- Concentrations and course offerings may vary by campus and/or by program modality. Please consult with your advisor or admissions coach for the course availability each term at your campus or within your program modality.
- Certain options within the program may be required at certain campuses or for certain program modalities. Please consult with your advisor or admissions coach for requirements at your campus or for your program modality.
Core Requirements
Code | Title | Hours |
---|---|---|
Foundations | ||
CY 5001 | Cybersecurity: Technologies, Threats, and Defenses 1 | 4 |
CY 5010 | Cybersecurity Principles and Practices | 4 |
Technical Track | ||
Complete 8 semester hours from the following: | 8 | |
Applied Cryptography | ||
Computer System Security | ||
Network Security Practices | ||
Software Vulnerabilities and Security | ||
Software Security Practices | ||
Network Security | ||
Wireless and Mobile Systems Security | ||
Contextual Track | ||
Complete 8 semester hours from the following: | 8 | |
Security Risk Management and Assessment | ||
Information System Forensics | ||
Cyberlaw: Privacy, Ethics, and Digital Rights | ||
Decision Making for Critical Infrastructure | ||
Special Topics in IT Security Governance, Risk, and Compliance | ||
Capstone | ||
CY 7900 | Capstone Project | 4 |
Electives
Code | Title | Hours |
---|---|---|
Complete 4 semester hours from the following: | 4 | |
Criminology | ||
The Criminal Justice Process | ||
Evidence-Based Crime Policy | ||
Database Management Systems | ||
Foundations of Software Engineering | ||
Computer Systems | ||
Web Development | ||
Fundamentals of Computer Networking | ||
Wireless Network | ||
Special Topics in Software Engineering | ||
Complexity Theory | ||
Cloud Security | ||
Applied Cryptography | ||
Computer System Security | ||
Network Security Practices | ||
Security Risk Management and Assessment | ||
Information System Forensics | ||
Cyberlaw: Privacy, Ethics, and Digital Rights | ||
Software Vulnerabilities and Security | ||
Special Topics in IT Security Governance, Risk, and Compliance | ||
Network Security | ||
Wireless and Mobile Systems Security | ||
Special Topics in Security and Privacy | ||
Security and Resilience Policy | ||
Managing People in Public and Nonprofit Sectors |
Concentration in Criminology
This optional concentration's required courses may count toward the contextual track, and its elective may count toward the major's elective area.
Code | Title | Hours |
---|---|---|
Required | ||
CRIM 6200 | Criminology | 4 |
CRIM 6202 | The Criminal Justice Process | 4 |
Complete one of the following: | 4 | |
Evidence-Based Crime Policy | ||
Decision Making for Critical Infrastructure | ||
CRIM elective 2 |
Program Credit/GPA Requirements
32 total semester hours required
Minimum 3.000 GPA required
- 1
A student who demonstrates prior mastery of the learning outcomes for Cybersecurity: Technologies, Threats, and Defenses (CY 5001) may replace the course with elective coursework to meet the semester hours required for the degree. See the electives list for options.
- 2
CRIM elective to be approved by director/associate director of MSCY.