Skip to main content

eServices scheduled downtime, July 11–July 13 | Fall 2025 Registration window now open. | Undergraduate Final Deadline is July 28 for fall term

Secure
Professor in front of computer monitors with students

Cybersecurity Operations (Combined BS + MS)

About The Program

The Combined (BS + MS) program in Cybersecurity offers a unique, accelerated pathway for students to earn two in-demand degrees within a streamlined 140-credit format. By integrating undergraduate and graduate coursework, students can save both time and tuition while developing the comprehensive skill set needed for leadership roles in the evolving cybersecurity field.

Students begin with a solid foundation in the BS program, where they learn to assess security risks, defend networked systems, and implement protective measures aligned with business, legal, and ethical standards. Core courses emphasize hands-on, lab-based learning and are aligned with industry-recognized certifications to enhance career readiness. The BS curriculum is designated by the National Security Agency (NSA) as a Center of Academic Excellence in Cyber Defense (NCAE-CD), ensuring national recognition and quality.

As students progress, they transition into graduate-level coursework that emphasizes advanced cyber operations—including offensive and defensive strategies, malware analysis, reverse engineering, threat intelligence, and risk management. The MS curriculum aligns with the NSA’s Center of Academic Excellence in Cyber Operations (NCAE-CO) knowledge units, reflecting the highest national standards for technical depth and mission-focused cybersecurity education.

Graduates of the combined program leave with two highly respected degrees, robust technical and professional skills, and a competitive edge in cybersecurity roles across government, defense, critical infrastructure, and private industry.

Program highlights

  • Accelerated dual-degree format: Earn both a BS in Cybersecurity and an MS in Cyber Operations in just 140 credits, reducing total time and cost.
  • Integrated curriculum: Select graduate courses count toward both degrees, allowing early entry into advanced topics while completing undergraduate requirements.
  • Hands-on training environment: Students develop real-world skills through lab-intensive courses, cloud-based simulations, and access to IT/OT cyber ranges.
  • NSA-designated programs: The BS program is aligned with NCAE-CD, and the MS curriculum aligns with NCAE-CO standards, ensuring rigorous, nationally recognized instruction.
  • Certification-aligned coursework: Undergraduate courses are mapped to industry-recognized cybersecurity certifications, strengthening employability.
  • Expert instruction: Courses are taught by faculty with significant experience in government, military, and private-sector cybersecurity.
  • Career-focused outcomes: Graduates are equipped for leadership roles in cyber defense and operations, entering the workforce with two degrees and a strategic advantage.

Learn more about the BS in Cybersecurity Program.

Learn more about the MS in Cyber Operations program.

Students in computer lab looking at cyber security threats.

Cyber systems operations job prospects

Cybersecurity professionals are in high demand, with the projected number of cyber systems operations jobs growing 28% over the next decade and starting salaries for well-qualified BS graduates approaching $100,000/year.

With a graduate degree from Metro State’s Cyber Operations program, there is no limit to what a student can accomplish. The MS in Cyber Operations program will enable graduates to seek employment opportunities in the military, government, and private sectors including the National Security Agency (NSA), Department of Defense (DOD), Navy Space and Naval Warfare System Command, and National Labs (Sandia National Laboratory, Pacific Northwest National Laboratory).

Cyber systems operations job titles can include Security Auditor/Manager, Security Administrator, Security Analyst/Architect/Engineer, Penetration Tester, Vulnerability Assessor, Incident Responder, and Secure Software Developer.

Seals of the DoD Cyber Academic Engagement Office, National Security Agency, National Centers of Academic Excellence in Cybersecurity, and the Centers of Academic Excellence in Cybersecurity Community, with the CAE-CD and CAE-CO cyber defense and cyber operations submarks

Metro State University is Minnesota’s only institution recognized by the National Security Agency (NSA) with dual designations as a National Center of Academic Excellence in Cyber Defense (NCAE-CD) and Cyber Operations (NCAE-CO).

The Bachelor of Science in Cybersecurity degree is aligned with the NCAE-CD designation, ensuring the program meets rigorous national standards in technical depth, applied learning, and ethical practice. This recognition provides students with a competitive edge in the workforce and validates their readiness to defend critical systems and data in a rapidly evolving cyber landscape.

