing. Software pervades everyday life in expected places like phones and computers but also in places that you may not consider such as toasters, thermostats, automobiles, and even light bulbs. Security flaws in software can have impacts ranging from inconvenient to damaging and even catastrophic when it involves life-critical systems. How can software be designed and built to minimize the presence of flaws or mitigate their impacts? This course focuses on software development processes that identify, model, and mitigate threats to all kinds of software. Topics include threat modeling frameworks, attack trees, attack libraries, defensive tactics, secure software development lifecycle, web, cloud, and human factors.
The cryptographic primitives of enciphering/deciphering and hashing are the two main methods of preserving confidentiality and integrity of data at rest and in transit. As such, the study of cryptographic techniques is of primary interest to security practitioners. This course will cover the important principles in historical and modern cryptography including the underlying information theory, mathematics, and randomness. Important technologies such as stream and block ciphers, symmetric and asymmetric cryptography, public key infrastructure, and key exchange will be explored. Finally, hashing and message authentication codes will be examined as a way of preserving data integrity.
OR
Software Systems:
This course surveys current practices in software development and software design, especially in the area of object-oriented design. The course will examine and contrast current and leading edge methodologies and practices, including agile, extreme programming, test-driven design, patterns, aspect-oriented programming, model-driven architecture, Unified Modeling Language, and integrated development environments.
This course covers topics in software systems engineering. Its scope is the design of the overall architecture for software systems with emphasis on distributed architectures. The issues in an architecture centered software development cycle and project management are addressed.
This course is an introduction to Artificial Intelligence (AI) from an applied perspective. After an introduction of some basic concepts and techniques (such as searching and knowledge representation), the course illustrates both the theoretical foundation and application of these techniques with examples from a variety of problems. The course surveys a wide range of active areas in AI such as machine learning, artificial neural networks, evolutionary computing, robotics, intelligent agents and bio-inspired AI approaches. It strikes a balance between engineering approaches and theory. Exercises include hands-on application of basic AI techniques as well as selection of appropriate technologies for a given problem. The principal topics in the selected areas are also coupled with projects where groups of students will participate in the creation of AI-based applications.
This course covers fundamental programming principles. Students will learn about the basic elements of a computer program, such as data types, assignments, conditional branching, loops, functions, recursion, basic data structures, program debugging, and testing.
This course introduces programming to individuals with little or no programming background. The goal of this course is to introduce the fundamentals of structured programming, problem solving, algorithm design, and software lifecycle. Topics will include testing, data types, operations, repetition and selection control structures, functions and procedures, arrays, and top down stepwise refinement. Students will design, code, test, debug, and document programs in a relevant programming language.
This course provides an introduction to software construction using an object-oriented approach. The student learns and reflects on problem analysis, object-oriented design, implementation, and testing. To support the concepts and principles of software construction, the student will design, code, test, debug, and document programs using the Java programming language. Basic data types, control structures, methods, and classes are used as the building blocks for reusable software components. Automated unit testing, programming style, and industrial practice are emphasized in addition to the object-oriented techniques of abstraction, encapsulation, and composition. Note, this course has proctored exam(s).
This course continues the object-oriented approach to intermediate-level software development. The student will learn and reflect on fundamental object-oriented analysis techniques, basic design patterns, and linear data structures such as lists and queues.
This course continues the objected-oriented approach to software construction. The student learns and reflects on advanced object-oriented techniques, algorithm efficiency, class hierarchies, and data structures. To support the concepts and principles of software construction, the student will design, code, test, debug, and document programs using the Java programming language. Design principles, I/O, exception handling, linear data structures (lists, stacks, and queues), and design patterns are emphasized in addition to the object-oriented techniques of inheritance and polymorphism. Note, this course has proctored exam(s).
This course introduces students to fundamental algebraic, logical, and combinational concepts in mathematics that are needed in upper division computer science courses. Topics include integer representation; algorithms; modular arithmetic and exponentiation; discrete logarithms; cryptography; recursion; primality testing; number theory; graphs and directed graphs; trees; and Boolean Algebra.
This course introduces students to fundamental algebraic, logical, and combinational concepts in mathematics that are needed in upper-division computer science courses. Topics include sets, mappings, and relations; elementary counting principles; proof techniques with an emphasis on mathematical induction; graphs and directed graphs; Boolean algebras; recursion; and applications to computer science.
Students with an undergraduate degree in computer science will be admitted without future prerequisites. However, the students will be expected to possess intermediate Java programming skills as determined by completing COMP 121 or COMP 511, having a Java SE 8 programmer certification from Oracle, or a portfolio of Java-related examples that would include the fundamentals of object-oriented programming, linear and non-liner data structures (stacks, queues, lists, etc.)
