{"id":8771,"date":"2025-11-20T11:37:18","date_gmt":"2025-11-20T19:37:18","guid":{"rendered":"https:\/\/www.callutheran.edu\/programs\/?page_id=8771"},"modified":"2026-01-13T06:36:09","modified_gmt":"2026-01-13T14:36:09","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/","title":{"rendered":"Cybersecurity Track"},"content":{"rendered":"<div class=\"row\">\n<div class=\"col-lg-7 mb-4 mb-lg-5\">\n<div class=\"quick-facts bg-purple-alt txt-white d-inline-flex flex-column p-4 p-lg-5\">\n<div class=\"anchor-link\" id=\"quick-facts\"><\/div>\n<p class=\"h3 fw-bold mb-4 txt-offwhite\">Quick Facts<\/p>\n<div class=\"d-flex flex-row mb-3\">\n<div class=\"icon d-flex justify-content-center align-items-center\">\n<img decoding=\"async\" src=\"https:\/\/callutheran.allcampus.com\/wp-content\/themes\/callutheran\/images\/icons\/quick-facts-graduation-cap.svg\" alt=\"graduation cap\">\n<\/div>\n<div class=\"text d-flex align-items-center ms-4\">\n<p class=\"p-0 m-0\"><strong>Total Courses Required:<\/strong> 12 courses total (36 credits)<\/p>\n<\/div>\n<\/div>\n<div class=\"d-flex flex-row mb-3\">\n<div class=\"icon d-flex justify-content-center align-items-center\">\n<img decoding=\"async\" class=\"\" src=\"https:\/\/callutheran.allcampus.com\/wp-content\/themes\/callutheran\/images\/icons\/quick-facts-diploma.svg\" alt=\"diploma\">\n<\/div>\n<div class=\"text d-flex align-items-center ms-4\">\n<p class=\"p-0 m-0\"><strong>Core Requirements:<\/strong> 8 courses in IT foundations and leadership<\/p>\n<\/div>\n<\/div>\n<div class=\"d-flex flex-row mb-3\">\n<div class=\"icon d-flex justify-content-center align-items-center\">\n<img decoding=\"async\" class=\"\" src=\"https:\/\/callutheran.allcampus.com\/wp-content\/themes\/callutheran\/images\/icons\/quick-facts-check.svg\" alt=\"check\">\n<\/div>\n<div class=\"text d-flex align-items-center ms-4\">\n<p class=\"p-0 m-0\"><strong>Cybersecurity Courses:<\/strong> 4 electives in areas like ethical hacking, cloud security and digital forensics<\/p>\n<\/div>\n<\/div>\n<div class=\"d-flex flex-row mb-3\">\n<div class=\"icon d-flex justify-content-center align-items-center\">\n<img decoding=\"async\" class=\"\" src=\"https:\/\/callutheran.allcampus.com\/wp-content\/themes\/callutheran\/images\/icons\/quick-facts-laptop.svg\" alt=\"laptop\">\n<\/div>\n<div class=\"text d-flex align-items-center ms-4\">\n<p class=\"p-0 m-0\"><strong>Capstone:<\/strong> Internship or IT project for hands-on experience<\/p>\n<\/div>\n<\/div>\n<div class=\"d-flex flex-row mb-3\">\n<div class=\"icon d-flex justify-content-center align-items-center\">\n<img decoding=\"async\" class=\"\" src=\"https:\/\/callutheran.allcampus.com\/wp-content\/themes\/callutheran\/images\/icons\/quick-facts-calendar.svg\" alt=\"calendar\">\n<\/div>\n<div class=\"text d-flex align-items-center ms-4\">\n<p class=\"p-0 m-0\"><strong>Timeline:<\/strong> Typically completed in 12 to 24 months with evening classes for working professionals<\/p>\n<\/div>\n<\/div>\n<p><small><strong>Note:<\/strong> While general MSIT courses are available online, cybersecurity track courses must be taken at our Thousand Oaks campus.. <\/small><\/p>\n<\/div>\n<\/div>\n<div class=\"col-lg-5 mb-4 mb-lg-5\">\n<div class=\"table-of-contents bg-offwhite d-inline-flex flex-column p-4\">\n<div class=\"\">\n<p class=\"h4 fw-bold mb-4\">On this page:<\/p>\n<ul>\n<li><a href=\"#quick-facts\" class=\"scroll-to\">Quick Facts<\/a><\/li>\n<li><a href=\"#who-is-the-cybersecurity-track-for\" class=\"scroll-to\">Who Is the Cybersecurity Track For?<\/a><\/li>\n<li><a href=\"#cybersecurity-track-curriculum\" class=\"scroll-to\">Cybersecurity Track Curriculum <\/a><\/li>\n<li><a href=\"#careers-in-cybersecurity\" class=\"scroll-to\">Careers in Cybersecurity<\/a><\/li>\n<li><a href=\"#cybersecurity-track-faqs\" class=\"scroll-to\">Cybersecurity Track FAQs<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>The cybersecurity track of California Lutheran University\u2019s <a href=\"\/programs\/graduate\/msit\/\" title=\"Master of Science in Information Technology (MSIT)\">Master of Science in Information Technology (MSIT)<\/a> program combines technical depth with strategic leadership, preparing you to stay ahead of threats and stop them if they happen.<\/p>\n<hr class=\"gray-hr\">\n<div class=\"anchor-link\" id=\"who-is-the-cybersecurity-track-for\"><\/div>\n<h2>Who Is the Cybersecurity Track For?<\/h2>\n<p>This track is designed for professionals who want to protect the systems organizations depend on. If you\u2019re fascinated by how attacks happen and how to stop them, you\u2019ll thrive here.