Skip to main content

Apply now! Spring priority deadline is October 1.

Secure
Professor in front of computer monitors with students

Cybersecurity Operations (Combined BS + MS)

About The Program

The Combined (BS + MS) program in Cybersecurity offers a unique, accelerated pathway for students to earn two in-demand degrees within a streamlined 140-credit format. By integrating undergraduate and graduate coursework, students can save both time and tuition while developing the comprehensive skill set needed for leadership roles in the evolving cybersecurity field.

Students begin with a solid foundation in the BS program, where they learn to assess security risks, defend networked systems, and implement protective measures aligned with business, legal, and ethical standards. Core courses emphasize hands-on, lab-based learning and are aligned with industry-recognized certifications to enhance career readiness. The BS curriculum is designated by the National Security Agency (NSA) as a Center of Academic Excellence in Cyber Defense (NCAE-CD), ensuring national recognition and quality.

As students progress, they transition into graduate-level coursework that emphasizes advanced cyber operations—including offensive and defensive strategies, malware analysis, reverse engineering, threat intelligence, and risk management. The MS curriculum aligns with the NSA’s Center of Academic Excellence in Cyber Operations (NCAE-CO) knowledge units, reflecting the highest national standards for technical depth and mission-focused cybersecurity education.

Graduates of the combined program leave with two highly respected degrees, robust technical and professional skills, and a competitive edge in cybersecurity roles across government, defense, critical infrastructure, and private industry.

Program highlights

  • Accelerated dual-degree format: Earn both a BS in Cybersecurity and an MS in Cyber Operations in just 140 credits, reducing total time and cost.
  • Integrated curriculum: Select graduate courses count toward both degrees, allowing early entry into advanced topics while completing undergraduate requirements.
  • Hands-on training environment: Students develop real-world skills through lab-intensive courses, cloud-based simulations, and access to IT/OT cyber ranges.
  • NSA-designated programs: The BS program is aligned with NCAE-CD, and the MS curriculum aligns with NCAE-CO standards, ensuring rigorous, nationally recognized instruction.
  • Certification-aligned coursework: Undergraduate courses are mapped to industry-recognized cybersecurity certifications, strengthening employability.
  • Expert instruction: Courses are taught by faculty with significant experience in government, military, and private-sector cybersecurity.
  • Career-focused outcomes: Graduates are equipped for leadership roles in cyber defense and operations, entering the workforce with two degrees and a strategic advantage.

Learn more about the BS in Cybersecurity Program.

Learn more about the MS in Cyber Operations program.

Students in computer lab looking at cyber security threats.

Cyber systems operations job prospects

Cybersecurity professionals are in high demand, with the projected number of cyber systems operations jobs growing 28% over the next decade and starting salaries for well-qualified BS graduates approaching $100,000/year.

With a graduate degree from Metro State’s Cyber Operations program, there is no limit to what a student can accomplish. The MS in Cyber Operations program will enable graduates to seek employment opportunities in the military, government, and private sectors including the National Security Agency (NSA), Department of Defense (DOD), Navy Space and Naval Warfare System Command, and National Labs (Sandia National Laboratory, Pacific Northwest National Laboratory).

Cyber systems operations job titles can include Security Auditor/Manager, Security Administrator, Security Analyst/Architect/Engineer, Penetration Tester, Vulnerability Assessor, Incident Responder, and Secure Software Developer.

Seals of the DoD Cyber Academic Engagement Office, National Security Agency, National Centers of Academic Excellence in Cybersecurity, and the Centers of Academic Excellence in Cybersecurity Community, with the CAE-CD and CAE-CO cyber defense and cyber operations submarks

Metro State University is Minnesota’s only institution recognized by the National Security Agency (NSA) with dual designations as a National Center of Academic Excellence in Cyber Defense (NCAE-CD) and Cyber Operations (NCAE-CO).

The Bachelor of Science in Cybersecurity degree is aligned with the NCAE-CD designation, ensuring the program meets rigorous national standards in technical depth, applied learning, and ethical practice. This recognition provides students with a competitive edge in the workforce and validates their readiness to defend critical systems and data in a rapidly evolving cyber landscape.

The Master of Science in Cyber Operations is aligned with the NCAE-CO designation, awarded by the National Security Agency. This elite recognition underscores the program’s focus on the operational side of cybersecurity—emphasizing advanced technical skills, adversarial thinking, and mission-oriented training beyond traditional cybersecurity practices. The NCAE-CO designation affirms that the program meets the nation’s most rigorous standards for preparing professionals to conduct complex cyber operations in support of national defense, critical infrastructure protection, and intelligence missions.

