Contact Admissions: (866) 967-7046

email: onlineprograms@lewisu.edu

computer-science-professionals.jpg

M.S. in Computer Science - Cyber Security Concentration

Design Software, Tools and Networks to Combat Cyber Attacks

The Cyber Security concentration in the MS in Computer Science (MSCS) program teaches students how to identify, monitor and investigate organizational cyber threats, as well as how to create responses to them. Learn how to design software, networks and encryption and authentication systems that combat cyber attacks. Plus, learn to investigate the aftermath of cyber attacks using popular digital forensics tools, as well as tools you create yourself.

Cyber Security Courses

For the Cyber Security concentration, students will take 4 courses (12 credit hours) from the track plus 1 elective (3 credit hours) for a total of 15 credit hours. A sample of the online Cyber Security courses offered include:

  • Digital Forensics
  • Enterprise Network Security
  • Encryption and Authentication
  • Intrusion Detection, Response and Recovery
  • Wireless Security

Based on students’ interests, potential projects may involve intrusion detection, reverse engineering of malware, penetration testing, operating system and network forensics, defense-in-depth technologies, and other assignments relevant to keeping data systems secure.

Student Learning Outcomes

Upon completion of the Cyber Security concentration in the MSCS program, students will be equipped to:

  1. Identify the risks an organization faces due to cyber threats, and recommend steps to combat those risks.
  2. Apply skills and knowledge to create new responses to emerging cyber security problems so that they can respond to new attacks as they evolve.
  3. Describe how cyber attacks against an organization can be monitored and investigated for actionable intelligence.
  4. Explain how symmetric and asymmetric encryption and authentication systems safeguard data, and recommend encryption and authentication systems suited to particular tasks and settings.
  5. Identify components of a modern information system and the threats that challenge their security.
  6. Design software and networks that resist and mitigate cyber attacks.
  7. Specify tools and architectures to help secure information systems both proactively and reactively.

Shape the Science of Technology

To learn more about the online MS in Computer Science, call (866) 967-7046 to speak with a Graduate Admissions Counselor or click here to request more information.