Complete all courses and requirements listed below unless otherwise indicated.
Core Requirements
| Code | Title | Hours |
|---|---|---|
| Foundations | ||
| CY 5001 | Cybersecurity: Technologies, Threats, and Defenses 1 | 4 |
| CY 5010 | Cybersecurity Principles and Practices | 4 |
| Technical Track | ||
| Complete 8 semester hours from the following: | 8 | |
| Applied Cryptography | ||
| Computer System Security | ||
| Network Security Practices | ||
| Software Vulnerabilities and Security | ||
| Software Security Practices | ||
| Network Security | ||
| Wireless and Mobile Systems Security | ||
| Contextual Track | ||
| Complete 8 semester hours from the following: | 8 | |
| Security Risk Management and Assessment | ||
| Information System Forensics | ||
| Cyberlaw: Privacy, Ethics, and Digital Rights | ||
| Decision Making for Critical Infrastructure | ||
| Special Topics in IT Security Governance, Risk, and Compliance | ||
| Capstone | ||
| CY 7900 | Capstone Project | 4 |
Electives
| Code | Title | Hours |
|---|---|---|
| Complete 4 semester hours from the following: | 4 | |
| Criminology | ||
| The Criminal Justice Process | ||
| Evidence-Based Crime Policy | ||
| Database Management Systems | ||
| Foundations of Software Engineering | ||
| Computer Systems | ||
| Web Development | ||
| Fundamentals of Computer Networking | ||
| Special Topics in Software Engineering | ||
| Complexity Theory | ||
| Cloud Security Practices | ||
| Applied Cryptography | ||
| Computer System Security | ||
| Network Security Practices | ||
| Security Risk Management and Assessment | ||
| Information System Forensics | ||
| Cyberlaw: Privacy, Ethics, and Digital Rights | ||
| Software Vulnerabilities and Security | ||
| Software Security Practices | ||
| Special Topics in IT Security Governance, Risk, and Compliance | ||
| Network Security | ||
| Wireless and Mobile Systems Security | ||
| Special Topics in Security and Privacy | ||
| Security and Resilience Policy | ||
| Managing People in Public and Nonprofit Sectors | ||
Concentration in Criminology
This optional concentration's required courses may count toward the contextual track, and its elective may count toward the major's elective area.
| Code | Title | Hours |
|---|---|---|
| Required | ||
| CRIM 6200 | Criminology | 4 |
| CRIM 6202 | The Criminal Justice Process | 4 |
| Complete one of the following: | 4 | |
| Evidence-Based Crime Policy | ||
| Decision Making for Critical Infrastructure | ||
CRIM Elective 2 | ||
Program Credit/GPA Requirements
32 total semester hours required
Minimum 3.000 GPA required
- 1
A student who demonstrates prior mastery of the learning outcomes for Cybersecurity: Technologies, Threats, and Defenses (CY 5001) may replace the course with elective coursework to meet the semester hours required for the degree. See the electives list for options.
- 2
CRIM elective to be approved by director/associate director of MSCY.