Protect against Cyber Attacks
Available online, on campus, and in a blended format, the Master of Science in Computer Information Systems concentration in Cybersecurity at Boston University’s Metropolitan College (MET) is designed to immerse you in the fast-paced world of technological innovation—preparing you for IT leadership positions and artificial intelligence-integrated in all sectors.
Program at a Glance
- Top 10 Online Program since 2014
- Online, On Campus, and Blended
- Part-Time or Full-Time Study
- STEM Designated
- 32 Units
- 8–16 Months to Completion
- 19 Core Faculty
- No GRE/GMAT
- Tuition & Fees Range—Part-Time Study*: $27,204–$28,956
*Based on 2025–2026 Boston University tuition and fees. Merit scholarship may reduce cost.
Advance Your Career with a Master’s in Computer Information Systems
In 2024, the FBI’s Internet Crime Complaint Center (IC3) received 859,532 complaints, with losses exceeding $16.6 billion. From email compromises, phishing scams, and ransomware to corporate data breaches, cryptocurrency-related crimes, and even cyberterrorism, businesses face unprecedented threats from cybercriminals.
Having information security systems in place to protect the assets of the organization, employees, and clients is essential. The BU MET master’s in Computer Information Systems concentration in Cybersecurity positions you for exciting careers protecting organizations against acts of cybercrime. Roles such as information security analyst are expected to surge through 2032, according to the U.S. Bureau of Labor Statistics, with much faster than average job growth of 32 percent, making it an opportune time to take the next step in your career as organizations scramble to employ and retain qualified cybersecurity engineers, cybersecurity analysts, cybersecurity consultants, cybersecurity managers/administrators, cybersecurity architects, and others.
“I was not only able to gain more knowledge, but my security insight matured to a level that I thought unachievable prior to entering my master’s program. All of the topics covered in my program I used in my job interviews, and in my job. Best choice I made.” Read more.
Ian Hill (MET'19)
Sr. Information Security Engineer, The Baupost Group
MS, Computer Information Systems; Concentration, Security; Graduate Certificate, Information Security
Connect with a Student Ambassador
Why BU’s Computer Information Systems Degree Has Been Top 10 since 2014
- Recognized by the NSA: The National Security Agency (NSA) designates Boston University a Center of Academic Excellence (CAE) in Cyber Defense and Research for its MS in Computer Information Systems concentration in Cybersecurity.
- Active Learning Environment: BU MET’s Computer Information Systems courses ensure you get the attention you need, while introducing case studies and real-world projects that ensure you gain in-depth, practical experience with the latest technologies. BU’s Center for Reliable Information Systems and Cyber Security (RISCS) offers opportunities to collaborate and participate in research on system reliability and information security.
- Career Counseling: MET’s Career Development office and BU’s Center for Career Development offer a variety of job-hunting resources, including one-on-one career counseling by appointment for both online and on-campus students.
- Engaged Faculty: In BU MET’s Computer Information Systems master’s program, you benefit from working closely with highly qualified faculty and industry leaders who have hands-on involvement in information security and fighting cybercrime for the world’s top companies.
- AI-Integrated: Many courses prepare you to leverage artificial intelligence for the analysis, development, and integration of modern information systems.
- Extensive Network: Study information systems alongside peers with solid business experience, learn from faculty who have valuable IT contacts across several sectors, and benefit from an alumni community with strong professional connections.
- STEM Designated: Eligible graduates on student visas have access to an Optional Practical Training (OPT) of 12 months and an extension for up to 24 additional months.
- 24:1 Average Class Ratio: Enjoy an exceptional student-to-instructor ratio, ensuring close interaction with faculty and access to support.
- Valuable Resources: Make use of Boston University’s extensive resources, including the Center for Career Development, Educational Resource Center, Fitness & Recreation Center, IT Help Centers, Mugar Memorial Library, Howard Thurman Center for Common Ground, George Sherman Union, Rafik B. Hariri Institute for Computing and Computational Science & Engineering, and many others.
- Flexible Options: Study at the pace that works for you, evenings on campus, fully online, or in the blended format that combines on-campus and online learning. Courses begin fall, spring, and summer; online courses have two starts per term.
- Track Record: Learn from the best—BU MET’s Department of Computer Science was established in 1979 and is the longest-running computer science department at BU. Over the course of its existence, the department has played an important role in the emergence of IT at the University and throughout the region.
- Merit Scholarships: All graduate students are automatically considered for merit scholarships during the application process and nominated based on eligibility. Learn more.