Students without a computer science degree will need to have credit for the above Franklin University courses or the equivalent undergraduate course work for the prerequisites at an institutionally (formerly regionally) accredited institution OR appropriate relevant work experience. Graduate prerequisite courses (500 level) must be completed with a grade of "C" or better. Undergraduate prerequisite courses must be completed with a grade of "C" or better. Work experience as a software engineer, developer, or programmer analyst will be evaluated by the program chair upon request. Resumes, work samples, and personal interviews may all be used to determine the depth of knowledge in these areas.
Free Master's Toolkit
Eliminate guesswork by comparing schools and calculate the ROI of a master’s degree.
M.S. in Computer Science - Cybersecurity Focus Program Details
2023 - 2024 Tuition | Cost Per Credit |
---|---|
Standard tuition per credit hour | $670 |
Nursing programs MSN-FNP, MSN-PMHNP, MSN-AGPCNP, Post-Graduate FNP Certificate, Post-Graduate AGPCNP Certificate and Post-Graduate PMHNP Certificate | $670 |
MSN-Generalist, MSN-Nurse Administrator and MSN-Nurse Educator | $598 |
RN-MSN Pathway (NURS 500) | $298 |
Current service members | $536 |
Graduate Prerequisite Courses (500 level) | $398 |
Graduate Prerequisite Courses (500 level) - International Students | $526 |
2024 - 2025 Tuition | Cost Per Credit |
---|---|
Standard tuition per credit hour | $670 |
Nursing programs MSN-FNP, MSN-PMHNP, MSN-AGPCNP, Post-Graduate FNP Certificate, Post-Graduate AGPCNP Certificate and Post-Graduate PMHNP Certificate | $670 |
MSN-Generalist, MSN-Nurse Administrator and MSN-Nurse Educator | $598 |
RN-MSN Pathway (NURS 500) | $298 |
Current service members | $536 |
Graduate Prerequisite Courses (500 level) | $398 |
Graduate Prerequisite Courses (500 level) - International Students | $526 |
Know the Total Cost of Your Master’s from Day One
Save yourself the anxiety of annual tuition increases with Franklin’s Tuition Guarantee. The guarantee lets you lock-in what you’ll pay from first-term through graduation, as long as you remain actively enrolled. Not only will this help you maximize funding sources - like employer reimbursement or financial aid, it will keep you focused on earning your degree.
A learning outcome map functions as a roadmap to help guide students' progress through their program of study. Click HERE to view the M.S. Computer Science matrix.
To be awarded a graduate degree, students must:
- Successfully complete all required curriculum courses.
- Maintain a minimum cumulative grade point average (GPA) of 3.00.
- Complete the residency requirement:
- M.S. - Computer Science students must earn at least 24 of the 36 required credits at Franklin University – in any modality (on-site, hybrid or online).
- Complete the payment of all requisite tuition and fees;
- Not to be under disciplinary dismissal due to academic dishonesty or violation of Student Code of Conduct.
Transfer credit awarded based on experiential learning shall not count toward the residence requirement at Franklin University.
The admission process reflects Franklin University’s efforts to clearly identify the performance standards that can help predict student success in graduate level study. The selection criterion for Franklin’s graduate programs, as determined by faculty, emphasizes academic ability, contributory work experience, and personal qualities and characteristics.
Requirements for admission include having earned a bachelor's degree from an institution accredited by the Accrediting Commission for Community and Junior Colleges, Western Association of Schools and Colleges (ACCJC), Higher Learning Commission (HLC), Middle States Commission on Higher Education (MSCHE), New England Commission on Higher Education (NECHE), Northwest Commission on Colleges and Universities (NWCCU), Southern Association of Colleges and School Commission on Colleges (SACSCOC), WASC Senior College and University Commission (WSCUC), or a Council for Higher Education Accreditation (CHEA)-recognized accrediting organization with a GPA of at least a 2.75 on a 4.0 scale.
Applicants who earned at least a 2.5 GPA on a 4.0 scale in their earned bachelor’s degree will automatically be granted conditional enrollment status. Applicants who earned lower than a 2.5 GPA on a 4.0 scale in their earned bachelor’s degree can petition for conditional enrollment status to the program chair by submitting an essay detailing other criteria that the applicant believes should be considered to demonstrate their ability to be successful in a graduate program. This petition could include details on the applicant’s work experience, work ethic, level of professionalism, personality characteristics, level of difficulty of program of study previously completed, etc.
