Master of Science in Cybersecurity: Curriculum

Choose your specialization and hit the ground running

Curriculum Details

30 TOTAL
CREDITS REQUIRED

Each course in our Master of Science in Cybersecurity program is carefully designed to prepare you in less than two years for the real-world challenges cybersecurity leaders face every day.

Six courses and a two-day online virtual cybersecurity residency comprise the core program, followed by your choice of seven specializations that give an extensive understanding of a specific discipline. You'll complete this program with skills in cybersecurity, leadership, ethics, and decision-making that are vital in any role.

Course abstracts on this page are meant to provide an overview and are subject to change based on term, faculty, and/or institutional requirements. View the official course descriptions as written in the Utica College Academic Catalog and in adherence to regional compliance.

National Center of Excellence

With cutting-edge programs, Utica College is a nationwide leader in cybersecurity education. We're proud to be designated a National Center of Academic Excellence in Cyber Defense Education (CAE-CD) by the National Security Agency (NSA) and Department of Homeland Security (DHS). Utica College has met the increased demands of this new designation category with its Bachelor's and Master's in Cybersecurity programs. The NSA designation academic year 2024.

The college has also earned designation as a National Center of Digital Forensics Academic Excellence (CDFAE) by the Defense Cyber Crime Center (DC3).

Students who have not completed foundational computer software or networking courses, or who have no practical training and experience in computer software or networking, will be required to take CYB 505 – Foundations of Computing for Cybersecurity (3 credit hours) as a part of the program.

Students will select 4 courses (12 credits) within each advising specialization. Some specializations may require specific courses be completed.

 

Required Courses

Credit Hours

Major Total Hours:

CYB 605 Principles of CybersecurityCredit Hours: 3

Explore the following foundational concepts and processes for information security in cyberspace: incident response, reporting, containment, and restoration of the information infrastructure.

CYB 610 Cyber IntelligenceCredit Hours: 3

Explore foundational concepts and processes in the sub-discipline of cyber intelligence.

CYB 633 Critical National Infrastructures and National SecurityCredit Hours: 3

Examine major critical infrastructure protection issues, technologies, and approaches as they relate to telecommunications, energy, banking and finance, transportation, the internet, and emergency services.

CYB 673 Principles of Cybercrime InvestigationsCredit Hours: 3

Examine the legal and technical aspects of cybercrime investigations, then compare them with techniques of traditional investigations.

CYB 695 Capstone Project ICredit Hours: 3

This capstone course in cybersecurity is an opportunity for you to master a specialized field of your choice through a focused research project that is consistent with the graduate research proposal guidelines.

CYB 696 Capstone Project IICredit Hours: 3

Complete the capstone cybersecurity research project proposed in CYB 695 Capstone Project I and remain consistent with graduate research guidelines.

Prerequisite: CYB 695

Intelligence Specialization Total Hours:

CYB 615 Cyber CounterintelligenceCredit Hours: 3

Develop a broad understanding of the concepts and processes of counterintelligence in cyberspace. Explore topics including counterintelligence missions, defensive and offensive counterintelligence, and counterespionage.

CYB 616 International TerrorismCredit Hours: 3

Examine the history, emergence, and growth of terrorist groups. Taking a global and international perspective, you'll assess the capabilities and activities of terrorist groups in the context of cybersecurity issues, political activism, and the law.

Prerequisites: CYB 605, 610, 633, and 673

CYB 671 Open Source Cyber SurveillanceCredit Hours: 3

Learn about open-source cyber surveillance including the responsible, legal, and ethical use of data and information gathered from the use of unmanned, semi-autonomous systems, Web data mining, social networks, and other modern cyber systems.

CYB 617 Cyber ConflictCredit Hours: 3

Explore the development and evolution of cyber conflict in the context of intelligence, terrorism, and counterterrorism.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673

CYB 667 Critical Incident Command, Response, and All HazardsCredit Hours: 3

Explore command and response issues for management of critical 'All Hazards' incidents; field command structure and multijurisdictional issues relating to cyber conflict.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673

CYB 674 Cyber Data FusionCredit Hours: 3

Explore data collection, fusion, integration, and analysis problems selected from the following advanced surveillance technologies: acoustic, electromagnetic, sensors, special (magnetic, cryptologic, computer), and human networks.