As an active participant in the national CAE community, Metro State continues to lead in cybersecurity workforce development, education, and public service—equipping graduates to protect the digital assets of government, industry, and society.

Student outcomes

Program Educational Objectives (PEOs)

Graduates of the Combined BS + MS in Cybersecurity and Cyber Operations program are expected to achieve the following within a few years of completing the program:

  1. Lead in cybersecurity and cyber operations roles by applying advanced knowledge and hands-on experience to protect and defend complex information systems across public and private sectors.
  2. Develop and implement effective cyber defense strategies through the analysis of adversarial tactics, emerging threats, and risk management principles grounded in technical, legal, and ethical standards.
  3. Communicate technical information clearly and effectively to diverse stakeholders, including technical teams, executives, and non-technical audiences, in both operational and strategic contexts.
  4. Exhibit leadership, collaboration, and professional responsibility, contributing to high-performing teams and making sound ethical decisions in high-stakes cybersecurity environments.
  5. Pursue continuous professional development by staying current with evolving technologies, regulatory frameworks, and threat landscapes to remain adaptable and effective in a dynamic field.

Program oversight

MN Cyber icon. Train, Test, Detect, Protect

Housed within the College of Sciences, the MN Cyber Institute is a statewide initiative dedicated to positioning Minnesota as a national leader in cybersecurity education and workforce development. The Institute advances this mission through strategic public-private partnerships, interdisciplinary research, and community engagement.

Program oversight is provided by the MN Cyber Advisory Board, a group of cybersecurity leaders from industry, government, and academia. The board ensures the program remains responsive to current and emerging threats, provides strategic guidance, and helps align the curriculum with real-world workforce demands.

The combined program reflects the highest national standards in cybersecurity education. The bachelor’s program is aligned with the NCAE-CD designation, ensuring students develop foundational competencies grounded in nationally recognized cyber defense standards. At the graduate level, the program aligns with the NCAE-CO designation, incorporating advanced Knowledge Units (KUs) focused on offensive and defensive tactics, threat intelligence, and mission-driven cyber operations. Together, these designations ensure that students receive a technically rigorous, operationally relevant, and nationally endorsed education that prepares them for leadership roles across the cybersecurity landscape.

Career prospects

Graduates of the combined (BS + MS) program are uniquely positioned for high-impact careers at the intersection of cyber defense, operations, and national security. With a comprehensive education spanning foundational defense strategies and advanced offensive operations, graduates are equipped to protect critical systems, anticipate sophisticated threats, and lead cybersecurity initiatives across sectors.

The dual-degree structure not only accelerates entry into the workforce but also enhances professional credibility and competitiveness for advanced roles. Students exit the program with hands-on experience, nationally recognized credentials, and NSA-aligned training—making them ideal candidates for careers in government, military, defense contracting, critical infrastructure, and private industry.

According to the U.S. Bureau of Labor Statistics, employment for cybersecurity professionals is projected to grow by 33% over the next decade, far outpacing the average for all occupations. Median salaries exceed $124,000, with specialized roles in cyber operations and threat intelligence offering even greater earning potential.

Graduates of the combined program are prepared for a range of advanced roles, including:

  • Cybersecurity Engineer / Analyst
  • Cyber Operations Specialist
  • Threat Intelligence Analyst
  • Penetration Tester
  • Malware Analyst / Reverse Engineer
  • Security Architect
  • Incident Responder
  • National Security or Defense Cyber Analyst

Whether securing enterprise systems or contributing to national defense initiatives, graduates are equipped to lead in a rapidly evolving cybersecurity landscape.

How to enroll

Program eligibility requirements

Admission to the Combined Cyber Operations Program (BS + MS) is based on a holistic review of each applicant’s academic background, relevant experience in computing or cybersecurity, and letters of recommendation. The Graduate Program Director oversees all admission decisions and evaluates the equivalency of any transferred coursework.

There are two applications for the BS + MS Cybersecurity Operations program. Please see the application process below.

If you are new to Metro, you must first apply to the undergraduate Cybersecurity BS program. This is done through the MinnState application.

Apply to Metro State: Learn about the steps to enroll or, if you have questions about what Metro State can offer you, request information, visit campus or chat with an admissions counselor.

