Master's in Cybersecurity Online
Master of Science in Computer Science - Cybersecurity Engineering
Cybersecurity has never been more important to organizations in both the public and private sectors. The Master of Science in Computer Science degree with a concentration in Cybersecurity Engineering from Colorado Technical University can help you prepare to develop security policies and procedures to protect valuable data, networks and devices.
The Master of Science in Computer Science with a concentration in Cybersecurity Engineering at CTU:
- Has a curriculum that was acknowledged by the Department of Homeland Security and the National Security Agency as mapping to the DHS/NSA cybersecurity knowledge units
- Is ranked among the Best Online Master's in Computer Information Technology Programs by U.S. News and World Report for the eighth year in a row*
CTU helps adult students succeed with flexible online courses that accommodate busy schedules. Learn more about the program below. Or speak to an advisor by filling out the form to the right.
* CTU programs are ranked among U.S. News & World Report’s 2022 Best Online Programs.
Relevant Institutional/Programmatic Accreditation
CTU is institutionally accredited by the Higher Learning Commission www.hlcommission.org
- June 28, 2022
- August 09, 2022
- September 20, 2022
Estimate Tuition and Grad Date
Total tuition for this degree program will vary depending on your educational needs, existing experience, and other factors.Estimate your costs, potential savings and graduation date
Effective July 2, 2019, this program is no longer available for future enrollments at the Colorado Springs and Aurora campuses.
Prior to January 2018, this concentration was known as Computer Systems Security.
The MSCS program is designed to provide students with a strong and broad Computer Science related technical background as well as systematic, analytical, critical-thinking, and problem-solving skills that enable them to contribute as a professional or a subject expert to a variety of Computer Science or Software Engineering related technical roles, including but not limited to Computer and Information Research Scientists, Information Security Analysts, Computer Programmers, Software Developers, Software Quality Assurance Engineers and Testers, Computer Systems Engineers/Architects, and Computer Science Teachers.
The Master of Science in Computer Science (MSCS) degree program includes core courses which are designed to provide relevant and advanced instruction in a set of Computer Science’s most important subjects such as computer algorithm, operating system, database, security, and networking, as well as software engineering. In addition, the MSCS degree program has a General Track as well as three concentrations: Data Science, Software Engineering and Cybersecurity Engineering. Each concentration provides a set of courses which are designed to equip students with additional domain knowledge such as principles, processes and methodologies, as well as best practice on how to apply relevant computer software or other computing technologies in the concentration subjects.
This program does not lead to additional licensure or certification. As such, CTU has made no determination regarding prerequisites for licensure or certification in any state or jurisdiction.
College of Computer Science, Engineering and Technology Mission Statement
Through innovative industry-current curricula and technology-enabled student-centered teaching, the College of Computer Science, Engineering and Technology empowers students to become motivated, creative, ethical, and skillful professionals who can resolve challenges in Computer Science, Computer/Electrical Engineering, and Information Technology in order to meet the needs of the digital economy.
Course Title Course Description Credit Hours CS627
This course involves both the design and analysis of classic and other useful algorithms which includes the necessary treatment of graph theory and algorithm complexity analysis. Students will design and code many of the algorithms and measure their performance to compare them to one another and to analyze the effect of scale.
Design and Analysis of Algorithms 4 CS630
This is an advanced (OS) course to present the current progress of modern OS. Internal structure and mechanisms as well as the design principles of multi-processor and multi-core OS are evaluated. Technologies of extending the kernel OS functions to solve technical challenges associated with concurrency, synchronization, virtualization, scheduling, clustering, security, client-server, service-orientation, communication and distribution, etc. are discussed. Students will also conduct an applied research or a case study on extending OS to support various types of computing technologies, such as grid computing, cloud computing, embedded computing, distributed and network computing, and/or any new type of computer system architecture.
Modern Operating Systems 4 CS635
Emerging technologies continuously change the way we network. This course analyzes the foundational concepts in computer networking along with the current state of the practice and assesses the changes required by new technologies. The layers of the OSI Reference Model are compared and contrasted with the TCP/IP protocol suite. Network issues, such as addressing and routing, security, and reliability are appraised. Emerging technologies, such as Voice over IP, Multimedia on Demand, Cloud Computing and Virtualization will be evaluated and incorporated into design projects.
Computer Networking 4 CS651
This course introduces the overall foundations required for the understanding of, and further study in, information systems security. It reviews the history of security and computer systems security in particular to develop a set of models to guide the approach to realizing computer systems security. An overview of current security technologies is presented. A research project and formal paper are required.
Computer Systems Security Foundations 4 CS660
This course explores current database systems and provides a foundation for future study. Techniques for the design and implementation of relational databases are presented and applied using SQL and a DBMS. Other data models such as the object-oriented and object-relational models are examined and compared to the relational model. Database systems using data warehouses and data marts, distributed databases, and web-based databases are discussed.