Computer Forensics Specialization Total Hours:

CYB 624 Essential Topics and Emerging Trends in Cybercrime InvestigationsCredit Hours: 3

Examine topics, concepts, trends, and methods in computer and network forensic investigation. Acquire skills and knowledge related to digital evidence collection and evaluation; legal issues; and international, jurisdiction, and privacy issues.

CYB 651 Computer Forensics and Investigation MethodsCredit Hours: 3

Examine techniques and tools used by computer forensics investigations such as acquisition, preservation, recovery, and analysis of evidence obtained from portable and stationary computer storage devices, personal digital assistants (PDAs), and cell phones.

Prerequisite: Permission of instructor

CYB 652 Intrusion Forensics and Network AnalysisCredit Hours: 3

As advances in technology increase the frequency of computer-related crime and victimization, experts are needed in detecting unlawful intrusion and the parties responsible. Examine the ethical considerations and proper procedure for intrusion analysis and the forensic investigation that follows.

Prerequisite: permission of instructor

CYB 653 Network ForensicsCredit Hours: 3

Gain an introduction to identifying data of evidentiary value within network communications.

CYB 659 Advanced Topics in Computer ForensicsCredit Hours: 3

Learn about advanced topics and concepts in cybersecurity and computer forensics including cyber defense tools, attack methods, and technologies.

Prerequisites: CYB 605, 610, 633 and 673, or permission of instructor

Cyber Operations Specialization Total Hours:

CYB 640 Tactics, Techniques, and ProceduresCredit Hours: 3

Explore the ethical, technical, and legal fundamentals associated with cyber operations.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673 or permission of instructor

CYB 641 Computer and Network OperationsCredit Hours: 3

Perform studies of attack and defense methods in the cyber environment and learn about the intricacies of vulnerability assessment, penetration testing, and system exploitation.

Prerequisites: CYB 605, CYB 610, CYB 633 and CYB 673, or permission of instructor

CYB 642 Access Methods and Data HidingCredit Hours: 3

Explore data hiding, including methods of anonymity, steganography, cryptography, and anti-forensics.

Prerequisite: CYB 605, CYB 610, CYB 633, and CYB 673, or permission of instructor

CYB 643 Autonomous Cyber OperationsCredit Hours: 3

Learn the construction, discovery, and analysis of defensive and offensive viral code. You'll also examine the legal issues associated with autonomous operations.

Prerequisites: CYB 605, 610, 633, and 673 or permission of instructor

CYB 649 Advanced Topics in Cyber OperationsCredit Hours: 3

Apply cyber operations techniques to realistic, systems-oriented problem sets in an integrated defensive/offensive scenario-based virtual environment. This course will also address cyber incident response.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673, or permission of instructor

Cyber Policy Specialization Total Hours:

CYB 665 Legal Foundations of Information Security and PrivacyCredit Hours: 3

Learn the principles of privacy relating to non-public personal, proprietary business, or government information. You'll examine policy issues; legal, regulatory and business controls; and best practices.

CYB 668 Organizational Risk Management FrameworksCredit Hours: 3

Examine rules, regulations, and issues related to organizational risk management. You'll explore risk assessment and management from healthcare, financial, privacy, data breach, and government perspectives.

CYB 688 International Aspects of Cyber PolicyCredit Hours: 3

Examine the principle of national responsibility related to cyber policy. Become acquainted with international law, diplomacy, international cooperation, non-cooperation, international organizations, internet governance, the European Convention on Cybercrime, and the Tallinn Manual.

PHI 655 Cyber EthicsCredit Hours: 3

Examine how classical theorists interpreted the concept of morality, and how their interpretations apply to cyber conflict, cyber ethics, and the general use of technology.