If you are a current undergraduate Cybersecurity BS student and have met the below minimum requirements, please apply to the Cyber Operations MS program through GradCAS.

Minimum Eligibility Requirements

Meeting the minimum requirements does not guarantee admission, as space is limited and selection is competitive. To be considered, applicants must be a current admitted undergrad student at Metro State:

  • Have successfully completed or transfer equivalents of all 24-credits of the pre-major foundation courses with a grade of C- or higher and a minimum GPA of 2.5 for ICS 265 and MATH 215.
    • Pre-major foundation course list: CFS 262, CFS 264, ICS 140, ICS 265, MATH 215, STAT 201
  • Declared major in Cybersecurity BS and possess a minimum cumulative GPA of 3.0 at the end of their junior year and maintain through completion of bachelors degree.
  • Have completed (or be in progress to complete) 90 or more credits applicable toward the bachelor’s degree

Application instructions

Metro State University is participating in the common application for graduate programs (GradCAS). Applications are only accepted via the CAS website.

Please note that Cyber Operations (MS) applications are only accepted Fall semesters. Deadlines are noted below and within the CAS application.

CAS steps

  1. Select the term for which you are seeking admission (below), and navigate to the CAS website. Open applications include:
  1. Create or log in to your account and select the Cyber Operations (MS) program.
  2. Carefully review all instructions and complete all four sections of the application.

Specific application requirements for individual programs can be found on each program page in CAS. Carefully read the instructions that appear throughout the application pages. You can only submit your application once. If you need to update information you have submitted, please notify graduate.studies@metrostate.edu

Application fee

A nonrefundable $38 fee is required for each application.
Applications will not be processed until this fee is received.

Active-duty military, veterans, and Metro State alumni can receive an application fee waiver. Contact graduate.studies@metrostate.edu.

Final Admission to the Graduate Program

Official acceptance into the Master of Science in Cyber Operations program is contingent upon successful completion of the bachelor’s degree with a minimum cumulative GPA of 3.0. Students who do not meet this requirement upon graduation will not be formally admitted into the graduate portion of the combined program.

Questions?

Courses and Requirements

SKIP TO COURSE REQUIREMENTS

Guidelines for completing the Combined (BS + MS) Program

Students interested in pursuing the Combined Bachelor’s and Master’s (BS + MS) program in Cyber Operations are strongly encouraged to consult with an academic advisor to fully understand the program structure, eligibility requirements, and course sequencing.

Upon admission to the combined program, students will officially join the graduate cohort in the fall semester of their senior year. From this point forward, students will be held to the same academic standards as graduate students for all graduate-level coursework. Importantly, students will only pay graduate tuition for the graduate courses they are enrolled in.

By the conclusion of the following spring semester, students must complete all requirements for the Bachelor of Science (BS) in Cybersecurity and officially graduate. Provided they meet all eligibility criteria, including academic performance standards, students will transition from undergraduate to graduate status and proceed to complete the remaining coursework for the Master of Science (MS) in Cyber Operations.

Eligibility Requirements

To remain in good standing and eligible for continuation in the combined program, students must:

  • Maintain a minimum cumulative GPA of 3.0
  • Earn a grade of B or higher in all graduate-level coursework

Combined (BS + MS) Program Structure

The Combined Cybersecurity Operations Program enables qualified students to earn both a bachelor’s and a master’s degree in an accelerated format, completing 90 credits in the Cybersecurity major and 16 overlapping credits that apply to both degrees. The program is structured in three sequential parts:

Part I: Undergraduate Coursework (40 Credits)

  • Complete Pre-Major Foundation Courses (24 credits) and Cybersecurity Major Core Courses (16 credits)
  • Fulfill additional undergraduate degree requirements, including General Education (GELS), upper-division credits, and elective coursework

Part II: Overlapping Undergraduate and Graduate Coursework (30 Credits)

  • Complete 26 credits of major core coursework, including 12 credits that are double-counted toward both the BS and MS degrees
  • Take an additional 4 credits of graduate coursework, also double-counted for both degree requirements
  • Satisfy the 120-credit requirement to graduate with a BS in Cybersecurity

Part III: Graduate Coursework (20 Credits)

  • Complete 17 credits of advanced graduate-level core courses
  • Fulfill the 3-credit graduate capstone, distributed over three semesters
  • Graduate with a Master of Science in Cyber Operations

Prerequisite Knowledge and Skills

Due to the program's rigorous and accelerated nature, incoming students are expected to possess solid technical foundations in the following areas:

  • Programming Languages: Python, C, Assembly Language, PowerShell
  • Computer Science Fundamentals: Data Structures and Algorithms
  • Systems and Networking: Systems Administration, Computer Networking, Linux Fundamentals

To ensure success, students should acquire these competencies through prior undergraduate coursework or through targeted short courses before beginning the graduate portion of the program.