Conditional enrollment requires students to achieve a final grade of “B” (3.0 GPA) or better in the first graduate-level course of their program. If the terms of the conditional enrollment are not met, the student will not be allowed to advance in their program and will be unable to earn this graduate degree from Franklin University.
English Language Testing & TOEFL IELTS
Prospective students must demonstrate English Language Proficiency. The requirement is met through any of the following:
- The applicant is a citizen of a country where English is the official language.*
- The applicant has received a bachelor’s degree (or higher) from an institution located in an English-speaking country in which the courses were taught in English.*
- The applicant has earned appropriate scores on language proficiency exams taken within the last two years, as listed in the Academic Catalog.
*For more information about English proficiency, including a list of English-speaking nations, please visit our International Students section.
The University employs a team approach to planning, developing and maintaining its academic curriculum. An essential element of this process – and a key to the institution’s quality assurance practices – is the Program Advisory Board (and the associated Alumni Advisory Board). A diverse array of business and industry leaders make up these discipline-specific boards that provide guidance on theory-to-practice ideas, global business perspectives, and emerging topics in the field. Each academic year, Program Advisory Boards meet with Division Chairs and faculty for lively and engaged conversations, thus bringing members’ substantial professional experience and expertise into the classroom. In addition, some Division Chairs elect to engage Program Advisory Board members in the assessment of academic program outcomes.
Name | Organization | Title |
---|---|---|
Herbert Berger | Cardinal Health Inc. | Enterprise Architect |
David Blum | Hylant | Chief Info. + Innovation Officer |
Gary Clark | Columbus State Community College | Principal Investigator, Asst. Prof. |
Sean Erikson | Grange Insurance Companies | VP, Architecture + IT Strategy |
Mihajlo Jovanovic | JP Morgan Chase | Lead Software Engineer |
Perumal Ramasamy | NetJets | VP, Data + Quality Programs |
Srini Ramaswamy | Battelle | Head of Technology |
Gloria Rogiers | Columbus State Community College | Dean |
Paul Varner | Nationwide | Consulting IT Architect |
David Vasquez | Nationwide Insurance | Director, IT Applications |
Bradley West | HMB Inc. | Dir., Project Mgmt. Practice |
Byron White | Chemical Abstracts Service | Software Development Manager |
Manasa K.
M.S. Computer Science '20
"Thank you Franklin University, for helping me reach this important milestone in my career."
Computer Science Cybersecurity Career Opportunities
Information Security Analyst
Information security analysts plan and implement security features to protect an organization’s computer networks and systems.
Software Developer
Software developers, also known as computer programmers, help design, create, install, test and maintain relevant and functional computer programs and device applications.
Cybersecurity Engineer
Cybersecurity engineers lead cybersecurity operations, build technical roadmaps and manage virtual network models.
Computer Science Cybersecurity Employment Outlook
From 2021-2031 jobs in Computer Science are expected to increase by 13%
All Occupations
2021 |
5,400,282 jobs
|
2031 |
6,080,567 jobs
|
Computer and Information Systems Managers
2023 |
604,207 jobs
|
2033 |
722,584 jobs
|
Software Developers and Software Quality Assurance Analysts and Testers
2021 |
1,600,098 jobs
|
2031 |
1,924,125 jobs
|
Web Developers and Digital Interface Designers
2021 |
198,907 jobs
|
2031 |
222,454 jobs
|
Computer User Support Specialists
2023 |
604,207 jobs
|
2033 |
722,584 jobs
|
Computer Systems Analysts
2023 |
593,007 jobs
|
2033 |
676,019 jobs
|
Source information provided by Lightcast.
Knowledge & Skillsets
Gain in-demand skills sought by employers with curriculum that teaches you:
- Develop and maintain documentation for security systems and procedures
- Understand and assess risks and challenges associated with emerging new hardware, data center, and software technologies
- Define plans for how to address and mitigate risk
- Understand network architecture and security infrastructure placement
- Identify high-performance cryptographic protocols
- Possess knowledge of cryptographic security fundamentals, including but not limited to (HSM integration, key generation and protection, symmetric and asymmetric use cases)
- Evaluate the security of a cryptosystem (threat modeling and analysis)
- Develop dynamic, data-driven applications through mastery of relational database design, complex SQL queries, and transaction processing
- Write SQL database queries of medium to high complexity in support of data analysis and technical programming
- Apply relational database design best practices to efficiently build data models
- Implement data models, database designs, data access, and table maintenance codes
- Analyze large collections of data in order to inform and apply association rules and other techniques, such as genetic encoding, classification hierarchies and regression analysis to decision making
- Apply relational algebra to the optimization of queries using heuristics
- Utilize data mining techniques to discover knowledge in large data collections
- Apply refactoring techniques to modify and improve database designs
M.S. Computer Science - Cybersecurity, M.S. IT - Cybersecurity or M.S. in Cybersecurity?
