Be the Firewall against Cybercrime Attacks
The Master of Science in Computer Science concentration in Security at Boston University’s Metropolitan College (MET) provides in-depth knowledge of emerging security threats and solutions to prepare technical leaders to identify, develop, and implement highly secure networks that support organizational goals.
Program at a Glance
- On Campus
- Part-Time or Full-Time Study
- STEM Designated
- 40 Units
- 12–20 Months to Completion
- 18 Core Faculty
- No GRE/GMAT
- Tuition & Fees Range—Part-Time Study*: $31,815–$35,319
*Based on 2025–2026 Boston University tuition and fees. Merit scholarship may reduce cost.
Develop In-Demand Cybersecurity Skills for Your Career
Cybercrime has become easily the most significant threat to organizations and individuals alike. A single hack can affect billions of users or cripple a company, and the problem promises only to become more challenging as the world’s digital content balloons and more devices, machines, and vehicles become “smart.” Cybereconomy research firm Cybersecurity Ventures asserts that by 2021 global cybercrime damages will exceed $6 trillion per year. At the same time, there is dire need for those with the critical applied skills and technological expertise to protect against, detect, and investigate cybercrime. The (ISC)2 Cybersecurity Workforce Study conducted in 2019 shows a shortfall in talent close to 500,000, and estimates that the workforce needs to grow more than 60 percent to meet today’s demands.
The BU MET Computer Science master’s with Security concentration will prepare you to fill sought-after roles as varied as chief information security officer, IT security director or manager, security architect/engineer, security administrator, or information security analyst—which was ranked #5 in the U.S. News & World Report list of Top Technology Jobs (2020) and shows much faster than average growth.
“The skills and competencies that I gained helped me to attend an internship program which later converted to a fulltime position. I started my career as a data scientist right after finishing my master’s program. During my studies at BU, in addition to gaining knowledge and skills, I was able to build my self confidence and become aware of my potential, which is very helpful in my career as well as my personal life.” Read more.
Maryam Asghari (MET'22)
Senior Data Scientist, Telenav
MS, Computer Science
Why Earn a Master’s in Computer Science Degree from BU?
- Active Learning Environment: BU MET’s computer science courses ensure you get the attention you need, while introducing case studies and real-world projects that emphasize technical and theoretical knowledge—combining in-depth, practical experience with the critical skills needed to remain on the forefront of the information technology field. In addition, BU’s Center for Reliable Information Systems & Cyber Security (RISCS) offers opportunities to collaborate and participate in research on system reliability and information security.
- Career Counseling: MET’s Career Development office and BU’s Center for Career Development offer a variety of job-hunting resources, including one-on-one career counseling by appointment for both online and on-campus students.
- Engaged Faculty: In BU MET’s Computer Science master’s program, you benefit from working closely with highly qualified faculty and industry leaders who have hands-on involvement in areas such as cybersecurity, digital forensics, data analytics, database management, cybersecurity, computer networks, software engineering, software development, and many others.
- Extensive Network: Study computer science alongside peers with solid IT and business experience, learn from faculty who have valuable contacts across several sectors, and benefit from an alumni community with strong professional connections.
- STEM Designated: Eligible graduates on student visas have access to an Optional Practical Training (OPT) of 12 months and an extension for up to 24 additional months.
- Student Support: Enjoy an exceptional student-to-instructor ratio, ensuring close interaction with faculty mentors and access to support.
- Valuable Resources: Make use of Boston University’s extensive resources, including the Center for Career Development, Educational Resource Center, Fitness & Recreation Center, IT Help Centers, Mugar Memorial Library, Howard Thurman Center for Common Ground, George Sherman Union, Rafik B. Hariri Institute for Computing and Computational Science & Engineering, and many others.
- Flexible Options: Study at the pace that works for you, evenings on campus with courses that begin fall, spring, and summer.
