Graduate Programs

Degree Programs

Secure Computing

Master of Science in Secure Computing
M.S. Requirements

Program-Level Learning Outcomes

  • Appraise relationships among a variety of computing practices and technologies to create integrated solutions to cybersecurity problems
  • Formulate and defend realistic and detailed designs for solutions of cybersecurity problems of enterprise scope
  • Evaluate and apply common cybersecurity standards for technology and technology management
  • Communicate cybersecurity problems and suggested solutions to other professionals and with business clients

The Masters of Science Degree in Secure Computing is structured as follows. A student must complete 36 credit hours of courses with the requirement that the following number of credit hours be achieved in each of the four areas as described below:


  • Computing Foundations (9 cr.)
  • Secure Computing Core (12 cr.)
  • Applied Security and Professional Practice (6 cr.)
  • Electives (9 cr.)

Computing Foundations

These courses ensure that students have a firm grasp of computing systems. Students need to take 9 credit hours from the following list of courses. 

Required (unless exempted):

  • CSCI-P 536 Advanced Operating Systems
  • CSCI-P 538 Computer Networks

Must complete at least one course from the following (total of 9 credit hours including required courses):

  • CSCI-B 534 Distributed Systems
  • CSCI-B 541 Hardware System Design I
  • CSCI-B 543 Computer Architecture
  • CSCI-B 561 Advanced Database Concepts
  • CSCI-P 535 Pervasive Computing
  • CSCI-P 542 Hardware System Design II
  • CSCI-P 545 Embedded and Real-Time Systems

Secure Computing Core

These courses ensure that students have a firm grasp of the fundamental ideas, skills, models and tools of cybersecurity.  Students need to take 12 credit hours from the following list of courses.

Required (unless exempted):

  • CSCI-B 544 Security for Networked Systems 
  • CSCI-B 547 Systems and Protocol Security and Information Assurance

Must complete at least 2 courses (total of 12 credit hours including required courses):

  • CSCI-B 504 Introduction to Cryptography 
  • CSCI-B 546 Malware Epidemic: Threat and Defense
  • CSCI-B 590 Topics in Computer Science
    • Topic: Programming/Cyber Competitions
  • CSCI-B 649 Topics in Systems
    • The course section you enroll in should be for a security or privacy topic
    • Examples: Data Driven Security & Privacy OR Security and Applied Crypto OR Usable Security and Privacy
  • ENGR-E 599 Topics in Intelligent Systems Engineering
    • Topic: Reverse Engineering Embedded Systems
  • INFO-I 525 Organizational Informatics and Economics of Security
  • INFO-I 537 Legal and Social Informatics of Security

Applied Security and Professional Practice

Internship credit must be obtained from organizations where students are exposed to some practical aspect of cybersecurity. Each 10-hour per week internship over a semester/summer provides 1 credit hour.  Students may also engage in internships with security faculty at academic institutions.

A student may take a maximum of two internships, for a maximum of 6 credit hours.  Further, a student may work no more than 40 hours per week for credit.

Students may also satisfy their Applied Security and Professional credit requirements through specific course:

  • CSCI-Y 798 Graduate Internship


The remaining 9 credit hours are electives. All elective credits must be 500 level or higher, unless you have permission from the Secure Computing program director.

Electives must be used to take the following courses unless these topics have already been covered at the undergraduate level (with approval from the Secure Computing program director).

  • Programming - CSCI-A 591 Introduction to Computer Science
  • Data Structures - CSCI-A 594 Data Structures
  • Algorithms - CSCI-B 505 Applied Algorithms

Academic Bulletins