Build Expertise in Cyber Incident Investigation and Data Recovery
Available online, on campus, and in a blended format, the Master of Science in Computer Information Systems concentration in in Digital Forensics at Boston University’s Metropolitan College (MET) provides comprehensive knowledge of digital crime scene investigation that can be applied across civil, criminal, or administrative cases—preparing you for IT leadership positions and artificial intelligence-integrated positions in all sectors.
Program at a Glance
- Online, On Campus, and Blended
- Part-Time or Full-Time Study
- STEM Designated
- 32 Units
- 8–16 Months to Completion
- 19 Core Faculty
- No GRE/GMAT
- Tuition & Fees Range—Part-Time Study*: $27,204–$30,708
*Based on 2025–2026 Boston University tuition and fees. Merit scholarship may reduce cost.
Advance Your Career with Digital Forensics Expertise
Computers and various digital devices are used throughout organizations large and small to operate daily business. The fundamental role of digital systems in business brings with it serious security challenges. According to the FBI’s Internet Crime Complaint Center (IC3), more than $37 billion in losses have been reported since 2019, with $12.5 billion reported in 2023 alone. Much of that is a result of hackers, criminals, and other “bad actors” attacking organizations through business email compromise (BEC), ransomware, extortion, personal data breaches, phishing, and tech support schemes (to name just a few).
To mitigate the risks of a cyber-attack, it is important for IT specialists to obtain a comprehensive overview of digital forensics, along with the ability to successfully investigate cyber incidents, recover and analyze digital evidence, and support cybersecurity and legal teams.
The MS in Computer Information Systems concentration in Digital Forensics introduces the essential skills to conduct a thorough digital crime scene investigation resulting from a cybercrime incident. Coursework examines forensic analysis policy and procedures, forensic analysis tools, data recovery, digital investigation practices, and other key topics. By completing the MSCIS Digital Forensics concentration, you will have the expertise to collect viable evidence from digital crime scenes and the authority to serve as an expert witness in related court cases.
By earning the BU Computer Information Systems master’s specializing in Digital Forensics, you develop the analytical, investigative, and reporting skills sought after in a wide range of industries, including financial services, healthcare, government and defense, technology and software, legal, and telecommunications. The Digital Forensics curriculum will prepare you to move into roles such as digital forensics investigator, incident response analyst, cybersecurity consultant, threat intelligence analyst, security operation center (SOC) analyst, compliance and risk analyst, malware analyst, legal and eDiscovery specialist, and forensic tool developer, among others.
Why BU’s Computer Information Systems Degree Has Been Top 10 since 2014
- Active Learning Environment: BU MET’s Computer Information Systems courses introduce case studies and real-world projects that ensure you gain in-depth, practical experience with the latest technologies.
- Career Counseling: MET’s Career Development office and BU’s Center for Career Development offer a variety of job-hunting resources, including one-on-one career counseling by appointment for both online and on-campus students.
- Engaged Faculty: In BU MET’s Computer Information Systems master’s program, you benefit from working closely with highly qualified faculty and industry leaders with substantial backgrounds and achievements in data analysis.
- AI-Integrated: Many courses prepare you to leverage artificial intelligence for the analysis, development, and integration of modern information systems.
- Extensive Network: Study information systems alongside peers with solid business experience, learn from faculty who have valuable IT contacts across several sectors, and benefit from an alumni community with strong professional connections.
- STEM Designated: Eligible graduates on student visas have access to an Optional Practical Training (OPT) of 12 months and an extension for up to 24 additional months.
- 24:1 Average Class Ratio: Enjoy an exceptional student-to-instructor ratio, ensuring close interaction with faculty and access to support.
- Valuable Resources: Make use of Boston University’s extensive resources, including the Center for Career Development, Educational Resource Center, Fitness & Recreation Center, IT Help Centers, Mugar Memorial Library, Howard Thurman Center for Common Ground, George Sherman Union, Rafik B. Hariri Institute for Computing and Computational Science & Engineering, and many others.
- Flexible Options: Study at the pace that works for you, evenings on campus, fully online, or in the blended format that combines on-campus and online learning. Courses begin fall, spring, and summer; online courses have two starts per term.
- Track Record: Learn from the best—BU MET’s Department of Computer Science was established in 1979 and is the longest-running computer science department at BU. Over the course of its existence, the department has played an important role in the emergence of IT at the University and throughout the region.
