Purpose

The MS degree is a unique program in that it is an interdisciplinary program of study among three colleges, Business, Engineering, and Science. Due to this collaboration between the colleges, students will be exposed to a diversified core curriculum with a choice of 3 different elective tracks; having in-depth curriculum in their track while gaining familiarity in the other two. Upon graduation students will be able to perform: Cybersecurity Analysis of vulnerabilities and threats to network environments, Network Penetration Testing, Auditing for Certification & Accreditation, and Technical Project Management in Information Technology. Students will also be able to integrate the business and scientific underpinnings of information technology trends related to the System Development Life Cycle and understand the federal, state & local statutory requirements associated with Information and cybersecurity through the Information Assurance Technical Framework (IATF).

Program prerequisites are kept to a minimum and the program is designed to meet the needs of students with a wide variety of educational backgrounds. The admission and program requirements for those pursuing the Management track are described below.

Admission Requirements

Admission is granted to students who show high promise for success in graduate study and who hold baccalaureate degrees from approved institutions. Admission to the computer science track may require that a student hold a degree in one of the following disciplines:

  • Computer Science
  • Electrical Engineering, Computer Engineering
  • Information Systems Security Engineering


Applicants for graduate study must apply for admission to the Graduate School.  More information about the admissions process may be found on the Graduate School Admission webpage.

Computer Science Track

Bachelor's degree in computer science or a related field; students with a bachelor's in an unrelated field will be required to take the following prerequisites: Data Structure, Operating Systems, Algorithm Design and Analysis, Computer Architecture and Probability and Statistics.

CS 692 is the capstone course and should be taken toward the end of the student’s program. Students must earn a grade of B or better in the capstone course.

Cybersecurity Core Courses
IS 550CYBERSECURITY MANAGEMENT3
IS 663COMPUTER FORENSICS3
CPE 549INTRO TO CYBERSECURITY ENGINRG3
CS 585INTRO TO COMPUTER SECURITY3
CS 692CYBERSECURITY CAPSTONE3
or IS 692 CYBERSECURITY PRACTICUM
Cybersecurity: Computer Science Track
NETWORK SECURITY
INTRO TO COMPUTER NETWORKS
COMPUTER SECURITY
Electives
Select two of the following:6
BUSINESS INTELLIGENCE & ANALYT
DATA MGT AND DATA MINING
INFORMATION SYS STRATEGY & APP
OPERATING SYSTEMS
UBIQUITOUS COMPUTING
ADVANCED COMPUTER NETWORKS
DATA BASE SYSTEMS
CLIENT/SERVER ARCHITECTURES
DES & ANALY OF ALGORITHM
SOFT'W ENGINEERING PROC
COMPUTER NETWORKS
ADVANCED OPERATING SYSTEMS
TELECOMMUNICATIONS & NETWRK'G
NETWORK DEFENSE & OPERATING SY
BUSINESS CONTINGENCY PLANNING
ADV CYBERSECURITY ENGINEERING
COMPUTER NETWORK SECURITY
MOBILE & WIRELESS NETWORKS
NETWORK SECURITY
INTRO TO COMPUTER NETWORKS
COMPUTER SECURITY
Total Semester Hours21

Restrictions on Elective Courses

  1. Computer Science track students should take two elective courses from CS courses.
  2. Computer Engineering track students should take at least one elective course from CPE courses.
  1. Students can take only one course between these courses.
    1. CS 570 and IS 560
    2. CS 685 and CPE 645
    3. CS 670 and CPE 646
    4. CS 687 and IS 640
  2. At least half of the hours must be completed in courses numbered 600.