Data Analytics Specialization Total Hours:

DSC 501 Introduction to Data ScienceCredit Hours: 3

Explore important data science goals and objectives that inform data collection and analysis techniques. You'll gain an understanding of how appropriate quantitative and qualitative methods, data collection techniques, and software help data scientists interpret and apply research findings to help solve real-world problems using private, proprietary, and public data sources. You will develop advanced critical thinking in research ethics and social responsibilities as they relate to management and decision sciences.

DSC 503 Statistical MethodsCredit Hours: 3

Learn advanced statistical models for data analysis. Gain a theoretical understanding and practical application of the principles and techniques of statistical data analysis. 

DSC 607 Data MiningCredit Hours: 3

Develop an understanding of theoretical concepts and methods in the field of data mining. Explore data mining methods used for prediction and knowledge discovery in databases by using programming software to analyze real-world data.

DSC 609 Machine LearningCredit Hours: 3

Understand the key machine learning algorithms and their applications to real-world problems. Learn theoretical foundations and empirical applications of machine learning with hands-on programming assignments and projects.

DSC 611 Data VisualizationCredit Hours: 3

Become an effective data storyteller by creating rich visuals to represent and communicate data analysis.

Malware Analysis Specialization Total Hours:

CYB 617 Cyber ConflictCredit Hours: 3

Explore the development and evolution of cyber conflict in the context of intelligence, terrorism, and counterterrorism.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673

CYB 641 Computer and Network OperationsCredit Hours: 3

Perform studies of attack and defense methods in the cyber environment and learn about the intricacies of vulnerability assessment, penetration testing, and system exploitation.

Prerequisites: CYB 605, CYB 610, CYB 633 and CYB 673, or permission of instructor

CYB 643 Autonomous Cyber OperationsCredit Hours: 3

Learn the construction, discovery, and analysis of defensive and offensive viral code. You'll also examine the legal issues associated with autonomous operations.

Prerequisites: CYB 605, 610, 633, and 673 or permission of instructor

CYB 689 Advanced Topics in CybersecurityCredit Hours: 3

Explore state-of-the art advances, emerging trends, and threats in cybersecurity.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673

CYB 691 Malware PracticumCredit Hours: 3

This practicum is designed to give students supervised, practical application of previously or concurrent studied theory in malware mitigation and analysis. Students will learn the nuances of finding and mitigating malware and gain a deep understanding of the technical methods of malicious code (malcode), specialized malware analysis tools and environments, and enterprise-wide mitigation methods.

Prerequisite: CYB 689

Electronic Crime Specialization Total Hours:

FCM 535 Legal and Regulatory Issues for Fraud ManagementCredit Hours: 3

Examine the structure and design of organizations with a focus on systems theory and its impact on economic crime. Expand on your findings and apply them to today's environment.

FCM 627 Fraud Management: Risk and ComplianceCredit Hours: 3

Become familiar with the principles and practices of compliance and operational risk assessment and mitigation. You'll also examine the management of fraud prevention detection and investigation.

FCM 631 Fraud Management and TechnologyCredit Hours: 3

You'll examine the challenges of management in an increasingly technological environment. You'll also explore the history and evolutionary development of counter-fraud technology and the integration of fraud management in the development of new corporate products or instruments. You'll learn to anticipate new forms of fraud based on the application of new and anticipated technologies.

FCM 642 Advanced Fraud AnalysisCredit Hours: 3

Explore innovative analytic approaches used to perform complex fraud analysis. You'll examine link analysis, data mining, advanced statistical tools, case management systems, and expert system approaches such as neural network early-warning software.

 
Request More Information

We'd love to get to know you and hear more about your educational and professional goals. If you'd like to learn more about one of our programs, fill out this form and we'll be in touch:

          Yes, I do want to communicate with Utica College via SMS. I am providing my consent by leaving the opt-in checked. Message and data rates may apply. Privacy and Terms.
          CAPTCHA
          This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.