<\/p>\n<p>It\u2019s a strong fit if you\u2019re:<\/p>\n<ul>\n<li>A network or systems administrator interested in security specialization<\/li>\n<li>An IT professional seeking to advance into cybersecurity or risk management roles<\/li>\n<li>A career changer drawn to ethical hacking, digital forensics or data protection<\/li>\n<li>A detail-oriented problem solver who wants to make an immediate impact<\/li>\n<\/ul>\n<hr class=\"gray-hr\">\n<div class=\"anchor-link\" id=\"cybersecurity-track-curriculum\"><\/div>\n<h2>Cybersecurity Track Curriculum<\/h2>\n<div id=\"accordion-section-tracks\" class=\"accordion accordion-flush custom-accordion faq-accordion\">\n<div class=\"accordion-item\">\n<h3 id=\"accordion-header-track-1\" class=\"accordion-header\">\n<button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-content-track-1\" aria-expanded=\"false\" aria-controls=\"accordion-content-track-1\">\nDigital Forensics\n<\/button>\n<\/h3>\n<div id=\"accordion-content-track-1\" class=\"accordion-collapse collapse\" aria-labelledby=\"accordion-header-track-1\" data-bs-parent=\"#accordion-section-track\">\n<div class=\"accordion-body\">\n<p>Modern technologies have created a myriad of ways that data can be stored and communicated \u2014 and hidden. Digital forensics is the science of finding those data after the fact. This course presents an overview of the principles and practices of digital investigation and prepares students to conduct a cyber forensics investigation in an organized and systematic way. The course allows students to develop skills in collecting, seizing and analyzing suspect devices, creating forensics images, recovering deleted data from various file systems and damaged media, applying digital forensics techniques to email and other electronic communications and describing incident and intrusion response approaches, among other topics.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"accordion-item\">\n<h3 id=\"accordion-header-track-2\" class=\"accordion-header\">\n<button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-content-track-2\" aria-expanded=\"false\" aria-controls=\"accordion-content-track-2\">\nEthical Hacking\n<\/button>\n<\/h3>\n<div id=\"accordion-content-track-2\" class=\"accordion-collapse collapse\" aria-labelledby=\"accordion-header-track-2\" data-bs-parent=\"#accordion-section-track\">\n<div class=\"accordion-body\">\n<p>Ethical hacking or penetration testing is the act of breaking into a system with the permission and legal consent of the organization or individual who owns and operates the system, with the purpose of identifying vulnerabilities to strengthen the organization&#8217;s security.<\/p>\n<p>This course introduces students to the principles and techniques of the cybersecurity practice known as penetration testing and covers various tools and methods commonly used to compromise and control access to information systems. As part of this course, students will conduct hands-on penetration tests in a controlled lab environment, discover how system vulnerabilities can be exploited and learn how to avoid such problems in order to better secure organizational data and systems.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"accordion-item\">\n<h3 id=\"accordion-header-track-3\" class=\"accordion-header\">\n<button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-content-track-3\" aria-expanded=\"false\" aria-controls=\"accordion-content-track-3\">\nCloud Security\n<\/button>\n<\/h3>\n<div id=\"accordion-content-track-3\" class=\"accordion-collapse collapse\" aria-labelledby=\"accordion-header-track-3\" data-bs-parent=\"#accordion-section-track\">\n<div class=\"accordion-body\">\n<p>Cloud computing services (whereby distributed resources are rented, rather than owned) are being adopted across a variety of organizations yet many security challenges exist. This course introduces students to various cloud computing architectures and delivery models followed by a review of the security and privacy issues related to various types of cloud computing environments.<\/p>\n<p>The course covers aspects related to cloud security design, implementation, architecture, operations, controls and compliance with regulatory frameworks for both cloud platforms and infrastructure security and cloud application security.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"accordion-item\">\n<h3 id=\"accordion-header-track-4\" class=\"accordion-header\">\n<button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-content-track-4\" aria-expanded=\"false\" aria-controls=\"accordion-content-track-4\">\nCybersecurity Risk Management\n<\/button>\n<\/h3>\n<div id=\"accordion-content-track-4\" class=\"accordion-collapse collapse\" aria-labelledby=\"accordion-header-track-4\" data-bs-parent=\"#accordion-section-track\">\n<div class=\"accordion-body\">\n<p>Protecting organizational assets against an increased numbers of cybersecurity threats is of critical importance in all modern organizations. Having a cybersecurity plan and a governance structure in place for dealing with cybersecurity risks is a more successful strategy than recovering organizational systems after a cyberattack has occurred.