Most popular programs
Trending now
The online Master of Information and Cybersecurity (MICS) program prepares leaders to drive the future of cybersecurity solutions across industries.
3,000+
Alumni in the global UC Berkeley I School network
35%
Employment growth rate for information security analysts from 2021 to 2031Footnote 1
No. 2
Online master’s in cybersecurity programFootnote 2
{"version":"1.0.1","id":113,"featureFlags":{"formType":"STANDARD"},"embedFormData":{},"grouping":"ucb-cyb","degreeOffering":"ucb-cyb","credentialType":"DEGREE","programsOfStudy":"5deaba1d-5f98-4636-abf0-c35d936afdd2","inferredFields":{"country":"country_name"},"experimentalTrialAttributes":{},"formAttributesConfig":{},"fields":[{"hidden":false,"name":"first_name","label":"First Name","required":true,"type":0,"value":{"text":""},"helpText":"","mountPoint":1},{"hidden":false,"name":"last_name","label":"Last Name","required":true,"type":0,"value":{"text":""},"helpText":"","mountPoint":1},{"hidden":false,"name":"email","label":"Email","required":true,"type":0,"value":{"text":""},"helpText":"","mountPoint":1},{"hidden":false,"name":"level_of_education","label":"What is your highest level of education?","required":true,"type":3,"value":{"options":[{"label":"High School","value":"High School"},{"label":"Associate's","value":"Associates"},{"label":"Bachelor's in progress","value":"Bachelors in progress"},{"label":"Bachelor's","value":"Bachelors"},{"label":"Master's in progress","value":"Masters in progress"},{"label":"Master's","value":"Masters"},{"label":"Doctorate","value":"Doctorate"}],"defaultOption":""},"helpText":"","mountPoint":1},{"hidden":false,"name":"stated_gpa_range","label":"What was your undergraduate GPA?","required":true,"type":3,"value":{"options":[{"label":"4.00 and above","value":"4.00 and above"},{"label":"3.99 - 3.50","value":"3.99-3.50"},{"label":"3.49 - 3.00","value":"3.49-3.00"},{"label":"2.99 - 2.50","value":"2.99-2.50"},{"label":"2.49 and below","value":"2.49 and below"}],"defaultOption":""},"helpText":"","mountPoint":1},{"hidden":false,"name":"years_of_programming_experience","label":"How many years of programming experience do you have?","required":true,"type":3,"value":{"options":[{"label":"0","value":"0"},{"label":"1","value":"1"},{"label":"2","value":"2"},{"label":"3","value":"3"},{"label":"4","value":"4"},{"label":"5","value":"5"},{"label":"6","value":"6"},{"label":"7","value":"7"},{"label":"8","value":"8"},{"label":"9","value":"9"},{"label":"10+","value":"10+"}],"defaultOption":""},"helpText":"","mountPoint":1},{"hidden":true,"name":"country","label":"Country of Residence","required":false,"type":6,"value":{},"helpText":"","mountPoint":1},{"hidden":false,"name":"phone","label":"Phone","required":true,"type":0,"value":{"text":""},"helpText":"","mountPoint":1,"conditionallyRendered":true},{"hidden":false,"name":"zip_code","label":"Zip/Postal Code","required":true,"type":0,"value":{"text":""},"helpText":"","mountPoint":1},{"hidden":false,"name":"state","label":"State","required":true,"type":5,"value":{},"helpText":"","mountPoint":1},{"hidden":true,"name":"degree","label":"Degree Interest","required":false,"type":3,"value":{"options":[{"label":"CYB","value":"CYB"}],"defaultOption":"CYB"},"helpText":"","mountPoint":1},{"hidden":false,"name":"lead_share_opt_in","label":"US Marketing Consent 🇺🇸","required":true,"type":11,"value":{"format":"checkbox","disclaimer":"edX, and its parent company, 2U, Inc., offer other online education programs across various fields of study.","optInValue":"UCB-CYB Marketing","checkboxText":"Please contact me about these programs.","defaultRadio":"none","defaultChecked":true,"smsHiddenConsent":false},"helpText":"","mountPoint":1,"conditionallyRendered":true},{"hidden":false,"name":"lead_share_opt_in","label":"GDPR Marketing Consent 🇪🇺","required":true,"type":8,"value":{"disclaimer":"","retailOptIn":{"sms":"","text":"Yes, I want to receive additional information about cybersecurity@berkeley. Please contact me via:","email":"Email","phone":"Phone"},"leadShareOptIn":{"sms":"","text":"edX, and its parent company, 2U, Inc., offer other online education programs across various fields of study.","email":"Please email me about these programs.","phone":"","leadShareValue":"UCB-CYB Marketing"}},"helpText":"","mountPoint":1,"conditionallyRendered":true},{"hidden":false,"name":"undergraduate_major","label":"What category best describes your undergraduate major?","required":true,"type":3,"value":{"options":[{"label":"Computer Engineering","value":"Computer Engineering"},{"label":"Computer Science","value":"Computer Science"},{"label":"Electrical Engineering","value":"Electrical Engineering"},{"label":"Mathematics","value":"Mathematics"},{"label":"Mechanical Engineering","value":"Mechanical Engineering"},{"label":"Physics","value":"Physics"},{"label":"Information Technology","value":"Information Technology"},{"label":"Other","value":"Other"}],"defaultOption":""},"helpText":"","mountPoint":1},{"hidden":false,"name":"sms_opt_in","label":"TEXT/SMS Opt-In","required":true,"type":2,"value":{"options":[{"label":"Yes","value":"true"},{"label":"No","value":"false"}],"defaultOption":""},"helpText":"2U, Inc. may send me information about cybersecurity@berkeley via automated SMS. Participation