The Master of Science in Cyber Operations is aligned with the NCAE-CO designation, awarded by the National Security Agency. This elite recognition underscores the program’s focus on the operational side of cybersecurity—emphasizing advanced technical skills, adversarial thinking, and mission-oriented training beyond traditional cybersecurity practices. The NCAE-CO designation affirms that the program meets the nation’s most rigorous standards for preparing professionals to conduct complex cyber operations in support of national defense, critical infrastructure protection, and intelligence missions.

As an active participant in the national CAE community, Metro State continues to lead in cybersecurity workforce development, education, and public service—equipping graduates to protect the digital assets of government, industry, and society.

Student outcomes

Program Educational Objectives (PEOs)

Graduates of the Combined BS + MS in Cybersecurity and Cyber Operations program are expected to achieve the following within a few years of completing the program:

  1. Lead in cybersecurity and cyber operations roles by applying advanced knowledge and hands-on experience to protect and defend complex information systems across public and private sectors.
  2. Develop and implement effective cyber defense strategies through the analysis of adversarial tactics, emerging threats, and risk management principles grounded in technical, legal, and ethical standards.
  3. Communicate technical information clearly and effectively to diverse stakeholders, including technical teams, executives, and non-technical audiences, in both operational and strategic contexts.
  4. Exhibit leadership, collaboration, and professional responsibility, contributing to high-performing teams and making sound ethical decisions in high-stakes cybersecurity environments.
  5. Pursue continuous professional development by staying current with evolving technologies, regulatory frameworks, and threat landscapes to remain adaptable and effective in a dynamic field.

Program oversight

MN Cyber icon. Train, Test, Detect, Protect

Housed within the College of Sciences, the MN Cyber Institute is a statewide initiative dedicated to positioning Minnesota as a national leader in cybersecurity education and workforce development. The Institute advances this mission through strategic public-private partnerships, interdisciplinary research, and community engagement.

Program oversight is provided by the MN Cyber Advisory Board, a group of cybersecurity leaders from industry, government, and academia. The board ensures the program remains responsive to current and emerging threats, provides strategic guidance, and helps align the curriculum with real-world workforce demands.

The combined program reflects the highest national standards in cybersecurity education. The bachelor’s program is aligned with the NCAE-CD designation, ensuring students develop foundational competencies grounded in nationally recognized cyber defense standards. At the graduate level, the program aligns with the NCAE-CO designation, incorporating advanced Knowledge Units (KUs) focused on offensive and defensive tactics, threat intelligence, and mission-driven cyber operations. Together, these designations ensure that students receive a technically rigorous, operationally relevant, and nationally endorsed education that prepares them for leadership roles across the cybersecurity landscape.

Career prospects

Graduates of the combined (BS + MS) program are uniquely positioned for high-impact careers at the intersection of cyber defense, operations, and national security. With a comprehensive education spanning foundational defense strategies and advanced offensive operations, graduates are equipped to protect critical systems, anticipate sophisticated threats, and lead cybersecurity initiatives across sectors.

The dual-degree structure not only accelerates entry into the workforce but also enhances professional credibility and competitiveness for advanced roles. Students exit the program with hands-on experience, nationally recognized credentials, and NSA-aligned training—making them ideal candidates for careers in government, military, defense contracting, critical infrastructure, and private industry.

According to the U.S. Bureau of Labor Statistics, employment for cybersecurity professionals is projected to grow by 33% over the next decade, far outpacing the average for all occupations. Median salaries exceed $124,000, with specialized roles in cyber operations and threat intelligence offering even greater earning potential.

Graduates of the combined program are prepared for a range of advanced roles, including:

  • Cybersecurity Engineer / Analyst
  • Cyber Operations Specialist
  • Threat Intelligence Analyst
  • Penetration Tester
  • Malware Analyst / Reverse Engineer
  • Security Architect
  • Incident Responder
  • National Security or Defense Cyber Analyst

Whether securing enterprise systems or contributing to national defense initiatives, graduates are equipped to lead in a rapidly evolving cybersecurity landscape.

How to enroll

Program eligibility requirements

There are two applications for the BS + MS Cybersecurity Operations program. Please see the application process below.

If you are new to Metro, you must first apply to the undergraduate Cybersecurity BS program. This is done through the MinnState application.

Apply to Metro State: Learn about the steps to enroll or, if you have questions about what Metro State can offer you, request information, visit campus or chat with an admissions counselor.

If you are a current undergraduate Cybersecurity BS student and have met the below minimum requirements, please apply to the Cyber Operations MS program through GradCAS.

Meeting these requirements does not guarantee admission.