<\/p>\n<p>This course introduces students to risk management approaches for identifying, analyzing and responding to cybersecurity risks, governance mechanisms, human resource security and business continuity. This course provides students with necessary skills required to formulate and implement a cybersecurity plan.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h3 class=\"txt-bold mt-5\">Special Topic Courses <\/h3>\n<p>Special topics courses vary and are used to introduce students to new topics in the Information technology field.<\/p>\n<div id=\"accordion-section-special\" class=\"accordion accordion-flush custom-accordion faq-accordion\">\n<div class=\"accordion-item\">\n<h3 id=\"accordion-header-special-1\" class=\"accordion-header\">\n<button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-content-special-1\" aria-expanded=\"false\" aria-controls=\"accordion-content-special-1\">\nInternship\n<\/button>\n<\/h3>\n<div id=\"accordion-content-special-1\" class=\"accordion-collapse collapse\" aria-labelledby=\"accordion-header-special-1\" data-bs-parent=\"#accordion-section-special\">\n<div class=\"accordion-body\">\n<p>Internships are a valuable experiential learning tool where students engage in work with an organization on an approved topic. Students will write a comprehensive report based on their learning experience along with weekly logs and a managerial evaluation. The report will be evaluated and graded by the instructor.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"accordion-item\">\n<h3 id=\"accordion-header-special-2\" class=\"accordion-header\">\n<button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-content-special-2\" aria-expanded=\"false\" aria-controls=\"accordion-content-special-2\">\nIT Project\n<\/button>\n<\/h3>\n<div id=\"accordion-content-special-2\" class=\"accordion-collapse collapse\" aria-labelledby=\"accordion-header-special-2\" data-bs-parent=\"#accordion-section-special\">\n<div class=\"accordion-body\">\n<p>Students will work on proposing, developing and implementing a comprehensive project based on concepts learned during their program. A project is a form of research aimed at creating or contributing new knowledge in a discipline, or an applied study that combines a specific topic with actual problems or issues within a setting.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<hr class=\"gray-hr\">\n<div class=\"anchor-link\" id=\"careers-in-cybersecurity\"><\/div>\n<h2>Careers in Cybersecurity<\/h2>\n<p>According to <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\">the U.S. Bureau of Labor Statistics<\/a>, <strong>jobs for information security analysts are projected to grow 29%<\/strong> through 2034, much faster than the average for all occupations. <\/p>\n<p>Organizations across industries are seeking skilled IT leaders who can defend systems, manage risks and secure critical data. <\/p>\n<p>By completing the cybersecurity track of Cal Lutheran\u2019s MSIT program, you\u2019ll be prepared for in-demand roles such as information security analyst, cybersecurity manager or even chief information security officer (CISO).<\/p>\n<p>Here\u2019s a closer look at the job titles, salaries and growth potential that this track can lead to:<\/p>\n<p><!-- lightcast widget --><\/p>\n<div class=\"lightcast-widget msit mt-5 mb-4\">\n[lightcast_widget]\n<\/div>\n<hr class=\"gray-hr\">\n<div class=\"anchor-link\" id=\"cybersecurity-track-faqs\"><\/div>\n<h2>Cybersecurity Track FAQs<\/h2>\n<div id=\"accordion-section-faq\" class=\"accordion accordion-flush custom-accordion faq-accordion\">\n<div class=\"accordion-item\">\n<h3 id=\"accordion-header-faq-1\" class=\"accordion-header\">\n<button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-content-faq-1\" aria-expanded=\"false\" aria-controls=\"accordion-content-faq-1\">\nHow is the cybersecurity track different from a master\u2019s in cybersecurity?\n<\/button>\n<\/h3>\n<div id=\"accordion-content-faq-1\" class=\"accordion-collapse collapse\" aria-labelledby=\"accordion-header-faq-1\" data-bs-parent=\"#accordion-section-faq\">\n<div class=\"accordion-body\">\n<p>A master\u2019s in cybersecurity is built for deep specialization. You\u2019ll spend most of your time mastering advanced defense techniques, forensics and security architecture.