Protect against Cyber Attacks
Available online, on campus, and in a blended format, the Master of Science in Computer Information Systems concentration in Security at Boston University’s Metropolitan College (MET) is designed to immerse you in the fast-paced world of technological innovation—preparing you for IT leadership positions in all sectors.
Program at a Glance
- Top 10 Online Program since 2014
- Online, On Campus, and Blended
- Part-Time or Full-Time Study
- 40 Credits
- 18–24 Months to Completion
- 17 Core Faculty
- No GRE/GMAT
Advance Your Career with a Master’s in Computer Information Systems
In 2019, the FBI’s Internet Crime Complaint Center (IC3) received 467,361 complaints, with losses exceeding $3.5 billion. The number of complaints since 2015 is close to 2 million, with $10 billion in losses. From email compromises, phishing scams, and ransomware to corporate data breaches or even cyberterrorism, businesses face unprecedented threats from cybercriminals.
Having information security systems in place to protect the assets of the organization, employees, and clients is essential. The BU MET master’s in Computer Information Systems concentration in Security positions you for exciting careers protecting organizations against acts of cybercrime. Roles such as information security analyst are expected to surge through 2028, according to the U.S. Bureau of Labor Statistics, with much faster than average job growth of 32 percent and median annual salaries in excess of $90K. There remains, however, a significant talent gap as organizations scramble to employ and retain qualified cybersecurity engineers, cybersecurity analysts, cybersecurity consultants, cybersecurity managers/administrators, cybersecurity architects, and others.
#8 Best Online Master's in Computer Information Technology Programs
MET’s online master’s degrees in computer information technology are ranked #8 in the nation by U.S. News & World Report for 2021.Learn More
A National Center of Academic Excellence
Boston University has been designated a Center of Academic Excellence (CAE) in Cyber Defense and Research by the National Security Agency and Department of Homeland Security. Our information security programs are certified by the Committee on National Security Systems (CNSS).Learn More
Stay connected! Learn more about our program.Learn More
“My job is extremely diverse, it involves risk management, security policy and procedure development, vendor reviews, network security, and enterprise security as a whole. These are all subjects that I took directly at BU MET with professors who are experienced and elevated within their fields. I was not only able to gain more knowledge, but my security insight matured to a level that I thought unachievable prior to entering my master’s program. All of the topics covered in my program I used in my job interviews, and in my job. Best choice I made.”—Ian Hill (MET’19), Information Security & Privacy Cloud Analyst, Partners HealthCare
Why BU’s Computer Information Systems Degree Has Been Top 10 since 2014
- Recognized & Certified: Boston University is recognized by the National Security Agency and the Department of Homeland Security as a Center of Academic Excellence (CAE) in Cyber Defense and Research. BU MET’s information security programs are certified by the Committee on National Security Systems (CNSS).
- Active Learning Environment: BU MET’s Computer Information Systems courses ensure you get the attention you need, while introducing case studies and real-world projects that ensure you gain in-depth, practical experience with the latest technologies. BU’s Center for Reliable Information Systems and Cyber Security (RISCS) offers opportunities to collaborate and participate in research on system reliability and information security.
- Engaged Faculty: In BU MET’s Computer Information Systems master’s program, you benefit from working closely with highly qualified faculty and industry leaders who have hands-on involvement in information security and fighting cybercrime for the world’s top companies.
- Extensive Network: Study information systems alongside peers with solid business experience, learn from faculty who have valuable IT contacts across several sectors, and benefit from an alumni community with strong professional connections.
- 15:1 Class Ratio: Enjoy an exceptional student-to-instructor ratio, ensuring close interaction with faculty and access to support.
- Valuable Resources: Make use of Boston University’s extensive resources, including the Center for Career Development, Educational Resource Center, Fitness & Recreation Center, IT Help Centers, Mugar Memorial Library, Center for Antiracist Research, Howard Thurman Center for Common Ground, George Sherman Union, Rafik B. Hariri Institute for Computing and Computational Science & Engineering, and many others.
- Flexible Options: Study at the pace that works for you, evenings on campus, fully online, or in the blended format that combines on-campus and online learning. Courses begin fall, spring, and summer; online courses have two starts per term.
- Track Record: Learn from the best—BU MET’s Department of Computer Science was established in 1979 and is the longest-running computer science department at BU. Over its four decades, the department has played an important role in the emergence of IT at the University and throughout the region.
- Merit Scholarships: All applicants are automatically considered, and admitted students are nominated based on eligibility.
