Requirements for the Master of Science in Cybersecurity
Choose from either the Computer Science Track or the Policy Track | ||
Computer Science Track: | ||
Required Courses: | ||
CSCI 1360 | Human Factors in Cybersecurity | 1 |
CSCI 1660 | Introduction to Computer Systems Security | 1 |
CSCI 1860 | Cybersecurity Law and Policy | 1 |
Select Three Track courses: | 3 | |
Fundamentals of Computer Systems | ||
Introduction to Cryptography and Computer Security | ||
Software Security and Exploitation | ||
Operating Systems | ||
Computer Networks | ||
Operating Systems Laboratory | ||
Design and Implementation of Programming Languages | ||
Privacy-Conscious Computer Systems | ||
Advanced Topics in Cryptography | ||
Topics in Applied Cryptography | ||
Topics in Computer Systems Security | ||
Topics in Software Security | ||
Select Two Elective Courses: | 2 | |
Theory of Computation | ||
Database Management Systems | ||
User Interfaces and User Experience | ||
Distributed Computer Systems | ||
Artificial Intelligence | ||
Machine Learning | ||
Advanced Introduction to Probability for Computing and Data Science | ||
Deep Learning | ||
Design and Analysis of Algorithms | ||
Cybersecurity and International Relations | ||
Computers, Freedom and Privacy | ||
Cybersecurity Ethics | ||
Introduction to Robotics | ||
Reading and Research | ||
Other appropriate courses are possible with the approval of the Director of Graduate Studies and the instructor if you've satisfied their prerequsities. | ||
Policy Track: | ||
Required Courses: | ||
CSCI 1360 | Human Factors in Cybersecurity | 1 |
CSCI 1860 | Cybersecurity Law and Policy | 1 |
CSCI 1880 | Introduction to Computer Security | 1 |
Select Three Track courses: | 3 | |
Individual Independent Study | ||
CSCI 2001 | Applied Cryptography and Data Privacy | |
Privacy and Personal Data Protection | ||
Other appropriate courses are possible with the approval of the Director of Graduate Studies and the instructor if you have satisfied their prerequisites. | ||
Select Two Elective Courses: | 2 | |
The Digital World | ||
Data Fluency for All | ||
Computing Foundations: Data | ||
Computing Foundations: Program Organization | ||
User Interfaces and User Experience | ||
Cybersecurity and International Relations | ||
Computers, Freedom and Privacy | ||
Cybersecurity Ethics | ||
Blockchains and Cryptocurrencies |