
M.S. in Secure Computing
Position yourself for success in today’s competitive market with a tech-driven cybersecurity master's degree.

Position yourself for success in today’s competitive market with a tech-driven cybersecurity master's degree.
Gain the skills to protect critical systems, from election infrastructure to financial networks, by mastering networking, access control, cryptography, forensics, human-computer interaction, and social engineering. This technology-focused, two-year cybersecurity program equips you with the latest tools to identify and mitigate threats while preparing you to innovate and design your own solutions. With the field expected to grow 35% by 2031, you'll be positioned for success in one of the most in-demand and lucrative areas of IT.
Complete this form to learn more about Secure Computing at Luddy.
Cybersecurity hinges on secure coding and a deep understanding of key areas like cryptography, forensics, network security, and cyber threats. In this degree, you’ll master these critical components while building a strong foundation in the concepts that drive the field. You’ll learn to use today’s latest tools to identify and stop threats, and gain the skills to adapt as technology evolves. Many of our students go on to create new tools and methods for defending against malicious attackers.
Format: On-campus
Start dates: Fall, Spring
The Luddy graduate admission committees will consider students who have a three- or four-year bachelor's degree. Applicants should have a minimum of a 3.0 (B) or higher GPA.
Our curriculum is designed to help you:

I imagine being a professional in both policy and security as being able to speak two different languages... Being able to understand both fields has made me more dynamic as a person.
Wodsander Maxime Secure Computing, Advanced Master's Program
Want to work in tech, healthcare, or research? Or maybe continue to a Ph.D.? This degree opens doors. About 50% of Luddy grads go straight into roles at companies or research hospitals like the Mayo Clinic or Cincinnati Children’s Hospital Medical Center, and the other half enter Ph.D. programs.
Luddy’s career services team and faculty mentors help connect you with internships, job fairs, and biotech and technology security leaders.
A few companies that have hired M.S. Secure Computing graduates at Luddy:
General Electric (GE), Fifth Third Bank, Grainger, Inc., Bridge Advisory, Indiana University - Global Research Network Operations Center (GlobalNOC), Indiana University, NSWC Crane, Central Bank of Uruguay, National Security Agency, EY, Microsoft, GM, NVIDIA, Visa
What are the career possibilities with a secure computing major?
Software Engineer, Security Operations Analyst, Automation Engineer, Cybersecurity Engineer, Chief Information Security Officer

At Luddy and across IU, students and faculty tackle bold research in areas like bioinformatics, computational biology, security, and privacy.
Through the Undergraduate Research Opportunities in Computing program, computer science majors can gain hands-on experience, work closely with faculty or Ph.D. mentors, and build skills that open doors in tech and research careers.

Attending the Luddy School of Informatics, Computing, and Engineering is more affordable than you think. With direct-admit scholarships and federal financial aid, you can reduce the cost of earning your M.S. in Secure Computing at IU.

Whether you’re an Informatics major or still exploring your options, Luddy School advisors are here to help you navigate degree requirements, seize academic opportunities, and tailor your journey to fit your goals.