Rankings & Accreditations
#10, Best Online Master's in Computer Information Technology ProgramsMET’s online master’s degrees in computer information technology are ranked #10 in the nation by U.S. News & World Report for 2025.
A National Center of Academic ExcellenceBoston University is a National Security Agency (NSA)-designated Center of Academic Excellence (CAE) in Cyber Defense and Research for its MS in Computer Information Systems concentration in Cybersecurity.
Master the Tools to Excel in Computer Information Systems
The Cybersecurity concentration is part of BU MET’s MS in Computer Information Systems (MSCIS) degree program. BU’s industry-leading MSCIS curriculum combines in-depth technical skills and emerging technology management. The concentration in Cybersecurity provides thorough knowledge of emerging security threats and solutions to prepare technical leaders to identify, develop, and implement highly secure systems and networks that support organizational goals. Graduates are prepared for careers as information security analysts, system analysts, or information system leaders, among others.
With eight concentrations, the Computer Information Systems master’s encompasses a number of fast-growing and well-paid segments of the IT job market, providing the foundation for work as an application analyst, computer and information systems manager, data analyst, data scientist, cybersecurity analyst, IT consultant, network and computer systems administrator, computer systems analyst, database administrator, and many other integral positions in an organization.
Graduate with Expertise
In addition to the learning outcomes derived from Metropolitan College’s Computer Information Systems master’s degree program, the concentration in Cybersecurity will equip you with:
- Competence in information security concepts, cryptography, cyberattacks, and cyber defense tools/protocols.
- Advanced knowledge of network and cloud security, including relevant threats/attacks, their root causes, IAM, and best security practices.
- Proficiency in security policies, processes, technology, operations, and risk management (e.g., asset assessments, architectural solutions, modeling, and design).
Certificate-to-Degree Pathway
You can also earn the master’s in Computer Information Systems with a concentration in Cybersecurity by completing the BU MET Graduate Certificate in Information Technology and Graduate Certificate in Information Security, plus one additional course—either Information Structures with Java (MET CS 520) or Information Structures with Python (MET CS 521). Students currently enrolled in a graduate certificate who are interested in transitioning into a master’s degree should contact their academic advisor to declare their interest in this pathway. A new master’s degree application is not required. Connect with a graduate admissions advisor at csadmissions@bu.edu to learn more about this option.
Master’s in Computer Information Systems Curriculum
Cybersecurity Concentration
A total of 32 units is required.
Students must complete the core courses and Cybersecurity concentration requirements.
For students who matriculated before Fall 2025 and wish to continue with the previous curriculum, check the following link for the degree requirements: 2024–2025 MSCIS Degree Requirements.
Prerequisites and Corequisites
Applicants to the program are required to have a bachelor’s degree in any discipline from a regionally accredited institution. Students with limited academic background in information technology or computer science may be required to enroll in the following complimentary lab. Recommendations will be provided upon admission.
Prerequisite:
- MET LB 102 Introduction to Computer Information Systems
All students are required to enroll in the following complimentary labs, regardless of their background. These labs can be taken simultaneously while enrolled in the MSCIS program.
