Skip to content

Master’s in Information Assurance and Cyber Defense From Marquette University (2023)

In a modern cyber environment, Information Assurance and Cyber Defense program places emphasis on the planning, integrating, administering, hardening, and protecting of all types of computer information systems and network infrastructure.

The course involves both continuous theoretical study as well as intensive laboratory practice to improve students’ critical thinking and problem-solving skills applied to all elements of modern computing disciplines. 

Hence, the M.S. in Information and Cyber Defense program at Marquette University provides prospective students with the necessary knowledge and skills to become future computer and cybersecurity professionals for both government and industry.

Why choose Marquette University?

  • Marquette University is recognized as a Center of Excellence in Cyber Defense Education program by the National Security Agency and the Department of Homeland Security because of its specialization in Information Assurance and Cyber Defense. 
  • Students pursuing the master’s degree in computing program at Marquette are prepared to be leaders in the field, and a program is an option for students with no background in computer science.  
  • Throughout the Information Assurance and Cyber Defense specialization, we provide expertise in the areas of planning and managing security interventions and defenses for networks, databases, and computing infrastructure. 
  • In this specialization, university courses cover a wide range of technical topics. Understanding is reinforced by gaining practical experience after completing classroom exercises and studying theory. 
  • Students can choose evening and blended delivery options and the curriculum and faculty of the on-campus program are identical to our online program, which was ranked sixth in U.S News and World Report’s 2021 Best Online Master’s in Information Technology Programs.

Areas of expertise: 

  • The computing program enables students to customize their curriculum or incorporate cybersecurity into their studies via a Cybersecurity Specialization.
  • The program offers a career-change pathway for students without a background in computer science through its Computing Career Change Opportunity (COSMIC) specialization.

Program Overview:

  • Computers encompass a diverse range of disciplines, including computer science, computer engineering, software engineering, information systems, and information technology.
  •  The computing program offers students the flexibility to study any combination of these disciplines.
  •  Besides computer science courses, the program allows students to take courses from engineering and business and to choose electives outside the program.
  • The program seeks to meet the educational needs of current or upcoming computing professionals looking for a new career opportunity or looking to update their skills.
  • These careers include fields such as cyber security, data analytics, business analysis, software engineering, project management, enterprise architecture, process modeling and management, database design and management, and technology management and service management
  • From among the dozens of approved courses offered by the Department of Computer Science, the Department of Electrical and Computer Engineering, the Graduate School of Management, the Department of Mathematical and Statistical Sciences, and other campuses on campus, students can choose courses that fit their interests.
  • For students who choose a specialization, coursework constitutes approximately half of the number of credit hours required for the degree.
  • Part-time or full-time study options are available for pursuing this degree.
  • Students may attend classes in the evenings or online.
  • Several courses are offered via distance learning in the department, which provides program flexibility.

Degree Requirements:

  • All candidates must hold a bachelor’s degree from an accredited university or college or be in the process of earning one.
  • Applicants not specializing in career change must have studied computer programming in a modern programming language with a solid understanding of algorithms and data structures (or have equivalent work experience).
  • Applicants who want to change their career specialization are not required any prior programming experience or knowledge of data structures and algorithms.
  • A student must nonetheless enroll in COSC 6500 Foundations of Computing, which is a boot camp-like course that meets the prerequisites for a career in computing and provides the proper introduction.

Application Process:

Please submit your application to the Graduate School, directly:

  • Submit the application form, along with the application fee.
  • Please submit copies of all transcripts except those from Marquette University.
  • Write an essay explaining relevant work experience and education, career goals, possible areas of interest, and reasons for applying.
  • The applicant should provide three letters of reference from professors and/or professionals familiar with their abilities, academic work, and/or professional backgrounds.
  • GRE (General Test) scores (for merit-based students applying for financial aid).
  • For international students who have not attended an English-speaking university a minimum TOEFL score of 80 on the Internet-based version or other acceptable proof of English proficiency.


Security of information is intended to protect the confidentiality, integrity, and availability of computer systems and physical data from unauthorized access regardless of whether malicious intent may have been intended.

Hence, it is essential to gain knowledge on Information security and Cyber Defense.

Kevin James

Kevin James

I'm Kevin James, and I'm passionate about writing on Security and cybersecurity topics. Here, I'd like to share a bit more about myself. I hold a Bachelor of Science in Cybersecurity from Utica College, New York, which has been the foundation of my career in cybersecurity. As a writer, I have the privilege of sharing my insights and knowledge on a wide range of cybersecurity topics. You'll find my articles here at, covering the latest trends, threats, and solutions in the field.