- Merit Scholarships: All graduate students are automatically considered for merit scholarships during the application process and nominated based on eligibility. Learn more.
Rankings & Accreditations
#10, Best Online Master's in Computer Information Technology ProgramsMET’s online master’s degrees in computer information technology are ranked #10 in the nation by U.S. News & World Report for 2025.
Master the Tools to Excel in Computer Information Systems
The Digital Forensics concentration is part of BU MET’s MS in Computer Information Systems (MSCIS) degree program, integrating in-depth technical skills and emerging technology management with the technical knowledge needed to investigate digital crime scenes, collect and analyze digital evidence, and serve as an expert witness in court cases involving fraud, cybercrime, data breaches, intellectual property theft, or regulatory compliance.
With eight concentrations, the Computer Information Systems master’s encompasses a number of fast-growing and well-paid segments of the IT job market, providing the foundation for work as an application analyst, data analyst, data scientist, cybersecurity analyst, IT consultant, network and computer systems administrator, computer systems analyst, database administrator, and many other integral positions in an organization.
Graduate with Expertise
Metropolitan College’s Computer Information Systems master’s degree concentration in Digital Forensics will equip you with:
- Advanced knowledge of the computer forensics tools necessary to launch a complete and successful digital forensics investigation in civil, criminal, or administrative cases.
- Proficiency in conducting network forensics analysis, including determining how a perpetrator or an attacker gained access to a network and transmitted felonious digital data.
- Competence sufficient to conduct a comprehensive “digital crime scene investigation” and mastery of skills pertaining to acquisition of digital evidence, conducting analysis, presenting a report, and being an expert witness in a court.
Certificate-to-Degree Pathway
You can also earn the master’s in Computer Information Systems with a concentration in Digital Forensics by completing the BU MET Graduate Certificate in Information Technology and Graduate Certificate in Digital Forensics, plus either Information Structures with Java (MET CS 520) or Information Structures with Python (MET CS 521), and one additional concentration elective. Students currently enrolled in a graduate certificate who are interested in transitioning into a master’s degree should contact their academic advisor to declare their interest in this pathway. A new master’s degree application is not required. Connect with a graduate admissions advisor at csadmissions@bu.edu to learn more about this option.
Master’s in Computer Information Systems Curriculum
Digital Forensics Concentration
A total of 32 units is required.
Students must complete the core courses and Digital Forensics concentration requirements.
Prerequisites and Corequisites
Applicants to the program are required to have a bachelor’s degree in any discipline from a regionally accredited institution. Students with limited academic background in information technology or computer science may be required to enroll in the following complimentary lab. Recommendations will be provided upon admission.
Prerequisite:
- MET LB 102 Introduction to Computer Information Systems
All students are required to enroll in the following complimentary labs, regardless of their background. These labs can be taken simultaneously while enrolled in the MSCIS program.
Corequisites:
- MET LB 103 Core Mathematical Concepts
- MET LB 104 Foundations of Probability
Core Courses
(Four courses/16 units)
One of the following:
MET CS 520 Information Structures with Java
Sprg ‘26
Prerequisite: MET LB 102 or consent of instructor. Not recommended for students without a programming background. Explore the concepts of object-oriented approach to software design and development using the Java programming language. You will engage in a detailed discussion of programming concepts starting with the fundamentals of data types, control structures methods, classes, applets, arrays and strings, and proceeding to advanced topics such as inheritance and polymorphism, interfaces, creating user interfaces, exceptions, and streams. Upon completion of this course, you will be able to apply software engineering criteria to design and implement Java applications that are secure, robust, and scalable. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O1 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
MET CS 521 Information Structures with Python
Sprg ‘26
HUB
This course covers the concepts of the object-oriented approach to software design and development using Python. It includes a detailed discussion of programming concepts starting with the fundamentals of data types, control structures methods, classes, arrays and strings, and proceeding to advanced topics such as inheritance and polymorphism, creating user interfaces, exceptions and streams. Upon completion of this course students will be able to apply software engineering principles to design and implement Python applications that can be used in with analytics and big data. Effective Fall 2021, this course fulfills a single unit in each of the following BU Hub areas: Quantitative Reasoning II, Creativity/Innovation, Critical Thinking. Prerequisite: Programming experience in any language. Or Instructor's consent. [ 4 cr. ]
