DEGREE PROGRAM REQUIREMENTS
Total Minimum Hours: 30 credit hours
Core Requirements – 12 hours
Concentrations – 15-18 hours
Practicum – 3 hours
Core Requirements - 12 hours
EEL 6936 (3) Special Topics: Data Networks, Sys & Securities (Proposed EEL 6808; pending SCNS approval)
MAT 5932 (3) Special Topics: Applied Cryptography
ISM 6328 (3) Basics of Information Security and Risk Management
ISM 6930 (3) Decision Processes for Business Continuity and Disaster Recovery
Concentrations - 12-18 hours
Students select from the following concentrations:
Digital Forensics - 15 hours
Area of emphasis on forensics following attacks on critical infrastructure systems.
CJE 6688 (3) Cybercrime and Criminal Justice
CJE 6623 (3) Digital Evidence Recognition
CJE 6624 (3) Introduction to Digital Evidence
CJE 6625 (3) Network Forensic Criminal Investigations
CJE 6626 (3) Digital Forensic Criminal Investigations
Computer Security Fundamentals - 15 hours
Area of emphasis in operating secure critical infrastructure systems.
Students select from the following options to complete the 12 hour requirement:
EEL 6764 (3) Principles of Computer Architecture
COP 6611 (3) Operating Systems
COT 6405 (3) Introduction to the Theory of Algorithms
CIS 6930 (3) Special Topics: Computer Systems Security (New Course Number Pending)
For the remaining 3 hours students may select a course from the other concentrations.
Cyber Intelligence - 18 hours
Area of emphasis in methodologies for analyzing threats against critical systems
Note – this concentration requires a minimum of 33 total program hours.
ENC 6261 (3) Professional and Technical Communication
LIS 6700 (3) Information Strategy & Decision Making
LIS 6703 (3) Core Concepts in Intelligence
LIS 6702 (3) Advanced Intelligence Analytic Methods
LIS 6709 (3) Cyber Intelligence
LIS 6670 (3) Advanced Cyber intelligence
Information Assurance - 15 hours
Area of emphasis in securing critical information and systems. The concentration requires students to take four out of the following five courses as well as an additional elective course.
ISM 6124 (3) Advanced Systems Analysis and Design
ISM 6218 (3) Advanced Database Management
BUL 5842 (3) Risk Management and Legal Compliance
ACG 6457 (3) Accounting Systems Audit, Control and Security
ISM 6137 (3) Statistical Data Mining
For the additional elective in the Information Assurance Concentration, students may take:
ISM 6145 (3) Seminar on Software Testing
ISM 6316 (3) Project Management
ACG 6688 (3) Forensics Accounting and the Legal Environment
Or any other elective pre-approved by the Muma College of Business Information Assurance Concentration Program Director.
The information below applies to all concentrations in the Program:
During the semester in which the student is scheduled to graduate, the student will be required to submit an electronic portfolio demonstrating completion of core program competencies in cybersecurity and in the area of concentration. This competency-based portfolio will substitute for the written comprehensive exam because the portfolio permits the capstone assessment to align exactly with the degree program’s objectives. Each objective in the portfolio is reviewed and rated by program faculty for Content (demonstrating knowledge of accepted practices, procedures, and trends in the field) and Critical Thinking (ability the student’s ability to analyze a problem, organize a response, synthesize perspectives, and draw practical, testable conclusions)
Because the primary aim of the M.S. in Cybersecurity is to train highly skilled practitioners for the workforce, the Degree does not include a research thesis requirement.
Practicum - 3 hours
Satisfactory completion of a three (3) credit hour applied learning experience (practicum) is a core degree requirement for all students pursuing the M.S. in Cybersecurity. The practicum experience is arranged and managed through the coordinator for the student’s concentration area. The student will register for practicum credit in her concentration area’s home department. Until each department receives final approval for a “practicum” or “field work” course number, some departments will develop a learning plan with the student for the practicum and use the “Independent Study” course mechanism.
• For Information Assurance: ISM 6905 Independent Study
• For Computer Security Fundamentals: CAP 6940 IT Graduate Practicum
• For Digital Forensics: CCJ 6905 Directed Independent Study
• For Cyber Intelligence: LIS 6946 Supervised Field Work