Complete OPSC-501
Explore Information Security with Operations Track
Take your cybersecurity expertise to the next level with our advanced online information security program designed for professionals involved in day-to-day system and network operations at mid-to-large sized enterprises. This unique master's in information security degree - focused on hands-on learning and real-world application - was developed in response to industry demand for a different kind of cybersecurity professional, one who is adept in both the strategic and tactical aspects of security operations.
Differentiate Your Master's Degree
By immersing yourself in the operations track of our MS in Information Security you will develop your strategic thinking around IT security, vulnerabilities, response to security incidents, and enterprise protection. Foster your ability to respond to situations in a different way–beyond just protocol–and become the creative problem solver needed in the midst of incidents.
A National Leader in Cybersecurity
Champlain is a nationally recognized leader in cybersecurity and digital forensics education and home of the Senator Patrick Leahy Center for Digital Investigation & Cybersecurity. With a robust faculty of expert-practitioner instructors who have significant experience working for top organizations and are sought-after thought leaders in the field, we specialize in building agile cybersecurity and digital forensics programs that the meet mission-critical needs of today's businesses, nonprofit organizations, and state and federal governments.
Champlain has been designated a National Center of Academic Excellence in Cyber Defense Education by the U.S. National Security Agency and the Department of Homeland Security since 2006, and Champlain cybersecurity programs have been named best in the nation by SC Magazine. Champlain is also designated as a National Center of Digital Forensics Academic Excellence by the Defense Cyber Crime Center (DC3) Air Force Office of Special Investigations - the fifth college in the nation to receive this distinction.
Build Your Career Future
Champlain's online master's in information security operations goes beyond a traditional cybersecurity master's degree to help students become security professionals who think strategically about the prevention of and response to security incidents, vulnerability management, and IT security overall. Learn to identify risks, understand current attack vectors, protect enterprise networks, use multiple cloud and software applications fluently, and fill the gap between policy-driven information assurance and the technical "live by the runbook" model.
You'll emerge from the program with a strategic, integrated view of information security, incorporating networks, computer systems, and human-oriented processes. You'll also gain essential professional skills, such as communication, critical thinking, and leadership, that are required in today's security professionals and will be key assets for future career advancement as technology changes.
Take the next step
Academic Excellence and Recognition
Regionally accredited by the New England Commission of Higher Education
Designated as a Military Friendly School for our commitment to the military community
Ranked among the best by Tech Guide for game design and computer science
Named the among the best schools with accelerated bachelor's degrees by Intelligent.com
Prepare For What's Next
As the threat of cyber attacks rises, organizations across all sectors are seeking strategic IT security experts to anticipate, mitigate, and thwart cybercrime at an operational level. With a valuable combination of technical acumen, subject matter expertise, and critical professional skills, graduates of Champlain's master's in information security program will be prepared to pursue advanced roles in the security operations field.
Master's degrees are in high demand and employment in master’s-level occupations is projected to grow by 15% from 2019 to 2029. A master's degree also pays off: the median salary for professionals with a master's degree is $78,210. Additionally, computer and information technology occupations are projected to grow 13% from 2020 to 2030 - much faster than the average for all occupations.*
*Sources: Bureau of Labor Statistics (BLS), 2020; job titles: cyberdegrees.org, 2020
Top Jobs for MS in Information Security Graduates
- Chief InfoSec Officer
- Forensics Expert
- Incident Responder
- Security Administrator/Analyst
- Security Consultant
- Security Engineer
- Vulnerability Assessor
Program Details
Learn more about Champlain's 100% online master's in information security with an operations track, designed for working professionals.
Champlain's online infosec courses encompass the top skills needed by today's information security professionals. Complete 12 credits of required courses, and then complete your focus in Operations.
- Required Courses: 12 Credits
- Operations Track: 18 Credits
* For admission to this program, students must demonstrate previous coursework and/or experience in information technology (IT) and Digital Forensics. Students who do not display sufficient IT knowledge and skills will need to complete CMIT-500 before starting the program.
Required Courses
Understanding risk and identifying the threats organizations face are essential skills for today's information security professionals. In this course that introduces students to the graduate degree program, students learn to compute impact scores for vulnerabilities, classify data, and use Champlain College Online's virtual environment to explore how to use IOCs (Indicators of Compromise).
Security controls are used to maintain confidentiality, integrity and availability of systems and typically enterprise architectures are built using frameworks. Students move beyond defense in depth and breadth strategies and "learn by doing" in this course, working in the virtual environment with tools like Nmap, Open-AduIT, Splunk, and more.