  • Have a minimum cumulative GPA of 3.0 at the end of Junior year.
  • Have declared Cybersecurity as a major.
  • Have completed (or are in progress) 90 or more credits towards fulfilling the bachelor’s degree requirement.

Program eligibility requirements

Admission into the Master of Science in Cyber Operations program is determined by evaluating the applicant's academic history, professional experience in computing/cybersecurity, and letters of recommendation. The graduate director is responsible for deciding on admissions to the master's program and assessing the equivalency of transferred coursework.

Application instructions

Metro State University is participating in the common application for graduate programs (GradCAS). Applications are only accepted via the CAS website.

Please note that Cyber Operations (MS) applications are only accepted Fall semesters.

CAS steps

  1. Select the term for which you are seeking admission (below), and navigate to the CAS website. Open applications include:
  1. Create or log in to your account and select the Cyber Operations (MS) program.
  2. Carefully review all instructions and complete all four sections of the application.

Specific application requirements for individual programs can be found on each program page in CAS. Carefully read the instructions that appear throughout the application pages. You can only submit your application once. If you need to update information you have submitted, please notify graduate.studies@metrostate.edu

Application fee

A nonrefundable $38 fee is required for each application.
Applications will not be processed until this fee is received.

Active-duty military, veterans, and Metro State alumni can receive an application fee waiver. Contact graduate.studies@metrostate.edu.

Courses and Requirements

SKIP TO COURSE REQUIREMENTS

Guidelines for completing the Combined (BS + MS) Program

  • Students interested in the Combined (BS + MS) program should work with an advisor to understand the program details and course sequencing.
  • If admitted into the combined program, students in their senior year will join the graduate cohort in the Fall semester.
    • Students will be evaluated the same way as graduate students during their senior year for any graduate-level work.
    • Students will pay graduate tuition for any graduate-level courses only.
  • By the end of the following Spring semester, students must complete all the bachelor's degree requirements and graduate with a BS in Cybersecurity.
  • Upon receiving the BS degree in Cybersecurity and maintaining the eligibility requirements, students will be switched from undergraduate to graduate standing and be allowed to complete the remaining MS in Cyber Operations program courses.
  • Eligibility: Students must maintain a minimum cumulative GPA of 3.0 and a grade of B or above in all graduate coursework to remain eligible for the combined program.

Combined (BS + MS) Program Structure
The combined (BS + MS) program in Cybersecurity Operations allows students to complete 90 major credits and graduate with both bachelor's and master's degrees in an accelerated fashion. Students will complete 16 credits of overlapping work between the undergraduate and graduate degrees. The combined (BS + MS) program in Cybersecurity Operations is divided into three parts as follows:

Part I: 40 credits of Undergraduate Coursework

  • Complete Pre-Major Courses (24 credits) and Major Core Courses (16 credits).
  • Complete other courses towards completing bachelor's degree requirements (GELS, Upper Division, etc.).

Part II: 30 credits of Undergraduate and Graduate Coursework

  • Complete Major Core Courses (26 credits) with 12 credits double counted
  • Take an additional four credits of graduate coursework, double-counted for both the undergraduate and graduate requirements.
  • Complete any remaining credits to fulfill the 120 credit hours requirements for the bachelor's degree.
  • Graduate with a BS in Cybersecurity degree.

Part III: 20 credits of Graduate Coursework

  • Complete Core Courses (17 credits) and Graduate Capstone (3 credits)
  • Graduate with an MS in Cyber Operations degree

Prerequisite Knowledge and Skills

Given the program's technical complexity and accelerated pace, students are expected to possess essential knowledge and skills. Proficiency in Python Programming, C Programming, Assembly Language, PowerShell, basic Data Structures and Algorithms, Systems Administration, Computer Networking, and Linux Fundamentals is crucial. For success in the program, it is strongly advised that students attain these competencies either through undergraduate courses or by taking short courses prior to commencing the graduate degree.

Combined Program Requirements

The combined (BS + MS) Cybersecurity Operations Program is divided into the following three parts:

+ Part I (40 credits)
Pre-major Courses 24 credits

To declare the Cybersecurity major, students must complete the following pre-major foundation courses with a grade of C- or higher and a minimum GPA of 2.5 for ICS 265 and MATH 215 or transfer equivalents. For further details, reference the General Guidelines section below.

