Master of Science in Telecommunication

CNSS - LogoThe Master of Science (MS) in Telecommunication degree program integrates knowledge of the computer science, engineering, managerial, and legal aspects of networking and telecommunications. The telecommunication degree program is designed to provide knowledge and critical skills essential for success in this rapidly expanding field. Program participants gain a solid knowledge of the basic networking technologies, systems, and services; increase their ability to compare networking and telecommunication products and services; and enhance their ability to manage complex telecommunication projects.

Students who complete the master’s degree in Telecommunication will be able to demonstrate:

  • Advanced knowledge of data communication protocols and networks, including, but not limited to, error control and flow control, distributed synchronization, error detection and correction, forwarding and techniques to implement it, performance analysis of networks, and management of large networks.
  • Competence sufficient to design, specify, and develop data transfer protocols for specific purposes; design, specify, plan, and define networks of any size; and analyze, evaluate, and select network technologies.

Concentration in Security

Students may choose to pursue a concentration in Security.

Dual Degree Option

Appreciating the converging nature of management skills and technology, the Computer Science Department has a special relationship with Metropolitan College’s Administrative Sciences and Actuarial Science departments. Degree candidates in either program may apply 8 credits from one degree toward a second degree in one of these disciplines, thereby reducing their work by two courses. Students must be accepted by both departments, but they may request that application materials such as references and transcripts be forwarded from the first program to the second.

Admission Information

Prerequisite courses or evidence of proficiency in these areas must accompany the application to the program. If college-level credit courses are not in evidence, the department will determine what prerequisite courses must be completed in addition to the graduate degree requirements. Students claiming equivalent proficiency in prerequisite courses from non-academic sources must take an examination to demonstrate such proficiency.

Official transcripts of previous academic work, three letters of recommendation, personal statement and résumé are required as part of the application.

A maximum of two graduate-level courses (8 credits) taken at Metropolitan College before acceptance into the program may be applied toward the degree.

Minimum passing grade for a course in the graduate program is C (2.0), but an average grade of B (3.0) must be maintained to be in good academic standing and satisfy the degree requirements.

Apply here.

Academic Standing

No grade lower than C may be used toward degree requirements. Students must maintain an overall grade point average of 3.0 in order to be in good academic standing and to graduate. Students with a grade point average of less than 3.0 are on academic probation and must be in a position to achieve a 3.0 within the 48 required credit hours for graduation.

Prerequisites

Applicants to the program are required to have a baccalaureate degree and proficiency in the following areas:

 

  • MET CS 201 Introduction to Programming
  • MET CS 231 Programming with C++ or
    MET CS 232 Programming with Java
  • MET CS 472 Computer Architecture

Degree Requirements

A total of 40 credits is required.

Core Curriculum

(Seven courses/28 credits)

MET CS 535 Computer Networks
Fall ‘14

Overview of data communication and computer networks, including network hardware and software, as well as reference models, example networks, data communication services and network standardization. The OSI and the Internet (TCP/IP) network models are discussed. The course covers each network layer in details, starting from the Physical layer to towards the Application layer, and includes an overview of network security topics. Other topics covered include encoding digital and analog signals, transmission media, protocols. circuit, packet, message, switching techniques, internetworking devices, topologies. LANs/WANs, Ethernet, IP, TCP, UDP, and Web applications. Labs on network analysis.   [ 4 cr. ]

Section Type Instructor Location Days Times
B1 IND Day CGS 527 T 6:00 pm – 9:00 pm
W4 IND Wu R 6:00 pm – 9:00 pm
MET CS 546 Quantitative Methods for Information Systems
Fall ‘14

The goal of this course is to provide Computer Information Systems students with the mathematical fundamentals required for successful quantitative analysis of problems in the field of business computing. The first part of the course introduces the mathematical prerequisites for understanding probability and statistics. Topics include combinatorial mathematics, functions, and the fundamentals of differentiation and integration. The second part of the course concentrates on the study of elementary probability theory, discrete and continuous distributions. 4 cr  [ 4 cr. ]

Section Type Instructor Location Days Times
D1 IND Kohn FLR 109 R 6:00 pm – 9:00 pm
EL IND Kohn FLR 109 R 6:00 pm – 9:00 pm
OL IND Milton ARR
BCL IND Parrott U 8:00 am – 3:30 pm
BHA IND Staff S 8:30 am – 4:00 pm
MET CS 575 Operating Systems
Fall ‘14

Overview of operating system characteristics, design objectives, and structures. Topics include concurrent processes, coordination of asynchronous events, file systems, resource sharing, memory management, security, scheduling and deadlock problems.   [ 4 cr. ]

Section Type Instructor Location Days Times
A1 IND Zhang MCS B25 M 6:00 pm – 9:00 pm
W2 IND Staff T 6:00 pm – 9:00 pm
MET CS 635 Network Design and Implementation

