Master of Science in Computer Information Systems focus area in Security

CNSS and PMI Accreditation - Logos

The Master of Science in Computer Information Systems concentration in Security provides in-depth knowledge of emerging security threats and solutions to prepare technical leaders to identify, develop, and implement highly secure systems and networks that support organizational goals.

Students who complete the Computer Information Systems master’s degree concentration in Security will be able to demonstrate:

  • Advanced knowledge in the analysis and documentation of requirements for architecture, design, and implementation of computer applications systems.
  • Proficiency in software and computing skills as they pertain to the design and implementation of database systems, data communications, systems analysis, and design.
  • Competence sufficient to identify current and emerging information technologies that may have strategic value for enterprise; assess where those technologies have value; and manage the implementation of those technologies in the enterprise.
  • Advanced knowledge of information security concepts, governance, biometric systems, and database systems security, as well as network security and cryptography.
  • Proficiency in risk management, such as asset assessments, architectural solutions, modeling, and design.
  • Competence in security policies, processes, technology, and operations.

A total of 40 credits is required. Students must complete both the Core Curriculum and the Concentration Requirements.

Degree Requirements—On Campus

Core Curriculum

(Six courses/24 credits)

MET CS 546 Quantitative Methods for Information Systems
Fall ‘14

The goal of this course is to provide Computer Information Systems students with the mathematical fundamentals required for successful quantitative analysis of problems in the field of business computing. The first part of the course introduces the mathematical prerequisites for understanding probability and statistics. Topics include combinatorial mathematics, functions, and the fundamentals of differentiation and integration. The second part of the course concentrates on the study of elementary probability theory, discrete and continuous distributions. 4 cr  [ 4 cr. ]

Section Type Instructor Location Days Times
D1 IND Kohn FLR 109 R 6:00 pm – 9:00 pm
EL IND Kohn FLR 109 R 6:00 pm – 9:00 pm
OL IND Milton ARR
BCL IND Parrott U 8:00 am – 3:30 pm
BHA IND Staff S 8:30 am – 4:00 pm
MET CS 625 Business Data Communication and Networks
Fall ‘14

This course presents the foundations of data communications and takes a bottom-up approach to computer networks. The course concludes with an overview of basic network security and management concepts. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
B1 IND Arena SMG 228 T 6:00 pm – 9:00 pm
EL IND Arena SMG 228 T 6:00 pm – 9:00 pm
OL IND Mansur ARR
BCL IND Donham S 8:30 am – 4:00 pm
BHA IND Staff U 8:30 am – 4:00 pm
MET CS 669 Database Design and Implementation for Business
Fall ‘14

Students learn the latest relational and object-relational tools and techniques for persistent data and object modeling and management. Students gain extensive hands-on experience using Oracle or Microsoft SQL Server as they learn the Structured Query Language (SQL) and design and implement databases. Students design and implement a database system as a term project. class. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
C1 IND Maiewski FLR 109 W 6:00 pm – 9:00 pm
EL IND Maiewski FLR 109 W 6:00 pm – 9:00 pm
OL IND Mansur ARR
MET CS 682 Information Systems Analysis and Design
Fall ‘14

Object-oriented methods of information systems analysis and design for organizations with data- processing needs. System feasibility; requirements analysis; database utilization; Unified Modeling Language; software system architecture, design, and implementation, management; project control; and systems-level testing.   [ 4 cr. ]

Section Type Instructor Location Days Times
AT IND Guadagno CAS 214 R 6:00 pm – 9:00 pm
D1 IND Guadagno CAS 214 R 6:00 pm – 9:00 pm
OL IND Braude ARR
MET CS 782 IT Strategy and Management
Fall ‘14

This course provides an overview of contemporary I.T. management. It explains the relevant issues of effectively managing information services. The course highlights areas of greatest current and potential application of I.T. to business needs and reviews electronic business, enterprise business systems, and decision support systems.   [ 4 cr. ]