<\/p>\n<p>The cybersecurity track in Cal Lutheran\u2019s MSIT program keeps that technical depth but adds something more: a wider view of how security decisions shape an organization. You\u2019ll learn to protect systems, and also to think like a strategist who understands how people, processes, and technology work together.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"accordion-item\">\n<h3 id=\"accordion-header-faq-2\" class=\"accordion-header\">\n<button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-content-faq-2\" aria-expanded=\"false\" aria-controls=\"accordion-content-faq-2\">\nWhy choose the cybersecurity track in the MSIT program instead of a standalone cybersecurity degree?\n<\/button>\n<\/h3>\n<div id=\"accordion-content-faq-2\" class=\"accordion-collapse collapse\" aria-labelledby=\"accordion-header-faq-2\" data-bs-parent=\"#accordion-section-faq\">\n<div class=\"accordion-body\">\n<p>This track prepares you for the big picture. You\u2019ll build the technical skills to stop threats and the leadership skills to lead teams, influence budgets and communicate risk in a language executives respect. It\u2019s the right choice if you want to grow from technical expert to trusted decision-maker.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"accordion-item\">\n<h3 id=\"accordion-header-faq-3\" class=\"accordion-header\">\n<button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-content-faq-3\" aria-expanded=\"false\" aria-controls=\"accordion-content-faq-3\">\nHow long does it take to complete the MSIT in cybersecurity?\n<\/button>\n<\/h3>\n<div id=\"accordion-content-faq-3\" class=\"accordion-collapse collapse\" aria-labelledby=\"accordion-header-faq-3\" data-bs-parent=\"#accordion-section-faq\">\n<div class=\"accordion-body\">\n<p>Most students finish the MSIT with a cybersecurity specialization in 12 to 24 months. You\u2019ll complete eight core courses, four cybersecurity electives and an optional capstone project or internship.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"accordion-item\">\n<h3 id=\"accordion-header-faq-4\" class=\"accordion-header\">\n<button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-content-faq-4\" aria-expanded=\"false\" aria-controls=\"accordion-content-faq-4\">\nCan I complete the cybersecurity track part time?\n<\/button>\n<\/h3>\n<div id=\"accordion-content-faq-4\" class=\"accordion-collapse collapse\" aria-labelledby=\"accordion-header-faq-4\" data-bs-parent=\"#accordion-section-faq\">\n<div class=\"accordion-body\">\n<p>Yes. Many students take one or two evening classes per term while working full time. The cybersecurity track courses are on campus, but they are offered in the evening, so you can build expertise in cybersecurity without putting your career (or life) on hold.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"accordion-item\">\n<h3 id=\"accordion-header-faq-5\" class=\"accordion-header\">\n<button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-content-faq-5\" aria-expanded=\"false\" aria-controls=\"accordion-content-faq-5\">\nDo I need a background in cybersecurity to succeed?\n<\/button>\n<\/h3>\n<div id=\"accordion-content-faq-5\" class=\"accordion-collapse collapse\" aria-labelledby=\"accordion-header-faq-5\" data-bs-parent=\"#accordion-section-faq\">\n<div class=\"accordion-body\">\n<p>No prior cybersecurity experience is required. If you\u2019re new to the field, you\u2019ll gain a solid foundation. If you\u2019re already in IT, you\u2019ll deepen your expertise and position yourself for leadership roles.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"accordion-item\">\n<h3 id=\"accordion-header-faq-6\" class=\"accordion-header\">\n<button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-content-faq-6\" aria-expanded=\"false\" aria-controls=\"accordion-content-faq-6\">\nWill I get hands-on experience in cybersecurity?\n<\/button>\n<\/h3>\n<div id=\"accordion-content-faq-6\" class=\"accordion-collapse collapse\" aria-labelledby=\"accordion-header-faq-6\" data-bs-parent=\"#accordion-section-faq\">\n<div class=\"accordion-body\">\n<p>Absolutely. Courses like Ethical Hacking and Digital Forensics put you in lab-based scenarios to test and defend systems in real time. You\u2019ll also complete either an internship or an IT project, which gives you market-ready experience that employers notice.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<hr class=\"gray-hr\">\n","protected":false},"excerpt":{"rendered":"<p><a href=\"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/\" class=\"btn btn-purple read-more article-read-more\" aria-label=\"Read more about this article: Cybersecurity Track \">Read more<\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"parent":2334,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-8771","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Track - MSIT | Cal Lutheran<\/title>\n<meta name=\"description\" content=\"Protect systems and lead with Cal Lutheran\u2019s MSIT Cybersecurity track. 