- Track Record: Learn from the best—BU MET’s Department of Computer Science was established in 1979 and is the longest-running computer science department at BU. Over its four decades, the department has played an important role in the emergence of IT at the University and throughout the region.
- Merit Scholarships: All graduate students are automatically considered for merit scholarships during the application process and nominated based on eligibility. Learn more.
Master the Tools to Excel in Computer Science
The Security concentration is part of BU MET’s MS in Computer Science (MSCS) degree program, focusing on developing the specific skills required to successfully develop and implement sophisticated and effective IT security systems.
BU MET’s Computer Science master’s degree prepares you for jobs that are seeing faster-than-average growth and excellent salaries. Amid growing demand for—and reliance upon—big data, cloud computing, machine learning, information security, and networking, the computer science and information technology sector is projected to grow at a rate much faster than the average for all other occupations through 2033, with a median annual wage of nearly $106K in 2024 (US Bureau of Labor Statistics Occupation Outlook Handbook). Because of the specialized nature of the work, competition for talent is fierce.
Graduate with Expertise
In addition to the learning outcomes derived from Metropolitan College’s Computer Science master’s degree program, the concentration in Security will be able to:
- Demonstrate advanced knowledge of cybersecurity concepts, models, principles, and practices, and ability to apply the knowledge to identify and solve the cybersecurity problems.
- Identify and explain social, legal, and ethical issues related to cybersecurity and privacy, and how they guide and apply cybersecurity design, planning, and decisions.
- Demonstrate advanced knowledge of crypto algorithms and their applications.
- Demonstrate advanced knowledge of network security and its applications.
- Identify and develop technologies and tools to prevent, detect, react to, and recover from attacks in various contexts using both offensive and defensive thinking.
- Effectively communicate (verbally and in writing), work in teams, and provide leadership.
Certificate-to-Degree Pathway
BU MET graduate certificate programs can serve as building blocks to a master’s degree. The Graduate Certificate in Information Security and Graduate Certificate in Digital Forensics share specific courses with the master’s in Computer Science concentration in Security. Students currently enrolled in a graduate certificate who are interested in transitioning into a master’s degree should contact their academic advisor to declare their interest in this pathway. A new master’s degree application is not required. Connect with a graduate admissions advisor at csadmissions@bu.edu to learn more about this option.
Master’s in Computer Science Curriculum
Security Concentration
A total of 40 units is required.
Students must complete the core courses and Security concentration requirements.
A minimum passing grade for a course in the graduate program is a C (2.0) but an average grade of B (3.0) must be maintained to be in good academic standing and to be eligible to graduate.
Core Courses
(Five courses/20 units)
MET CS 566 Analysis of Algorithms
Sprg ‘26
Prerequisites: MET CS 342 or MET CS 526 or consent of instructor. Learn methods for designing and analyzing algorithms while practicing hands-on programming skills. Topics include divide-and-conquer, sorting, dynamic programming, greedy algorithms, advanced data structures, graph algorithms (shortest path, spanning trees, tree traversals), matrix operations, and NP-completeness. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
CAS 208 |
M |
6:00 pm – 8:45 pm |
MET CS 575 Operating Systems
Sprg ‘26
Prerequisites: MET CS 232 and MET CS 472 or consent of instructor. Overview of operating system characteristics, design objectives, and structures. Topics include concurrent processes, coordination of asynchronous events, file systems, resource sharing, memory management, security, scheduling, and deadlock problems. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Nourai |
CAS 208 |
T |
6:00 pm – 8:45 pm |
MET CS 662 Computer Language Theory
Sprg ‘26
