MS in Cybersecurity

GRADUATE

MS in Cybersecurity

APPLICATIONS

Now Open For Fall 2025

START DATE

September 2025

APPLICATION DEADLINE

Rolling Admissions

FEES

No Application Fee

Earn your MS in Cybersecurity 100% online from The American University of Greece Global Campus (AUGGC). This 33-credit program prepares you to protect critical infrastructure, respond to evolving cyber threats, and lead with both technical and strategic expertise. Designed for early- and mid-career professionals, the program balances flexibility with real-world skills demanded in today’s job market. 

**Term 1 – Foundations**: 

• Network Protocols & Cloud Infrastructure 

This course aims to impart a comprehensive understanding of common network protocols, their associated vulnerabilities, cloud environments and the best practices for securing them. Through a blend of theoretical and practical sessions, students will examine the security features and weaknesses of protocols such as HTTP/HTTPS, FTP, SNMP, and many more. By the end of this course, students will have acquired the necessary knowledge and skills to understand the intricacies of network protocols as well as cloud infrastructures in the context of cybersecurity. They will be proficient in identifying vulnerabilities and applying best practices to secure network protocols, thereby contributing to more robust cybersecurity postures.  

• Operating Systems & Lab Environments 

This course is designed to provide an in-depth understanding of operating system (OS) security, focusing on various platforms such as Windows, Linux, and macOS. Students will also learn to set up their own lab environments using virtualization technologies, allowing them to simulate real-world OS security scenarios on their personal computers. Upon completion of this course, students will have gained the expertise to secure various operating systems against common vulnerabilities. Additionally, they will have hands-on experience in setting up and managing a virtual lab environment, which will serve as a foundation for future cybersecurity experiments and learning.  

• Digital Forensics & Computer Analysis 

This course delves deep into the realm of digital forensics, focusing on the processes, methodologies, and hands-on skills needed to conduct forensic analysis of computer systems. With an emphasis on practical application, students will use real-world tools to understand the intricacies of uncovering digital evidence and preserving its integrity for potential legal proceedings. Upon completion of this course, students will have a comprehensive understanding of the field of digital forensics. They will possess the skills to conduct forensic investigations, ensuring the validity and integrity of digital evidence, and will be well-prepared to navigate the challenges of the ever-evolving digital landscape.  

• Penetration Testing & Ethical Hacking 

This course provides students with a comprehensive understanding of penetration testing methodologies and ethical hacking practices. Students will explore various cyber-attack techniques, effective defence strategies, and the broader business implications associated with cybersecurity incidents. By integrating theory with practice, students will gain hands-on experience executing simulated penetration tests, applying industry-standard methodologies, and understanding how ethical hacking aligns with risk management, compliance, and security awareness. Upon completion, students will possess both the technical competence and strategic insight needed to evaluate cybersecurity risks and understand the business value derived from penetration testing and ethical hacking activities. 

 

**Term 2 – Advanced Concepts**: 

• Applied Cryptography 

This course is designed to provide advanced insights into the application of cryptographic techniques within the domain of cybersecurity. As an integral part of the MSc in Cybersecurity program, Applied Cryptography explores the strategic role of cryptographic protocols and algorithms in securing digital information, communication and systems. The course covers symmetric and asymmetric encryption, digital signatures, secure communication protocols, cryptographic key management and basic cryptanalysis techniques. Emphasis is placed on acquiring hands-on experience in implementing cryptographic algorithms in various programming languages and addressing contemporary cybersecurity challenges, including data protection, user authentication and message integrity.  

• Offensive Cyber Strategies 

This advanced module serves as a continuation of the introductory penetration testing and ethical hacking path. It dives deeper into more sophisticated attack vectors, modern exploitation techniques, and complex environments. This path also addresses the managerial complexities of overseeing advanced penetration testing projects, focusing on business impact, compliance, ethics, and governance. By the end of this advanced path, students will have gained in-depth technical and managerial insights into penetration testing and ethical hacking. Students will acquire hands-on skills in executing sophisticated penetration tests, understand the managerial aspects such as governance, risk assessment, and compliance. Students will be prepared for leadership roles in modern cybersecurity landscapes.  