Database Systems 4 CS672
Systems engineering methods provides a robust focus on functionality, design, creation, operational performance and operating systems that address the needs and requirements of customers. SEM provides an overview of techniques, methodologies, and approaches to system engineering. Topics include SE foundational models and the newest concepts, evaluation methods, and key tools. Focus also includes key stages in SEM such as system processes, eliciting customer requirements, system design, system quality, system integration, and deployment, maintenance, and system disposal.
Systems Engineering Methods 4 CS698
The Capstone course demonstrates mastery and critical knowledge from the MSCS program. The content, concepts, and knowledge from the MSCS is critically applied by completing an in-depth project focusing on a major technical problem or major issue that impacts the student’s own organization or in a desired area of study. The course gives the student the opportunity to perform a comprehensive analysis and study in a selected area of interest. The student will prepare a formal technical report of the detailed research and application of prior course concepts.
Computer Science Capstone 4 Total Credit Hours: 28
Course Title Course Description Credit Hours CS631
This course covers the theory and techniques that one employs to determine the cause of and sequence of events leading up to a security breach in computer systems. This includes the identification of clues and their locations on the offended system, in the associated local network, and into the Internet itself. Techniques to prevent or mitigate such breaches are explored.
Digital Forensics 4 CS652
Operating Systems Security provides an in-depth analysis of the security components at the operating system level. The focus is on the development of a security policy and the basic elements that provide identification and authentication, access control and security auditing. In addition to general concepts, both the UNIX/Linux and Windows operating systems are studied. Students participate in hands-on lab assignments to reinforce the material as well as to gain familiarity with a number of available operating system security products and tools (both freeware and commercially available).
Operating Systems Security 4 CS653
Students are provided with a brief overview of the basic elements of networking concepts, topologies, protocols and threats necessary to understand network security issues and make security relevant decisions. An in-depth analysis of the Open Systems Interconnection (OSI) model and layered network security mechanisms needed to provide Confidentiality, Integrity, Availability, Authorization, Authentication and Non-repudiation within a network environment is included. This course includes a thorough treatment of cryptography and cryptographic services. An implementation plan and formal paper are required.
Network Security 4 CS654
This course covers a variety of issues relating to the management of information systems security. The topics covered include development of policies, standards and procedures, risk analysis methodologies, contingency planning and disaster recovery. Additional topics covered include legal and ethical issues, incident reporting, security auditing, computer crime, and security awareness and training. Implementation issues, potential conflicts and tradeoffs are also discussed. A project is required.
Security Management 4 CS661
Attacks on enterprise level systems can be focused on many targets. Some of the targets, such as WEB servers are at the perimeter of the network. Others occur at the applications running on various operating systems. This course examines vulnerabilities caused by both scripting errors or poor scripting techniques on WEB based applications. Further, vulnerabilities created in custom developed applications written in high level programming languages are examined. SQL problems and architecture design flaws in relational database systems that contribute to vulnerabilities are also analyzed. A whole new set of intrusion risks present themselves with the newer emerging media and application environments such as cloud computing, social media venues, and mobile computing. Students will also conduct research into these areas. The need for security driven life cycle development models and security standards for programming and scripting languages are presented.
Software Information Assurance 4 Total Credit Hours: 20
Total Credit Hours: 48
Compare Related Areas of Study
Compare up to three additional degrees
Ways to Save
MSCS Foundation Requirements
The Master of Science in Computer Science (MSCS) is built upon the expectation that students will enter the program with a solid computer science background. Therefore, the MSCS program requires students to have prior foundational knowledge in all core computer science disciplines to be successful.
Students entering into the MSCS program without a bachelor’s degree in either computer science or computer engineering will be required to successfully complete two MSCS foundation courses (CS503 and CS505) covering the following discipline areas of computer science: discrete math; programming language; object-oriented programming; data structure; algorithms; and algorithm analysis.
If a student can show evidence of satisfying the foundation course objectives through coursework from an accredited institution, the foundation requirement can be waived.
The foundation courses are also available to students with an undergraduate computer science degree who wish to refresh their knowledge in these subject areas.
The MSCS foundation course CS503 must be completed and passed prior to beginning courses in the MSCS program. Students will need to complete and pass CS505 prior to the end of the first quarter.
Students must be able to exhibit proficiency by successfully completing the foundation course with a minimum 70% passing score. If after 5 attempts (applies to each course separately) students do not pass the foundation course, students are encouraged to work with the Student Success department if they have questions regarding these foundation courses, timeframes for completion, or for alternative programs of study as needed.
Students who do not meet the MSCS foundation requirements will be withdrawn, canceled or transferred from the MSCS program.
Cost of this degree may be reduced based on one or more of the following:
Where do I go from here?
Choosing to continue your education with is a big decision and we're here to help. Choose one of the options below to get started.
Start the conversation
Submit your details and speak to an admissions advisor within the next day:Request Information
Chat or call an Admissions Advisor today.1-855-230-0555
Program details are provided lower on the page.