Prerequisites: MET CS 566 or consent of instructor. Theory of finite automata, regular expressions, and properties of regular sets. Context- free grammars, context-free languages, and pushdown automata. Turing machines, undecidability problems, and the Chomsky hierarchy. Introduction to computational complexity theory and the study of NP-complete problems. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Naidjate |
COM 215 |
M |
6:00 pm – 8:45 pm |
| A2 |
IND |
Naidjate |
COM 215 |
W |
6:00 pm – 8:45 pm |
MET CS 673 Software Engineering
Sprg ‘26
HUB
Prerequisites: At least two programming-intensive courses. Or consent of instructor. Familiarity with OO design concepts and proficiency in at least one high-level programming language is required. Familiarity with web or mobile application development preferred. A comprehensive overview of the entire software development lifecycle, emphasizing modern software architectures, methodologies, practices, and tools. Key topics include agile principles and methodologies such as Scrum and XP, DevOps concepts and practices, CI/CD pipeline, modern software architectures including microservices, REST, and MVC, design patterns, refactoring, software testing, secure software development, and software project management. This course features a semester-long group project where students will design, develop, build, and deploy a real-world software system, applying Agile methodology, DevOps pipeline, and various software tools. This course is better taken as a capstone course towards the end of your program study. Effective Fall 2020, this course fulfills a single unit in each of the following BU Hub areas: Digital/Multimedia Expression, Oral and/or Signed Communication, Teamwork/Collaboration. [ 4 cr. ]
BU Hub Learn More - Digital/Multimedia Expression
- Oral and/or Signed Communication
- Teamwork/Collaboration
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Eryilmaz |
KCB 107 |
T |
6:00 pm – 8:45 pm |
And one of the following:
MET CS 535 Computer Networks
Sprg ‘26
Prerequisite: MET CS 575 or consent of instructor. Provides a robust understanding of networking. You will learn the fundamentals of networking systems, their architecture, function, and operation, and how these are reflected in current network technologies. As well as the principles that underlie all networks and their application (or not) to current network protocols and systems. Discover how layers of different scope are combined to create a network and receive a basic introduction to Physical Media, the functions that make up protocols, such as error detection, delimiting, lost and duplicate detection; and the synchronization required for the feedback mechanisms: flow and retransmission control, etc. In addition, learn how these functions are used in current protocols, such as Ethernet, WiFi, VLANs, TCP/IP, wireless communication, routing, congestion management, QoS, network management, security, and the common network applications, as well as some past applications with unique design solutions. Restrictions: This course may not be taken in conjunction with MET CS 625 or MET CS 425 (undergraduate). Only one of these courses can be counted toward degree requirements. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Day |
|
T |
12:30 pm – 3:15 pm |
MET CS 579 Database Management
Sprg ‘26
Prerequisite: MET CS 232 or consent of instructor. A theoretical yet modern presentation of database topics ranging from data and object modeling, relational algebra and normalization, to advanced topics such as how to develop web-based database applications. Other topics include relational data modeling, SQL, and manipulating relational data; applications programming for relational databases; physical characteristics of databases; achieving performance and reliability with database systems; and object-oriented database systems. Restrictions: This course may not be taken in conjunction with MET CS 469 (undergraduate) or MET CS 669. Refer to your department for further details. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Lee |
CAS 228 |
R |
6:00 pm – 8:45 pm |
Students who have completed courses on core curriculum subjects as part of their undergraduate degree program may request permission from the Department of Computer Science to replace the corresponding core courses with graduate-level computer science electives. Please refer to the MET CS Academic Policies Manual for further details.