Master the Tools to Excel in Computer Information Systems
The Security concentration is part of BU MET’s Master of Science in Computer Information Systems (MSCIS). BU’s industry-leading MSCIS curriculum combines in-depth technical skills and emerging technology management. The concentration in Security provides thorough knowledge of emerging security threats and solutions to prepare technical leaders to identify, develop, and implement highly secure systems and networks that support organizational goals. Graduates are prepared for careers as information security analysts, system analysts, or information system leaders, among others.
BU MET’s Computer Information Systems master’s degree prepares you for jobs that are seeing faster-than-average growth and excellent salaries. According to the U.S. Bureau of Labor Statistics, the median annual wage for computer and information systems managers (for instance) is more than $146,000. And with seven concentrations, the Computer Information Systems master’s encompasses several other fast-growing and well-paid segments of the IT job market, providing the foundation for work as an application analyst, data analyst, data scientist, cybersecurity analyst, IT consultant, network and computer systems administrator, computer systems analyst, database administrator, and many other integral positions in an organization.
Graduate with Expertise
Metropolitan College’s Computer Information Systems master’s degree concentration in Security will equip you with:
- Advanced knowledge in the analysis and documentation of requirements for architecture, design, and implementation of computer applications systems.
- Proficiency in software and computing skills as they pertain to the design and implementation of database systems, data communications, systems analysis, and design.
- Competence sufficient to identify current and emerging information technologies that may have strategic value for enterprise; assess where those technologies have value; and manage the implementation of those technologies in the enterprise.
- Advanced knowledge of information security concepts, governance, biometric systems, and database systems security, as well as network security and cryptography.
- Proficiency in risk management, such as asset assessments, architectural solutions, modeling, and design.
- Competence in security policies, processes, technology, and operations.
You can also earn the master’s in Computer Information Systems with a concentration in Security by completing the BU MET Graduate Certificate in Information Technology and Graduate Certificate in Information Security, plus two additional courses: Introduction to Probability and Statistics (MET CS 546) and either Information Structures with Java (MET CS 520) or Information Structures with Python (MET CS 521). An alternative path is to complete the Graduate Certificate in Information Technology and Graduate Certificate in Digital Forensics, plus MET CS 546, MET CS 520 or MET CS 521, and two additional courses: IT Security Policies and Procedures (MET CS 684), and Enterprise Cyber Security (MET CS 695). To be eligible for the degree, you must apply for admission and be accepted into the degree program. Connect a with a graduate admissions advisor at firstname.lastname@example.org to learn more about this option.
Master’s in Computer Information Systems Curriculum
A total of 40 credits is required.
Students who are declaring an MSCIS concentration in Security must complete the core and required concentration courses.
(Five courses/20 credits)
MET CS 625 Business Data Communication and Networks
This course presents the foundations of data communications and takes a bottom-up approach to computer networks. The course concludes with an overview of basic network security and management concepts. Prereq: MET CS 200, or instructor's consent. This course may not be taken in conjunction with MET CS 425 (undergraduate) or MET CS 535. Only one of these courses can be counted towards degree requirements. [ 4 cr. ]Sum1 2021
|SC1||IND||Arena||MET 122||T||6:00 pm – 9:30 pm|
|A1||IND||Arena||STH 113||M||8:00 am – 10:45 am|
|A2||IND||Arena||EPC 204||T||6:00 pm – 8:45 pm|
MET CS 669 Database Design and Implementation for Business
Students learn the latest relational and object-relational tools and techniques for persistent data and object modeling and management. Students gain extensive hands- on experience using Oracle or Microsoft SQL Server as they learn the Structured Query Language (SQL) and design and implement databases. Students design and implement a database system as a term project. Restrictions: This course may not be taken in conjunction with MET CS 469 (undergraduate) or MET CS 579. Only one of these courses can be counted towards degree requirements. [ 4 cr. ]Sum1 2021
