Master of Science in Cybersecurity: Curriculum

Choose your specialization and hit the ground running

Curriculum Details

30 TOTAL
CREDITS REQUIRED

Each course in our Master of Science in Cybersecurity program is carefully designed to prepare you in less than two years for the real-world challenges cybersecurity leaders face every day.

Six courses and a two-day on campus or online virtual cybersecurity residency comprise the core program, followed by a choice between five specializations that give you an extensive understanding of a specific discipline. You'll complete this program with skills in cybersecurity, leadership, ethics, and decision-making that are vital in any role.

The curriculum course abstracts on this page are meant to provide a high-level course overview and subject to change based on term, faculty, and/or institutional requirements. View the official course descriptions as written in the Utica College Academic Catalog and in adherence to regional compliance.

Required Courses

Credit Hours

Major Total Hours:

CYB 605 Principles of CybersecurityCredit Hours: 3

Explore the following foundational concepts and processes for information security in cyberspace: incident response, reporting, containment, and restoration of the information infrastructure.

CYB 610 Cyber IntelligenceCredit Hours: 3

Explore foundational concepts and processes in the sub-discipline of cyber intelligence.

CYB 633 Critical National Infrastructures and National SecurityCredit Hours: 3

Examine major critical infrastructure protection issues, technologies, and approaches as they relate to telecommunications, energy, banking and finance, transportation, the internet, and emergency services.

CYB 673 Principles of Cybercrime InvestigationsCredit Hours: 3

Examine the legal and technical aspects of cybercrime investigations, then compare them with techniques of traditional investigations.

CYB 695 Capstone Project ICredit Hours: 3

This capstone course in cybersecurity is an opportunity for you to master a specialized field of your choice through a focused research project that is consistent with the graduate research proposal guidelines.

CYB 696 Capstone Project IICredit Hours: 3

Complete the capstone cybersecurity research project proposed in CYB 695 Capstone Project I and remain consistent with graduate research guidelines.

Prerequisite: CYB 695

Intelligence Specialization Total Hours:

CYB 615 Cyber CounterintelligenceCredit Hours: 3

Develop a broad understanding of the concepts and processes of counterintelligence in cyberspace. Explore topics including counterintelligence missions, defensive and offensive counterintelligence, and counterespionage.

CYB 616 International TerrorismCredit Hours: 3

Examine the history, emergence, and growth of terrorist groups. Taking a global and international perspective, you'll assess the capabilities and activities of terrorist groups in the context of cybersecurity issues, political activism, and the law.

Prerequisites: CYB 605, 610, 633, and 673

CYB 671 Open Source Cyber SurveillanceCredit Hours: 3

Learn about open-source cyber surveillance including the responsible, legal, and ethical use of data and information gathered from the use of unmanned, semi-autonomous systems, Web data mining, social networks, and other modern cyber systems.

CYB 617 Cyber ConflictCredit Hours: 3

Explore the development and evolution of cyber conflict in the context of intelligence, terrorism, and counterterrorism.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673

CYB 667 Critical Incident Command, Response, and All HazardsCredit Hours: 3

Explore command and response issues for management of critical 'All Hazards' incidents; field command structure and multijurisdictional issues relating to cyber conflict.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673

CYB 674 Cyber Data FusionCredit Hours: 3

Explore data collection, fusion, integration, and analysis problems selected from the following advanced surveillance technologies: acoustic, electromagnetic, sensors, special (magnetic, cryptologic, computer), and human networks.

Computer Forensics Specialization Total Hours:

CYB 624 Essential Topics and Emerging Trends in Cybercrime InvestigationsCredit Hours: 3

Examine topics, concepts, trends, and methods in computer and network forensic investigation. Acquire skills and knowledge related to digital evidence collection and evaluation; legal issues; and international, jurisdiction, and privacy issues.

CYB 651 Computer Forensics and Investigation MethodsCredit Hours: 3

Examine techniques and tools used by computer forensics investigations such as acquisition, preservation, recovery, and analysis of evidence obtained from portable and stationary computer storage devices, personal digital assistants (PDAs), and cell phones.

Prerequisite: Permission of instructor

CYB 652 Intrusion Forensics and Network AnalysisCredit Hours: 3

As advances in technology increase the frequency of computer-related crime and victimization, experts are needed in detecting unlawful intrusion and the parties responsible. Examine the ethical considerations and proper procedure for intrusion analysis and the forensic investigation that follows.

Prerequisite: permission of instructor

CYB 653 Network ForensicsCredit Hours: 3

Gain an introduction to identifying data of evidentiary value within network communications.

CYB 659 Advanced Topics in Computer ForensicsCredit Hours: 3

Learn about advanced topics and concepts in cybersecurity and computer forensics including cyber defense tools, attack methods, and technologies.