Concentration Requirements
(Five courses/20 units)
MET CS 595 Cybersecurity Fundamentals
Sprg ‘26
This course introduces fundamental concepts, principles of cybersecurity and their use in the development of security mechanisms and policies. Topics include basic risk assessment and management; basic legal and ethics issues, various cyber attacks, defense methods and tools; security principles, models and components; different crypto protocols, techniques and tools, including symmetric and asymmetric encryption algorithms, hashing, public key infrastructure, and how they can be used; security threats and defense to hardware, operating systems, networks and applications in modern computing environments. Hands-on labs using current tools are provided and required. Prerequisite: METCS535 or METCS625 or instructor's consent. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Arena |
|
W |
6:00 pm – 8:45 pm |
| O1 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
MET CS 690 Network and Cloud Security
Sprg ‘26
Prerequisites: (MET CS 535 or MET CS 625) and (MET CS 595 or MET CY 100) or consent of instructor. This course is designed to provide students with a comprehensive understanding of the fundamental concepts, principles, technologies, and best practices to secure both computer networks and clouds. Topics include an overview of network threats, SSL/TLS, Kerberos, PKI, IPsec, DNSsec, SSH, Firewall, IDS, VPD, electronic mail security, wireless network security, Blockchain, TOR, Cloud architecture, an overview of cloud threats, architecture protection, and data protection in Cloud, IAM, security best practices, etc. Upon the completion of the course, students are expected to know the threats and vulnerabilities that networks and cloud systems face, along with the strategies and tools used to mitigate those risks. Hands-on labs based on existing tools are provided and required. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
MCS B33 |
M |
6:00 pm – 8:45 pm |
MET CS 789 Cryptography
Prerequisites: (MET CS 248 & MET CS 566) or consent of instructor - The course covers the main concepts and principles of cryptography, with the main emphasis on public key cryptography. It begins with the review of integers and a thorough coverage of the fundamentals of finite group theory, followed by the RSA and ElGamal ciphers. Primitive roots in cyclic groups and the discrete log problem are discussed. Baby-step Giant-step and the Index Calculus probabilistic algorithms to compute discrete logs in cyclic groups are presented. Naor -- Reingold and Blum -- Blum -- Shub Random Number Generators as well as Fermat, Euler and Miller-Rabin primality tests are thoroughly covered. Pollard's Rho, Pollard's and Quadratic Sieve factorization algorithms are presented. The course ends with the coverage of some oblivious transfer protocols and zero-knowledge proofs. There are numerous programming assignments in the course. [ 4 cr. ]
Plus one course selected from the following:
MET CS 599 Biometrics
Sprg ‘26
In this course we will study the fundamental and design applications of various biometric systems based on fingerprints, voice, face, hand geometry, palm print, iris, retina, and other modalities. Multimodal biometric systems that use two or more of the above characteristics will be discussed. Biometric system performance and issues related to the security and privacy aspects of these systems will also be addressed. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Djordjevic |
KCB 104 |
W |
6:00 pm – 8:45 pm |
MET CS 674 Database Security
Sprg ‘26
The course provides a strong foundation in database security and auditing by utilizing Oracle scenarios and step-by-step examples. The following topics are covered: security, profiles, password policies, privileges, roles, Virtual Private Databases, and auditing. The course also covers advanced topics such as SQL injection, database management, and security issues, such as securing the DBMS, enforcing access controls, and related issues. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O2 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
MET CS 684 Enterprise Cybersecurity Management
Sprg ‘26
This course covers important topics that students need to understand in order to effectively manage a successful cybersecurity and privacy program, including governance, risk management, asset classification and incidence response. Students are first introduced to cybersecurity & privacy policy frameworks, governance, standards, and strategy. Risk tolerance is critical when building a cybersecurity and privacy program that supports business goals and strategies. Risk management fundamentals and assessment processes will be reviewed in depth including the methodology for identifying, quantifying, mitigating and controlling risks. Asset classification and the importance of protecting Intellectual Property (IP) will prepare students to understand and identify protection mechanisms needed to defend against malicious actors, including industry competitors and nation states. Incident Response programs will cover preparation and responses necessary to triage incidents and respond quickly to limit damage from malicious actors. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O2 |