|SC1||IND||Matthews||CAS 116||W||6:00 pm – 9:30 pm|
|A1||IND||Maiewski||CAS 204A||W||6:00 pm – 8:45 pm|
|A2||IND||Russo||CAS 226||R||6:00 pm – 8:45 pm|
|A3||IND||Matthews||CGS 515||T||6:00 pm – 8:45 pm|
|E1||IND||Matthews||CGS 515||T||6:00 pm – 8:45 pm|
|R1||IND||Russo||NIP 320||R||6:00 pm – 8:45 pm|
MET CS 682 Information Systems Analysis and Design
Object-oriented methods of information systems analysis and design for organizations with data- processing needs. System feasibility; requirements analysis; database utilization; Unified Modeling Language; software system architecture, design, and implementation, management; project control; and systems-level testing. Prerequisite: Basic programming knowledge or instructor's consent. [ 4 cr. ]Sum1 2021
|SC1||IND||Guadagno||EPC 206||R||6:00 pm – 9:30 pm|
|A1||IND||Guadagno||PHO 201||T||6:00 pm – 8:45 pm|
|A2||IND||Guadagno||SAR 300||R||6:00 pm – 8:45 pm|
|E1||IND||Guadagno||SAR 300||R||6:00 pm – 8:45 pm|
MET CS 782 IT Strategy and Management
This course describes and compares contemporary and emerging information technology and its management. Students learn how to identify information technologies of strategic value to their organizations and how to manage their implementation. The course highlights the application of I.T. to business needs. CS 782 is at the advanced Masters (700) level, and it assumes that students understand IT systems at the level of CS 682 Systems Analysis and Design. Students who haven't completed CS 682 should contact their instructor to determine if they are adequately prepared. Prereq: MET CS 682, or instructor's consent. [ 4 cr. ]Sum1 2021
|SC1||IND||Arakelian||CAS 211||R||6:00 pm – 9:30 pm|
|A1||IND||Arakelian||CAS 324||R||6:00 pm – 8:45 pm|
And one of the following*:
MET CS 520 Information Structures with Java
This course covers the concepts of object-oriented approach to software design and development using the Java programming language. It includes a detailed discussion of programming concepts starting with the fundamentals of data types, control structures methods, classes, applets, arrays and strings, and proceeding to advanced topics such as inheritance and polymorphism, interfaces, creating user interfaces, exceptions, and streams. Upon completion of this course the students will be able to apply software engineering criteria to design and implement Java applications that are secure, robust, and scalable. Prereq: MET CS 200 or MET CS 300 or Instructor's Consent. Not recommended for students without a programming background. For undergraduate students: This course may not be taken in conjunction with METCS232. Only one of these courses can be counted towards degree requirements. [ 4 cr. ]Sum2 2021
|A1||IND||Donald||HAR 212||M||6:00 pm – 8:45 pm|
|E1||IND||Donald||HAR 212||M||6:00 pm – 8:45 pm|
|BHA||IND||Staff||W||6:00 pm – 8:45 pm|
MET CS 521 Information Structures with Python
This course covers the concepts of the object-oriented approach to software design and development using Python. It includes a detailed discussion of programming concepts starting with the fundamentals of data types, control structures methods, classes, arrays and strings, and proceeding to advanced topics such as inheritance and polymorphism, creating user interfaces, exceptions and streams. Upon completion of this course students will be able to apply software engineering principles to design and implement Python applications that can be used in with analytics and big data. Effective Fall 2021, this course fulfills a single unit in each of the following BU Hub areas: Quantitative Reasoning II, Creativity/Innovation, Critical Thinking. [ 4 cr. ]
|SC1||IND||Aleksandrov||EPC 206||T||6:00 pm – 9:30 pm|
|SC2||IND||Orsini||CAS 324||W||6:00 pm – 9:30 pm|
|A1||IND||Lu||STH 113||M||6:00 pm – 8:45 pm|
|A2||IND||Pinsky||KCB 104||W||8:00 am – 10:45 am|
|A3||IND||Burstein||CAS B36||W||6:00 pm – 8:45 pm|
|A4||IND||Aleksandrov||CAS 201||R||6:00 pm – 8:45 pm|
*If a student chooses to take both MET CS 520 and MET CS 521, the first course completed will fulfill the core requirement and the second course completed will count as an elective.
Students who have completed courses on core curriculum subjects as part of their undergraduate degree program or have relevant work-related experience may request permission from the Department of Computer Science to replace the corresponding core courses with graduate-level computer information systems electives. Please refer to the MET CS Academic Policies Manual for further details.
