Complete all courses and requirements listed below unless otherwise indicated.
Core Requirements
Code | Title | Hours |
---|---|---|
Foundations | ||
CY 5001 | Cybersecurity: Technologies, Threats, and Defenses 1 | 4 |
CY 5010 | Cybersecurity Principles and Practices | 4 |
Technical Track | ||
Complete 8 semester hours from the following: | 8 | |
Applied Cryptography | ||
Computer System Security | ||
Network Security Practices | ||
Software Vulnerabilities and Security | ||
Software Security Practices | ||
Network Security | ||
Wireless and Mobile Systems Security | ||
Contextual Track | ||
Complete 8 semester hours from the following: | 8 | |
Security Risk Management and Assessment | ||
Information System Forensics | ||
Cyberlaw: Privacy, Ethics, and Digital Rights | ||
Decision Making for Critical Infrastructure | ||
Special Topics in IT Security Governance, Risk, and Compliance | ||
Capstone | ||
CY 7900 | Capstone Project | 4 |
Electives
Code | Title | Hours |
---|---|---|
Complete 4 semester hours from the following: | 4 | |
Criminology | ||
The Criminal Justice Process | ||
Evidence-Based Crime Policy | ||
Database Management Systems | ||
Foundations of Software Engineering | ||
Computer Systems | ||
Web Development | ||
Fundamentals of Computer Networking | ||
Special Topics in Software Engineering | ||
Complexity Theory | ||
Cloud Security Practices | ||
Applied Cryptography | ||
Computer System Security | ||
Network Security Practices | ||
Security Risk Management and Assessment | ||
Information System Forensics | ||
Cyberlaw: Privacy, Ethics, and Digital Rights | ||
Software Vulnerabilities and Security | ||
Software Security Practices | ||
Special Topics in IT Security Governance, Risk, and Compliance | ||
Network Security | ||
Wireless and Mobile Systems Security | ||
Special Topics in Security and Privacy | ||
Security and Resilience Policy | ||
Managing People in Public and Nonprofit Sectors |
Concentration in Criminology
This optional concentration's required courses may count toward the contextual track, and its elective may count toward the major's elective area.
Code | Title | Hours |
---|---|---|
Required | ||
CRIM 6200 | Criminology | 4 |
CRIM 6202 | The Criminal Justice Process | 4 |
Complete one of the following: | 4 | |
Evidence-Based Crime Policy | ||
Decision Making for Critical Infrastructure | ||
CRIM Elective 2 |
Program Credit/GPA Requirements
32 total semester hours required
Minimum 3.000 GPA required
- 1
A student who demonstrates prior mastery of the learning outcomes for Cybersecurity: Technologies, Threats, and Defenses (CY 5001) may replace the course with elective coursework to meet the semester hours required for the degree. See the electives list for options.
- 2
CRIM elective to be approved by director/associate director of MSCY.