IND |
Mukavetz |
|
ARR |
12:00 am – 12:00 am |
MET CS 693 Digital Forensics and Investigations
Sprg ‘26
Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Learn what computer forensics and investigation is as a profession and gain an understanding of the overall investigative process. Operating system architectures and disk structures are discussed. Studies how to set up an investigator's office and laboratory, as well as what computer forensic hardware and software tools are available. Other topics covered include importance of digital evidence controls and how to process crime and incident scenes, details of data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness requirements. Provides a range of laboratory and hands-on assignments either in solo or in teams. With rapid growth of computer systems and digital data this area has grown in importance. Prereq: Working knowledge of windows computers, including installing and removing software. Access to a PC meeting the minimum system requirements defined in the course syllabus. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| E1 |
IND |
Arena |
MET 101 |
S |
9:00 am – 12:00 pm |
| O2 |
IND |
Navarro |
|
ARR |
12:00 am – 12:00 am |
MET CS 694 Mobile Forensics and Security
Sprg ‘26
Overview of mobile forensics investigation techniques and tools. Topics include mobile forensics procedures and principles, related legal issues, mobile platform internals, bypassing passcode, rooting or jailbreaking process, logical and physical acquisition, data recovery and analysis, and reporting. Provides in-depth coverage of both iOS and Android platforms. Laboratory and hands-on exercises using current tools are provided and required. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
STH 113 |
T |
6:00 pm – 8:45 pm |
MET CS 763 Secure Software Development
Sprg ‘26
Prerequisites: MET CS 248 or consent of instructor - Overview of techniques and tools to develop secure software. Focus on the application of security. Topics include secure software development processes, threat modeling, secure requirements and architectures, vulnerability and malware analysis using static code analysis and dynamic analysis tools, vulnerabilities in C/C and Java programs, Crypto and secure APIs, vulnerabilities in web applications and mobile applications, and security testing. Hands-on lab and programming exercises using current tools are provided and required. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
KCB 102 |
M |
6:00 pm – 8:45 pm |
MET CS 787 AI and Cybersecurity
Prerequisites: MET CS 577 or consent of instructor. This course provides an in-depth exploration of the critical intersection between Artificial Intelligence (AI) and cybersecurity, focusing on two interconnected themes: protecting AI systems from vulnerabilities and harnessing the power of AI to tackle cybersecurity challenges. As AI becomes a cornerstone of modern technology, ensuring the security of AI-powered systems against adversarial attacks, backdoor attacks, and model theft is essential. Simultaneously, AI offers transformative capabilities for malware detection, intrusion prevention, and malware analysis. Through a combination of theoretical foundations, hands-on exercises, and real-world case studies, students will delve into topics such as adversarial machine learning, backdoor injection and defense, IP protection, and privacy-preserving AI. They will also learn how to design and implement AI-driven tools for identifying and mitigating cyber threats in dynamic environments. The course emphasizes practical applications, encouraging students to build resilient AI systems and utilize advanced AI techniques to enhance system security and detect emerging threats. Hands-on labs based on existing tools are provided and required. [ 4 cr. ]
MET CS 793 Special Topics in Computer Science
The course changes from semester to semester. More than one special topics course can be offered in a given semester. Course descriptions for all sections are listed below. For more information, please contact MET Department of Computer Science. [ 4 cr. ]
And no more than one additional course from the following general electives:
MET CS 544 Foundations of Analytics and Data Visualization
Sprg ‘26
Prerequisites: MET LB 103, MET LB 104, and (METCS 520 or METCS 521), or equivalent knowledge, or consent of instructor. The goal of this course is to provide students with the mathematical and practical background required in the field of data analytics. Probability and statistics concepts will be reviewed as well as the R tool for statistical computing and graphics. Different types of data are investigated along with data summarization techniques and plotting methods. Data populations using discrete, continuous, and multivariate distributions are explored. Sampling methods and errors during measurements and computations are analyzed in the course. String manipulations and data wrangling methods are examined in detail. The concepts covered in the course are demonstrated using R. Laboratory Course. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Rizinski |