Security Concentration Requirements
(Five courses/20 credits)
MET CS 546 Introduction to Probability and Statistics
The goal of this course is to provide students with the mathematical fundamentals required for successful quantitative analysis of problems. The first part of the course introduces the mathematical prerequisites for understanding probability and statistics. Topics include combinatorial mathematics, functions, and the fundamentals of differentiation and integration. The second part of the course concentrates on the study of elementary probability theory, discrete and continuous distributions. Prereq: Academic background that includes the material covered in a standard course on college algebra or instructor's consent. For undergraduate students: This course may not be taken in conjunction with MET MA 213, only one of these courses will count toward degree program requirements. Students who have taken MET MA 113 as well as MET MA 123 will also not be allowed to count MET CS 546 towards degree requirements. [ 4 cr. ]Sum1 2021
|SC1||IND||Gorlin||NIP 320||W||6:00 pm – 9:30 pm|
|A1||IND||Gorlin||CAS 214||M||6:00 pm – 8:45 pm|
|A2||IND||Gorlin||HAR 316||T||6:00 pm – 8:45 pm|
|E1||IND||Gorlin||HAR 316||T||6:00 pm – 8:45 pm|
MET CS 684 Enterprise Cybersecurity Management
|A1||IND||Staff||PSY B37||W||6:00 pm – 8:45 pm|
MET CS 695 Enterprise Cybersecurity
This course introduces fundamental concepts, principles of cybersecurity and their use in the development of security mechanisms and policies. Topics include basic risk assessment and management; basic legal and ethics issues, various cyber attacks, defense methods and tools; security principles, models and components; different crypto protocols, techniques and tools, including symmetric and asymmetric encryption algorithms, hashing, public key infrastructure, and how they can be used; security threats and defense to hardware, operating systems, networks and applications in modern computing environments. Hands-on labs using current tools are provided and required. Prerequisite: METCS535 or METCS625 or instructor's consent. [ 4 cr. ]Sum2 2021
|A1||IND||Zhang||MET 101||T||6:00 pm – 8:45 pm|
|E1||IND||Zhang||MET 101||T||6:00 pm – 8:45 pm|
And two courses selected from the following (some courses may not be available in the blended or online format):
MET CS 599 Biometrics
In this course we will study the fundamental and design applications of various biometric systems based on fingerprints, voice, face, hand geometry, palm print, iris, retina, and other modalities. Multimodal biometric systems that use two or more of the above characteristics will be discussed. Biometric system performance and issues related to the security and privacy aspects of these systems will also be addressed. [ 4 cr. ]
MET CS 674 Database Security
The course provides a strong foundation in database security and auditing. This course utilizes Oracle scenarios and step-by-step examples. The following topics are covered: security, profiles, password policies, privileges and roles, Virtual Private Databases, and auditing. The course also covers advanced topics such as SQL injection, database management security issues such as securing the DBMS, enforcing access controls, and related issues. Prereq: MET CS 579 or MET CS 669; or instructor's consent. [ 4 cr. ]
MET CS 690 Network Security
This course will cover advanced network security issues and solutions. The main focus on the first part of the course will be on Security basics, i.e. security services, access controls, vulnerabilities, threats and risk, network architectures and attacks. In the second part of the course, particular focus and emphasis will be given to network security capabilities and mechanisms (Access Control on wire-line and wireless networks), IPsec, Firewalls, Deep Packet Inspection and Transport security. The final portion of the course will address Network Application security (Email, Ad-hoc, XML/SAML and Services Oriented Architecture security. As part of our course review we will explore a number of Network Use Cases. Prereq: MET CS 535 or MET CS 625; Familiarity with OSI and TCP/IP protocol stack; Background-familiarity with binary numbers, prime numbers, binary- hexadecimal-decimal conversions, etc; Familiarity with computer programming concepts; or instructor's consent. [ 4 cr. ]Sum1 2021
|A1||IND||Matthews||CGS 315||R||6:00 pm – 8:45 pm|
|E1||IND||Matthews||CGS 315||R||6:00 pm – 8:45 pm|
MET CS 693 Digital Forensics and Investigations
Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Learn what computer forensics and investigation is as a profession and gain an understanding of the overall investigative process. Operating system architectures and disk structures are discussed. Studies how to set up an investigator's office and laboratory, as well as what computer forensic hardware and software tools are available. Other topics covered include importance of digital evidence controls and how to process crime and incident scenes, details of data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness requirements. Provides a range of laboratory and hands-on assignments either in solo or in teams. With rapid growth of computer systems and digital data this area has grown in importance. Prereq: Working knowledge of windows computers, including installing and removing software. Access to a PC meeting the minimum system requirements defined in the course syllabus. [ 4 cr. ]
