Our Master of Science in Cybersecurity combines a solid understanding of information security technology with relevant knowledge from law, the social sciences, criminology, and management. The MS program is designed for working professionals and also recent graduates who want knowledge they can apply in workplaces to assess and manage information security risks effectively.
The cybersecurity program provides graduates with both the theoretical and experimental skills to perform professional cybersecurity duties. Due to the broad variety of positions that cybersecurity professionals may hold in the industry, our curriculum is designed to provide enough flexibility to our students to tailor their own career appropriately.
The cybersecurity curriculum is intended to provide a comprehensive approach to cybersecurity, which includes both the technical skills and the contextual understanding that are fundamental to cybersecurity professions.
The MS in Cybersecurity—Align program is designed for students with a BS/BA degree from all backgrounds. During the first semester of year one, students are expected to take foundational courses in computer science fundamentals, as well as a course in data structures/discrete mathematics. During their second semester, students take coursework in object-oriented design, as well as introductions to algorithms and computer systems.
Concentration in Criminology
Cybercrime has evolved into more advanced techniques and sophisticated structures. Cybersecurity professionals are of vital importance in crime investigations, and for that reason they need to have a well-rounded background and knowledge. The Master of Science in Cybersecurity provides an interdisciplinary foundation that includes computer science technical courses, complemented with the contextual knowledge courses required for a proper holistic approach to cybercrime. The concentration in criminology and criminal justice will offer MSCY students an opportunity to obtain the fundamental principles and the most important practices that criminal justice professionals use.
Gordon Institute of Engineering Leadership
Master's Degree in Cybersecurity with Graduate Certificate in Engineering Leadership
Students may complete a Master of Science in Cybersecurity in addition to earning a Graduate Certificate in Engineering Leadership. Students must apply and be admitted to the Gordon Engineering Leadership Program in order to pursue this option. The certificate program requires fulfillment of the 16-semester-hour curriculum required to earn the Graduate Certificate in Engineering Leadership, which includes an industry-based challenge project with multiple mentors. The integrated 36-semester-hour master’s degree and certificate require 24 hours from the Master of Science in Cybersecurity (MS required courses, technical track, and contextual track).
Core Requirements
Code | Title | Hours |
---|---|---|
Foundations | ||
CY 5001 | Cyberspace Technology and Applications 1 | 4 |
CY 5010 | Foundations of Information Assurance | 4 |
Technical Track | ||
Complete 8 semester hours from the following: | 8 | |
Applied Cryptography | ||
Computer System Security | ||
Network Security Practices | ||
Software Vulnerabilities and Security | ||
Software Security Practices | ||
Network Security | ||
Wireless and Mobile Systems Security | ||
Contextual Track | ||
Complete 8 semester hours from the following: | 8 | |
Security Risk Management and Assessment | ||
Information System Forensics | ||
Cyberlaw: Privacy, Ethics, and Digital Rights | ||
Decision Making for Critical Infrastructure | ||
Special Topics in IT Security Governance, Risk, and Compliance | ||
Special Topics in Privacy Law | ||
Capstone | ||
CY 7900 | Capstone Project | 4 |
Electives
Code | Title | Hours |
---|---|---|
Complete 4 semester hours from the following: | 4 | |
Database Management Systems | ||
Foundations of Software Engineering | ||
Computer Systems | ||
Web Development | ||
Fundamentals of Computer Networking | ||
Wireless Network | ||
Special Topics in Software Engineering | ||
Complexity Theory | ||
Introduction to Cyberspace Programming 2 | ||
Cloud Security | ||
Introduction to IoT Security | ||
Applied Cryptography | ||
Computer System Security | ||
Network Security Practices | ||
Security Risk Management and Assessment | ||
Information System Forensics | ||
Cyberlaw: Privacy, Ethics, and Digital Rights | ||
Software Vulnerabilities and Security | ||
Software Security Practices | ||
Special Topics in IT Security Governance, Risk, and Compliance | ||
Special Topics in Privacy Law | ||
Machine Learning in Cybersecurity and Privacy | ||
Network Security | ||
Cryptography and Communications Security | ||
Wireless and Mobile Systems Security | ||
Special Topics in Security and Privacy | ||
Criminology | ||
The Criminal Justice Process | ||
Evidence-Based Crime Policy | ||
Managing People in Public and Nonprofit Sectors | ||
Security and Resilience Policy | ||
Cyberconflict |
Concentration in Criminology
This concentration's required courses may count toward the contextual track, and its elective may count toward the major's elective area.
