Master of Science in Telecommunication focus area in Security
Students in the Master of Science in Telecommunication program may pursue a concentration in Security, which provides in-depth knowledge of emerging security threats and solutions to prepare technical leaders to identify, develop, and implement highly secure networks that support organizational goals.
Students who complete the Telecommunication master’s degree concentration in Security will be able to demonstrate:
- Advanced knowledge of data communication protocols and networks, including, but not limited to, error control and flow control, distributed synchronization, error detection and correction, forwarding and techniques to implement it, performance analysis of networks, and management of large networks.
- Competence sufficient to design, specify, and develop data transfer protocols for specific purposes; design, specify, plan, and define networks of any size; and analyze, evaluate, and select network technologies.
- Advanced knowledge of information security concepts, governance, biometric systems, and database systems security, as well as network security and cryptography.
- Proficiency in risk management, such as asset assessments, architectural solutions, modeling, and design.
- Competence in security policies, processes, technology, and operations.
A total of 40 credits is required. Students must complete both the Core Curriculum and the Focus Area Requirements.
(Seven courses/28 credits)
MET CS 535 Computer Networks
Overview of data communication and computer networks, including network hardware and software, as well as reference models, example networks, data communication services and network standardization. The OSI and the Internet (TCP/IP) network models are discussed. The course covers each network layer in details, starting from the Physical layer to towards the Application layer, and includes an overview of network security topics. Other topics covered include encoding digital and analog signals, transmission media, protocols. circuit, packet, message, switching techniques, internetworking devices, topologies. LANs/WANs, Ethernet, IP, TCP, UDP, and Web applications. Labs on network analysis. [ 4 cr. ]
|D1||IND||Day||SMG 228||R||6:00 pm – 9:00 pm|
MET CS 546 Quantitative Methods for Information Systems
The goal of this course is to provide Computer Information Systems students with the mathematical fundamentals required for successful quantitative analysis of problems in the field of business computing. The first part of the course introduces the mathematical prerequisites for understanding probability and statistics. Topics include combinatorial mathematics, functions, and the fundamentals of differentiation and integration. The second part of the course concentrates on the study of elementary probability theory, discrete and continuous distributions. 4 cr [ 4 cr. ]
|A1||IND||Kohn||FLR 109||M||6:00 pm – 9:00 pm|
|EL||IND||Kohn||FLR 109||M||6:00 pm – 9:00 pm|
MET CS 575 Operating Systems
Overview of operating system characteristics, design objectives, and structures. Topics include concurrent processes, coordination of asynchronous events, file systems, resource sharing, memory management, security, scheduling and deadlock problems. [ 4 cr. ]
|C1||IND||Suresh||MCS B25||W||6:00 pm – 9:00 pm|
MET CS 635 Network Design and Implementation
Computer Networks continue to grow and diversify at unprecedented rate. Much of that diversification is in how the media are utilized. One can not truly understand networking, analyze alternatives or design good networks without a solid founding in how the media are utilized. This course will explore current and expected media technologies with the intent of understanding what they offer and the trade-offs they present. The course will cover both wireline (Ethernet, DOCSIS, MPLS, ATM) and wireless (802.11, Wi-Max, Zigbee, Bluetooth, etc). The course will analyze the technologies to consider their error characteristics, support for quality of service, congestion control, and security, and their manageability. [ 4 cr. ]
|C1||IND||Day||MCS B23||W||6:00 pm – 9:00 pm|
MET CS 685 Network Design and Management
This course covers computer networks management including configuration, fault, performance, as well as security management. Particular focus and emphasis is given to security management. Problem solving techniques and network management tools are discussed and practiced during extensive laboratory sessions. Topics include LAN and WAN network management, fault detection, configuration, security, performance, accounting management. Strong focus on problem-solving techniques and network management tools based on SNMP, detailed discussion of multi-user computer systems security techniques, basics of cryptography, authentication techniques, and Kerberos, Secure operating systems. Software protection. Electronic mail. Web Security, IPsec, e-commerce: payment protocols, electronic cash. Risk assessment. [ 4 cr. ]
MET CS 690 Network Security
This course will cover advanced network security issues and solutions. The main focus on the first part of the course will be on Security basics, i.e. security services, access controls, vulnerabilities, threats and risk, network architectures and attacks. In the second part of the course, particular focus and emphasis will be given to network security capabilities and mechanisms (Access Control on wire-line and wireless networks), IPsec, Firewalls, Deep Packet Inspection and Transport security. The final portion of the course will address Network Application security (Email, Ad-hoc, XML/SAML and Services Oriented Architecture security. As part of our course review we will explore a number of Network Use Cases. 4 credits. [ 4 cr. ]
|B1||IND||Skorupka||SHA 210||T||6:00 pm – 9:00 pm|
MET CS 775 Advanced Networking
In-depth coverage of the architecture, interfaces, protocols, and technologies of high-speed broadband networks. Topics include broadband wide-area network (WAN) technologies such as gigabit routers with IP switching, MPLS, ATM and Frame Relay; broadband LAN technologies: Fast Ethernet and Ethernet Switching, Gigabit Ethernet, and FDDI; broadband access technologies: DSL and Cable modems, as well as discussion of network performance, congestion control and traffic management, provision of different levels of quality of service (QoS),resource reservation, unicast and multicast routing, and multimedia compression and security in broadband networks. Students are required to complete a research project in one of the advanced Internet technologies. Labs on network performance analysis. [ 4 cr. ]
Students who have completed courses on core curriculum subjects as part of their undergraduate degree program must replace the corresponding core courses with electives. It is recommended that each replacement course be in the same technical area. Students who have work-related experience in any of the core curriculum courses may apply for a waiver by submitting appropriate documentation. When a course waiver is granted the student must substitute a graduate-level computer science course for the core course.
