Skip to content

Professional Science Master’s in Cyber Defense and Information Assurance at Temple University (2023)

In a modern cyber environment, the Information Assurance and Cyber Defense program emphasizes planning, integrating, administering, hardening, and protecting all types of computer information systems and network infrastructure.

The course involves both continuous theoretical study and intensive laboratory practice to improve students’ critical thinking and problem-solving skills applied to all elements of modern computing disciplines.

Hence, the M.S. in Information and Cyber Defense program at Temple University provides prospective students with the necessary knowledge and skills to become future computer and cybersecurity professionals for both government and industry.

Reason for choosing Temple University?

Join Temple’s College of Science and Technology’s Professional Science Master’s program in Cyber Defense and Information Assurance to be an integral part of information protection and security measures.

Professionals in technology-related fields may enroll in this interdisciplinary 30-credit hour program that includes coursework in cybersecurity detection and prevention, as well as current laws and regulations.

Upon graduation, you’ll be equipped to take the lead on information protection initiatives at your company, resulting in more secure systems and data.

Cyber threats are growing in number. Consequently, new laws and technological advancements are being developed.

Taking a PSM in Cyber Defense and Information Assurance focuses on understanding an overall strategy for cybersecurity based on three principles: detection, prevention, and correction.

As a part of the Cyber Defense and Information Assurance Program, you will study:

  • We are investigating and handling electronic evidence, including analysis, collection and handling, and reporting.
  • Various types of hacking, including ethical and unethical.
  • A fundamental understanding of operating systems and computer networks and software system support, and the IP protocol suite.
  • For better protection of programs and data, model and design the software.

During the final project of the Cyber Defense and Information Assurance program, you will be presented with a real-world security issue in a professional organization.

Prerequisites for the program:

Students must complete 30 credit hours of coursework to complete the Cyber Defense and Information Assurance PSM program, including three credits toward the final capstone research project.

An organization that practices technology management identifies a security issue in the final capstone project.

Three phases must be followed in resolving the issue of security:

First Phase: Assessing the impact of the case on an organization and identifying regulatory measures that may need to be taken.

Second Phase: Perform security forensics using network and application security analysis tools and document findings.

Third Phase: During the presentation, you will share your findings with program faculty and individuals from the organization.

Class schedules and Courses offered:

To accommodate your professional schedule, most classes are held in the evenings or at weekends. Temple University’s main campus is home to research facilities and a large community of faculty from the College of Science and Technology.

The program’s core courses consist of:

  • Computer Systems Security & Privacy, 
  • Ethical Hacking & Intrusion Forensics, 
  • Introduction to Digital Forensics and 
  • Networking & Operating Systems.

Tuition and Fees:

The Professional Science Masters, which Temple offers at an affordable tuition rate with multiple ways to obtain financial support, reflects Temple’s commitment to access and affordability. A university’s tuition rates are determined annually.

They are affected by numerous factors, including program degree level (undergraduate or graduate), course load (full- or part-time), in-state or out-of-state residency, among others. The tuition costs above are for the academic year 2022-2022.

Pennsylvania resident: $1,159.00 per credit

Out-of-state: $1,514.00 per credit

Degree Requirements:

  • All candidates must hold a bachelor’s degree from an accredited university or college or be in the process of earning one.
  • Applicants not specializing in career change must have studied computer programming in a modern programming language with a solid understanding of algorithms and data structures (or have equivalent work experience).
  • Candidates entering the career change specialization do not need programming experience or knowledge of data structures and algorithms.
  • A student must enrol in COSC 6500 Foundations of Computing, a boot camp-like course that meets the prerequisites for a career in computing and provides the proper introduction.

Application Process:

  • Write an essay explaining relevant work experience and education, career goals, possible areas of interest, and reasons for applying.
  • The applicant should provide three letters of reference from professors and professionals familiar with their abilities, academic work, and professional backgrounds.
  • GRE (General Test) scores (for merit-based students applying for financial aid).
  • For international students who have not attended an English-speaking university, a minimum TOEFL score of 80 on the Internet-based version or other acceptable proof of English proficiency.


Information security is intended to protect the confidentiality, integrity, and availability of computer systems and biological data from unauthorized access regardless of whether malicious intent may have been planned.

Hence, it is essential to gain knowledge on Information security and Cyber Defense.

Kevin James

Kevin James

I'm Kevin James, and I'm passionate about writing on Security and cybersecurity topics. Here, I'd like to share a bit more about myself. I hold a Bachelor of Science in Cybersecurity from Utica College, New York, which has been the foundation of my career in cybersecurity. As a writer, I have the privilege of sharing my insights and knowledge on a wide range of cybersecurity topics. You'll find my articles here at, covering the latest trends, threats, and solutions in the field.