Complete all courses and requirements listed below unless otherwise indicated.
Align Bridge Coursework
A grade of B or higher is required in each course.
| Code | Title | Hours |
|---|---|---|
| Fundamentals | ||
| CS 5001 and CS 5003 | Intensive Foundations of Computer Science and Recitation for CS 5001 | 4 |
| Discrete Structures | ||
| CS 5002 | Discrete Structures | 4 |
| Cybersecurity | ||
| CY 5001 | Cybersecurity: Technologies, Threats, and Defenses | 4 |
| Additional Align Courses | ||
| CY 5003 | Foundations of Software Security | 4 |
Core Requirements
| Code | Title | Hours |
|---|---|---|
| Foundations | ||
| CY 5010 | Cybersecurity Principles and Practices | 4 |
| Technical Track | ||
| Complete 8 semester hours from the following: | 8 | |
| Applied Cryptography | ||
| Computer System Security | ||
| Network Security Practices | ||
| Software Vulnerabilities and Security | ||
| Software Security Practices | ||
| Network Security | ||
| Wireless and Mobile Systems Security | ||
| Contextual Track | ||
| Complete 8 semester hours from the following: | 8 | |
| Security Risk Management and Assessment | ||
| Information System Forensics | ||
| Cyberlaw: Privacy, Ethics, and Digital Rights | ||
| Decision Making for Critical Infrastructure | ||
| Special Topics in IT Security Governance, Risk, and Compliance | ||
| Capstone | ||
| CY 7900 | Capstone Project | 4 |
Electives
| Code | Title | Hours |
|---|---|---|
| Complete 4 semester hours from the following: | 4 | |
| Criminology | ||
| The Criminal Justice Process | ||
| Evidence-Based Crime Policy | ||
| Database Management Systems | ||
| Foundations of Software Engineering | ||
| Computer Systems | ||
| Web Development | ||
| Fundamentals of Computer Networking | ||
| Special Topics in Software Engineering | ||
| Complexity Theory | ||
| Cloud Security Practices | ||
| Applied Cryptography | ||
| Computer System Security | ||
| Network Security Practices | ||
| Security Risk Management and Assessment | ||
| Information System Forensics | ||
| Cyberlaw: Privacy, Ethics, and Digital Rights | ||
| Software Vulnerabilities and Security | ||
| Special Topics in IT Security Governance, Risk, and Compliance | ||
| Network Security | ||
| Wireless and Mobile Systems Security | ||
| Special Topics in Security and Privacy | ||
| Security and Resilience Policy | ||
| Managing People in Public and Nonprofit Sectors | ||
Concentration in Criminology
This optional concentration's required courses may count toward the contextual track, and its elective may count toward the major's elective area.
| Code | Title | Hours |
|---|---|---|
| Required | ||
| CRIM 6200 | Criminology | 4 |
| CRIM 6202 | The Criminal Justice Process | 4 |
| Complete one of the following: | 4 | |
| Evidence-Based Crime Policy | ||
| Decision Making for Critical Infrastructure | ||
CRIM elective 1 | ||
Program Credit/GPA Requirements
36–44 total semester hours required
Minimum 3.000 GPA required
- 1
CRIM elective to be approved by director/associate director of MSCY.