Prerequisites
Hands-on labs and assignments using Kali Linux, Metasploitable, Nessus and Armitage build on previously acquired knowledge of threat and vulnerability classification in this course that allows students to use the knowledge of a vulnerability to perform threat analysis. Vulnerability and patch management processes are also addressed.
Prerequisites
Complete OPSC-501
It's not a question of if an incident will take place, but when. Organizations must assume they will suffer a breach, data loss or other security event that will impact operations. Students learn to prioritize events, develop and document an incident response plan, and identify the role of forensic investigations in incident response as well as use tools to perform USB and memory forensics exercises.
Prerequisites
Complete OPSC-520 and OPSC-501
Game theory provides a framework for understanding complicated problems and predicting outcomes. In this course, students evaluate security threats and vulnerabilities using game theory principles. Discussions, quizzes and assignments introduce students to concepts and strategies like Nash Equilibrium and strict dominance.
Prerequisites
Complete OPSC-501
Scripting languages like Python can help security professionals extend available tools but also create new tools to address specific needs. Extensive labs in this course have students attacking MD5 hashes, web scraping, parsing security logs and breaking a cipher.
Prerequisites
Complete OPSC-501
An excellent primer for the capstone, this course is jam-packed with hands-on activities! Students use the virtual environment to test open source software, compare Nmap, netcat and Angry IP Scanner, test WordPress vulnerability scanners, and experiment with Armitage attacks on Metasploitable. Also, students learn to document findings with reporting tools in Kali Linux and even write a test plan.
This exciting capstone class is where students get to "talk the talk and walk the walk" of information security professionals. Broken into two virtual teams that must defend and attack multiple devices on two networks, students spend three weeks working in a virtual environment. They must configure firewalls, patch systems, maintain services and exploit vulnerabilities in an attempt to gain access and then persistence. Opportunities to reflect and assess performance are also part of the WarGames Capstone experience.
Prerequisites
OPSC-510 and complete 27 credits in OPSC
* May choose two of any of these four courses, however may only choose OPSC 535 or OPSC 565 you cannot take them both.
Students will gain an understanding and respect for emerging technology by exploring current trends in security and examining topics such as artificial intelligence, machine learning, blockchain and behavior analytics. Students will analyze the science behind these technologies as well as the ethical and privacy concerns and implications that may hinder their widespread adoption.
Prerequisites
Take OPSC-501
Are you ready for a challenge? This course teaches students to evaluate malware samples to determine their infection vector, identify strategies used by malware to remain present on systems, and recommend solutions to prevent and detect malware attacks. Students work with malware samples throughout the course on virtual machines. Use caution!
Prerequisites
Complete OPSC-530
Students will learn to differentiate privacy from security and how international, federal and state regulations impact organizations and govern the security of information systems and data. They will also identify security standards, survey compliance frameworks, measure return on security investment and assess the effectiveness of a security awareness program.
Prerequisites
Complete OPSC-501 and OPSC-515
Today's adversaries are organized and well-funded which is why security professionals must understand their tactics and targets. Students in this course learn to distinguish cyberwarfare from cybercrime, and the differences between nation-states and APTs (Advanced Persistent Threats). The methods may differ but the target stays the same, especially when social engineering is involved.
Prerequisites
Complete OPSC-530
In addition to developing advanced communication and analytical skills, and an agile, strategic mindset, graduates of the information security master's online program will demonstrate a mastery of the following industry-specific competencies:
- Develop system and data classification criteria based on both stated and innate levels of value and sensitivity.
- Evaluate systems and data resources using established criteria to prioritize their value and respond strategically.
- Assess attack strategies through the use of analysis techniques and recommend defenses to those attacks.
- Identify vulnerabilities within an enterprise system, and propose and implement effective remediation/response.
- Recommend strategies to improve existing network and system protection schemes based on observed attack patterns.
- Analyze common intrusion patterns to identify potential attack vectors and strategically enhance defenses.
- Protect systems through informed selection and application of exploits, based on known or observed vulnerabilities.
- Propose appropriate data sources and create methods of analysis to aid in tracking and detection attacks.
- Determine appropriate controls to detect suspicious behavior within systems and networks and provide recommendations to leadership.
- Angri IP Scanner
- Armitage
- Kali Linux
- Metasploitable
- Nash Equilibrium
- netcat
- Nessus
- Nmap
- Open-AduIT
- Python
- Splunk
Students will also be able to:
- Use Indicators of Compromise (IOCs)
- Evaluate threats using game theory principles
- Use honeypots and effective defenses against Distributed Denial of Service (DDos) attacks
- Conduct port and network scans
- Perform USB and memory forensics exercises
- Attack MD5 hashes
- Perform web scraping, parse security logs, and break a cipher
- Configure firewalls and patch systems
- Understand how to exploit vulnerabilities
- Evaluate malware samples to determine infection vectors, identify strategies used, and recommend solutions to prevent and detect attacks
- Distinguish cyberwarfare from cybercrime, and nation-states from APTs (Advanced Persistent Threats)
In addition to the admission requirements for all graduate program applicants, our online master's of information security program has specific requirements that must be met.