Section Type Instructor Location Days Times
A1 IND Arakelian MCS B19 M 6:00 pm – 9:00 pm
EL IND Arakelian MCS B19 M 6:00 pm – 9:00 pm
OL IND Arakelian ARR

And one of the following:

MET CS 520 Information Structures
Fall ‘14

This course covers the concepts of object-oriented approach to software design and development using the Java programming language. It includes a detailed discussion of programming concepts starting with the fundamentals of data types, control structures methods, classes, applets, arrays and strings, and proceeding to advanced topics such as inheritance and polymorphism, interfaces, creating user interfaces, exceptions, and streams. Upon completion of this course the students will be able to apply software engineering criteria to design and implement Java applications that are secure, robust, and scalable.

MET CS 200 Fundamentals of Information Technology; recommended to students with no programming background. Or Instructor's Consent.  [ 4 cr. ]

Section Type Instructor Location Days Times
B1 IND Kalathur FLR ARR T 6:00 pm – 9:00 pm
EL IND Kalathur FLR ARR T 6:00 pm – 9:00 pm
OL IND Kalathur ARR
MET CS 601 Web Application Development
Fall ‘14

This course focuses on building core competencies in web design and development. It begins with a complete immersion into HTML essentially XHTML and Dynamic HTML (DHTML). Students are exposed to Cascading Style Sheets (CSS), as well as Dynamic CSS. The fundamentals of JavaScript language including object-oriented JavaScript is covered comprehensively. AJAX with XML and JSON are covered, as they are the primary means to transfer data from client and server. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
A1 IND Sheehan FLR ARR M 6:00 pm – 9:00 pm
EL IND Heda FLR ARR M 6:00 pm – 9:00 pm
OL IND Bishop ARR

Students who have completed courses on core curriculum subjects as part of their undergraduate degree program must replace the corresponding core courses with electives. It is recommended that each replacement course be in the same technical area as the original core course. Students who have work-related experience in any of the core curriculum courses may apply for a waiver by submitting appropriate documentation. When a course waiver is granted, the student must substitute a graduate-level elective for the core course.

Concentration Requirements

In addition to the MS in Computer Information Systems core curriculum (24 credits), students pursuing a concentration in Security must also take the following five required courses and electives:

Required Security Courses

(Two courses/8 credits)

MET CS 684 IT Security Policies and Procedures
Fall ‘14

This course enables IT professional leaders to identify emerging security risks and implement highly secure networks to support organizational goals. Discussion of methodologies for identifying, quantifying, mitigating and controlling risks. Students implement a comprehensive IT risk management plans (RMP) that identify alternate sites for processing mission-critical applications, and techniques to recover infrastructure, systems, networks, data and user access. The course also discusses related topics such as: disaster recovery, handling information security; protection of property, personnel and facilities; protection of sensitive and classified information, privacy issues, and criminal terrorist and hostile activities.  [ 4 cr. ]

Section Type Instructor Location Days Times
D1 IND Burgoyne MCS B21 R 6:00 pm – 9:00 pm
OL IND Burgoyne ARR
MET CS 695 Enterprise Information Security
Fall ‘14

The course provides an in-depth presentation of security issues in computer systems, networks, and applications. Formal security models are presented and illustrated on operating system security aspects, more specifically memory protection, access control and authentication, file system security, backup and recovery management, intrusion and virus protection mechanisms. Application level security focuses on language level security and various security policies; conventional and public keys encryption, authentication, message digest and digital signatures. Internet and intranet topics include security in IP, routers, proxy servers, and firewalls, application-level gateways, Web servers, file and mail servers. Discussion of remote access issues, such as dial-up servers, modems, VPN gateways and clients.  [ 4 cr. ]

Section Type Instructor Location Days Times
A1 IND Jacobs FLR ARR M 6:00 pm – 9:00 pm
EL IND Jacobs FLR ARR M 6:00 pm – 9:00 pm

Electives

(Two courses/8 credits)

Choose one of the following courses:

MET CS 674 Database Security
Fall ‘14

The course provides a strong foundation in database security and auditing. This course utilizes Oracle scenarios and step-by-step examples. The following topics are covered: security, profiles, password policies, privileges and roles, Virtual Private Databases, and auditing. The course also covers advanced topics such as SQL injection, database management security issues such as securing the DBMS, enforcing access controls, and related issues.  [ 4 cr. ]

Section Type Instructor Location Days Times
B1 IND Wolfe FLR ARR T 6:00 pm – 9:00 pm
EL IND Wolfe FLR ARR T 6:00 pm – 9:00 pm
OL IND Carroll ARR
MET CS 693 Digital Forensics and Investigations
Fall ‘14

Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Laboratory and hands-on assignments either in solo or in teams. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
EL IND Arena FLR ARR S 9:00 am – 12:00 pm
OL IND Navarro ARR

And one additional course selected from the following:

MET CS 599 Biometrics

In this course we will study the fundamental and design applications of various biometric systems based on fingerprints, voice, face, hand geometry, palm print, iris, retina, and other modalities. Multimodal biometric systems that use two or more of the above characteristics will be discussed. Biometric system performance and issues related to the security and privacy aspects of these systems will also be addressed. 4 credits.  [ 4 cr. ]

MET CS 690 Network Security
Fall ‘14

This course will cover advanced network security issues and solutions. The main focus on the first part of the course will be on Security basics, i.e. security services, access controls, vulnerabilities, threats and risk, network architectures and attacks. In the second part of the course, particular focus and emphasis will be given to network security capabilities and mechanisms (Access Control on wire-line and wireless networks), IPsec, Firewalls, Deep Packet Inspection and Transport security. The final portion of the course will address Network Application security (Email, Ad-hoc, XML/SAML and Services Oriented Architecture security. As part of our course review we will explore a number of Network Use Cases. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
C1 IND Skorupka MCS B23 W 6:00 pm – 9:00 pm
MET CS 703 Network Forensics
Fall ‘14

This course provides a comprehensive understanding of network forensic analysis principles. Within the context of forensics security, network infrastructures, topologies, and protocols are introduced. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
EL IND Jacobs FLR ARR S 1:00 pm – 4:00 pm
MET CS 713 Advanced Digital Forensics

This course provides an introduction to the advanced digital forensic topic relating to malicious software (malware), which represents an increasing information security threat to computer systems and networks. Students will review software engineering design fundamentals and reverse engineering techniques utilized to conduct static and dynamic forensic analysis on computer systems and networks. Students will learn about the importance of forensic principles, legal considerations, digital evidence controls, and documentation of forensic procedures. This course will incorporate demonstrations and laboratory exercises to reinforce practical applications of course instruction and will require an independent research paper related to the course topic.  [ 4 cr. ]

MET CS 789 Cryptography
Fall ‘14

The course covers the main concepts and principles of cryptography with the main emphasis put on public key cryptography. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
B1 IND Temkin CGS 515 T 6:00 pm – 9:00 pm
MET CS 799 Advanced Cryptography

This course builds on the material covered in CS 789 Cryptography. It begins with the coverage of commutative rings, finite fields, rings of polynomials, and finding of the greatest common divisor in the ring of polynomials. Irreducible polynomials are discussed. Field extensions and fields Fᴩ [x]/P are thoroughly covered. The main emphasis is put on elliptic curves over Fᴩ and F₂ and the ElGamal cipher on elliptic curves is presented. Block ciphers DES and double and triple DES are introduced. AES and WHIRLPOOL block ciphers and modes of operation are covered. The course continues with the introduction of message integrity and message authentication. In the last part of the course cryptographic hash functions SHA-512 and WHIRLPOOL as well as various digital signatures are introduced. Finally, entity authentication and key management issues are discussed.  [ 4 cr. ]

Degree Requirements—eLive

Degree requirements for the blended, eLive format MS in Computer Information Systems concentration in Security can be viewed here.

Degree Requirements—Online

Degree requirements for the online MS in Computer Information Systems concentration in Security can be viewed here.

View all Computer Science & IT graduate courses.