• Law & Compliance (GDPR, HIPAA, PCI-DSS) 

Law and Compliance in Cybersecurity series, aims to provide a comprehensive foundation on legal and compliance issues that organizations face in the realm of cybersecurity. This path will cover various laws, regulations, and compliance frameworks that govern the collection, storage, and transmission of data, as well as the criminal and civil ramifications of cybersecurity incidents. Data protection laws like GDPR, CCPA and sector specific regulations such as HIPPA and PCI DSS will be analyzed alongside compliance frameworks like ISO 27001 and NIST. By the end of this path, students will be well-equipped to navigate the complex landscape of laws and compliance requirements that pertain to cybersecurity. This path is particularly beneficial for those aspiring to roles that bridge the gap between legal, compliance, and cybersecurity functions within an organization. It also dives deep into practical case studies, primarily focused on the General Data Protection Regulation (GDPR) and other European cybersecurity laws alongside with ENISA directives.  

 

**Term 3 – Innovation & Application**: 

• Artificial Intelligence in Cybersecurity 

This course aims to bridge the gap between artificial intelligence (AI) and cybersecurity by focusing on the practical applications and implications of Data analytics, AI and machine learning (ML) in securing digital assets. The curriculum will introduce the fundamentals of AI and ML, followed by in-depth discussions on their roles in enhancing cybersecurity measures and resilience against cyber threats. By completing this course, students will gain a multi-faceted understanding of how artificial intelligence and machine learning are revolutionizing the field of cybersecurity. They will be equipped with the knowledge to critically evaluate and implement AI-powered cybersecurity solutions, considering both technical efficacy and ethical considerations. This course is ideal for cybersecurity professionals looking to advance their career by integrating AI-driven strategies into their skillset.  

• Intrusion Detection & Incident Response 

Intrusion Detection and Incident Response lecture series aims to equip students with the essential knowledge and skills in intrusion detection systems (IDS) and incident response (IR) in cybersecurity. The course will cover methodologies, tools, and best practices in detecting and responding to various types of cyber threats and incidents. By the end of this lesson series, students will be well-equipped to design, implement, and manage intrusion detection systems and incident response strategies effectively. This course is crucial for those aspiring to roles such as Incident Responder, Security Analyst, or Cybersecurity Consultant.  

• Risk Assessment & Policy 

This module provides students with a comprehensive understanding of risk assessment methodologies and the development of cybersecurity policies that safeguard organizations from digital threats. It explores how companies can identify, evaluate, and mitigate risks while implementing policies that align with industry standards and regulatory requirements. This path prepares students for roles such as Cybersecurity Analyst, Risk Manager, Security Consultant, and Compliance Officer by equipping them with essential risk management and policy development skills. Organizations today prioritize risk assessment and policy enforcement to safeguard digital assets, making these skills highly valuable in the cybersecurity landscape. 

• Capstone or Thesis Project 

The Capstone Project is practice-oriented, focusing on the technical implementation of applied concepts without the requirement for an extensive literature review or scholarly analysis.  The Master’s Thesis is research-oriented, requiring a comprehensive review of the academic literature, critical analysis, and original contribution within a focused area of cybersecurity. 

Welcome to the MS in Cybersecurity at The American University of Greece Global Campus.

We live in a time when digital innovation drives progress across every industry—but also introduces new vulnerabilities and evolving threats. The demand for highly skilled cybersecurity professionals who can lead with both technical expertise and strategic insight has never been greater.

Our fully online MS in Cybersecurity is designed to meet this need by preparing forward-thinking professionals to protect digital infrastructures, manage risk, and lead with confidence in complex organizational environments. What sets this program apart is its interdisciplinary, business-friendly approach. We go beyond technical training to help you understand how cybersecurity decisions impact real-world systems—from corporate environments to critical public services.

Our faculty includes leading experts from across Europe and the world, each bringing hands-on experience and research in areas such as ethical hacking, cloud infrastructure, digital forensics, and cybersecurity management. You’ll engage with a practical, flexible curriculum rooted in real-world applications, industry standards, and ethical frameworks.

Whether you’re advancing your current career or transitioning into the cybersecurity field, this program offers the knowledge, tools, and global perspective you need to succeed.

I invite you to join us—and become part of the next generation of cybersecurity leaders.