Computer Networks continue to grow and diversify at unprecedented rate. Much of that diversification is in how the media are utilized. One can not truly understand networking, analyze alternatives or design good networks without a solid founding in how the media are utilized. This course will explore current and expected media technologies with the intent of understanding what they offer and the trade-offs they present. The course will cover both wireline (Ethernet, DOCSIS, MPLS, ATM) and wireless (802.11, Wi-Max, Zigbee, Bluetooth, etc). The course will analyze the technologies to consider their error characteristics, support for quality of service, congestion control, and security, and their manageability.  [ 4 cr. ]

MET CS 685 Network Design and Management
Fall ‘14

This course covers computer networks management including configuration, fault, performance, as well as security management. Particular focus and emphasis is given to security management. Problem solving techniques and network management tools are discussed and practiced during extensive laboratory sessions. Topics include LAN and WAN network management, fault detection, configuration, security, performance, accounting management. Strong focus on problem-solving techniques and network management tools based on SNMP, detailed discussion of multi-user computer systems security techniques, basics of cryptography, authentication techniques, and Kerberos, Secure operating systems. Software protection. Electronic mail. Web Security, IPsec, e-commerce: payment protocols, electronic cash. Risk assessment.  [ 4 cr. ]

Section Type Instructor Location Days Times
A1 IND Staff CAS 229 M 6:00 pm – 9:00 pm
MET CS 690 Network Security
Fall ‘14

This course will cover advanced network security issues and solutions. The main focus on the first part of the course will be on Security basics, i.e. security services, access controls, vulnerabilities, threats and risk, network architectures and attacks. In the second part of the course, particular focus and emphasis will be given to network security capabilities and mechanisms (Access Control on wire-line and wireless networks), IPsec, Firewalls, Deep Packet Inspection and Transport security. The final portion of the course will address Network Application security (Email, Ad-hoc, XML/SAML and Services Oriented Architecture security. As part of our course review we will explore a number of Network Use Cases. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
C1 IND Skorupka MCS B23 W 6:00 pm – 9:00 pm
MET CS 775 Advanced Networking
Fall ‘14

In-depth coverage of the architecture, interfaces, protocols, and technologies of high-speed broadband networks. Topics include broadband wide-area network (WAN) technologies such as gigabit routers with IP switching, MPLS, ATM and Frame Relay; broadband LAN technologies: Fast Ethernet and Ethernet Switching, Gigabit Ethernet, and FDDI; broadband access technologies: DSL and Cable modems, as well as discussion of network performance, congestion control and traffic management, provision of different levels of quality of service (QoS),resource reservation, unicast and multicast routing, and multimedia compression and security in broadband networks. Students are required to complete a research project in one of the advanced Internet technologies. Labs on network performance analysis.  [ 4 cr. ]

Section Type Instructor Location Days Times
D1 IND Day MCS B23 R 6:00 pm – 9:00 pm

Students who have completed courses in core curriculum subjects as part of their undergraduate degree program must replace the corresponding core courses with electives. It is recommended that each replacement course be in the same technical area. Students who have work-related experience in any of the core curriculum courses may apply for a waiver by submitting appropriate documentation. When a course waiver is granted the student must substitute a graduate-level computer science course for the core course.

General Electives

(Three courses/12 credits)

Students who are not pursuing a concentration in Security must select three general electives. Electives other than those listed below must be approved by the student’s advisor. Students should make sure that they have all prerequisites required by the selected course. At least two courses must be at the 600-level or above:

MET CS 599 Biometrics

In this course we will study the fundamental and design applications of various biometric systems based on fingerprints, voice, face, hand geometry, palm print, iris, retina, and other modalities. Multimodal biometric systems that use two or more of the above characteristics will be discussed. Biometric system performance and issues related to the security and privacy aspects of these systems will also be addressed. 4 credits.  [ 4 cr. ]

MET CS 601 Web Application Development
Fall ‘14

This course focuses on building core competencies in web design and development. It begins with a complete immersion into HTML essentially XHTML and Dynamic HTML (DHTML). Students are exposed to Cascading Style Sheets (CSS), as well as Dynamic CSS. The fundamentals of JavaScript language including object-oriented JavaScript is covered comprehensively. AJAX with XML and JSON are covered, as they are the primary means to transfer data from client and server. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
A1 IND Sheehan FLR ARR M 6:00 pm – 9:00 pm
EL IND Heda FLR ARR M 6:00 pm – 9:00 pm
OL IND Bishop ARR
MET CS 632 Information Technology Project Management
Fall ‘14

