May 06, 2024  
2023-2024 Academic Catalog 
    
2023-2024 Academic Catalog

Cybersecurity, M.S.


This Master of Science in Cybersecurity program is a 30-credit (10-course) graduate program in cybersecurity that focuses on data communication, ethical hacking, software security, project management and risk management, and defensive technologies. Data communication: we explore cryptographic techniques, tunneling to ensure security of data during transit. Ethical hacking: students will perform penetration testing by using techniques like foot printing, attack surface, discovery, and attack vectors. Software security: students will learn to develop strategies that mitigate security vulnerabilities caused by either non-conformance to software requirements or omissions caused by incorrect business requirements. Project management: students will select and implement projects of their interest, and these projects can be research-oriented or development-oriented. Students will have to perform precise formulation of the identified problem, research or implement a solution. Risk Management: students will gain the ability to perform risk analysis and learn the ability to prioritize remediation efforts based on risk assessment. In terms of defensive technologies, students will learn about the toolchain needed to protect an organization like firewalls, routers, IDPS systems, while learning about concepts like layered defense strategies. Privacy and Security: Students will be able to identify privacy and security threats in organizations and propose tools and mechanisms for protection.

Student Learning Outcomes

  1. Analyze a complex cybersecurity problem and apply principles of cybersecurity and other relevant disciplines to identify solutions.
  2. Design, implement, and evaluate a solution to meet a given set of security requirements in the context of the program’s discipline.
  3. Communicate effectively in a variety of professional contexts.
  4. Recognize professional responsibilities and make informed judgments in network and information security practice based on legal and ethical principles.
  5. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  6. Apply security principles and practices to maintain operations in the presence of risk and threats.