Warm regards,
Dr. Konstantinos Vavousis
Program Director, MS in Cybersecurity
AUG Global Campus

Term 1: Foundations of Cybersecurity

In the first term, students are introduced to the core concepts of cybersecurity, including network protocols, vulnerabilities, and cloud infrastructure. Students will also gain hands-on experience in operating systems and digital forensics. The courses are designed to establish a strong foundation in both the theoretical and practical aspects of cybersecurity.

· Network Protocols Vulnerabilities & Cloud Infrastructures -Learn about key vulnerabilities in network protocols and cloud infrastructures and understand how to secure these critical systems.

· Operating Systems & Lab Environments - Gain practical experience in managing operating systems and learn to troubleshoot and secure systems in various lab environments.

· Digital Forensics & Computer Analysis - Understand the techniques of digital forensics and computer analysis, including the tools and methodologies used to investigate cybercrimes.

· Penetration Testing & Ethical Hacking - Dive into penetration testing techniques and ethical hacking practices, learning to identify vulnerabilities in systems before malicious attackers can exploit them.


Term 2: Advanced Cybersecurity Concepts

The second term dives deeper into specialized areas of cybersecurity, including cryptography, advanced offensive strategies, and compliance regulations. Students will gain the technical and legal expertise necessary to address complex cybersecurity challenges in today's digital landscape.

· Applied Cryptography - Study cryptographic techniques used to protect data in transmission and storage, including encryption methods and key management practices.

· Advanced Cyber Offensive Strategies - Build on the foundational knowledge from Term 1 with advanced penetration testing techniques. This course includes practical labs and real-world attack simulations.

· Law & Compliance in Cybersecurity - Explore the legal aspects of cybersecurity, including privacy laws, regulatory compliance, and best practices for ensuring organizational security, focusing on global compliance frameworks such as GDPR, PCI-DSS and HIPAA.


Term 3: Emerging Trends and Final Project

In the final term, students will tackle cutting-edge topics in cybersecurity, such as the use of artificial intelligence in security and advanced intrusion detection systems. The program culminates with a capstone project or thesis, allowing students to apply their knowledge to a real-world cybersecurity challenge.

· Risk Assessment & Cybersecurity Policies - This course enhances students’ understanding of the essential elements of risk assessment and the creation of effective cybersecurity policies for companies and organizations.

· Artificial Intelligence in Cybersecurity - Learn about the role of AI in detecting and preventing cyber threats, and explore the future potential of AI in cybersecurity defense strategies.

· Intrusion Detection & Incident Response - Study the techniques used to detect intrusions and respond to cyber incidents, including real-time monitoring, threat detection, and incident management.

· Capstone/Thesis

Apply your knowledge to a real-world cybersecurity project or research thesis. The capstone project provides an opportunity to showcase your skills and contribute to the field.

What Will You Learn?
1. Network Protocols Vulnerabilities & Cloud Infrastructures
2. Operating Systems & Lab Environments
3. Digital Forensics & Computer Analysis
4. Penetration Testing & Ethical Hacking
5. Applied Cryptography
6. Law & Compliance in Cybersecurity
7. Artificial Intelligence in Cybersecurity
8. Intrusion Detection & Incident Response
9. Advanced Cyber Offensive Strategies
10. Risk Assessment & Cybersecurity Policies

  • Cybersecurity Strategy & Governance
    • Develop and apply strategic cybersecurity frameworks to manage enterprise risks, align with business objectives, and ensure compliance with global standards and regulations.
  • Network Security & Infrastructure Protection
    • Evaluate and secure network systems, cloud environments, and critical infrastructures using best practices in network architecture, monitoring, and threat mitigation.
  • Threat Analysis & Incident Response
    • Identify, analyze, and respond to cyber threats and incidents using contemporary tools, ethical hacking techniques, and digital forensics methodologies.
  • Security Risk Management & Policy Development
    • Assess organizational security risks and design robust, policy-based mitigation plans that incorporate business continuity, access control, and regulatory compliance.
  • Ethical & Legal Considerations in Cybersecurity
    • Navigate ethical dilemmas and legal obligations in cybersecurity, demonstrating awareness of global data protection laws and professional codes of conduct.
  • Secure Systems Design & Software Assurance
    • Apply secure design principles to software, applications, and systems throughout the development lifecycle to prevent vulnerabilities and reduce attack surfaces.
  • Communication & Leadership in Cybersecurity
    • Communicate complex cybersecurity issues clearly to diverse stakeholders and lead multidisciplinary teams in implementing effective security strategies.
  • Applied Research & Professional Development
    • Conduct evidence-based research and apply emerging technologies, trends, and best practices to support continuous learning and professional growth in the cybersecurity field.