Corequisites:
- MET LB 103 Core Mathematical Concepts
- MET LB 104 Foundations of Probability
Core Courses
(Four courses/16 units)
One of the following:
MET CS 520 Information Structures with Java
Sprg ‘26
Prerequisite: MET LB 102 or consent of instructor. Not recommended for students without a programming background. Explore the concepts of object-oriented approach to software design and development using the Java programming language. You will engage in a detailed discussion of programming concepts starting with the fundamentals of data types, control structures methods, classes, applets, arrays and strings, and proceeding to advanced topics such as inheritance and polymorphism, interfaces, creating user interfaces, exceptions, and streams. Upon completion of this course, you will be able to apply software engineering criteria to design and implement Java applications that are secure, robust, and scalable. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O1 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
MET CS 521 Information Structures with Python
Sprg ‘26
HUB
This course covers the concepts of the object-oriented approach to software design and development using Python. It includes a detailed discussion of programming concepts starting with the fundamentals of data types, control structures methods, classes, arrays and strings, and proceeding to advanced topics such as inheritance and polymorphism, creating user interfaces, exceptions and streams. Upon completion of this course students will be able to apply software engineering principles to design and implement Python applications that can be used in with analytics and big data. Effective Fall 2021, this course fulfills a single unit in each of the following BU Hub areas: Quantitative Reasoning II, Creativity/Innovation, Critical Thinking. Prerequisite: Programming experience in any language. Or Instructor's consent. [ 4 cr. ]
BU Hub Learn More - Creativity/Innovation
- Critical Thinking
- Quantitative Reasoning II
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Mohan |
CAS 222 |
T |
6:00 pm – 8:45 pm |
| O1 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
| O2 |
IND |
Trajanov |
|
ARR |
12:00 am – 12:00 am |
And these three courses:
MET CS 625 Business Data Communication and Networks
Sprg ‘26
Prerequisites: MET LB 102 or consent of instructor. - This course presents the foundations of data communications and takes a bottom-up approach to computer networks. The course concludes with an overview of basic network security and management concepts. Restrictions: This course may not be taken in conjunction with MET CS 425 (undergraduate) or MET CS 535. Only one of these courses can be counted toward degree requirements. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Arena |
CAS 208 |
T |
12:30 pm – 3:15 pm |
| A2 |
IND |
Arena |
CAS 116 |
T |
6:00 pm – 8:45 pm |
| O1 |
IND |
Rizinski |
|
ARR |
12:00 am – 12:00 am |
| O2 |
IND |
Rizinski |
|
ARR |
12:00 am – 12:00 am |
MET CS 669 Database Design and Implementation for Business
Sprg ‘26
Learn the latest relational and object-relational tools and techniques for persistent data and object modeling and management. You will gain extensive hands-on experience using Oracle or Microsoft SQL Server as you learn the Structured Query Language (SQL) and design and implement databases. You will design and implement a database system as a term project. Restrictions: This course may not be taken in conjunction with MET CS 469 (undergraduate) or MET CS 579. Only one of these courses can be counted towards degree requirements. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Diwania |
CAS B20 |
R |
6:00 pm – 8:45 pm |
| O1 |
IND |
Mansur |
|
ARR |
12:00 am – 12:00 am |
| O2 |
IND |
Lee |
|
ARR |
12:00 am – 12:00 am |
MET CS 682 Information Systems Analysis and Design
Sprg ‘26
Prerequisites: Basic programming knowledge or consent of instructor. - Object-oriented methods of information systems analysis and design for organizations with data- processing needs. System feasibility; requirements analysis; database utilization; Unified Modeling Language; software system architecture, design, and implementation, management; project control; and systems-level testing. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Guadagno |
CAS 324 |
W |
6:00 pm – 8:45 pm |
| O2 |
IND |
Braude |
|
ARR |
12:00 am – 12:00 am |
Students who have completed courses on core curriculum subjects as part of their undergraduate degree program may request permission from the Department of Computer Science to replace the corresponding core courses with graduate-level computer information systems electives. Please refer to the MET CS Academic Policies Manual for further details.
Concentration Requirements
(Four courses/16 units)
MET CS 595 Cybersecurity Fundamentals
Sprg ‘26
This course introduces fundamental concepts, principles of cybersecurity and their use in the development of security mechanisms and policies. Topics include basic risk assessment and management; basic legal and ethics issues, various cyber attacks, defense methods and tools; security principles, models and components; different crypto protocols, techniques and tools, including symmetric and asymmetric encryption algorithms, hashing, public key infrastructure, and how they can be used; security threats and defense to hardware, operating systems, networks and applications in modern computing environments. Hands-on labs using current tools are provided and required. Prerequisite: METCS535 or METCS625 or instructor's consent. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Arena |
CDS 364 |
W |
6:00 pm – 8:45 pm |
| O1 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
MET CS 684 Enterprise Cybersecurity Management
Sprg ‘26