|E1||IND||Arena||EPC 203||S||9:00 am – 12:00 pm|
MET CS 694 Mobile Forensics and Security
Overview of mobile forensics investigation techniques and tools. Topics include mobile forensics procedures and principles, related legal issues, mobile platform internals, bypassing passcode, rooting or jailbreaking process, logical and physical acquisition, data recovery and analysis, and reporting. Provides in-depth coverage of both iOS and Android platforms. Laboratory and hands-on exercises using current tools are provided and required. [ 4 cr. ]
MET CS 703 Network Forensics
This course provides a comprehensive understanding of network forensic analysis principles. Within the context of forensics security, network infrastructures, topologies, and protocols are introduced. Students understand the relationship between network forensic analysis and network security technologies. Students will learn to identify network security incidents and potential sources of digital evidence and demonstrate the ability to perform basic network data acquisition and analysis using computer based applications and utilities. Students will also identify potential applications for the integration of network forensic technologies and demonstrate the ability to accurately document network forensic processes and analysis. Prereq: MET CS 625 and MET CS 695; or instructor's consent. [ 4 cr. ]
MET CS 763 Secure Software Development
Overview of techniques and tools to develop secure software. Focus on the application security. Topics include secure software development processes, threat modeling, secure requirements and architectures, vulnerability and malware analysis using static code analysis and dynamic analysis tools, vulnerabilities in C/C++ and Java programs, Crypto and secure APIs, vulnerabilities in web applications and mobile applications, and security testing. Hands-on lab and programming exercises using current tools are provided and required. Prerequisite: At least two 500- level (or above) programming-intensive computer science courses; or instructor's consent. [ 4 cr. ]
MET CS 789 Cryptography
The course covers the main concepts and principles of cryptography with the main emphasis put on public key cryptography. It begins with the review of integers and a thorough coverage of the fundamentals of finite group theory followed by the RSA and ElGamal ciphers. Primitive roots in cyclic groups and the discrete log problem are discussed. Baby-step Giant-step and the Index Calculus probabilistic algorithms to compute discrete logs in cyclic groups are presented. Naor -- Reingold and Blum -- Blum -- Shub Random Number Generators as well as Fermat, Euler and Miller-Rabin primality tests are thoroughly covered. Pollard's Rho, Pollard's and Quadratic Sieve factorization algorithms are presented. The course ends with the coverage of some oblivious transfer protocols and zero-knowledge proofs. There are numerous programming assignments in the course. Prereq: MET CS 248, or instructor's consent. [ 4 cr. ]
|A1||IND||Pascoe||PSY 212||M||6:00 pm – 8:45 pm|
MET CS 793 Special Topics in Computer Science
The course MET CS 793 Special Topics in Computer Science changes from semester to semester. More than one CS793 can be offered in a given semester. Course descriptions for all sections are listed below. For more information, please contact MET Department of Computer Science. [ 4 cr. ]
MET CS 799 Advanced Cryptography
This course builds on the material covered in CS 789 Cryptography. It begins with the coverage of commutative rings, finite fields, rings of polynomials, and finding of the greatest common divisor in the ring of polynomials. Irreducible polynomials are discussed. Field extensions and fields Fᴩ [x]/P are thoroughly covered. The main emphasis is put on elliptic curves over Fᴩ and F₂ and the ElGamal cipher on elliptic curves is presented. Block ciphers DES and double and triple DES are introduced. AES and WHIRLPOOL block ciphers and modes of operation are covered. The course continues with the introduction of message integrity and message authentication. In the last part of the course cryptographic hash functions SHA-512 and WHIRLPOOL as well as various digital signatures are introduced. Finally, entity authentication and key management issues are discussed. Prereq: MET CS 789; or instructor's consent. [ 4 cr. ]
Computer Science Faculty
View all Faculty
Associate Dean for Academic Affairs Associate Professor, Computer Science Director, Health Informatics and Health Sciences
Master Lecturer, Computer Science
Assistant Professor, Computer Science Director, Analytics
Associate Professor, Computer Science and Administrative Sciences Director, Project Management
Jae Young Lee
Assistant Professor, Computer Science Coordinator, Databases
Associate Professor of the Practice, Computer Science Coordinator, Software Development
Assistant Professor, Computer Science
Associate Professor Emeritus, Computer Science
Associate Professor Emeritus, Computer Science
Assistant Professor, Computer Science Coordinator, Programming Languages
Associate Professor, Computer Science Coordinator, Health Informatics
Assistant Professor, Computer Science
Assistant Professor, Computer Science Coordinator, Information Security
Dean, Metropolitan College & Extended Education Professor of the Practice, Computer Science and Education Director, Information Security