Cyber Security and Behavior

Sophisticated networks and systems drive our world. They enable simpler and stronger connectivity from one digital device to another. And in doing so, they become a prime target for attacks. Our master’s in cyber security degree offers a cyber security and behavior track to help you understand and stop the people interfering with our connections.

The first known cyber attack was in 1986. Since then, these attacks have intensified and grown more dangerous  data compromised from online retailer eBay in 2014 and credit bureau Equifax in 2017 impacted more than 140 million consumers.

The smartest companies now approach cyber security with a risk management strategy. When you understand threats, you’re better prepared to minimize their impact.

Cyber security student analyzing data.

What can you learn?

Take courses on human factors in cyber security and insider threat analysis to not only understand hackers, but also to know how to anticipate and stop them.

Focus on identifying critical behaviors as you detect, prevent and respond to cyber attacks. Our curriculum emphasizes the important role of psychological science in designing and maintaining critical infrastructure security. 

This track addresses the behavioral aspects of cyber security including insider threat analysis, social engineering and other human factors that exacerbate or mitigate cyber security risks.

Focus your studies on:

  • The science of human attention, perception, learning and cognition
  • Insider threat analysis
  • Human cognition
Review Your Courses

What can you do?

As cyber threats become more common and firewalls and antivirus programs are no longer sufficient to protect systems, cyber security professionals like you need to shift your approach. Now, you’re focusing on identifying specific characteristics and mimicking hacker behavior in addition to the usual methods of protection.

Demand for these skills is strong, with employment projected to grow 13% from 2016 to 2026. That’s faster than the average for all occupations.*

*U.S. Bureau of Labor Statistics

Qualify for roles including:

  • Security Researcher
  • Vulnerability Analyst
  • Security Architect
Learn About Careers