This course covers important topics that students need to understand in order to effectively manage a successful cybersecurity and privacy program, including governance, risk management, asset classification and incidence response. Students are first introduced to cybersecurity & privacy policy frameworks, governance, standards, and strategy. Risk tolerance is critical when building a cybersecurity and privacy program that supports business goals and strategies. Risk management fundamentals and assessment processes will be reviewed in depth including the methodology for identifying, quantifying, mitigating and controlling risks. Asset classification and the importance of protecting Intellectual Property (IP) will prepare students to understand and identify protection mechanisms needed to defend against malicious actors, including industry competitors and nation states. Incident Response programs will cover preparation and responses necessary to triage incidents and respond quickly to limit damage from malicious actors. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O2 |
IND |
Mukavetz |
|
ARR |
12:00 am – 12:00 am |
MET CS 690 Network and Cloud Security
Sprg ‘26
Prerequisites: (MET CS 535 or MET CS 625) and (MET CS 595 or MET CY 100) or consent of instructor. This course is designed to provide students with a comprehensive understanding of the fundamental concepts, principles, technologies, and best practices to secure both computer networks and clouds. Topics include an overview of network threats, SSL/TLS, Kerberos, PKI, IPsec, DNSsec, SSH, Firewall, IDS, VPD, electronic mail security, wireless network security, Blockchain, TOR, Cloud architecture, an overview of cloud threats, architecture protection, and data protection in Cloud, IAM, security best practices, etc. Upon the completion of the course, students are expected to know the threats and vulnerabilities that networks and cloud systems face, along with the strategies and tools used to mitigate those risks. Hands-on labs based on existing tools are provided and required. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
MCS B33 |
M |
6:00 pm – 8:45 pm |
| O1 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
And one course selected from the following (some courses may not be available in the online format):
MET CS 599 Biometrics
Sprg ‘26
In this course we will study the fundamental and design applications of various biometric systems based on fingerprints, voice, face, hand geometry, palm print, iris, retina, and other modalities. Multimodal biometric systems that use two or more of the above characteristics will be discussed. Biometric system performance and issues related to the security and privacy aspects of these systems will also be addressed. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Djordjevic |
KCB 104 |
W |
6:00 pm – 8:45 pm |
MET CS 674 Database Security
Sprg ‘26
The course provides a strong foundation in database security and auditing by utilizing Oracle scenarios and step-by-step examples. The following topics are covered: security, profiles, password policies, privileges, roles, Virtual Private Databases, and auditing. The course also covers advanced topics such as SQL injection, database management, and security issues, such as securing the DBMS, enforcing access controls, and related issues. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O2 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
MET CS 693 Digital Forensics and Investigations
Sprg ‘26
Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Learn what computer forensics and investigation is as a profession and gain an understanding of the overall investigative process. Operating system architectures and disk structures are discussed. Studies how to set up an investigator's office and laboratory, as well as what computer forensic hardware and software tools are available. Other topics covered include importance of digital evidence controls and how to process crime and incident scenes, details of data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness requirements. Provides a range of laboratory and hands-on assignments either in solo or in teams. With rapid growth of computer systems and digital data this area has grown in importance. Prereq: Working knowledge of windows computers, including installing and removing software. Access to a PC meeting the minimum system requirements defined in the course syllabus. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| E1 |
IND |
Arena |
MET 101 |
S |
9:00 am – 12:00 pm |
| O2 |
IND |
Navarro |
|
ARR |
12:00 am – 12:00 am |
MET CS 694 Mobile Forensics and Security
Sprg ‘26
Overview of mobile forensics investigation techniques and tools. Topics include mobile forensics procedures and principles, related legal issues, mobile platform internals, bypassing passcode, rooting or jailbreaking process, logical and physical acquisition, data recovery and analysis, and reporting. Provides in-depth coverage of both iOS and Android platforms. Laboratory and hands-on exercises using current tools are provided and required. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
STH 113 |
T |
6:00 pm – 8:45 pm |
MET CS 763 Secure Software Development
Sprg ‘26
Prerequisites: MET CS 248 or consent of instructor - Overview of techniques and tools to develop secure software. Focus on the application of security. Topics include secure software development processes, threat modeling, secure requirements and architectures, vulnerability and malware analysis using static code analysis and dynamic analysis tools, vulnerabilities in C/C and Java programs, Crypto and secure APIs, vulnerabilities in web applications and mobile applications, and security testing. Hands-on lab and programming exercises using current tools are provided and required. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