STH 113 |
M |
6:00 pm – 8:45 pm |
| O1 |
IND |
Kalathur |
|
ARR |
12:00 am – 12:00 am |
MET CS 550 Computational Mathematics for Machine Learning
Sprg ‘26
Prerequisites: Basic knowledge of Python or R; or consent of instructor. - Mathematics is fundamental to data science and machine learning. In this course, you will review essential mathematical concepts and fundamental procedures illustrated by Python and/or R code and visualizations. Computational methods for data science presented through accessible, self-contained examples, intuitive explanations, and visualization will be discussed. Equal emphasis will be placed on both mathematics and computational methods that are at the heart of many algorithms for data analysis and machine learning. You will also advance your mathematical proficiency, enabling you to effectively apply your skills to data analytics and machine learning. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Pinsky |
SOC B57 |
M |
6:00 pm – 8:45 pm |
| O1 |
IND |
Pinsky |
|
ARR |
12:00 am – 12:00 am |
MET CS 555 Foundations of Machine Learning
Sprg ‘26
Prerequisites: MET CS 544 or MET CS 550 or consent of instructor. Learn the foundations of machine learning, regression, and classification. Topics include how to describe data, statistical inference, 1 and 2 sample tests of means and proportions, simple linear regression, multiple linear regression, multinomial regression, logistic regression, analysis of variance, and regression diagnostics. These topics are explored using the statistical package R, with a focus on understanding how to use these methods and interpret their outputs and how to visualize the results. In each topic area, the methodology, including underlying assumptions and the mechanics of how it all works along with appropriate interpretation of the results are discussed. Concepts are presented in context of real-world examples in order to help you learn when and how to deploy different methods. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
STH B20 |
W |
12:30 pm – 3:15 pm |
| A2 |
IND |
Alizadeh-Shabdiz |
CAS 116 |
W |
6:00 pm – 8:45 pm |
| O2 |
IND |
Alizadeh-Shabdiz |
|
ARR |
12:00 am – 12:00 am |
MET CS 561 Financial Analytics
Sprg ‘26
This course presents an overview of modern investment topics. We will start with a survey of the financial markets and the common quantitative technique to value a range of financial instruments. Once the basic blocks of valuation tools are established, the course will discuss the portfolio construction process and risk management with derivative and time series analysis. The course will use Python Jupyter Notebook to illustrate the concept and build visualization for effective communication. By completing the course, students will be able to conduct exploratory data analysis independently and leverage their programming skillset with real-world financial case studies. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Page |
STH B19 |
T |
6:00 pm – 8:45 pm |
| N4 |
IND |
O'Gorman |
|
ARR |
12:00 am – 12:00 am |
MET CS 570 Biomedical Sciences and Health IT
Sprg ‘26
Designed for current and aspiring IT professionals preparing for healthcare-related IT (Health Informatics) careers, this course provides a high-level introduction to basic concepts of biomedicine and familiarizes students with the structure and organization of the American healthcare system and the role played by IT. Medical terminology, human anatomy and physiology, disease processes, diagnostic modalities, and treatments associated with common disease processes are introduced. IT case studies also demonstrate the key roles of health informatics and how IT tools and resources help medical professionals integrate multiple sources of information to make diagnostic and therapeutic decisions. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Keskin |
MUG 205 |
T |
6:00 pm – 8:45 pm |
MET CS 577 Data Science with Python
Sprg ‘26
Prerequisite: MET CS 521 or equivalent. Or, instructor's consent. Students will learn major Python tools and techniques for data analysis. There are weekly assignments and mini projects on topics covered in class. These assignments will help build necessary statistical, visualization and other data science skills for effective use of data science in a variety of applications including finance, text processing, time series analysis and recommendation systems. In addition, students will choose a topic for a final project and present it on the last day of class. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Pinsky |
|
W |
6:00 pm – 8:45 pm |
| A2 |
IND |
Pinsky |
|
T |
6:00 pm – 8:45 pm |
| O2 |
IND |
Mohan |
|
ARR |
12:00 am – 12:00 am |
MET CS 580 Health Informatics
Sprg ‘26