This course provides students with a comprehensive overview of the principles, processes, and practices of software project management. Students learn techniques for planning, organizing, scheduling, and controlling software projects. There is substantial focus on software cost estimation and software risk management. Students will obtain practical project management skills and competencies related to the definition of a software project, establishment of project communications, managing project changes, and managing distributed software teams and projects.   [ 4 cr. ]

Section Type Instructor Location Days Times
C1 IND Campbell FLR ARR W 6:00 pm – 9:00 pm
EL IND Campbell FLR ARR W 6:00 pm – 9:00 pm
MET CS 633 Distributed Software Development and Management
Fall ‘14

This course prepares students to justify, lead, participate in, and maintain geographically distributed development (GDD) projects. Students study the technical and business implications of GDD. They also work in geographically dispersed teams to produce documented applications. No programming background is required. Prerequisites: MET CS 520 or MET CS 601 and MET CS 682. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
D1 IND Elentukh FLR ARR R 6:00 pm – 9:00 pm
EL IND Elentukh FLR ARR R 6:00 pm – 9:00 pm
OL IND Elentukh ARR
MET CS 664 Artificial Intelligence
Fall ‘14

Study of the ideas and techniques that enable computers to behave intelligently. Search, constraint propagations, and reasoning. Knowledge representation, natural language, learning, question answering, inference, visual perception, and/or problem solving. Laboratory course.   [ 4 cr. ]

Section Type Instructor Location Days Times
D1 IND Berry CAS 218 R 6:00 pm – 9:00 pm
MET CS 684 IT Security Policies and Procedures
Fall ‘14

This course enables IT professional leaders to identify emerging security risks and implement highly secure networks to support organizational goals. Discussion of methodologies for identifying, quantifying, mitigating and controlling risks. Students implement a comprehensive IT risk management plans (RMP) that identify alternate sites for processing mission-critical applications, and techniques to recover infrastructure, systems, networks, data and user access. The course also discusses related topics such as: disaster recovery, handling information security; protection of property, personnel and facilities; protection of sensitive and classified information, privacy issues, and criminal terrorist and hostile activities.  [ 4 cr. ]

Section Type Instructor Location Days Times
D1 IND Burgoyne MCS B21 R 6:00 pm – 9:00 pm
OL IND Burgoyne ARR
MET CS 693 Digital Forensics and Investigations
Fall ‘14

Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Laboratory and hands-on assignments either in solo or in teams. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
EL IND Arena FLR ARR S 9:00 am – 12:00 pm
OL IND Navarro ARR
MET CS 695 Enterprise Information Security
Fall ‘14

The course provides an in-depth presentation of security issues in computer systems, networks, and applications. Formal security models are presented and illustrated on operating system security aspects, more specifically memory protection, access control and authentication, file system security, backup and recovery management, intrusion and virus protection mechanisms. Application level security focuses on language level security and various security policies; conventional and public keys encryption, authentication, message digest and digital signatures. Internet and intranet topics include security in IP, routers, proxy servers, and firewalls, application-level gateways, Web servers, file and mail servers. Discussion of remote access issues, such as dial-up servers, modems, VPN gateways and clients.  [ 4 cr. ]

Section Type Instructor Location Days Times
A1 IND Jacobs FLR ARR M 6:00 pm – 9:00 pm
EL IND Jacobs FLR ARR M 6:00 pm – 9:00 pm
MET CS 699 Data Mining and Business Intelligence
Fall ‘14

Data mining and investigation is a key goal behind any data warehouse effort. The course provides an introduction to concepts behind data mining, text mining, and web mining. Algorithms will be tested on data sets using the Weka Data mining software and Microsoft SQL Server 2005 (Business Intelligence Development Studio). 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
AT IND Lee FLR ARR R 6:00 pm – 9:00 pm
D1 IND Lee FLR ARR R 6:00 pm – 9:00 pm
EL IND Lee FLR ARR R 6:00 pm – 9:00 pm
MET CS 701 Rich Internet Application Development
Fall ‘14

The Rich Internet Application (RIA) Development course concentrates primarily on building rich client web applications in the browser for desktop and mobile devices. The course is divided into various modules covering in depth the following technologies: HTML5, jQuery UI & Mobile, and AngularJS. Along with the fundamentals underlying these technologies, several applications will be showcased as case studies. Students work with these technologies starting with simple applications and then examining real world complex applications. At the end of this course, students would have mastered the latest and widely used RIA methodologies.   [ 4 cr. ]

Section Type Instructor Location Days Times
A1 IND Kalathur FLR ARR M 6:00 pm – 9:00 pm
MET CS 703 Network Forensics
Fall ‘14

This course provides a comprehensive understanding of network forensic analysis principles. Within the context of forensics security, network infrastructures, topologies, and protocols are introduced. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
EL IND Jacobs FLR ARR S 1:00 pm – 4:00 pm
MET CS 713 Advanced Digital Forensics