In addition to the MS in Telecommunication core curriculum (28 credits), students pursuing a concentration in Security must take the following three required and elective courses:
Required Security Courses
(Two courses/8 credits)
MET CS 703 Network Forensics
This course provides a comprehensive understanding of network forensic analysis principles. Within the context of forensics security, network infrastructures, topologies, and protocols are introduced. 4 credits. [ 4 cr. ]
MET CS 789 Cryptography
The course covers the main concepts and principles of cryptography with the main emphasis put on public key cryptography. 4 credits. [ 4 cr. ]
(One course/4 credits)
One course selected from the following:
MET CS 674 Database Security
The course provides a strong foundation in database security and auditing. This course utilizes Oracle scenarios and step-by-step examples. The following topics are covered: security, profiles, password policies, privileges and roles, Virtual Private Databases, and auditing. The course also covers advanced topics such as SQL injection, database management security issues such as securing the DBMS, enforcing access controls, and related issues. [ 4 cr. ]
|A1||IND||Wolfe||FLR 133||M||6:00 pm – 9:00 pm|
|AT||IND||Wolfe||FLR 133||M||6:00 pm – 9:00 pm|
|EL||IND||Wolfe||FLR 133||M||6:00 pm – 9:00 pm|
MET CS 684 IT Security Policies and Procedures
This course enables IT professional leaders to identify emerging security risks and implement highly secure networks to support organizational goals. Discussion of methodologies for identifying, quantifying, mitigating and controlling risks. Students implement a comprehensive IT risk management plans (RMP) that identify alternate sites for processing mission-critical applications, and techniques to recover infrastructure, systems, networks, data and user access. The course also discusses related topics such as: disaster recovery, handling information security; protection of property, personnel and facilities; protection of sensitive and classified information, privacy issues, and criminal terrorist and hostile activities. [ 4 cr. ]
|C1||IND||Burgoyne||FLR 264||W||6:00 pm – 9:00 pm|
|EL||IND||Burgoyne||FLR 264||W||6:00 pm – 9:00 pm|
MET CS 693 Digital Forensics and Investigations
Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Laboratory and hands-on assignments either in solo or in teams. 4 credits. [ 4 cr. ]
MET CS 695 Enterprise Information Security
The course provides an in-depth presentation of security issues in computer systems, networks, and applications. Formal security models are presented and illustrated on operating system security aspects, more specifically memory protection, access control and authentication, file system security, backup and recovery management, intrusion and virus protection mechanisms. Application level security focuses on language level security and various security policies; conventional and public keys encryption, authentication, message digest and digital signatures. Internet and intranet topics include security in IP, routers, proxy servers, and firewalls, application-level gateways, Web servers, file and mail servers. Discussion of remote access issues, such as dial-up servers, modems, VPN gateways and clients. [ 4 cr. ]
|A1||IND||Jacobs||FLR 264||M||6:00 pm – 9:00 pm|
|EL||IND||Jacobs||FLR 264||M||6:00 pm – 9:00 pm|
MET CS 713 Advanced Digital Forensics
This course provides an introduction to the advanced digital forensic topic relating to malicious software (malware), which represents an increasing information security threat to computer systems and networks. Students will review software engineering design fundamentals and reverse engineering techniques utilized to conduct static and dynamic forensic analysis on computer systems and networks. Students will learn about the importance of forensic principles, legal considerations, digital evidence controls, and documentation of forensic procedures. This course will incorporate demonstrations and laboratory exercises to reinforce practical applications of course instruction and will require an independent research paper related to the course topic. [ 4 cr. ]
MET CS 799 Advanced Cryptography
This course builds on the material covered in CS 789 Cryptography. It begins with the coverage of commutative rings, finite fields, rings of polynomials, and finding of the greatest common divisor in the ring of polynomials. Irreducible polynomials are discussed. Field extensions and fields Fᴩ [x]/P are thoroughly covered. The main emphasis is put on elliptic curves over Fᴩ and F₂ and the ElGamal cipher on elliptic curves is presented. Block ciphers DES and double and triple DES are introduced. AES and WHIRLPOOL block ciphers and modes of operation are covered. The course continues with the introduction of message integrity and message authentication. In the last part of the course cryptographic hash functions SHA-512 and WHIRLPOOL as well as various digital signatures are introduced. Finally, entity authentication and key management issues are discussed. [ 4 cr. ]
|B1||IND||Temkin||CGS 311||T||6:00 pm – 9:00 pm|
|BHA||IND||Temkin||M||6:00 pm – 9:00 pm|
View all Computer Science & IT graduate courses.