BU Hub Learn More - Creativity/Innovation
- Critical Thinking
- Quantitative Reasoning II
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Mohan |
CAS 222 |
T |
6:00 pm – 8:45 pm |
| O1 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
| O2 |
IND |
Trajanov |
|
ARR |
12:00 am – 12:00 am |
And these three courses:
MET CS 625 Business Data Communication and Networks
Sprg ‘26
Prerequisites: MET LB 102 or consent of instructor. - This course presents the foundations of data communications and takes a bottom-up approach to computer networks. The course concludes with an overview of basic network security and management concepts. Restrictions: This course may not be taken in conjunction with MET CS 425 (undergraduate) or MET CS 535. Only one of these courses can be counted toward degree requirements. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Arena |
CAS 208 |
T |
12:30 pm – 3:15 pm |
| A2 |
IND |
Arena |
CAS 116 |
T |
6:00 pm – 8:45 pm |
| O1 |
IND |
Rizinski |
|
ARR |
12:00 am – 12:00 am |
| O2 |
IND |
Rizinski |
|
ARR |
12:00 am – 12:00 am |
MET CS 669 Database Design and Implementation for Business
Sprg ‘26
Learn the latest relational and object-relational tools and techniques for persistent data and object modeling and management. You will gain extensive hands-on experience using Oracle or Microsoft SQL Server as you learn the Structured Query Language (SQL) and design and implement databases. You will design and implement a database system as a term project. Restrictions: This course may not be taken in conjunction with MET CS 469 (undergraduate) or MET CS 579. Only one of these courses can be counted towards degree requirements. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Diwania |
CAS B20 |
R |
6:00 pm – 8:45 pm |
| O1 |
IND |
Mansur |
|
ARR |
12:00 am – 12:00 am |
| O2 |
IND |
Lee |
|
ARR |
12:00 am – 12:00 am |
MET CS 682 Information Systems Analysis and Design
Sprg ‘26
Prerequisites: Basic programming knowledge or consent of instructor. - Object-oriented methods of information systems analysis and design for organizations with data- processing needs. System feasibility; requirements analysis; database utilization; Unified Modeling Language; software system architecture, design, and implementation, management; project control; and systems-level testing. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Guadagno |
CAS 324 |
W |
6:00 pm – 8:45 pm |
| O2 |
IND |
Braude |
|
ARR |
12:00 am – 12:00 am |
Students who have completed courses on core curriculum subjects as part of their undergraduate degree program may request permission from the Department of Computer Science to replace the corresponding core courses with graduate-level computer information systems electives. Please refer to the MET CS Academic Policies Manual for further details.
Concentration Requirements
(Four courses/16 units)
MET CS 693 Digital Forensics and Investigations
Sprg ‘26
Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Learn what computer forensics and investigation is as a profession and gain an understanding of the overall investigative process. Operating system architectures and disk structures are discussed. Studies how to set up an investigator's office and laboratory, as well as what computer forensic hardware and software tools are available. Other topics covered include importance of digital evidence controls and how to process crime and incident scenes, details of data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness requirements. Provides a range of laboratory and hands-on assignments either in solo or in teams. With rapid growth of computer systems and digital data this area has grown in importance. Prereq: Working knowledge of windows computers, including installing and removing software. Access to a PC meeting the minimum system requirements defined in the course syllabus. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| E1 |
IND |
Arena |
MET 101 |
S |
9:00 am – 12:00 pm |
| O2 |
IND |
Navarro |
|
ARR |
12:00 am – 12:00 am |
MET CS 694 Mobile Forensics and Security
Sprg ‘26
Overview of mobile forensics investigation techniques and tools. Topics include mobile forensics procedures and principles, related legal issues, mobile platform internals, bypassing passcode, rooting or jailbreaking process, logical and physical acquisition, data recovery and analysis, and reporting. Provides in-depth coverage of both iOS and Android platforms. Laboratory and hands-on exercises using current tools are provided and required. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
STH 113 |
T |
6:00 pm – 8:45 pm |
And two courses from the following (some courses may not be available in the online format):
MET CS 595 Cybersecurity Fundamentals
Sprg ‘26