Complete all of the following six courses:

This course covers the fundamental concepts of a single user operating system. The topics discussed in the course are the basic concepts of computer organization and architecture, memory management, process handling, disk and file management and control, and peripherals operation. Students also have the opportunities to learn the techniques and procedures of system installation, configuration, administration, and trouble shooting. The operating systems illustrated in the course are MS Windows and/or Mac OS X.

Full course description for Computer and Operating Systems Fundamentals I

This course covers the fundamental concepts of a multi-user operating system. The topics discussed in the course are conventional computer organization and architecture, memory management, process handling, disk and file management and control, and peripherals operation. Students also have the opportunities to learn the techniques and procedures of system installation, configuration, administration, and trouble shooting. The operating systems illustrated in the course are Linux and Unix.

Full course description for Computer and Operating Systems Fundamentals II

This course introduces fundamental concepts in computer programming and the development of computer programs to solve problems across various application domains. Topics include number systems, Boolean algebra, variables, decision-making and iterative structures, lists, file manipulation, and problem deconstruction via modular design approaches. Lab work and homework assignments involving programming using a language such as Python form an integral part of the course.

Full course description for Computational Thinking with Programming

This course is designed to provide a fast-paced exposure to the C programming language for students majoring in a computer-related discipline. The following topics are briefly reviewed using C syntax: looping, selection, variables, scope rules, functions and pass-by-value arguments. New topics include pass-by-address arguments, formatted and unformatted I/O, user defined types (enum, struct, union), preprocessing directives, file handling, pointers, pointer arithmetic, string manipulation and selected library functions.

Full course description for C Programming

This course covers the basic principles and methods of statistics. It emphasizes techniques and applications in real-world problem solving and decision making. Topics include frequency distributions, measures of location and variation, probability, sampling, design of experiments, sampling distributions, interval estimation, hypothesis testing, correlation and regression.

Full course description for Statistics I

Core Courses (16 credits)

Once the pre-major foundation courses are completed, students must declare Cybersecurity as their major and successfully complete the subsequent courses with a grade of C- or higher.

This course introduces principles of computer security with integrated hands-on labs. The course prepares students to effectively protect information assets by providing fundamental details about security threats, vulnerabilities, and their countermeasures ranging from a simple computer to enterprise computing. Topics include broad range of today's security challenges, common security threats and countermeasures, security management, access control mechanisms, applied cryptography, privacy issues, computer ethics, file system security, and network security. Overlap: ICS 382 Computer Security

Full course description for Computer Security

Networks are the backbone of information technology operations within an enterprise and are responsible for a significant portion of an organization's security posture. Cybersecurity professionals are often tasked with securing network operations and responding to network threats which demonstrates the importance to networking knowledge in the cybersecurity industry. As a cybersecurity practitioner, it is imperative that there is an understanding of network operations, protocols, and administration practices. This course focuses on developing skills and taking a deep dive into networking protocols including TCP, UDP, ICMP, and IP, network design and architecture, network administration automation, network analysis, and network protocol and design impacts on security and defense measures. Overlap: ICS 383 Networking Protocols and Analysis

Full course description for Networking Protocols and Analysis

Covers concepts and methods in the definition, creation and management of databases. Emphasis is placed on usage of appropriate methods and tools to design and implement databases to meet identified business needs. Topics include conceptual, logical and physical database design theories and techniques, such as use of Entity Relationship diagrams, query tools and SQL; responsibilities of data and database administrators; database integrity, security and privacy; and current and emerging trends. Use of database management systems such as MySQL. Coverage of HCI (Human Computer Interaction) topics and development of front ends to databases with application of HCI principles to provide a high level usability experience. Overlap: ICS 311T Database Management Systems.

Full course description for Database Management Systems

+ Part II (30 credits)
Core 24 credits

During their senior year, students must finish the following two undergraduate courses, ensuring they maintain a cumulative GPA of at least 3.0.

To properly secure any organization's information infrastructure and assets, a periodic assessment of its security posture at various levels of the organization is essential. One key area is the direct assessment of vulnerabilities in the IT infrastructure, systems and applications, followed by targeting and exploitation of the same. This course covers the theoretical bases for cyber threats and vulnerabilities, and delves into selection and application of penetration testing methodologies ranging from reconnaissance to the exploitation of vulnerabilities by probing infrastructure, services and applications. The course places a strong emphasis on the use of these methodologies to demonstrate, document, report on, and provide a clear roadmap for remediation of exposed security issues.