Code | Title | Hours |
---|---|---|
Required | 8 | |
Criminology | ||
The Criminal Justice Process | ||
Complete one of the following: | 4 | |
Evidence-Based Crime Policy | ||
Decision Making for Critical Infrastructure | ||
CRIM elective 2 |
Program Credit/GPA Requirements
32 total semester hours required
Minimum 3.000 GPA required
- 1
A student who demonstrates prior mastery of the learning outcomes for Cyberspace Technology and Applications (CY 5001) may replace the course with elective coursework to meet the semester hours required for the degree. See the electives list for options.
- 2
CRIM elective to be approved by director/associate director of MSCY.
Align Bridge Coursework
A grade of B or higher is required in each course.
Code | Title | Hours |
---|---|---|
Students will be required to complete two or more of the following bridge courses to be determined by faculty mentor. | 8 | |
Fundamentals | ||
Intensive Foundations of Computer Science and Recitation for CS 5001 | ||
Discrete Structures | ||
Discrete Structures | ||
Cybersecurity | ||
Cyberspace Technology and Applications | ||
Additional Align Courses | ||
Data Structures, Algorithms, and Their Applications within Computer Systems and Recitation for CS 5008 |
Core Requirements
Code | Title | Hours |
---|---|---|
Foundations | ||
CY 5010 | Foundations of Information Assurance | 4 |
Technical Track | ||
Complete 8 semester hours from the following: | 8 | |
Applied Cryptography | ||
Computer System Security | ||
Network Security Practices | ||
Software Vulnerabilities and Security | ||
Software Security Practices | ||
Network Security | ||
Wireless and Mobile Systems Security | ||
Contextual Track | ||
Complete 8 semester hours from the following: | 8 | |
Security Risk Management and Assessment | ||
Information System Forensics | ||
Cyberlaw: Privacy, Ethics, and Digital Rights | ||
Decision Making for Critical Infrastructure | ||
Special Topics in IT Security Governance, Risk, and Compliance | ||
Special Topics in Privacy Law | ||
Capstone | ||
CY 7900 | Capstone Project | 4 |
Electives
Code | Title | Hours |
---|---|---|
Complete 4 semester hours from the following: | 4 | |
Criminology | ||
The Criminal Justice Process | ||
Evidence-Based Crime Policy | ||
Database Management Systems | ||
Foundations of Software Engineering | ||
Computer Systems | ||
Web Development | ||
Fundamentals of Computer Networking | ||
Wireless Network | ||
Special Topics in Software Engineering | ||
Complexity Theory | ||
Introduction to Cyberspace Programming 2 | ||
Cloud Security | ||
Introduction to IoT Security | ||
Applied Cryptography | ||
Computer System Security | ||
Network Security Practices | ||
Security Risk Management and Assessment | ||
Information System Forensics | ||
Cyberlaw: Privacy, Ethics, and Digital Rights | ||
Software Vulnerabilities and Security | ||
Software Security Practices | ||
Special Topics in IT Security Governance, Risk, and Compliance | ||
Special Topics in Privacy Law | ||
Machine Learning in Cybersecurity and Privacy | ||
Network Security | ||
Cryptography and Communications Security | ||
Wireless and Mobile Systems Security | ||
Security and Resilience Policy | ||
Cyberconflict | ||
Managing People in Public and Nonprofit Sectors |
Concentration in Criminology
This concentration's required courses may count toward the contextual track, and its elective may count toward the major's elective area.
Code | Title | Hours |
---|---|---|
Required | 8 | |
Criminology | ||
The Criminal Justice Process | ||
Complete one of the following: | 4 | |
Evidence-Based Crime Policy | ||
Decision Making for Critical Infrastructure | ||
CRIM elective 1 |
Program Credit/GPA Requirements
36–44 total semester hours required
Minimum 3.000 GPA required
- 1
CRIM elective to be approved by director/associate director of MSCY.