KCB 102 |
M |
6:00 pm – 8:45 pm |
MET CS 787 AI and Cybersecurity
Prerequisites: MET CS 577 or consent of instructor. This course provides an in-depth exploration of the critical intersection between Artificial Intelligence (AI) and cybersecurity, focusing on two interconnected themes: protecting AI systems from vulnerabilities and harnessing the power of AI to tackle cybersecurity challenges. As AI becomes a cornerstone of modern technology, ensuring the security of AI-powered systems against adversarial attacks, backdoor attacks, and model theft is essential. Simultaneously, AI offers transformative capabilities for malware detection, intrusion prevention, and malware analysis. Through a combination of theoretical foundations, hands-on exercises, and real-world case studies, students will delve into topics such as adversarial machine learning, backdoor injection and defense, IP protection, and privacy-preserving AI. They will also learn how to design and implement AI-driven tools for identifying and mitigating cyber threats in dynamic environments. The course emphasizes practical applications, encouraging students to build resilient AI systems and utilize advanced AI techniques to enhance system security and detect emerging threats. Hands-on labs based on existing tools are provided and required. [ 4 cr. ]
MET CS 789 Cryptography
Prerequisites: (MET CS 248 & MET CS 566) or consent of instructor - The course covers the main concepts and principles of cryptography, with the main emphasis on public key cryptography. It begins with the review of integers and a thorough coverage of the fundamentals of finite group theory, followed by the RSA and ElGamal ciphers. Primitive roots in cyclic groups and the discrete log problem are discussed. Baby-step Giant-step and the Index Calculus probabilistic algorithms to compute discrete logs in cyclic groups are presented. Naor -- Reingold and Blum -- Blum -- Shub Random Number Generators as well as Fermat, Euler and Miller-Rabin primality tests are thoroughly covered. Pollard's Rho, Pollard's and Quadratic Sieve factorization algorithms are presented. The course ends with the coverage of some oblivious transfer protocols and zero-knowledge proofs. There are numerous programming assignments in the course. [ 4 cr. ]
Master’s Thesis Option
(8 units)
Students have the option to complete a master’s thesis in addition to the program’s eight course (32 unit) requirements. The thesis option is to be completed within twelve months and is available to Master of Science in Computer Information Systems candidates who have completed at least four courses toward their degree and have a GPA of 3.7 or higher. Students are responsible for finding a thesis advisor and a principal reader within the department. The advisor must be a full-time faculty member; the principal reader may be part-time faculty with a PhD (unless waived by the department).
Computer Science Faculty
Tuition & Financial Assistance
Competitive Tuition
Our part-time rates are substantially lower than those of the traditional, full-time residential programs yet provide access to the same high-quality BU education.
Learn More
Comprehensive Financial Assistance
Our services include
scholarships, graduate loans, and payment plans.
Learn More
How Much Does This Program Cost?
BU MET programs offer the flexibility of part-time or full-time study, either on campus or online. Tuition, fees, and total program cost are determined by enrollment status. If you enroll in 1–2 courses (4–8 units) in a semester, you are charged the part-time per-unit rate. If you enroll in 3–4 courses (12–16 units) in a semester, you are charged the full-time semester rate.
MS in Computer Information Systems, Cybersecurity Concentration (Online and On Campus)
| Enrollment Status |
Part Time |
Full Time |
| Courses per Semester |
2 courses (8 units) |
4 courses (16 units) |
3 courses (12 units) |
| Time to Degree |
4 semesters (16 months) |
2 semesters (8–12 months)*** |
3 semesters (12–16 months)*** |
| Tuition* |
$567–$1,005 per unit** |
$34,935 per semester |
$34,935 per semester |
| Fees per Semester* |
$75 |
$501 |
$501 |
| Total Degree Cost* |
$27,204– $28,956 |
$70,872 |
$78,987 |
*Based on 2025–2026 Boston University tuition and fee rates.
**Cost per unit is determined by course number (100–599 = $567/unit, 600–999 = $1,005/unit).
***Summer semester enrollment is not required for international students to maintain F-1 visa status. Enrollment in summer semester coursework will expedite completion of program and reduce total program cost.
International students seeking an F-1 visa for on-campus study must enroll full time and demonstrate availability of funds to cover the Estimated Cost of Graduate Study; those who wish to study online may enroll part-time but are not eligible for a visa. Learn more about International Student Tuition & Fees.
Questions? Please contact us to hear from an Admissions Advisor who can help you determine the best enrollment pathway. For information regarding financial aid, visit BU MET’s Financial Aid page.
Get Started
Please visit the BU MET admissions page for details on how to apply, financial assistance, tuition and fees, requirements for international students, and more.
Apply Now
News & Events
Events
Financing your BU MET Graduate Education (for DOMESTIC students)
Day:
December 18th, 2025
Time:
1:00pm - 1:45pm
Online
Details
Events
Admitted Student Webinar: On-Campus Students Meet Your BU Classmates!
Day:
January 8th, 2026
Time:
8:00am - 8:45am
Online
Details
Events
Admitted Student Webinar: On-Campus Students Meet Your BU Classmates!
Day:
January 8th, 2026
Time:
1:00pm - 1:45pm
Online
Details
Back to Programs