Master of Science in Computer Science - Computer Systems Security

Building on the Master of Science in Computer Science program core, this concentration is intended to provide the foundation and focused knowledge for those interested in the systems security field. Protecting vital enterprise computer systems from unauthorized change, improper access, theft of information and monetary theft can become even more important with the rapid growth of networking, the Internet and e-business. This concentration presents an overview of computer systems security, and is designed to offer the opportunity to attain education competencies in developing a security policy, formulating an implementation plan, designing and implementing security measures and monitoring and managing computer systems security.

For the third year in a row, CTU’s online Master of Science in Computer Science degree programs were ranked among the 2017 Best Online Programs by U.S. News and World Report.*

Relevant Institutional/Programmatic Accreditation
CTU is institutionally accredited by the Higher Learning Commission www.hlcommission.org
National Center of Academic Excellence in Information Assurance/Cybersecurity 2014-2021**

  • Classes start

  • Total Credits 

    48
  • Program Availability

    Online | Colorado Springs | Denver

Program Details

Courses
Related Degrees
Tuition
Ways to Save
Outcomes
Next Steps
  • Courses

    Degree Requirements

    Courses: Core
    CS627Design and Analysis of Algorithms4
    CS630Modern Operating Systems4
    CS635Computer Networking4
    CS651Computer Systems Security Foundations4
    CS660Database Systems4
    CS672Systems Engineering Methods4
    CS698Computer Science Capstone4
    Total Credit Hours:28
    Courses: Concentration
    CS631Digital Forensics4
    CS652Operating Systems Security4
    CS653Network Security4
    CS654Security Management4
    CS661Software Information Assurance4
    Total Credit Hours:20

    Total Credit Hours: 48

    Preparatory Requirements

    The CTU Master of Science in Computer Science degree program is designed to provide technical depth in computer science and in the three concentration areas—software engineering, security and database management systems. In order to achieve this depth a solid foundation in mathematics, computer science, and the student’s concentration area is required. In addition, the student must have an intermediate level of ability to program in a current object-oriented programming language such as C++ or Java, such as is provided by CS215 or IT215. Students who have the required background but need to refresh their mathematics skills are highly encouraged to take MATH501. Students who have the required background but need to refresh some of their computer science skills are highly encouraged to take CS500. 

    National Security Agency and Department of Homeland Security

    The Department of Homeland Security and the National Security Agency have recognized Colorado Technical University as a National Center of Academic Excellence in Information Assurance and Cyber Defense (CAE IA/CD). The CTU cyber security curriculum was certified thereby to map to the DHS/NSA cybersecurity knowledge units. This recognition and certification is valid through 2021.

    This CAE IA/CD designation is applicable to this degree program.

  • Related Degrees

    Master of Science in Computer Science

  • Tuition

    Tuition

    Total tuition for this degree program will vary depending on your educational needs, existing experience, and other factors.

    View our tuition resources page for links to information on our civilian and military student tuition, books and fees.

    Calculator icon Estimate your costs, potential savings and graduation date
  • Ways to Save

    Ways to Save

    Cost of this degree may be reduced based on one or more of the following:

  • Outcomes

    This degree program is designed to provide the following skills and knowledge:

    • Assess the need for, and make recommendations on the technical requirements necessary for the implementation of an effective security infrastructure
    • Recommend and defend the implementation of security components at the operating system and network level to include considerations for cloud computing and virtualization
    • Develop effective enterprise level security policies, standards and procedures including business continuity
  • Next Steps

    Where do I go from here?

    Choosing to continue your education is a big decision and we're here to help. Choose one of the options below to get started.


    Submit your details and speak to an admissions advisor within the next day:



    Submit a no-fee online application. An advisor will get in touch after your application is received to schedule an interview (required before enrolling):


Gainful Employment and Other Student Disclosures

Below you can find placement rates and other information tailored to your chosen campus and program. Certain disclosures are published on this website to assist students in understanding the facts about their programs.

Program Disclosure Information for:
-- Select Campus above --

 

Employment Rates:

Select a campus for rate information.

 

- Graduation Rate

Select a campus for rate information.

Learn More 

Need help choosing the right degree program?

Request Information

*Learn more about the U.S. News rankings for Colorado Technical University’s online degree programs.

**CTU has been designated as a National Center of Academic Excellence in Information Assurance/Cybersecurity for academic years 2014-2021 for its cybersecurity and information assurance programs