Cybersecurity, Master of Science

Admission

Please refer to “The Graduate Admissions Process” section for general graduate admission information and requirements.

  1. Before registering for your first course, please submit a graduate application for admission accompanied by a non-refundable $35 application fee.
  2. Steps for registration:
    1. Register for CYB 6000 or CYB 6010 as the first course in the Cybersecurity Program.
    2. Students enrolled in the Master of Science Cybersecurity program must review and sign the College of Technology's Code of Conduct Policy.    
    3. Attend an online Master of Science Cybersecurity program orientation session.
    4. Submit an official copy of your college transcripts from an accredited university to the Office of Graduate Admissions.  All students are required to demonstrate proficiency in basic Information Technology knowledge.  Students who cannot demonstrate proficiency will be required to take IST 5500 within the first semester of the Cybersecurity program 

All Cybersecurity students are encouraged to complete IST 5000, an introductory academic writing course during their first semester. Students must maintain a 3.0 GPA in order to graduate.

Program Purpose

Students earning this degree will be prepared to advance in the growing and challenging field of Cybersecurity. The program offers students the opportunity to learn both tactical and strategic perspectives of Cybersecurity. The combination of tactical and strategic perspectives enables students to become practitioners and leaders in the field of Cybersecurity.



Program Competencies

The graduate student who successfully completes the Cybersecurity program will be expected to:

I. Oral Communication

  • Create and deliver a presentation that adheres to oral presentation best practices.
  • Prepare and deliver a professional presentation related to Cybersecurity.
  • Determine the appropriate verbal communication medium (phone call, meeting, presentation, etc.) for a given situation.
  • Develop an effective verbal communication strategy for a given situation.

II.    Written Communication

  • Determine the appropriate written communication medium (email, text, report, etc.) for a given situation.
  • Develop an effective written communication strategy for a given situation.
  • Correctly use citations, quotations, and references to support written/typed material.
  • Correctly format citations, quotations, and references in accordance with the APA Manual’s standards
  • Format written/typed material, including tables and figures, in accordance with the APA Manual’s standards, including APA style and format.

III.   Critical Thinking

  • Solve an IT/IS and/or Cybersecurity related problem / scenario.
  • Utilize quantitative, qualitative and /or scientific reasoning to solve problems.
  • Use/Apply critical thinking strategies, including reasoning, problem solving, analysis and evaluation.
  • Define a problem or issue and develop questions and methods to address the problem or issue and/or to create new knowledge.

IV.  Information Literacy

  • Identify and analyze the applicability and reliability of research information.
  • Use applicable and reliable research information as support for group and/or individual assignments.

V.    Ethics

  • Critique a scenario/case study involving a Cybersecurity ethical dilemma.

VI.  Cybersecurity Best Practices

  • Apply a Cybersecurity best practice to a scenario.
  • Compare and contrast a given set of Cybersecurity best practices.

VII. Cybersecurity Plan

  • Develop a Cybersecurity plan for a given situation/case study.
  • Analyze / critique a Cybersecurity plan.

VIII. Cybersecurity Tools, Techniques, and Methodologies

  • Compare and contrast a given set of Cybersecurity methodologies.
  • Apply/utilize the appropriate Cybersecurity tool for a given situation/case study.
  • Describe a given Cybersecurity technique.


Program Design

Students who successfully complete the Masters of Science in Cybersecurity will possess a working command of current cybersecurity practices that can be immediately applied to an organization regardless of size. Degree recipients will be capable of managing complex cybersecurity responsibilities and projects from inception to completion. Students have the option to pursue a concentration that caters to their vocational pursuit. Students graduating from the MS in Cybersecurity program should be prepared to provide leadership in the field of Cybersecurity. Graduates will have the following skills, knowledge, and values:

• A core knowledge of Cybersecurity

• Communication, interpersonal, and team skills

• Analytical and critical thinking skills

• Specific skills leading to a career

Information Systems Foundations

Students who have an insufficient level of expertise to enter the program will be identified through a placement exam and will be required to take IST 5500 - IST Fundamentals.

Cybersecurity Core Course Requirements

CYB 6000Network Security

3

CYB 6010Protecting and Securing the OS

3

CYB 6020Vulnerability Assmt and PT

3

CYB 6030IDS and IPS

3

CYB 6040Cyberthreat Intelligence

3

CYB 8100Cybersecurity Capstone

3

CYB 8101Research Seminar

3

Electives

If pursuing no concentration, then select five (5) of the following electives:

CYB 6090Special Topics: Cybersecurity

3

IST 7060Project and Change Management

3

SEC 6010Planning for Information Security

3

SEC 6025Radio Frequency Identification (RFID) Applied Systems

3

SEC 6040Web and Data Security

3

SEC 6050Business Intelligence

3

SEC 6060Incident Handling and Response

3

Cyber Terrorism Concentration

Students pursuing the Cyber Terrorism Concentration should select five (5) of the following courses:

MHS 7000/MAJ 7000Contemporary Issues in Homeland Security

3

MHS 7001Sociology of Terrorism

3

MHS 7002/MAJ 7002Legal Aspects and Policy of Homeland Security

3

MHS 7003/MAJ 7003Risk Assessment and Management

3

MHS 7006Topics in Intelligence

3

MHS 7007Strategic Planning in Homeland Security

3

SCADA Cybersecurity Concentration

Students pursuing the SCADA Cybersecurity concentration will complete the following courses:

IST 7100IT Policy and Strategy

3

SEC 6080Industrial Control Systems (ICS) Security

3

SEC 6082SCADA Architecture

3

SEC 6084SCADA Risk Management and Auditing

3

SEC 6086SCADA Security Awareness and Standards

3