close menu

cyber security

    Master of Science in Cyber Security (MSCYS)

    CIP Code: 11.1003

    This program qualifies for the STEM designation.

    The goal of the MSCYS program is to equip technologists with the competencies to develop, implement and maintain an effective cyber defense strategy for a range of organizations. Topics include network and systems security, identity management, network defense, information assurance compliance, strategic planning, organizational leadership, disaster recovery, business continuation and cybersecurity ethics. With emphases on governance, leadership, and responsibilities, the strong analytical and ethical concepts and applications will provide technology specialists with the tools to create and monitor business and enterprise security in an ever-connected cyber world.

    Program Objectives

    Together, the 12 MSCYS courses provide the knowledge and skills that enable graduates to advance in, and become leaders of, cyber security career fields. Specifically, each group of courses in the MSCYS curriculum measure a student’s ability to:

    • Apply concepts and terminologies for management of cyber security systems and applications, which is demonstrated by successful completion of the exercises and projects required in the common- and program-core courses, and capstone course;
    • Analyze cyber security threats, trends, and strategies on a national security level, which is demonstrated by successful completion of analyses and creation of models required in the program core and elective courses;
    • Evaluate computer networks and systems for cyber security with the ability to apply techniques that test potential threats, which are required in the program core and electives courses;
    • Build organizational and technological structures to protect digital assets, which are required in the program core and electives courses, and capstone course; and
    • Develop models for technology disaster recovery plans that are aligned with business operations utilizing appropriate systems, tools, and ethical considerations, which are required in the program core, electives courses, and capstone course. 

    Program Length

    It is expected that students will take two courses per term throughout their programs. Since many students take one approved quarter-off (vacation term) per year during their program, the normal program length is 2 years (24 months) with the expectation that students will complete in this length of time. Students are given 3 years (36 months) to complete their programs as long as they are making satisfactory academic progress.

    Curriculum

    Common Core (2 Courses)

    • Course
      Credit Hrs
    • MGMT515 - Management that Transforms

      4.5

    • TECH515 - Technology that Transforms

      4.5

    Program Core (5 Courses)

    • INST 540 - Principles of Information Security

      4.5

    • INST 541 - Information Security Policy

      4.5

    • INST 542 - Information Security Risk and Vulnerability Assessment

      4.5

    • INST 569 - Data and System Security

      4.5

    • INST 570 - Information Security Ethics and Legal Aspects

      4.5

    Elective (4 Courses)

      Students may choose from the various graduate core or elective courses offered in this and other programs. A sample selection of electives is listed as follows.

    • CYBR 501 - Cloud and Security Control (Certification prep for Cloud+)

      4.5

    • CYBR 502 - System Defense and Network Security (Certification prep for Security+)

      4.5

    • CYBR 550 - Cybersecurity Range Lab Simulations and Training 

      4.5

    • CMSC 530 - Operating System Internals

      4.5

    • CMSC 580 - System Architecture and Security Design

      4.5

    • INST 543 - Forensics and Incident Response

      4.5

    Capstone (1 Course)

    • CAPS600 - Graduate Capstone

      4.5