Skip to content

Master of Science in Cybersecurity: Curriculum

Curriculum Details

30 TOTAL CREDITS REQUIRED

Each course in our Master of Science in Cybersecurity program is carefully designed to prepare you in less than two years for the real-world challenges cybersecurity leaders face every day.

Six courses and a two-day online virtual cybersecurity residency comprise the core program, followed by your choice of seven specializations that give an extensive understanding of a specific discipline. You’ll complete this program with skills in cybersecurity, leadership, ethics, and decision-making that are vital in any role.

Course abstracts on this page are meant to provide an overview and are subject to change based on term, faculty, and/or institutional requirements. View the official course descriptions as written in the Utica College Academic Catalog and in adherence to regional compliance. Select the appropriate Graduate Catalog from the dropdown.

National Center of Excellence

With cutting-edge programs, Utica College is a nationwide leader in cybersecurity education. We’re proud to be designated a National Center of Academic Excellence in Cyber Defense Education (CAE-CD) by the National Security Agency (NSA) and Department of Homeland Security (DHS). Utica College has met the increased demands of this new designation category with its Bachelor’s and Master’s in Cybersecurity programs. The NSA designation academic year 2024.

The college has also earned designation as a National Center of Digital Forensics Academic Excellence (CDFAE) by the Defense Cyber Crime Center (DC3).

MAJOR

Explore the following foundational concepts and processes for information security in cyberspace: incident response, reporting, containment, and restoration of the information infrastructure.
Explore foundational concepts and processes in the sub-discipline of cyber intelligence.
Examine major critical infrastructure protection issues, technologies, and approaches as they relate to telecommunications, energy, banking and finance, transportation, the internet, and emergency services.

Examine the legal and technical aspects of cybercrime investigations, then compare them with techniques of traditional investigations.

This capstone course in cybersecurity is an opportunity for you to master a specialized field of your choice through a focused research project that is consistent with the graduate research proposal guidelines.

Complete the capstone cybersecurity research project proposed in CYB 695 Capstone Project I and remain consistent with graduate research guidelines.

Prerequisite: CYB 695

INTELLIGENCE SPECIALIZATION

Develop a broad understanding of the concepts and processes of counterintelligence in cyberspace. Explore topics including counterintelligence missions, defensive and offensive counterintelligence, and counterespionage.

Examine the history, emergence, and growth of terrorist groups. Taking a global and international perspective, you’ll assess the capabilities and activities of terrorist groups in the context of cybersecurity issues, political activism, and the law.

Prerequisites: CYB 605, 610, 633, and 673

Learn about open-source cyber surveillance including the responsible, legal, and ethical use of data and information gathered from the use of unmanned, semi-autonomous systems, Web data mining, social networks, and other modern cyber systems.

Explore the development and evolution of cyber conflict in the context of intelligence, terrorism, and counterterrorism.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673

Explore command and response issues for management of critical ‘All Hazards’ incidents; field command structure and multi-jurisdictional issues relating to cyber conflict.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673

Explore data collection, fusion, integration, and analysis problems selected from the following advanced surveillance technologies: acoustic, electromagnetic, sensors, special (magnetic, cryptologic, computer), and human networks.

COMPUTER FORENSICS SPECIALIZATION

Examine topics, concepts, trends, and methods in computer and network forensic investigation. Acquire skills and knowledge related to digital evidence collection and evaluation; legal issues; and international, jurisdiction, and privacy issues.

Examine techniques and tools used by computer forensics investigations such as acquisition, preservation, recovery, and analysis of evidence obtained from portable and stationary computer storage devices, personal digital assistants (PDAs), and cell phones.

Prerequisite: Permission of instructor.

As advances in technology increase the frequency of computer-related crime and victimization, experts are needed in detecting unlawful intrusion and the parties responsible. Examine the ethical considerations and proper procedure for intrusion analysis and the forensic investigation that follows.

Prerequisite: permission of instructor

Gain an introduction to identifying data of evidentiary value within network communications.

Learn about advanced topics and concepts in cybersecurity and computer forensics including cyber defense tools, attack methods, and technologies.

Prerequisites: CYB 605, 610, 633 and 673, or permission of instructor.

CYBER OPERATIONS SPECIALIZATION

Explore the ethical, technical, and legal fundamentals associated with cyber operations.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673 or permission of instructor.

Perform studies of attack and defense methods in the cyber environment and learn about the intricacies of vulnerability assessment, penetration testing, and system exploitation.