is voluntary. Reply STOP to opt out of SMS. ","mountPoint":1},{"hidden":false,"name":"prospect_education_journey","label":"When are you considering starting your program?","required":true,"type":3,"value":{"options":[{"label":"Next available cohort","value":"Next available cohort"},{"label":"3 to 6 months","value":"3 to 6 months"},{"label":"6 to 12 months","value":"6 to 12 months"},{"label":"Unsure","value":"Unsure"}],"defaultOption":""},"helpText":"","mountPoint":1},{"hidden":false,"name":"military_affiliation","label":"Are you military affiliated?","required":true,"type":3,"value":{"options":[{"label":"No","value":"No"},{"label":"Veteran","value":"Veteran"},{"label":"Active Duty","value":"Active Duty"},{"label":"Reserve","value":"Reserve"},{"label":"Spouse","value":"Spouse"}],"defaultOption":""},"helpText":"","mountPoint":1},{"hidden":true,"name":"no_klondike_gdpr_setting","required":true,"type":15,"label":"","value":{"text":"geo"}},{"hidden":false,"name":"","type":7,"value":{"text":"By submitting this form, you agree that 2U, in partnership with University of California, Berkeley, may contact you regarding this program. Your personal data will be used as described in cybersecurity@berkeley’s [--link:https://ischoolonline.berkeley.edu/legal/privacy-policy/ target:blank]privacy policy[link--]. You may opt out of receiving communications at any time."},"mountPoint":2}],"screens":[{"allFields":[5,17],"conditional":{},"out":{"1":["$next",[{"data":"$valid"}]]}},{"allFields":[15,3,13,4,16],"conditional":{},"out":{"2":["$next",[{"data":"$valid"}]]}},{"allFields":[0,1,2],"conditional":{},"out":{"3":["$next",[{"data":"$valid"}]]}},{"allFields":[9,8,6,7,14,10,11,12,18],"conditional":{"7":[3,"",[{"data":"state.no_klondike_carmen_sandiego_region"},{"data":"eu"},{"op":0}]],"11":[1,"",[{"data":"state.no_klondike_gdpr_setting"},{"data":"never"},{"op":0},{"data":"state.no_klondike_gdpr_setting"},{"data":"geo"},{"op":0},{"data":"state.no_klondike_carmen_sandiego_region"},{"data":"eu"},{"op":1},{"op":7},{"op":8}]],"12":[1,"",[{"data":"state.no_klondike_gdpr_setting"},{"data":"always"},{"op":0},{"data":"state.no_klondike_gdpr_setting"},{"data":"geo"},{"op":0},{"data":"state.no_klondike_carmen_sandiego_region"},{"data":"eu"},{"op":0},{"op":7},{"op":8}]]},"out":{"-1":["$next",[{"data":"$valid"}]]}}],"published":"2024-11-01T19:52:25.799Z"}
Learners master core technical skills and become fluent in cybersecurity’s business, political, and legal contexts.
The admissions committee reviews applications holistically and considers each applicant’s background and goals over test scores.
Demand for cybersecurity professionals is projected to grow 35% between 2021 and 2031.Footnote 3
UC Berkeley School of Information (I School) is a vibrant community of scholars, practitioners, and learners who are committed to expanding access to information for all. Since 2014, the I School has been offering online programs to develop data-driven leaders anywhere in the world who want to solve current and emerging information problems.
Tuition and fees are subject to change and may increase each academic year. Tuition does not include student fees, technology platform licensing, or support services. Learners are also responsible for travel and accommodation costs related to any in-person immersions or residentials.
Technology and services powered by 2U, Inc., the parent company of edX.
The interdisciplinary cybersecurity@berkeley curriculum offers hands-on practical experience with secure systems and applications, and equips learners with the ability to lead, manage, and contribute to building cybersecurity solutions. Learners graduate with a comprehensive understanding of the technical, political, business, legal, and ethical components of cybersecurity. Below are three featured courses in the program:
Learn about the mathematical and practical foundations of cryptography and the many different cryptosystems.
Compare approaches to security taken among several modern operating systems, and learn techniques for establishing trust across a set of interoperating systems.
Survey privacy mechanisms applicable to systems engineering, focusing on the inference threat that may arise due to advancements in artificial intelligence and machine learning.
UC Berkeley seeks candidates who want to make a positive impact on the I School community and the world. As part of your application, you will need to submit electronic copies of the following documents:
Official transcripts (bachelor’s degree required)
Statement of purpose and additional admissions statements
Two professional letters of recommendation
Current résumé
GRE/GMAT scores (optional)
The immersion experience allows learners to socialize in person with faculty and peers from around the world — on the UC Berkeley campus — and make lasting connections in the San Francisco Bay Area and in nearby Silicon Valley, a global technology hub.
Currently offered three times a year, immersions deliver full itineraries of additional learning, networking, and community-building opportunities, such as:
Presentations led by I School faculty and industry experts
Professional development workshops
Networking events with alumni and local industry leaders
Company tours of leading data-driven organizations