Combined Program Requirements

The combined (BS + MS) Cybersecurity Operations Program is organized into the following three distinct phases:

+ Part I (40 credits)
Pre-major Courses 24 credits

To declare the Cybersecurity major, students must first complete the designated pre-major foundation courses with a minimum grade of C- in each. Additionally, a combined GPA of at least 2.5 is required for ICS 265 and MATH 215, or their approved transfer equivalents. For more information, please refer to the General Guidelines section below.

Complete all of the following six courses:

This course introduces students to the fundamentals of computer hardware, operating systems, networking, and cybersecurity. Students will learn to install, configure, and troubleshoot computer components, mobile devices, operating systems, and software while applying basic security practices. The course covers diagnosing and resolving common technical issues, servicing hardware components, and documenting and communicating technical support solutions. Additionally, students will explore operating system architectures, cloud computing, virtualization, scripting, and multi-OS environments. Through hands-on labs, students will gain practical skills essential for IT support roles and CompTIA A+ certification preparation.

Full course description for IT Infrastructure Fundamentals

This course provides an in-depth exploration of multi-user operating systems, focusing on Linux environment. Students will learn to install, configure, and manage Linux systems, software, storage, and services while ensuring security and performance optimization. The course covers memory management, process handling, disk and file system management, and peripheral operations. Students will develop proficiency in user and group management, authentication methods, access controls, and network security. Hands-on labs will emphasize troubleshooting system performance issues, diagnosing application failures, and resolving hardware-related problems. Additionally, students will gain experience in automating system administration tasks using shell scripting and Git for version control. By the end of the course, students will be able to apply best practices for system security, implement firewalls, manage permissions, and execute system hardening techniques to mitigate cybersecurity risks. The…

Full course description for IT System Administration

This course introduces fundamental concepts in computer programming and the development of computer programs to solve problems across various application domains. Topics include number systems, Boolean algebra, variables, decision-making and iterative structures, lists, file manipulation, and problem deconstruction via modular design approaches. Lab work and homework assignments involving programming using a language such as Python form an integral part of the course.

Full course description for Computational Thinking with Programming

This course is designed to provide a fast-paced exposure to the C programming language for students majoring in a computer-related discipline. The following topics are briefly reviewed using C syntax: looping, selection, variables, scope rules, functions and pass-by-value arguments. New topics include pass-by-address arguments, formatted and unformatted I/O, user defined types (enum, struct, union), preprocessing directives, file handling, pointers, pointer arithmetic, string manipulation and selected library functions.

Full course description for C Programming

This course covers the basic principles and methods of statistics. It emphasizes techniques and applications in real-world problem solving and decision making. Topics include frequency distributions, measures of location and variation, probability, sampling, design of experiments, sampling distributions, interval estimation, hypothesis testing, correlation and regression.

Full course description for Statistics I

Core Courses (16 credits)

Upon completion of the pre-major foundation courses, students are required to officially declare Cybersecurity as their major and must successfully complete the subsequent major coursework with a minimum grade of C- in each course.

This course introduces fundamental cybersecurity principles with hands-on labs, preparing students to protect information assets from evolving threats and vulnerabilities. Covering key security concepts, students will learn to identify, analyze, and mitigate cyber threats while securing hybrid environments like cloud, mobile, IoT, and operational technology. The course explores security architecture, operations, and program management, including risk management, compliance, vulnerability management, incident response, and best practices for securing hardware, software, and data. Students will also develop essential governance, communication, and reporting skills for real-world cybersecurity roles. Aligned with CompTIA Security+ objectives, this course equips students with the technical expertise and industry knowledge needed for entry-level cybersecurity roles, such as Security Analyst, SOC Analyst, and IT Security Administrator.

Full course description for Cybersecurity Principles and Applications

Networks are the foundation of modern IT operations and play a critical role in cybersecurity, defense, and threat mitigation. As cybersecurity professionals, understanding network operations, protocols, secure network architectures, and network management is essential for protecting enterprise environments. This course provides an in-depth analysis of networking protocols, including TCP, UDP, ICMP, and IP, and explores network design, security controls, intrusion detection, automation, and troubleshooting techniques. Students will gain hands-on experience using industry-standard networking tools and security solutions. This course aligns with the CompTIA Network+ certification objectives, preparing students for real-world network security and operations challenges.