Prerequisites: CYB 605, 610, 633 and 673, or permission of instructor

Cyber Operations Specialization Total Hours:

CYB 640 Tactics, Techniques, and ProceduresCredit Hours: 3

Explore the ethical, technical, and legal fundamentals associated with cyber operations.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673 or permission of instructor

CYB 641 Computer and Network OperationsCredit Hours: 3

Perform studies of attack and defense methods in the cyber environment and learn about the intricacies of vulnerability assessment, penetration testing, and system exploitation.

Prerequisites: CYB 605, CYB 610, CYB 633 and CYB 673, or permission of instructor

CYB 642 Access Methods and Data HidingCredit Hours: 3

Explore data hiding, including methods of anonymity, steganography, cryptography, and anti-forensics.

Prerequisite: CYB 605, CYB 610, CYB 633, and CYB 673, or permission of instructor

CYB 643 Autonomous Cyber OperationsCredit Hours: 3

Learn the construction, discovery, and analysis of defensive and offensive viral code. You'll also examine the legal issues associated with autonomous operations.

Prerequisites: CYB 605, 610, 633, and 673 or permission of instructor

CYB 649 Advanced Topics in Cyber OperationsCredit Hours: 3

Apply cyber operations techniques to realistic, systems-oriented problem sets in an integrated defensive/offensive scenario-based virtual environment. This course will also address cyber incident response.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673, or permission of instructor

Malware Analysis Specialization Total Hours:

CYB 617 Cyber ConflictCredit Hours: 3

Explore the development and evolution of cyber conflict in the context of intelligence, terrorism, and counterterrorism.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673

CYB 641 Computer and Network OperationsCredit Hours: 3

Perform studies of attack and defense methods in the cyber environment and learn about the intricacies of vulnerability assessment, penetration testing, and system exploitation.

Prerequisites: CYB 605, CYB 610, CYB 633 and CYB 673, or permission of instructor

CYB 643 Autonomous Cyber OperationsCredit Hours: 3

Learn the construction, discovery, and analysis of defensive and offensive viral code. You'll also examine the legal issues associated with autonomous operations.

Prerequisites: CYB 605, 610, 633, and 673 or permission of instructor

CYB 689 Advanced Topics in CybersecurityCredit Hours: 3

Explore state-of-the art advances, emerging trends, and threats in cybersecurity.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673

CYB 691 Malware PracticumCredit Hours: 3

This practicum is designed to give students supervised, practical application of previously or concurrent studied theory in malware mitigation and analysis. Students will learn the nuances of finding and mitigating malware and gain a deep understanding of the technical methods of malicious code (malcode), specialized malware analysis tools and environments, and enterprise-wide mitigation methods.

Prerequisite: CYB 689

Electronic Crime Specialization Total Hours:

FCM 535 Legal and Regulatory Issues for Fraud ManagementCredit Hours: 3

Examine the structure and design of organizations with a focus on systems theory and its impact on economic crime. Expand on your findings and apply them to today's environment.

FCM 627 Fraud Management: Risk and ComplianceCredit Hours: 3

Become familiar with the principles and practices of compliance and operational risk assessment and mitigation. You'll also examine the management of fraud prevention detection and investigation.

FCM 631 Fraud Management and TechnologyCredit Hours: 3

You'll examine the challenges of management in an increasingly technological environment. You'll also explore the history and evolutionary development of counter-fraud technology and the integration of fraud management in the development of new corporate products or instruments. You'll learn to anticipate new forms of fraud based on the application of new and anticipated technologies.

FCM 642 Advanced Fraud AnalysisCredit Hours: 3

Explore innovative analytic approaches used to perform complex fraud analysis. You'll examine link analysis, data mining, advanced statistical tools, case management systems, and expert system approaches such as neural network early-warning software.

Students who have not completed foundational computer software or networking courses, or who have no practical training and experience in computer software or networking, will be required to take CYB 505 – Foundations of Computing for Cybersecurity (3 credit hours) as a part of the program.

 
Request More Information

We'd love to get to know you and hear more about your educational and professional goals. If you'd like to learn more about one of our programs, fill out this form and we'll be in touch:

          I consent to receiving SMS/MMS messages generated by an autodialer from Utica College or its representatives at the mobile number I provided. Consent is not required to receive information. Message & data rates may apply. Send STOP to 35254 to unsubscribe. Send HELP to 35254 for help. Click here for Terms & Conditions and Privacy Policy
          Yes! I'd like to schedule an appointment with an admissions counselor.If this option is not selected, an admission specialist will still contact you at a time of their choosing.
          CAPTCHA
          This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.