Prerequisites: CYB 605, CYB 610, CYB 633 and CYB 673, or permission of instructor

Explore data hiding, including methods of anonymity, steganography, cryptography, and anti-forensics.

Prerequisite: CYB 605, CYB 610, CYB 633, and CYB 673, or permission of instructor.

Learn the construction, discovery, and analysis of defensive and offensive viral code. You’ll also examine the legal issues associated with autonomous operations.

Prerequisites: CYB 605, 610, 633, and 673 or permission of instructor.

Apply cyber operations techniques to realistic, systems-oriented problem sets in an integrated defensive/offensive scenario-based virtual environment. This course will also address cyber incident response.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673, or permission of instructor.

CYBER POLICY SPECIALIZATION

Learn the principles of privacy relating to non-public personal, proprietary business, or government information. You’ll examine policy issues; legal, regulatory and business controls; and best practices.
Examine rules, regulations, and issues related to organizational risk management. You’ll explore risk assessment and management from healthcare, financial, privacy, data breach, and government perspectives.
Examine the principle of national responsibility related to cyber policy. Become acquainted with international law, diplomacy, international cooperation, non-cooperation, international organizations, internet governance, the European Convention on Cybercrime, and the Tallinn Manual.
Examine how classical theorists interpreted the concept of morality, and how their interpretations apply to cyber conflict, cyber ethics, and the general use of technology.

DATA ANALYTICS SPECIALIZATION

Explore important data science goals and objectives that inform data collection and analysis techniques. You’ll gain an understanding of how appropriate quantitative and qualitative methods, data collection techniques, and software help data scientists interpret and apply research findings to help solve real-world problems using private, proprietary, and public data sources. You will develop advanced critical thinking in research ethics and social responsibilities as they relate to management and decision sciences.

Learn advanced statistical models for data analysis. Gain a theoretical understanding and practical application of the principles and techniques of statistical data analysis.

Develop an understanding of theoretical concepts and methods in the field of data mining. Explore data mining methods used for prediction and knowledge discovery in databases by using programming software to analyze real-world data.

Understand the key machine learning algorithms and their applications to real-world problems. Learn theoretical foundations and empirical applications of machine learning with hands-on programming assignments and projects.

Become an effective data storyteller by creating rich visuals to represent and communicate data analysis.

MALWARE ANALYSIS SPECIALIZATION

Explore the development and evolution of cyber conflict in the context of intelligence, terrorism, and counterterrorism.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673

Perform studies of attack and defense methods in the cyber environment and learn about the intricacies of vulnerability assessment, penetration testing, and system exploitation.

Prerequisites: CYB 605, CYB 610, CYB 633 and CYB 673, or permission of instructor

Learn the construction, discovery, and analysis of defensive and offensive viral code. You’ll also examine the legal issues associated with autonomous operations.

Prerequisites: CYB 605, 610, 633, and 673 or permission of instructor.

Explore state-of-the art advances, emerging trends, and threats in cybersecurity. Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673

This practicum is designed to give students supervised, practical application of previously or concurrent studied theory in malware mitigation and analysis. Students will learn the nuances of finding and mitigating malware and gain a deep understanding of the technical methods of malicious code (malcode), specialized malware analysis tools and environments, and enterprise-wide mitigation methods.

Prerequisite: CYB 689

ELECTRONIC CRIME SPECIALIZATION

Examine the structure and design of organizations with a focus on systems theory and its impact on economic crime. Expand on your findings and apply them to today’s environment.

Become familiar with the principles and practices of compliance and operational risk assessment and mitigation. You’ll also examine the management of fraud prevention detection and investigation.

You’ll examine the challenges of management in an increasingly technological environment. You’ll also explore the history and evolutionary development of counter-fraud technology and the integration of fraud management in the development of new corporate products or instruments. You’ll learn to anticipate new forms of fraud based on the application of new and anticipated technologies.

Explore innovative analytic approaches used to perform complex fraud analysis. You’ll examine link analysis, data mining, advanced statistical tools, case management systems, and expert system approaches such as neural network early-warning software.

Additional Curriculum Requirements

Students who have not completed foundational computer software or networking courses, or who have no practical training and experience in computer software or networking, will be required to take CYB 505 – Foundations of Computing for Cybersecurity (3 credit hours) as a part of the program.

Students will select 4 courses (12 credits) within each advising specialization. Some specializations may require specific courses be completed.

Request More Information

We’d love to get to know you and hear more about your educational and professional goals. If you’d like to learn more about one of our programs, fill out this form and we’ll be in touch:

Note: All fields required.