Affording your MS In Cybersecurity degree at The American University of Greece Global Campus

The American University of Greece Global Campus (AUGGC) is proudly accredited by the New England Commission of Higher Education (NECHE) and authorized by the Massachusetts Board of Higher Education. As an international institution from a financial aid perspective, AUGGC students are not eligible for U.S. federal financial aid. However, we are committed to making high-quality, globally recognized education accessible and affordable.

Our base tuition is highly competitive by North American standards, and we encourage students to explore a variety of funding options, including private loans, employer tuition benefits, and other financial resources.

Our admissions team is available to discuss payment plans and help you identify the best options for making your education at AUGGC a reality.

The MS in Cybersecurity Full Degree Cost: $14,025*

*Please note that base tuition does not include technology and graduation fees. AUGGC reserves the right to adjust pricing as needed.
While tuition is listed in USD, students may pay in their local currency at the prevailing exchange rate through standard credit card payments.

Scholarship and discount opportunities are available. 

  • EU residents automatically receive a 25% tuition reduction, which can be combined with Alumni and Study Abroad Ambassador Discounts. 
  • North American and other non-EU residents may qualify for merit-based scholarships of up to 20%, which can also be combined with the Alumni and Study Abroad Ambassador Discounts.  
  • See here for more information: Paying for Your Education.
  • Ask about our special Global Alumni Scholarship of 25% if you complete your application by August 18, 2025.

The MS in Cybersecurity is designed for early- to mid-career professionals who are looking to build or transition into a career in cybersecurity, digital infrastructure protection, or information security management.

Ideal candidates include:

  • STEM or IT graduates seeking advanced specialization in cybersecurity
  • Professionals in tech-adjacent fields (e.g., engineering, systems analysis, telecommunications) aiming to pivot toward cybersecurity roles
  • IT managers and network administrators expanding their knowledge in risk management, cloud security, and incident response
  • Career changers with foundational technical skills looking to break into the cybersecurity domain

Aspiring leaders in public or private sectors who want to understand cybersecurity from both a technical and strategic perspective

Key characteristics:

  • Strong analytical and critical thinking skills
  • Interest in ethical hacking, digital forensics, and cyber risk governance
  • Motivation to lead and secure complex digital systems
  • Comfort with technology and willingness to engage in hands-on, practical learning

Whether you’re working in tech, business, or government—or entering the cybersecurity field for the first time—the program is structured to support flexible, applied learning for professionals across the globe.

Graduates of the MS in Cybersecurity are well-positioned for high-impact roles across a range of industries—from finance and healthcare to government and tech. The program prepares you to combine deep technical knowledge with strategic business awareness, making you highly competitive in today’s job market.
 
Top Career Paths & Estimated Salary Ranges
Job Title Average Salary (USD)
  • Cybersecurity Analyst: $70,000 – $110,000
  • Information Security Manager:  $95,000 – $145,000
  • Network Security Engineer: $85,000 – $130,000
  • Ethical Hacker / Penetration Tester: $80,000 – $120,000
  • Cybersecurity Consultant: $90,000 – $140,000
  • Digital Forensics Specialist: $75,000 – $115,000
  • Cloud Security Architect: $110,000 – $160,000
  • IT Risk & Compliance Analyst: $75,000 – $125,000
  • Chief Information Security Officer (CISO):   $150,000 – $250,000+ (with experience)
 
Salary ranges vary by region, level of experience, and industry sector. However, the global demand for cybersecurity professionals continues to grow—especially in roles that combine technical expertise with leadership, risk management, and policy development.
 
The MS in Cybersecurity from AUGGC equips you with exactly that skillset, helping you thrive in a world where secure, ethical, and resilient digital systems are essential.

Admission Requirements for Graduate Programs 

At the American University of Greece Global Campus, we consider a student’s lived experience.  