Full course description for Networking Protocols and Analysis

Covers concepts and methods in the definition, creation and management of relational databases. Emphasis is placed on usage of appropriate methods and tools to design and implement relational databases to meet identified business needs. Topics include conceptual database design, use of Entity Relationship Diagrams, query tools and SQL; database integrity, security and privacy; query optimization; transaction management, concurrency control, and recovery; and emerging data management trends. Use of database management systems such as MySQL.

Full course description for Database Management Systems

+ Part II (30 credits)
Core 24 credits

In their senior year, students are required to complete the following two undergraduate courses while maintaining a minimum cumulative GPA of 3.0.

To properly secure an organization¿s information infrastructure and assets, periodic assessments of security posture at multiple levels are critical. This course provides a comprehensive approach to penetration testing and vulnerability assessment, covering key phases from reconnaissance to exploitation and post-exploitation techniques. Students will apply industry-standard penetration testing methodologies, use advanced tools such as Nmap, Wireshark, Metasploit, and Snort, and conduct controlled cybersecurity testing to simulate real-world attacks. Emphasis is placed on reporting and remediation, ensuring students can document findings and recommend actionable security improvements. This course aligns with CompTIA PenTest+ certification objectives, equipping students with essential offensive security skills needed for penetration testing, ethical hacking, and vulnerability analysis.

Full course description for Vulnerability Assessment and Penetration Testing

In today's rapidly evolving digital landscape, cryptography is fundamental to securing sensitive information, protecting communications, and maintaining data integrity. This course provides a comprehensive foundation in applied cryptography, covering the historical evolution, mathematical principles, encryption techniques, and real-world implementations of cryptographic security. Students will explore symmetric and asymmetric encryption methods, including Feistel networks, S-Box design, RSA, Diffie-Hellman, and Elliptic Curve Cryptography, while also applying cryptographic principles to security technologies such as SSL/TLS, Virtual Private Networks (VPNs), and military-grade encryption. The course delves into cryptanalysis techniques to assess cryptographic vulnerabilities and adversarial attack methods used to bypass encryption defenses. Additionally, students will evaluate the future of cryptography, including quantum-resistant encryption, cloud-based cryptographic applications,…

Full course description for Cryptography for Cybersecurity Practitioners

During their senior year, students are required to enroll in designated graduate-level courses as part of the integrated program, with the following course substitutions: CYBR 641 will replace CYBR 442 CYBR 671 and CYBR 672 will substitute for CFS 280 CYBR 681 will take the place of CYBR 482 Notably, CYBR 681 will fulfill both the major elective requirement for the Bachelor of Science in Cybersecurity and a core requirement for the Master of Science in Cyber Operations. Additionally, CYBR 621 will provide four graduate-level credits that apply toward both the undergraduate and graduate degree requirements.

Operating systems form the backbone of modern computing and play a pivotal role in cybersecurity and cyber operations. This course comprehensively introduces operating system theory while integrating essential security concepts. Students will learn core OS fundamentals¿including process management, memory management, and file systems¿through a combination of theoretical study and practical exercises. The curriculum includes hands-on experience with low-level programming using Assembly and C, as well as the utilization of Unix-like operating system APIs. Emphasis is placed on understanding OS architecture, identifying common vulnerabilities, and applying basic mitigation strategies through secure coding practices. This balanced approach establishes a solid foundation in OS principles and security, preparing students for more specialized studies in malware analysis, reverse engineering, and vulnerability assessments in advanced courses.