12 courses, hands-on capstone, and skills for high-demand security careers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Track - MSIT | Cal Lutheran\" \/>\n<meta property=\"og:description\" content=\"Protect systems and lead with Cal Lutheran\u2019s MSIT Cybersecurity track. 12 courses, hands-on capstone, and skills for high-demand security careers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"California Lutheran University\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-13T14:36:09+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/\",\"url\":\"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/\",\"name\":\"Cybersecurity Track - MSIT | Cal Lutheran\",\"isPartOf\":{\"@id\":\"https:\/\/www.callutheran.edu\/programs\/#website\"},\"datePublished\":\"2025-11-20T19:37:18+00:00\",\"dateModified\":\"2026-01-13T14:36:09+00:00\",\"description\":\"Protect systems and lead with Cal Lutheran\u2019s MSIT Cybersecurity track. 12 courses, hands-on capstone, and skills for high-demand security careers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.callutheran.edu\/programs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Graduate Degree Programs\",\"item\":\"https:\/\/www.callutheran.edu\/programs\/graduate\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Master of Science in Information Technology\",\"item\":\"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity Track\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.callutheran.edu\/programs\/#website\",\"url\":\"https:\/\/www.callutheran.edu\/programs\/\",\"name\":\"California Lutheran University\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.callutheran.edu\/programs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Track - MSIT | Cal Lutheran","description":"Protect systems and lead with Cal Lutheran\u2019s MSIT Cybersecurity track. 12 courses, hands-on capstone, and skills for high-demand security careers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Track - MSIT | Cal Lutheran","og_description":"Protect systems and lead with Cal Lutheran\u2019s MSIT Cybersecurity track. 12 courses, hands-on capstone, and skills for high-demand security careers.","og_url":"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/","og_site_name":"California Lutheran University","article_modified_time":"2026-01-13T14:36:09+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/","url":"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/","name":"Cybersecurity Track - MSIT | Cal Lutheran","isPartOf":{"@id":"https:\/\/www.callutheran.edu\/programs\/#website"},"datePublished":"2025-11-20T19:37:18+00:00","dateModified":"2026-01-13T14:36:09+00:00","description":"Protect systems and lead with Cal Lutheran\u2019s MSIT Cybersecurity track. 12 courses, hands-on capstone, and skills for high-demand security careers.","breadcrumb":{"@id":"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.callutheran.edu\/programs\/"},{"@type":"ListItem","position":2,"name":"Graduate Degree Programs","item":"https:\/\/www.callutheran.edu\/programs\/graduate\/"},{"@type":"ListItem","position":3,"name":"Master of Science in Information Technology","item":"https:\/\/www.callutheran.edu\/programs\/graduate\/msit\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity Track"}]},{"@type":"WebSite","@id":"https:\/\/www.callutheran.edu\/programs\/#website","url":"https:\/\/www.callutheran.edu\/programs\/","name":"California Lutheran University","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.callutheran.edu\/programs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"featured_image_src":null,"featured_image_src_square":null,"_links":{"self":[{"href":"https:\/\/www.callutheran.edu\/programs\/wp-json\/wp\/v2\/pages\/8771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.callutheran.edu\/programs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.callutheran.edu\/programs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.callutheran.edu\/programs\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.callutheran.edu\/programs\/wp-json\/wp\/v2\/comments?post=8771"}],"version-history":[{"count":0,"href":"https:\/\/www.callutheran.edu\/programs\/wp-json\/wp\/v2\/pages\/8771\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.callutheran.edu\/programs\/wp-json\/wp\/v2\/pages\/2334"}],"wp:attachment":[{"href":"https:\/\/www.callutheran.edu\/programs\/wp-json\/wp\/v2\/media?parent=8771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}