Admission is open to individuals who demonstrate basic proficiency in relevant areas through formal education, professional experience or alternative verifiable means such as relevant courses and/or certifications. Applicants are expected to have:  

  • Basic Programming Skills –demonstrated through a certificate or proven proficiency during an interview.  
  • Foundational Knowledge in Networking—evidence by a networking course or equivalent practical experience.  
  • Introductory-level IT experience—such as internships, research placements, or other hands-on exposure to computing, cybersecurity, or software environments. 
  • General Proficiency with Operating Systems and Standard IT tools. 

The admissions requirements below are guidelines. 

The minimum graduate admission requirements are: 

1. A bachelor’s degree in any discipline from an accredited institution with an average G.P.A. of 3.0 or better. 

  • Applicants who do not meet the minimum criteria may be admitted to the program on conditional status if the institution perceives other strengths in their application (e.g., strong research or relevant work experience, or other outstanding achievements during the applicants’ undergraduate experience). 

2. Motivation to undertake graduate-level study and work to also be determined by: 

  • Two recommender’s contact information 
  • A personal statement of approx. 500 words submitted with the application form 
  • An interview is optional and under the discretion of the Admissions Committee 

4. English Proficiency Requirement for Admission 

The American University of Greece (AUG) Global Campus delivers all programs in English. To ensure student success in an online learning environment, applicants whose primary language is not English must demonstrate English proficiency through one of the following pathways: 

  • 1. Standardized English Language Tests 
    • Applicants may submit official test scores meeting or exceeding the following minimum requirements: 
    • TOEFL iBT: 87 
    • IELTS Academic: 6.5 
    • Duolingo English Test: 125 
    • PTE Academic: 59 
    • Cambridge/Michigan/MSU English: Proficiency 
    • Official test scores must be no more than two years old. 

 

  • 2. Previous Education in English 
    • Applicants may be exempt from submitting test scores if they have completed: 
    • A bachelor’s degree (or equivalent) from an accredited institution where English was the primary language of instruction. 
    • At least two years of full-time secondary or postsecondary education in an English-speaking country or an institution where English is the primary language of instruction. 
    • Applicants must provide official transcripts and, if necessary, documentation from the institution confirming English as the language of instruction. 

Additional Considerations: 

  • AUG Global Campus reserves the right to request an interview to further assess English proficiency. 
  • Applicants who have completed international curricula such as the International Baccalaureate (IB) or British A-Levels in English may also qualify for an exemption. 
  • For applicants who do not meet the minimum scores but are close, a case-by-case review may be conducted, particularly for those with strong academic backgrounds. 

5. Identification in the form of: Birth Certificate or Passport (to determine scholarship level where applicable) 

6. Completed online application 

Note: American University of Greece Global Campus is not eligible for the United States of America Federal Aid. 

 

 

AI vs. AI: The Cybersecurity Arms Race

As AI tools become more accessible, hackers are leveraging them to craft smarter, faster attacks—from phishing emails indistinguishable from real communication to polymorphic malware that evolves with every breach attempt.
 
At the same time, cybersecurity teams are deploying machine learning models, predictive analytics, and automated defense systems to stay ahead.
 
“We're seeing a new class of threats that adapt in real time—just like living organisms,” says Dr. Konstantinos Vavousis, Program Director of the MS in Cybersecurity. “Our graduates must not only understand these AI-powered threats—they must outsmart them.”
 
What We Teach at AUGGC
Students in the MS in Cybersecurity program engage directly with this evolving challenge through:
  • Ethical Hacking & AI threat modeling
  • Machine learning for anomaly detection
  • Simulated red/blue team exercises using AI agents
  • Deep discussions on digital ethics and AI governance
 
Faculty Spotlight
“AI is redefining the entire cyber landscape,” explains Dr. Vavousis.“That’s why our program blends deep technical skills with strategic foresight—so our students graduate ready to lead, not just react. This isn’t about learning yesterday’s threats,” notes Dr. Vavousis. “The MS in Cybersecurity at AUGGC is designed to prepare students for what's next—from deepfakes and autonomous malware to ethical dilemmas AI brings to security decision-making. The cybersecurity leaders of the future won’t just monitor systems—they’ll design intelligent, adaptive defenses that evolve faster than the attackers,” adds Dr. Vavousis.