Full course description for Secure System Programming and OS Theory

Cyber operations encompass both offensive and defensive security strategies, requiring a deep understanding of network security, system vulnerabilities, and operational tactics. This course provides a comprehensive foundation in cyber operations, focusing on security principles, network architecture, protocol analysis, and strategic cyber engagements. Students will analyze fundamental cybersecurity principles and evaluate how failures in security design lead to system vulnerabilities that can be exploited in offensive cyber operations. The course covers network traffic analysis, TCP/IP protocols, and cyber operations phases, including planning, execution, authority considerations, and post-operation assessment. Students will design defensive network architectures with multi-layered security controls, ensuring mission security objectives are met. Additionally, the course examines the balance between usability and security, addressing human behavior risks that undermine system security…

Full course description for Cyber Operations Fundamentals

This course explores digital forensic methodologies, legal considerations, and investigative techniques used in modern forensic analysis. Students will develop the expertise to analyze forensic images, identify suspicious or concealed files¿including those hidden through steganography and data obfuscation¿and implement advanced strategies for evidence recovery across diverse digital environments, including Windows, macOS, smartphones, memory, and network systems. Emphasizing the use of cutting-edge forensic tools and bootable utilities, students will learn to extract and preserve digital evidence while maintaining data integrity. The course also examines contemporary methods used for hiding, encrypting, and scrambling data, equipping students with the skills to develop effective countermeasures in forensic investigations. Additionally, students will gain proficiency in preparing legally admissible documentation, maintaining a proper chain of custody, and drafting forensic reports that…

Full course description for Digital Forensics I

This course provides an in-depth examination of forensic techniques for investigating digital evidence across modern operating systems, including Windows, Linux, and macOS. Students will develop expertise in analyzing file systems to identify critical forensic artifacts and data structures essential to investigations. The course covers advanced memory forensics techniques to extract and interpret volatile data, including active processes and encryption keys. Students will also conduct network forensic investigations, utilizing packet analysis and decryption techniques to uncover hidden or encrypted malicious communications. Emphasizing correlation and interpretation of forensic evidence from multiple sources, students will integrate log analysis, system artifacts, and event timelines to reconstruct digital incidents. Hands-on experience with state-of-the-art forensic tools will enable students to perform forensic acquisitions of locally attached storage devices while ensuring data…

Full course description for Digital Forensics II

The increasing interconnectedness of digital systems and the rapid evolution of malicious software (malware) pose significant threats to individuals, businesses, and critical infrastructure. As cyber threats grow more sophisticated, the ability to analyze, dissect, and reverse-engineer malware is essential for threat intelligence, incident response, and cybersecurity defense. This course provides an in-depth exploration of malware analysis and reverse engineering methodologies, equipping students with the technical skills to investigate, understand, and mitigate malicious software. Students will analyze the characteristics, propagation methods, and impact of various types of malware, assessing their persistence mechanisms and interaction with host systems and networks. Using modern forensic tools, students will apply advanced static and dynamic analysis techniques to deobfuscate and reverse-engineer malware samples. The course also covers attacker techniques designed to evade…

Full course description for Malware Analysis and Reverse Engineering

+ Capstone Project Sequence (6 credits)

Students are required to complete CYBR 498 and CYBR 499 over the course of at least two semesters.

As the first course in a two-part capstone sequence, CYBR 498 provides students with the foundational framework to conceptualize, research, and plan a rigorous cybersecurity project. This course guides students through the identification and formulation of a well-defined research problem, leveraging current cybersecurity trends, industry challenges, and emerging threats. Students will conduct a comprehensive literature review, synthesizing insights from scholarly research, industry reports, and additional learning resources to support the development of a viable cybersecurity solution. Emphasis is placed on problem definition, scope of work, and research methodology, ensuring that students construct a strong theoretical and practical foundation for their capstone project. In addition to technical research, students will explore legal, ethical, and compliance considerations relevant to cybersecurity research and professional practice. To further enhance career readiness, students will…

Full course description for Cybersecurity Capstone I Concepts, Research and Planning

As the culminating experience of the undergraduate Cybersecurity program, CYBR 499 challenges students to apply their acquired knowledge, technical expertise, and industry best practices in developing a comprehensive security solution. This project-driven course requires students to integrate research, risk assessment, security implementation, and ethical considerations into a capstone project that addresses real-world cybersecurity challenges. Students will conduct independent research, analyzing and synthesizing scholarly and professional cybersecurity literature to support their project development. They will identify, evaluate, and mitigate cybersecurity risks and threats, applying advanced enterprise security strategies to enhance system defenses. Students will develop critical leadership and collaboration skills throughout the course, managing tasks and responsibilities in a high-pressure project environment. Effective communication is emphasized, as students will present their…

Full course description for Cybersecurity Capstone II - Design, Development, and Implementation

+ Part III (20 credits)
Core (17 credits)

Students are strongly encouraged to register for and complete the following courses only after fulfilling all requirements for their bachelor’s degree in Cybersecurity.