Full course description for Vulnerability Assessment and Penetration Testing

This course provides students with a thorough foundation of applied cryptography for cybersecurity practitioners. As encryption technologies continue to integrate into everyday culture, the importance of cryptography and encryption knowledge of cybersecurity practitioners continues to increase. Students will learn and be able to apply and analyze: the history of cryptography from the earliest ciphers to current encryption methodology, mathematical foundations for cryptography, symmetric and asymmetric algorithms, and applied cryptography pertaining to Virtual Private Networks (VPNs), SSL/TLS, strategies for defense utilizing encryption and cryptography, military applications, steganography, cryptanalysis, and more. Additionally, students will look to the future of cryptography and encryption including a look into quantum cryptography and encryption in cloud environments. Overlap: ICS 483.

Full course description for Cryptography for Cybersecurity Practitioners

During their senior year, students are required to enroll in specific graduate courses, with the following adjustments: CYBR 641 will substitute for CYBR 442, CYBR 671 and CYBR 672 will replace CFS 280, and CYBR 681 will take the place of CYBR 482. Importantly, CYBR 681 will count towards both the major elective requirement of the Bachelor of Science in Cybersecurity program and the core requirement of the Master of Science in Cyber Operations program. Additionally, CYBR 621 will contribute an extra four credits of graduate-level coursework, which will apply to both undergraduate and graduate degree requirements.

Understanding the Operating Systems (OS) theory and the OS security concepts is required to perform critical roles in the cybersecurity and cyber operations fields. This course exposes the students to topics of the OS theory with an emphasis on security applications. The course begins with an introduction of low-level programming, including Assembly and C. It continues with the basic Unix-like operating system Application Programming Interfaces (APIs) along with the fundamentals of OS concepts.

Full course description for Secure System Programming and OS Theory

Cyber operations encompass both offensive and defensive security strategies, requiring a deep understanding of network security, system vulnerabilities, and operational tactics. This course provides a comprehensive foundation in cyber operations, focusing on security principles, network architecture, protocol analysis, and strategic cyber engagements. Students will analyze fundamental cybersecurity principles and evaluate how failures in security design lead to system vulnerabilities that can be exploited in offensive cyber operations. The course covers network traffic analysis, TCP/IP protocols, and cyber operations phases, including planning, execution, authority considerations, and post-operation assessment. Students will design defensive network architectures with multi-layered security controls, ensuring mission security objectives are met. Additionally, the course examines the balance between usability and security, addressing human behavior risks that undermine system security…

Full course description for Cyber Operations Fundamentals

This course covers advanced topics of digital forensics procedures, legal issues, and scientific principles. The course addresses the current and new issues in digital forensics by offering various topics such as windows, smart phones, memory, network forensics, Macintosh forensics, and updated and expanded coverage on legal issues. Moreover, the students will learn how to report their findings to present them to the court using the state-of-the-art tools in digital forensics.

Full course description for Digital Forensics I

This course covers how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. The required technical details of how each operating system works and how to find artifacts is also covered. Topics like File systems, data recovery, memory forensics, executable layouts are discussed in details. Moreover, Hands-On Network Forensics that starts with the core concepts within network forensics, including coding, networking, forensics tools, and methodologies for forensic investigations are covered.

Full course description for Digital Forensics II

The ubiquitous nature of Internet of Everything (IoE) and the prevalence of computing technologies in critical infrastructure sectors have brought an unprecedented digital transformation to individuals, businesses, and industries. On the other hand, the IoE has also enabled the increased spread of malicious software (malware). Malware attacks are increasing exponentially over time with total number of known malware surpassed one billion. As a result, the ability to detect, analyze, understand, control, and eradicate malware derive threat intelligence, helps provide timely response to security incidents, fortify defenses, and is essential to nation¿s economic vitality and security. This course introduces malware analysis and reverse engineering techniques which will allow students to recognize, analyze and remediate infections. Using modern tools and procedures the student will understand how to dissect and reverse engineered a malware to understand its behavior, propagation,…

Full course description for Malware Analysis and Reverse Engineering

+ Capstone Project Sequence (6 credits)

Students must finish CYBR 498 and CYBR 499 over at least two semesters.

