MS Cybersecurity - Networking and Infrastructure
Course Overview
This Master of Science in Cybersecurity prepares students to become elite professionals in the rapidly expanding field of information security. The program provides a robust foundation in security theory combined with the practical skills needed to design, implement, and manage secure enterprise IT infrastructure and mitigate risk. Graduates are equipped for high-demand careers in areas such as digital forensics, incident response, and security architecture.
Key Program Highlights
- Master the theory and practice of securing enterprise IT infrastructure
- Develop expertise in proactive risk assessment and mitigation strategies
- Gain hands-on skills in digital forensics and incident response
- Learn to design and implement comprehensive security solutions
- Prepare for leadership roles in the high-growth cybersecurity market
Course Overview
This Master of Science in Cybersecurity prepares students to become elite professionals in the rapidly expanding field of information security. The program provides a robust foundation in security theory combined with the practical skills needed to design, implement, and manage secure enterprise IT infrastructure and mitigate risk. Graduates are equipped for high-demand careers in areas such as digital forensics, incident response, and security architecture.
Key Program Highlights
- Master the theory and practice of securing enterprise IT infrastructure
- Develop expertise in proactive risk assessment and mitigation strategies
- Gain hands-on skills in digital forensics and incident response
- Learn to design and implement comprehensive security solutions
- Prepare for leadership roles in the high-growth cybersecurity market
Requirements
Modules
- Discrete Structures For Computer Science
- Introduction To Programming
- Data Structures I
- Data Structures Ii
- Systems I
- Systems Ii
- Distributed Systems I
- Information Security Management
- Digital Forensic Techniques
- Network Security
- Object-Oriented Software Development
- Cybersecurity Automation Operations
- Computer Security
- Cryptology
- Theory And Practice Of Safe Systems Programming
- It Risk Management
- Governance Policies In Information Assurance
- Advanced Network Technologies And Design
- Network Security Ii
- Software Security Architecture
- Software Security Assessment
- Web Applications
- Framework For Web Application Development
- Computer Security
- Cryptology
- Distributed Systems Ii
- Foundations Of Computer Security
- Cyber-Physical System Security
- Data Analysis And Regression
- Advanced Modeling And Analysis Techniques
- Scripting For Data Analysis
- Fundamentals Of Data Science
- Data Visualization
- Programming Machine Learning Applications
- It Auditing
- Legal Responsibilities In Information Technology
- Business Continuity/Disaster Recovery Theories And Strategies
- Business Continuity/Disaster Recovery Management And Tactics
- Foundations Of Network Technologies
- Telecommunications Practicum
- Advanced Network Technologies And Design
- Computer-Communication Network Design And Analysis
- Protocols And Techniques For Data Networks
- Telecommunication Systems Design And Management
- Network Management
- Network Security Ii
- Software Testing And Quality Assurance
- Continuous Delivery And Devops
- Object-Oriented Enterprise Computing
- Requirements Engineering
- Software Security Architecture
- Software Security Assessment
- Software Risk Management