This course introduces fundamental concepts, principles of cybersecurity and their use in the development of security mechanisms and policies. Topics include basic risk assessment and management; basic legal and ethics issues, various cyber attacks, defense methods and tools; security principles, models and components; different crypto protocols, techniques and tools, including symmetric and asymmetric encryption algorithms, hashing, public key infrastructure, and how they can be used; security threats and defense to hardware, operating systems, networks and applications in modern computing environments. Hands-on labs using current tools are provided and required. Prerequisite: METCS535 or METCS625 or instructor's consent. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Arena |
CDS 364 |
W |
6:00 pm – 8:45 pm |
| O1 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
MET CS 599 Biometrics
Sprg ‘26
In this course we will study the fundamental and design applications of various biometric systems based on fingerprints, voice, face, hand geometry, palm print, iris, retina, and other modalities. Multimodal biometric systems that use two or more of the above characteristics will be discussed. Biometric system performance and issues related to the security and privacy aspects of these systems will also be addressed. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Djordjevic |
KCB 104 |
W |
6:00 pm – 8:45 pm |
MET CS 674 Database Security
Sprg ‘26
The course provides a strong foundation in database security and auditing by utilizing Oracle scenarios and step-by-step examples. The following topics are covered: security, profiles, password policies, privileges, roles, Virtual Private Databases, and auditing. The course also covers advanced topics such as SQL injection, database management, and security issues, such as securing the DBMS, enforcing access controls, and related issues. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O2 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
MET CS 684 Enterprise Cybersecurity Management
Sprg ‘26
This course covers important topics that students need to understand in order to effectively manage a successful cybersecurity and privacy program, including governance, risk management, asset classification and incidence response. Students are first introduced to cybersecurity & privacy policy frameworks, governance, standards, and strategy. Risk tolerance is critical when building a cybersecurity and privacy program that supports business goals and strategies. Risk management fundamentals and assessment processes will be reviewed in depth including the methodology for identifying, quantifying, mitigating and controlling risks. Asset classification and the importance of protecting Intellectual Property (IP) will prepare students to understand and identify protection mechanisms needed to defend against malicious actors, including industry competitors and nation states. Incident Response programs will cover preparation and responses necessary to triage incidents and respond quickly to limit damage from malicious actors. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O2 |
IND |
Mukavetz |
|
ARR |
12:00 am – 12:00 am |
MET CS 690 Network and Cloud Security
Sprg ‘26
Prerequisites: (MET CS 535 or MET CS 625) and (MET CS 595 or MET CY 100) or consent of instructor. This course is designed to provide students with a comprehensive understanding of the fundamental concepts, principles, technologies, and best practices to secure both computer networks and clouds. Topics include an overview of network threats, SSL/TLS, Kerberos, PKI, IPsec, DNSsec, SSH, Firewall, IDS, VPD, electronic mail security, wireless network security, Blockchain, TOR, Cloud architecture, an overview of cloud threats, architecture protection, and data protection in Cloud, IAM, security best practices, etc. Upon the completion of the course, students are expected to know the threats and vulnerabilities that networks and cloud systems face, along with the strategies and tools used to mitigate those risks. Hands-on labs based on existing tools are provided and required. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
MCS B33 |
M |
6:00 pm – 8:45 pm |
| O1 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
MET CS 763 Secure Software Development
Sprg ‘26
Prerequisites: MET CS 248 or consent of instructor - Overview of techniques and tools to develop secure software. Focus on the application of security. Topics include secure software development processes, threat modeling, secure requirements and architectures, vulnerability and malware analysis using static code analysis and dynamic analysis tools, vulnerabilities in C/C and Java programs, Crypto and secure APIs, vulnerabilities in web applications and mobile applications, and security testing. Hands-on lab and programming exercises using current tools are provided and required. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
KCB 102 |
M |
6:00 pm – 8:45 pm |
MET CS 787 AI and Cybersecurity