As the first course in a two-part capstone sequence, CYBR 498 provides students with the foundational framework to conceptualize, research, and plan a rigorous cybersecurity project. This course guides students through the identification and formulation of a well-defined research problem, leveraging current cybersecurity trends, industry challenges, and emerging threats. Students will conduct a comprehensive literature review, synthesizing insights from scholarly research, industry reports, and additional learning resources to support the development of a viable cybersecurity solution. Emphasis is placed on problem definition, scope of work, and research methodology, ensuring that students construct a strong theoretical and practical foundation for their capstone project. In addition to technical research, students will explore legal, ethical, and compliance considerations relevant to cybersecurity research and professional practice. To further enhance career readiness, students will…

Full course description for Cybersecurity Capstone I Concepts, Research and Planning

As the culminating experience of the undergraduate Cybersecurity program, CYBR 499 challenges students to apply their acquired knowledge, technical expertise, and industry best practices in developing a comprehensive security solution. This project-driven course requires students to integrate research, risk assessment, security implementation, and ethical considerations into a capstone project that addresses real-world cybersecurity challenges. Students will conduct independent research, analyzing and synthesizing scholarly and professional cybersecurity literature to support their project development. They will identify, evaluate, and mitigate cybersecurity risks and threats, applying advanced enterprise security strategies to enhance system defenses. Students will develop critical leadership and collaboration skills throughout the course, managing tasks and responsibilities in a high-pressure project environment. Effective communication is emphasized, as students will present their…

Full course description for Cybersecurity Capstone II - Design, Development, and Implementation

+ Part III (20 credits)
Core (17 credits)

Students are advised to register for and complete the following courses only after meeting all requirements for their bachelor's degree.

Vulnerability analysis and its connection to exploit development are core skills for one involved in cyber operations. This course covers vulnerability discovery and exploitation. The focus is to understand the pattern of vulnerabilities and attacks to allow students to experience protection, risk mitigation, and identify vulnerabilities in new contexts. Topics will include buffer overflows, privilege escalation attacks, input validation issues, vulnerability discovery (fuzzing and crash dump analysis), exploit development, and mitigations (e.g., DEP, ASLR, ¿).

Full course description for Vulnerability Discovery and Exploitation

This course covers cryptography from both theoretical and practical perspective. The course provides details about advanced cryptography and its applications in the cybersecurity world. Students will learn various cryptographic algorithms and protocols and their relationships from both attack and defense perspectives. Various cryptographic tools to secure contemporary networks will be discussed as well. Students should be able to use advanced cryptographic algorithms based on elliptic curve cryptography.

Full course description for Applied Cryptography

In an era of sophisticated cyber threats, organizations rely on proactive threat intelligence and hunting strategies to defend against advanced network intrusions and data breaches. This course equips students with the knowledge and practical skills to collect, analyze, and apply Cyber Threat Intelligence (CTI) at tactical, operational, and strategic levels to enhance cyber threat-hunting operations and defensive cybersecurity mechanisms. Students will evaluate cyber threat intelligence frameworks, including MITRE ATT&CK, to identify adversary tactics, techniques, and procedures (TTPs) and detect advanced cyber threats. The course covers correlating Indicators of Compromise (IoCs) from multiple intelligence sources, including Open-Source Intelligence (OSINT), to strengthen proactive threat detection and response. Emphasis is placed on implementing intelligence-sharing frameworks and protocols to facilitate active cyber defense through threat-hunting and coordinated threat mitigation…

Full course description for Cyber Threat Hunting and Intelligence

As wireless and mobile technologies continue to evolve, they play an increasingly critical role in global communications, cybersecurity, and cyber operations. This course provides an in-depth exploration of cellular and wireless network architectures, emphasizing their security features, vulnerabilities, and risk mitigation strategies. Students will analyze the core architectures and security mechanisms of various generations of cellular networks, assessing operational differences and security challenges unique to wireless environments. The course covers modern encryption standards, authentication protocols, and access control policies, equipping students with the skills to design and implement secure wireless networks. Additionally, students will assess security protocols used in wireless communications to ensure authentication, data integrity, and confidentiality. Through hands-on exercises, students will investigate and mitigate threats to wireless and mobile networks, identifying…

Full course description for Securing Wireless and Mobile Technologies

Virtualization technology has rapidly expanded to become a core feature of various components of enterprise environments. It allows efficient use of physical IT infrastructure by sharing its capabilities among many users or environments. Virtualization is also an integral element to cloud computing and key technology in cybersecurity. Cloud computing provides organizations the ability to create and use IT services efficiently and rapidly without spending capital resources upfront. This course will discuss the capabilities and limitations of modern approaches to virtualization and the variety, complexity, and capabilities of modern cloud platforms and cloud security. The course will include hands-on lab exercises using leading Cloud infrastructure providers (ex. Amazon Web Services and Microsoft Azure). The course will review the applied concepts and techniques with end-to-end Cloud security architecture with real-world case studies using Web/Mobile based applications, and Internet…

