Cyber crimes are growing increasingly complex, and information increasingly vulnerable. Grad School Hub's 10 Best Master's Degrees in Forensic Accounting can advance graduates' skills for combatting cybercrime combat.
Forensic Accounting programs may be referred to as Cybersecurity, Digital Forensics, Information Technology, or Security Informatics programs. These programs typically incorporate aspects of engineering, science, and technology.
Program curricula may address areas of digital security including algorithms, digital hardware and software architecture, and hacking. Such courses generally aim to build skills in spotting, analyzing, and preventing suspicious cyber activity or compromised information.
Information security analysts generally work for businesses, consulting firms, financial companies, or tech companies. Typical duties include conducting penetration testing, developing and recommending security strategies, installing software, and monitoring networks.
According to the U.S. Bureau of Labor Statistics, the May 2017 median pay for information security analysts was $95,510 annually or $45.92 hourly. The field is experiencing a much faster growth rate than average, at 28 percent.
10 Best Master's Degrees in Forensic Accounting in 2021
is a private university located in Baltimore, MD. It is ranked #10 for Best National Universities by U.S. News & World Report. The university's motto is "The Truth Shall Set You Free." JHU's Security Informatics curriculum covers four subject areas: Health, Management, Policy, and Technology.
Core courses include Cloud Computing Security, Leading Change, and Rights in the Digital Age. Elective offerings include Art and Practice of Intelligence and From Information Warfare to Information Power. The degree program cumulates in a team-structured capstone project sponsored by information security partners. Students document the project through a report and presentation.
West Lafayette, IN
is a public research university in West Lafayette, IN. It is ranked #9 among the best graduate programs in Computer Engineering by U.S. News & World Report and #1 by Grad School Hub. Many students begin and conclude their time at Purdue by running through one of the five fountains on campus.
Purdue's Computer and IT coursework is heavily research-oriented. Students can specialize in one of eight studies, including but not limited to: Autonomy Intelligence, and Robotics; Cyber Learning and Computational Thinking; and Information Security, Cyberforensics, and Homeland Security. All students must complete a Computer IT Research Seminar in their first or second semester, and a direct project or thesis to finish the program.
Michigan Technological University
Michigan Technological University is a research university found on a bluff overlooking Portage Lake in Houghton, MI. Established initially to train mining engineers to operate local copper mines, it now features business, forestry, science, and technology programs.
MTU's Cybersecurity program incorporates cross-disciplinary studies in engineering, science, and technology. The program offers three specialized areas of interest: Critical Infrastructure Protection, Network Security Management, and Trusted Software Engineering. General degree requirements include courses in Cryptography and National Cybersecurity Policy and Law. Students can choose to complete a research thesis, an independent study project, or coursework only.
Carnegie Mellon University
is a state research university in Pittsburgh, PA. It was founded in 1900 by industrialist and philanthropist Andrew Carnegie. Its Software Engineering Institute CERT Division is known for having the first cybersecurity incident response team, called CERT Coordination Center. The Information Network within CMU's College of Engineering offers a Cyber Forensics and Incident Response Track.
The program emphasizes a skill-based curriculum and state-of-the-art software. The curriculum consists of four units: Applied Information Assurance, Cyber Forensics, and Incident Response Capstone, Host-Based Forensics, and Network Forensics. The coursework emphasizes skills in cyber problem-solving and puzzle deciphering.
Founded initially as a branch of the University of Virginia,now stands alone as a public research university. GMU is named after founding father George Mason, a planter and politician who authored the basis for the U.S. Bill of Rights. GMU's Digital Forensics and Cyber Analysis program prepare graduates for careers in academia and government. Its core course options include Advanced Computer Forensics, Digital Media Forensics, and Advanced Computer Forensics. Students may also choose to take courses such as Mobile Device Forensics, Memory Forensics, and Pen Testing. The program cumulates in a capstone course.
University of South Florida
Theis classified in the top tier of research universities by the Carnegie Foundation. In 2011, the Intellectual Property Owners Association ranked USF #10 among worldwide universities with the most U.S. patents granted.
The Digital Forensics concentration within USF's Cybersecurity program builds skills in cybercrime investigation, network analysis, and digital evidence identification. Required core courses include Applied Cryptography and Decision Processes for Business Continuity and Disaster Recovery. Students must also complete a directed independent study practicum experience. Upon completion of the program, students must submit a cumulative digital portfolio.
Boston University is a private university in Boston, MA. It is classified within the top tier of research universities by the Carnegie Foundation. BU is also a member of the prestigious Association of American Universities. U.S. News &; World Reportranks BU #42 for Best National Universities.
Students in BU's Cyber Security program works closely with the university's Center for Reliable Information Systems and Cyber Security. They take wide-ranging courses in the realms of applications, software, systems, and theory. Course examples include Complexity Theory, Cryptography, and Programming Languages. Students must also complete a faculty-approved research project or thesis in Cyber Security.
Rochester Institute of Technology
Rochester Institute of Technology was born from a merger between the Rochester Athenaeum literary society and The Mechanics Institute. RIT's Computing Security program emphasizes the importance of building security into computer hardware and software, rather than trying to add it later.
Computing Security students can choose a capstone course option, project option, or thesis option. The core of each option consists of courses in Computer System Security and Cryptography and Authentication along with research and advanced electives. Elective course offerings include Big Data Analytics, Information Security Risk Management, and Secure Coding.
George Washington University
is a state research university in Washington, D.C. The university has been designated a National Center of Academic Excellence for Information Assurance by the U.S. Department of Homeland Security. The campus' location in the nucleus of national policy helps root GW's forensic accounting program in cybersecurity policy as well as protective skills. The program's core courses assess algorithm design and analysis, computer architectures, and software patterns. Students can choose to follow a thesis or non-thesis route. The program is completable within two full-time years, or three part-time years.
Missouri State University
is a public university with branch campuses located in West Plains, MO, and Dalian, China, as well as a fruit research station in Mountain Grove, MO, and a Department of Defense in Fairfax, VA. U.S. News World Reportranks the university #32 among Top Public Schools in the country.
MO State's Cybersecurity program makes use of hands-on exercises and laboratory environments. Degree requirements include courses in Cloud Computing, Hacker Techniques and Incident Response, and Management of Information Security.
Grad School Hub compiles rankings based on public data released from educational, commercial, and government databases. Sources such as the National Center for Education Statistics and the U.S. Bureau of Labor Statistics play a significant role in how we source our educational data. After collecting insight for each institution, we organize information into five weighted categories.
A more comprehensive evaluation of how each category is determined and scored is accessible on our Ranking Methodology page.
||Full-time faculty percentage, student-to-faculty ratio, student retention and graduation rates
||Tuition rates, median student debt, and financial aid
||Admission and enrollment rates
||Number of program options
|Online Enrollment Score
||Portion of learners taking at least one online course
Still Looking for the Right Fit? Explore Similar Programs.
Explore these promoted online degree programs.
These top, accredited schools offer a variety of online graduate degree programs.
Figuring out where to apply? Consider one of these online Master’s or PhD programs.