Find the Cybersecurity Program That Fits Your Goals
If you’re interested in advancing your cybersecurity career, Franklin has several great options. Compare programs and identify your perfect match.
Focus:
Expand your technology capabilities to include identifying and developing security-focused software solutions.
Skills:
Advance your software development skills and expand your understanding of cryptography.
Careers:
Use your M.S. in Computer Science-Cybersecurity to lead the development of software solutions that prevent catastrophic loss.
How many courses are in the program?
Nine 12-week courses
How quickly can I complete the program?
20 months
Focus:
Develop expertise in the areas of risk management, network security and ethical hacking.
Skills:
Deepen your understanding of operational security, risk assessment, mitigation and incident response.
Careers:
Leverage your M.S. in IT-Cybersecurity to become a driving force in systems and data protection.
How many courses are in the program?
Nine 12-week courses
How quickly can I complete the program?
16 months
Focus:
Grow your knowledge and experience with emerging cybersecurity technologies, methodologies and strategies.
Skills:
Build leadership and technical skills along with cutting-edge application of cyber defense strategies and tactics.
Careers:
Put your M.S. in Cybersecurity to work delivering risk-based, business-driven security strategies and action plans.
How many courses are in the program?
Nine courses (three 6-week courses and six 12-week courses)
How quickly can I complete the program?
16 months
Get College Credit for What You Already Know
The certificates and training listed below are relevant to this degree program. Search our database to view pre-evaluated credentials and see how a license, certification or professional training saves you time and money toward your degree.
Frequently Asked Questions
The M.S. in Computer Science with a focus in Cybersecurity is a theory-to-practice master’s-level program built on a solid foundation of computer science principles, including advanced data structure and programming, algorithm analysis and distributed systems, and combined with fundamental skills in cybersecurity.
With an M.S. in Computer Science with a focus in Cybersecurity, you’ll gain specialized knowledge and skills within a computer science framework that can prepare you for a variety of positions including software developer, information security analyst and cybersecurity engineer.
With an M.S. in Computer Science with a focus in Cybersecurity, you’ll be equipped to integrate systems that align with organizational needs. Building on the core principles of a master’s-level computer science program, the cybersecurity focus enables you to customize your degree to your career aspirations.
Franklin’s M.S. in Computer Science with a focus in Cybersecurity is a 20-month, 100% online program influenced and designed by leaders in the technology industry. In Franklin’s theory-to-practice program, you’ll be taught by in-field practitioners.
Choose from three start dates each year – fall (August), spring (January) or summer (May).
Franklin University offers a quality education at a competitive cost so you can afford to invest in your future. Our per credit hour tuition rates (vs. per year or per term rates) enable you to get a realistic estimate of exactly how much your degree will cost. Our 2023-2024 tuition rate is $670 per credit hour. Use Franklin’s free MyCost Estimator to get a personalized estimate of your total degree cost. If you have any questions, ask our helpful staff about available financing options and financial aid programs.
Back to College Blog
Related Programs
- Degrees
- Microcredentials & Certificates
- Admissions
- Tuition & Financial Aid
- Transferring Credit
- The Franklin Experience
- About Us
- FranklinWORKS Marketplace
- Safety & Security
- Policy Information
- Your Privacy Settings
- Privacy Policy
- Terms of Use
- Careers At Franklin
- Sitemap
Franklin University
201 S Grant Ave.
Columbus, OH 43215
Local: (614) 797-4700
Toll Free: (877) 341-6300
admissions@franklin.edu
Copyright 2024 Franklin University
Franklin University is accredited by the Higher Learning Commission (hlcommission.org/800.621.7440) and authorized by the Ohio Department of Higher Education.
Franklin University is committed to being an inclusive community free from all forms of discrimination and harassment.
I AM A:
SHORTCUTS:
Associated Sites
- FranklinWORKS Marketplace
- Franklin University Store & Apparel
- International Institute for Innovative Instruction
- Leadership Center
- Global Center for Healthcare Education
- Center for Public Safety & Cybersecurity Education
- Best Adult Colleges & Careers Guide
- Accounting MVP Blog
- Data & Analytics MVP Blog