Full course description for Virtualization and Cloud Security

Cyber Operations, a more specific area of cybersecurity, is a highly technical field with a hardcore focus on both cyber offense and defense strategies. This course will cover special cyber operations topics that are not covered elsewhere in the MS Cyber Operations program. This course will provide the opportunity to keep the program current by introducing new and in-demand topics in cyber operations including but not limited to SCADA, IoT/IIoT, embedded systems, hardware reverse engineering, secure software development, programmable logic and microcontroller design, RF Analysis, Software defined Networking, etc.

Full course description for Special Topics in Cyber Operations

Any IT development project contains significant risks. However, keeping the status quo is also risky in rapidly changing technological and competitive environments. This course is designed to familiarize the student with risk analysis concepts derived from many sources including financial, actuarial and statistical studies, insurance and risk analysis, software quality assurance methodologies, management and audit trails and many others. Student will learn to assess the risk in an information systems portfolio and develop strategies for managing the many risk types discussed: Prerequisites: MIS 600.

Full course description for Risk Analysis in Information Technology

With Information Technology playing an ever greater role in organizations, and the widespread availability of technology with the ability to collect and create information on everyone, many new ethical issues have been created. This course will frame many current ethic issues in IT and help the student develop methods of analyzing and dealing with these issues in real world situations. Topics may include issues such as privacy, copyright and intellectual property, employee monitoring approaches, multinational information flows, corporate intelligence and others. Hacking, computer security, viruses and other acts of destruction will be reviewed from an ethical perspective.

Full course description for Cyber Ethics

Graduate Capstone (3 credits)

The graduate capstone experience is to be undertaken across three semesters within the graduate segment of the program. Students are expected to earn one credit in each of the Fall and Spring semesters of their senior year, with the concluding credit to be earned in the final semester of their graduate studies. As an alternative to executing the practical research project, students may satisfy the capstone requirement by obtaining advanced industry certifications, including CISSP, CASP+, or OSCP.

The cyber operation capstone project is aimed at building a connection between cyber concepts and the application of these concepts into a real-world context. Students identify and develop their capstone projects throughout the graduate program and produce a serious, in-depth, scholarly and professional level written component that is reflective of their knowledge and skills that they have gained during the program. This capstone project uses a phased approach where students solidify their project ideas by the end of the first semester and complete the project with an oral defense by the end of the MS program. The final project will demonstrate students' summative expression of what they have learned in the graduate program and hence the project should be a culmination of theory, principles, best industry practices, methodologies, tools, and technologies associated with cyber operations.

Full course description for Cyber Operations Capstone Project

+ General Guidelines
Transfer Courses

The evaluation of transfer coursework equivalency is conducted by the Computer Science and Cybersecurity (CSC) Department. This evaluation is initially carried out upon admission, and any updates are recorded in the DARS report. When transferring coursework, it's important to note that courses equivalent to our Pre-Major offerings may be available at various universities, community colleges, and technical colleges. In some cases, a lower-division course from another institution may correspond to one of our upper-division courses, or conversely, an upper-division course elsewhere may match one of our lower-division courses. The designation of the course at the originating institution (whether it is considered lower or upper division) is the determining factor for crediting upper-division courses towards major electives or university graduation requirements.

Prerequisites

Students must understand and comply with the prerequisites for any course they enroll in. Enrollment in a course is contingent upon completing all its prerequisites with a minimum grade of C-. Students who fail to meet these prerequisites will be administratively dropped from the course. While the registration system automatically enforces prerequisites for certain courses, discrepancies may occur. If your DARS report indicates that you satisfy the prerequisites for a course, but the registration system denies your enrollment, please contact your academic advisor for assistance.

Exit Strategy

Should students choose to leave the combined program and focus solely on the undergraduate component of the dual degree, any graduate courses they have completed will count towards meeting the Bachelor of Science in Cybersecurity requirements. They will then need to fulfill any outstanding undergraduate degree requirements in cybersecurity. However, if they opt to re-enroll in the graduate program later, credits from previously completed graduate courses may not be applied toward the Master of Science degree. It's advised to discuss the most suitable program exit strategy with the program advisor.