You're logged in as |

Cybersecurity

Requirements for the Master of Science in Cybersecurity

Choose from either the Computer Science Track or the Policy Track
Computer Science Track:
Required Courses:
CSCI 1360Human Factors in Cybersecurity1
CSCI 1660Introduction to Computer Systems Security1
CSCI 1860Cybersecurity Law and Policy1
Select Three Track courses: 3
Fundamentals of Computer Systems
Introduction to Cryptography and Computer Security
Software Security and Exploitation
Operating Systems
Computer Networks
Operating Systems Laboratory
Design and Implementation of Programming Languages
Privacy-Conscious Computer Systems
Advanced Topics in Cryptography
Topics in Applied Cryptography
Topics in Computer Systems Security
Topics in Software Security
Select Two Elective Courses:2
Theory of Computation
Database Management Systems
User Interfaces and User Experience
Distributed Computer Systems
Artificial Intelligence
Machine Learning
Advanced Introduction to Probability for Computing and Data Science
Deep Learning
Design and Analysis of Algorithms
Cybersecurity and International Relations
Computers, Freedom and Privacy
Cybersecurity Ethics
Introduction to Robotics
Reading and Research
Other appropriate courses are possible with the approval of the Director of Graduate Studies and the instructor if you've satisfied their prerequsities.
Policy Track:
Required Courses:
CSCI 1360Human Factors in Cybersecurity1
CSCI 1860 Cybersecurity Law and Policy1
CSCI 1880 Introduction to Computer Security1
Select Three Track courses: 3
Individual Independent Study
CSCI 2001
Applied Cryptography and Data Privacy
CSCI 2002
Privacy and Data Protection
IAPA 1201
Cybersecurity: Strategy and Policy
Other appropriate courses are possible with the approval of the Director of Graduate Studies and the instructor if you have satisfied their prerequisites.
Select Two Elective Courses:2
The Digital World
Data Fluency for All
Computing Foundations: Data
Computing Foundations: Program Organization
User Interfaces and User Experience
Cybersecurity and International Relations
Computers, Freedom and Privacy
Cybersecurity Ethics
Blockchains and Cryptocurrencies