Related Work Experience Requirement
We expect that applicants have a minimum of 2 years work experience. Applicants with limited work experience will be considered on a case-by-case basis. Due to the cybersecurity talent shortage, Champlain no longer requires applicants to have work experience in an IT or cybersecurity field. However, applicants who lack 2 years experience in the field may need to complete additional requirements while in the program.
Related Bachelor's Degree Requirement
Applicants to the master's in information security program must hold a bachelor's degree from a regionally accredited institution with at least a 2.5 GPA or equivalent. While a focus in information technology, computer science, cyber security or similar discipline is preferable, those who hold a bachelor's degree in another discipline are encouraged to apply.
For those without an IT or Cybersecurity background completion of CMIT 500 will be required. For those with an IT background, but not cybersecurity, CMIT 500 may be suggested.
Champlain College Online's computer science faculty, led by Department Chair Richard Pickering, are expert practitioners in the field. Their industry expertise ensures that our curriculum is aligned with the needs of employers, and reflects the skills today’s IT systems professionals need for success. Classes led by our seasoned experts will give you real-world insight into the world of information technology, and create a rich community of career-focused learning.
Alumni of the Champlain College Online Master's in Information Security program work in corporations, small businesses, government organizations, and non-profits nationwide, including:
- American Systems
- AT&T
- Cisco Systems
- Dealertrack Technologies
- Department of Navy
- E&J Gallo Winery
- Internal Revenue Service
- Kova Corp
- MetLife
- Moog
- PFI Tech
- Phillips Healthcare
- PWC
- Red Hat, Inc.
- Naval Information Warfare Center
- SHI
- Securities and Exchange Commission (SEC)
- Social Security Administration
- Sun National Bank
- TJX Companies, Inc.
- U.S. Air Force
Titles our alumni hold include:
- Acquisition Program Manager
- Cell Phone Forensics Examiner
- Cyber Threat Analyst
- Industry Solutions Architect
- Information System Security Officer
- Integration Data Center Technician
- Interoperability Developer
- IT Specialist
- Network Integrator
- Professional Security Engineer
- Security Analyst II
- Security Engineer
- Security Systems Specialist
- Senior Design Engineer
- Supervisory Information Technology Specialist
- Systems Administrator
- Technical Information Engineer IT System
- VPN Lead Network Security
Increasing your career mobility is at the center of everything we do. As an online master's degree student, you get free access to the Fast Start Formula Career Bundle for getting noticed and getting hired, taught by Jen Morris, a leading executive career coach that partners with us to support our students in their job search journeys.
Tuition & Costs
Graduate Tuition Fall '23 - Summer '25
*Based on a 3-credit course; cost will vary if course is a different number of credits
** Starting Summer 2024, not retroactive
See the graduate cost of attendance and fees here
Meet The Program Director
Benjamin Luthy, MS, CISSP, CISM, CDPSE
- Cybersecurity
- Cybersecurity Analytics
- Information Security
About
Benjamin Luthy has over 20 years of experience in delivering client-focused technical solutions to safeguard information systems and data in highly regulated environments. He holds multiple industry certifications reflecting his commitment to continuous learning and expertise in security and enterprise technologies. His research interests include information security, intelligence, and cloud computing and traditional infrastructure. As a recognized speaker at industry conferences, he has shared insights on strengthening cyber compliance and has been actively involved in competitive cybersecurity events, including winning the B-Sides Las Vegas Capture the Flag Competition on the 'Joes' team for his work in Windows Operating System Defense.
Outside of his professional pursuits, Ben is a professional musician, enjoys the outdoors, and spending quality time with his family.
Why Champlain
Career Growth
"I learned so many things that were outside - yet integral to - my professional environment. This gave me the opportunity to future-proof my career. I've seen changes in my career already, and I've been able to apply so much of what I learned at Champlain at work."
From Our Blog
You may also be interested in
Get Your MS Information Security Program Guide
Learn what you can expect from our online master's in information security program.
Download Program Guide
I acknowledge that, by clicking the "submit" button, I am giving my express written consent to Champlain College and its representatives to contact me about educational opportunities via email, text, or phone, at the phone number above, including my mobile phone, using an automatic dialer, or pre-recorded message. Message and data rates may apply. I understand that my consent is not a requirement for enrollment, and I may withdraw my consent at any time.