Prerequisites: MET CS 577 or consent of instructor. This course provides an in-depth exploration of the critical intersection between Artificial Intelligence (AI) and cybersecurity, focusing on two interconnected themes: protecting AI systems from vulnerabilities and harnessing the power of AI to tackle cybersecurity challenges. As AI becomes a cornerstone of modern technology, ensuring the security of AI-powered systems against adversarial attacks, backdoor attacks, and model theft is essential. Simultaneously, AI offers transformative capabilities for malware detection, intrusion prevention, and malware analysis. Through a combination of theoretical foundations, hands-on exercises, and real-world case studies, students will delve into topics such as adversarial machine learning, backdoor injection and defense, IP protection, and privacy-preserving AI. They will also learn how to design and implement AI-driven tools for identifying and mitigating cyber threats in dynamic environments. The course emphasizes practical applications, encouraging students to build resilient AI systems and utilize advanced AI techniques to enhance system security and detect emerging threats. Hands-on labs based on existing tools are provided and required. [ 4 cr. ]
MET CS 789 Cryptography
Prerequisites: (MET CS 248 & MET CS 566) or consent of instructor - The course covers the main concepts and principles of cryptography, with the main emphasis on public key cryptography. It begins with the review of integers and a thorough coverage of the fundamentals of finite group theory, followed by the RSA and ElGamal ciphers. Primitive roots in cyclic groups and the discrete log problem are discussed. Baby-step Giant-step and the Index Calculus probabilistic algorithms to compute discrete logs in cyclic groups are presented. Naor -- Reingold and Blum -- Blum -- Shub Random Number Generators as well as Fermat, Euler and Miller-Rabin primality tests are thoroughly covered. Pollard's Rho, Pollard's and Quadratic Sieve factorization algorithms are presented. The course ends with the coverage of some oblivious transfer protocols and zero-knowledge proofs. There are numerous programming assignments in the course. [ 4 cr. ]
Master’s Thesis Option
(8 units)
Students have the option to complete a master’s thesis in addition to the program’s eight course (32 unit) requirements. The thesis option is to be completed within twelve months and is available to Master of Science in Computer Information Systems candidates who have completed at least four courses toward their degree and have a GPA of 3.7 or higher. Students are responsible for finding a thesis advisor and a principal reader within the department. The advisor must be a full-time faculty member; the principal reader may be part-time faculty with a PhD (unless waived by the department).
Computer Science Faculty
Tuition & Financial Assistance
Competitive Tuition
Our part-time rates are substantially lower than those of the traditional, full-time residential programs yet provide access to the same high-quality BU education.
Learn More
Comprehensive Financial Assistance
Our services include
scholarships, graduate loans, and payment plans.
Learn More
How Much Does This Program Cost?
BU MET programs offer the flexibility of part-time or full-time study, either on campus or online. Tuition, fees, and total program cost are determined by enrollment status. If you enroll in 1–2 courses (4–8 units) in a semester, you are charged the part-time per-unit rate. If you enroll in 3–4 courses (12–16 units) in a semester, you are charged the full-time semester rate.
MS in Computer Information Systems, Digital Forensics Concentration (Online and On Campus)
| Enrollment Status |
Part Time |
Full Time |
| Courses per Semester |
2 courses (8 units) |
4 courses (16 units) |
3 courses (12 units) |
| Time to Degree |
4 semesters (16 months) |
2 semesters (8–12 months)*** |
3 semesters (12–16 months)*** |
| Tuition* |
$567–$1,005 per unit** |
$34,935 per semester |
$34,935 per semester |
| Fees per Semester* |
$75 |
$501 |
$501 |
| Total Degree Cost* |
$27,204– $30,708 |
$70,872 |
$78,987 |
*Based on 2025–2026 Boston University tuition and fee rates.
**Cost per unit is determined by course number (100–599 = $567/unit, 600–999 = $1,005/unit).
***Summer semester enrollment is not required for international students to maintain F-1 visa status. Enrollment in summer semester coursework will expedite completion of program and reduce total program cost.
International students seeking an F-1 visa for on-campus study must enroll full time and demonstrate availability of funds to cover the Estimated Cost of Graduate Study; those who wish to study online may enroll part-time but are not eligible for a visa. Learn more about International Student Tuition & Fees.
Questions? Please contact us to hear from an Admissions Advisor who can help you determine the best enrollment pathway. For information regarding financial aid, visit BU MET’s Financial Aid page.
Get Started
Please visit the BU MET admissions page for details on how to apply, financial assistance, tuition and fees, requirements for international students, and more.
Apply Now
News & Events
Events
Admitted Student Webinar: On-Campus Students Meet Your BU Classmates!
Day:
January 8th, 2026
Time:
8:00am - 8:45am
Online
Details
Events
Admitted Student Webinar: On-Campus Students Meet Your BU Classmates!
Day:
January 8th, 2026
Time:
1:00pm - 1:45pm
Online
Details
Events
Admitted Student Webinar: Online Students Meet Your BU Classmates!
Day:
January 13th, 2026
Time:
1:00pm - 1:45pm
Online
Details
Back to Programs