This course provides an introduction to the advanced digital forensic topic relating to malicious software (malware), which represents an increasing information security threat to computer systems and networks. Students will review software engineering design fundamentals and reverse engineering techniques utilized to conduct static and dynamic forensic analysis on computer systems and networks. Students will learn about the importance of forensic principles, legal considerations, digital evidence controls, and documentation of forensic procedures. This course will incorporate demonstrations and laboratory exercises to reinforce practical applications of course instruction and will require an independent research paper related to the course topic.  [ 4 cr. ]

MET CS 751 Web Services

Architecture of Web Services; review of XML Shemas; SOAP (Simple Object Access Protocol); WSDL (Web Services Description Language); UDDI (Universal Description, Discovery, and Integration); Web Services in .NET; Sun and Apache tools; Company-specific Web Service API?s; Java API?s for XML Messaging; Java Application Servers; review of Security, transactions, and business process languages (e.g. BPEL) among Web Services.   [ 4 cr. ]

MET CS 780 Database Administration

This course prepares students to perform the day-to-day administration of a database system. While most of the examples in this course are based on Oracle database administration, the course also covers the differences in administering Microsoft SQL Server and MySQL and examples. The course covers administration on Windows, Linux and Unix platforms. 4 credits.   [ 4 cr. ]

MET CS 783 Enterprise Architecture
Fall ‘14

This course builds upon the strong technical foundation of our MSCIS and MSCS curricula, by providing students with the CIO-level management perspective and skills of enterprise architecture, in the context of the technologies that implement those architectures. The course provides students with the understanding and skills needed to define and implement successful enterprise architectures that provide real value to organizations, such as substantially reducing IT costs while improving performance, agility and alignment of information technology to business goals. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
C1 IND Nizzari CAS B14 W 6:00 pm – 9:00 pm
MET CS 789 Cryptography
Fall ‘14

The course covers the main concepts and principles of cryptography with the main emphasis put on public key cryptography. 4 credits.  [ 4 cr. ]

Section Type Instructor Location Days Times
B1 IND Temkin CGS 515 T 6:00 pm – 9:00 pm
MET CS 795 Directed Study

Prereq: Consent of advisor. Requires prior approval of student-initiated proposal. Independent study on special projects under faculty guidance.   [ Var cr. ]

MET CS 796 Directed Study

Prereq: consent of the instructor. Requires prior approval of student-initiated proposal. Independent study on special projects under faculty guidance. variable cr  [ Var cr. ]

MET CS 799 Advanced Cryptography

This course builds on the material covered in CS 789 Cryptography. It begins with the coverage of commutative rings, finite fields, rings of polynomials, and finding of the greatest common divisor in the ring of polynomials. Irreducible polynomials are discussed. Field extensions and fields Fᴩ [x]/P are thoroughly covered. The main emphasis is put on elliptic curves over Fᴩ and F₂ and the ElGamal cipher on elliptic curves is presented. Block ciphers DES and double and triple DES are introduced. AES and WHIRLPOOL block ciphers and modes of operation are covered. The course continues with the introduction of message integrity and message authentication. In the last part of the course cryptographic hash functions SHA-512 and WHIRLPOOL as well as various digital signatures are introduced. Finally, entity authentication and key management issues are discussed.  [ 4 cr. ]

Master’s Thesis in Telecommunication

(8 credits)

Students majoring in Telecommunication may elect a thesis option, to be completed within twelve months. This option is available to Master of Science in Telecommunication candidates who have completed at least seven courses toward their degree and have a GPA of 3.7 or higher. Students are responsible for finding a thesis advisor and a principal reader within the department. The advisor must be a full-time faculty member; the principal reader may be part-time faculty with a PhD (unless waived by the department).

MET CS 810 Master's Thesis in Computer Science

This thesis must be completed within 12 months. Students majoring in Computer Science may elect a thesis option. This option is available to Master of Science in Computer Science candidates who have completed at least seven courses toward their degree and have a GPA of 3.7 or higher. Students are responsible for finding a thesis advisor and a principal reader within the department. The advisor must be a full-time faculty member; the principal reader may be part-time faculty member with a doctorate. Permission must be obtained by the department. 4cr.  [ 4 cr. ]

MET CS 811 Master's Thesis in Computer Science

This thesis must be completed within 12 months. Students majoring in Computer Science may elect a thesis option. This option is available to Master of Science in Computer Science candidates who have completed at least seven courses toward their degree and have a GPA of 3.7 or higher. Students are responsible for finding a thesis advisor and a principal reader within the department. The advisor must be a full-time faculty member; the principal reader may be part-time faculty member with a doctorate. Permission must be obtained by the department. 4cr.  [ 4 cr. ]

View all Computer Science & IT graduate courses.