Understanding vulnerability discovery and exploitation is fundamental to cyber operations, equipping professionals with the skills to identify, analyze, and mitigate security weaknesses across various computing environments. This course provides an in-depth exploration of vulnerability analysis, emphasizing the patterns of vulnerabilities and attack methodologies to help students develop a comprehensive security mindset. Students will analyze various types of vulnerabilities, assess their root causes and impact on security, and explore exploitation techniques and mitigation strategies. Key topics include buffer overflows, privilege escalation attacks, input validation flaws, fuzzing, crash dump analysis, exploit development, and security mitigations such as DEP and ASLR. The course also delves into security design principles, guiding students to integrate proactive security measures into system architecture, software development, and risk mitigation frameworks. Through hands-on…

Full course description for Vulnerability Discovery and Exploitation

Cryptography is a cornerstone of modern cybersecurity, protecting data across wireless networks, cloud computing, and next-generation applications. This course provides an in-depth exploration of advanced cryptographic techniques, focusing on their practical implementation in securing real-world systems. Students will analyze cryptographic security mechanisms in SSL/TLS, Virtual Private Networks (VPNs), military applications, cryptanalysis, and cryptographic backdoors. Emphasis is placed on evaluating cryptographic frameworks in vehicular ad hoc networks, smart grids, e-health systems, and mobile social networks. Students will also design and implement encryption-based defense strategies to enhance data confidentiality, integrity, and authentication. Additionally, the course examines the threat posed by quantum computing to modern cryptographic systems and explores post-quantum cryptography solutions. By the end of the course, students will have the expertise to apply, evaluate, and…

Full course description for Applied Cryptography

In an era of sophisticated cyber threats, organizations rely on proactive threat intelligence and hunting strategies to defend against advanced network intrusions and data breaches. This course equips students with the knowledge and practical skills to collect, analyze, and apply Cyber Threat Intelligence (CTI) at tactical, operational, and strategic levels to enhance cyber threat-hunting operations and defensive cybersecurity mechanisms. Students will evaluate cyber threat intelligence frameworks, including MITRE ATT&CK, to identify adversary tactics, techniques, and procedures (TTPs) and detect advanced cyber threats. The course covers correlating Indicators of Compromise (IoCs) from multiple intelligence sources, including Open-Source Intelligence (OSINT), to strengthen proactive threat detection and response. Emphasis is placed on implementing intelligence-sharing frameworks and protocols to facilitate active cyber defense through threat-hunting and coordinated threat mitigation…

Full course description for Cyber Threat Hunting and Intelligence

As wireless and mobile technologies continue to evolve, they play an increasingly critical role in global communications, cybersecurity, and cyber operations. This course provides an in-depth exploration of cellular and wireless network architectures, emphasizing their security features, vulnerabilities, and risk mitigation strategies. Students will analyze the core architectures and security mechanisms of various generations of cellular networks, assessing operational differences and security challenges unique to wireless environments. The course covers modern encryption standards, authentication protocols, and access control policies, equipping students with the skills to design and implement secure wireless networks. Additionally, students will assess security protocols used in wireless communications to ensure authentication, data integrity, and confidentiality. Through hands-on exercises, students will investigate and mitigate threats to wireless and mobile networks, identifying…

Full course description for Securing Wireless and Mobile Technologies

This course provides a comprehensive examination of virtualization architectures and cloud security, with a focus on enterprise and cloud environments. Students will analyze the security implications of hypervisors, virtual machines (VMs), networking, storage, and management interfaces, gaining an in-depth understanding of the risks and challenges associated with virtualized infrastructures. The course also explores cloud service models¿including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)¿as well as deployment strategies, evaluating security trade-offs and risk management considerations for diverse workloads. Students will gain hands-on experience in securing cloud-based workloads in environments such as AWS and Microsoft Azure, addressing deployment, configuration, scalability, and security challenges. Emphasizing compliance and governance, students will assess and apply industry security standards, audit policies, and…

Full course description for Virtualization and Cloud Security

This course provides a comprehensive exploration of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems, which serve as the backbone of critical infrastructure across manufacturing, energy, transportation, and utility sectors. Students will develop an in-depth understanding of ICS/SCADA architectures, their operational environments, and the evolving cybersecurity threats targeting these systems. The course examines the vulnerabilities inherent in industrial automation, the complexities of embedded systems, and the security frameworks designed to mitigate attacks. Through hands-on exercises, case studies, and industry-standard tools, students will gain practical experience in securing and assessing ICS environments.

Full course description for Industrial Control Systems Security and Resilience

Any IT development project contains significant risks. However, keeping the status quo is also risky in rapidly changing technological and competitive environments. This course is designed to familiarize the student with risk analysis concepts derived from many sources including financial, actuarial and statistical studies, insurance and risk analysis, software quality assurance methodologies, management and audit trails and many others. Student will learn to assess the risk in an information systems portfolio and develop strategies for managing the many risk types discussed: Prerequisites: MIS 600.

Full course description for Risk Analysis in Information Technology

With Information Technology playing an ever greater role in organizations, and the widespread availability of technology with the ability to collect and create information on everyone, many new ethical issues have been created. This course will frame many current ethic issues in IT and help the student develop methods of analyzing and dealing with these issues in real world situations. Topics may include issues such as privacy, copyright and intellectual property, employee monitoring approaches, multinational information flows, corporate intelligence and others. Hacking, computer security, viruses and other acts of destruction will be reviewed from an ethical perspective.

Full course description for Cyber Ethics

Graduate Capstone (3 credits)

The graduate capstone experience is designed to be completed over the course of three semesters during the graduate portion of the program. Students are expected to earn one credit in both the Fall and Spring semesters of their senior year, with the final credit completed in the culminating semester of their graduate studies. As an alternative to completing a practical research project, students may fulfill the capstone requirement by earning an approved advanced industry certification, such as CISSP, CASP+, or OSCP.

The Cyber Operations Capstone Project is a culminating experience where students synthesize, apply, and critically evaluate cybersecurity concepts in a real-world context. Throughout the graduate program, students identify, formulate, and develop their capstone projects, producing a comprehensive, scholarly, and professional-level research project that reflects their advanced knowledge and technical expertise. This capstone follows a phased approach, where students solidify their project scope and research methodology in the initial phase and design, develop, and implement their solutions in the final phase. The project emphasizes evidence-based decision-making, integration of industry best practices, and rigorous academic research to address complex cybersecurity challenges. Students will critically analyze and synthesize relevant scholarly and professional literature, ensuring their work contributes meaningfully to the field of cyber operations. The capstone experience culminates in…

Full course description for Cyber Operations Capstone Project

+ General Guidelines
Transfer Courses

The evaluation of transfer coursework equivalency is conducted by the Computer Science and Cybersecurity (CSC) Department. This process is initiated at the time of admission, with any resulting determinations reflected in the student’s DARS (Degree Audit Reporting System) report. When transferring coursework, students should be aware that many institutions—universities, community colleges, and technical colleges—offer courses that may be considered equivalent to our Pre-Major requirements. In certain cases, a lower-division course from another institution may be deemed equivalent to one of our upper-division courses, or vice versa. However, for the purpose of satisfying upper-division major electives or university graduation requirements, the classification of the course at the originating institution (i.e., whether it is designated as lower or upper division) is the determining factor.

Prerequisites

Students are responsible for understanding and meeting all prerequisite requirements for the courses in which they enroll. Enrollment in a course is contingent upon successful completion of all prerequisites with a minimum grade of C-. Students who do not meet these requirements will be administratively dropped from the course. While the registration system enforces prerequisites for many courses, discrepancies can occasionally occur. If your DARS report indicates that you have met the prerequisites, but you are unable to register due to a system error, please contact your academic advisor for assistance.

Part-time Enrollment

Part-time enrollment in the program is permitted; however, students should be aware of several important considerations. All students—regardless of part-time or full-time status—must complete the first semester (9 credits) in its entirety to satisfy the prerequisite requirements for subsequent courses. Because courses are offered only once during each cohort cycle, postponing or skipping a course may delay a student’s academic progress. Any missed courses cannot be retaken until they are offered in the next cohort cycle, which may significantly extend the overall duration of the program. Students considering part-time study are encouraged to consult with the Graduate Program Director to carefully plan their course progression.

Exit Strategy

If a student chooses to exit the combined program and pursue only the undergraduate component of the dual degree, any completed graduate coursework will be applied toward the Bachelor of Science in Cybersecurity requirements. The student will then be responsible for completing any remaining undergraduate degree requirements in cybersecurity. However, should the student later decide to reapply to the graduate program, previously completed graduate courses may not be eligible for credit toward the Master of Science in Cyber Operations. To ensure a smooth transition and make informed decisions, students are strongly encouraged to consult with the program advisor to determine the most appropriate exit strategy.