This course presents the fundamental principles, concepts, and technological elements that make up the building blocks of Health Informatics. It introduces the characteristics of data, information, and knowledge in the domain, the common algorithms for health applications, and IT components in representative clinical processes. It presents the conceptual framework for handling biomedical data collection, storage, and optimal use. It covers the concepts of population health and precision medicine and the information systems that support them. It introduces basic principles of knowledge management systems in biomedicine, various aspects of Health Information Technology standards, and IT aspects of clinical process modeling. Students design a simple Health Informatics solution as a term project. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Diwania |
MCS B37 |
M |
6:00 pm – 8:45 pm |
MET CS 581 Health Information Systems
Sprg ‘26
Health Information Systems are comprehensive application systems that automate the activities of healthcare delivery including clinical care using electronic health records (EHRs), coordination of care across providers, telehealth, management of the business of healthcare such as revenue cycle management, and population health management. The course covers the functionality of these systems, the underlying information technology they require and their successful operations. It addresses challenges in this rapidly changing field such as complex data, security, interoperability, mobile technology and distributed users. The course emphasizes applied use of health information systems through case studies, current articles, and exercises. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O1 |
IND |
Levinger |
|
ARR |
12:00 am – 12:00 am |
MET CS 599 Biometrics
Sprg ‘26
In this course we will study the fundamental and design applications of various biometric systems based on fingerprints, voice, face, hand geometry, palm print, iris, retina, and other modalities. Multimodal biometric systems that use two or more of the above characteristics will be discussed. Biometric system performance and issues related to the security and privacy aspects of these systems will also be addressed. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Djordjevic |
KCB 104 |
W |
6:00 pm – 8:45 pm |
MET CS 601 Frontend Web Development
Sprg ‘26
Prerequisite: MET WD 100 - Learn essential front-end development skills, starting with foundational JavaScript techniques, such as DOM manipulation and event handling, and advancing to interactive web technologies like HTML's Drag and Drop, Canvas, and SVG. You will be exposed to asynchronous operations, including AJAX, the Fetch API, and Web Workers, and learn to craft responsive designs using Flexbox, CSS Grid, and advanced CSS selectors. A comprehensive exploration of TypeScript and its main feature, static typing, and capabilities will also be covered. The course concludes with a comprehensive dive into ReactJS, covering its core architectural concepts, component-based structure, and state management techniques. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Davoodi |
CAS 315 |
T |
6:00 pm – 8:45 pm |
MET CS 602 Server-Side Web Development
Sprg ‘26
Prerequisite: MET CS 601 Or instructor's consent. - The Server-Side Web Development course concentrates primarily on building full stack applications using the state of the art tools and frameworks. The course is divided into various modules covering in depth the following topics: NodeJS, Express, React, MongoDB, Mongoose ODM, Sequelize ORM, REST and GraphQL APIs, and application security. Along with the fundamentals underlying these technologies, several applications will be showcased as case studies. Students work with these technologies starting with simple applications and then examining real world complex applications. At the end of this course, students would have mastered developing the full stack applications using the MERN stack and related technologies. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O1 |
IND |
Kalathur |
|
ARR |
12:00 am – 12:00 am |
MET CS 622 Advanced Programming Techniques
Sprg ‘26
HUB
Prerequisites: (MET CS 342 or equivalent knowledge of Java) or (MET CS 521 and MET CS 526) or consent of instructor. Polymorphism, containers, libraries, method specifications, large-scale code management, use of exceptions, concurrent programming, functional programming, programming tests. Java is used to illustrate these concepts. Students implement a project or projects of their own choosing, in Java, since some concepts are expressible only in Java. Effective Fall 2020, this course fulfills a single unit in each of the following BU Hub areas: Quantitative Reasoning II, Creativity/Innovation, Critical Thinking. [ 4 cr. ]
BU Hub Learn More - Creativity/Innovation
- Critical Thinking
- Quantitative Reasoning II
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Rawassizadeh |
CAS 214 |
W |
6:00 pm – 8:45 pm |
| O1 |
IND |
Rawassizadeh |
|
ARR |
12:00 am – 12:00 am |
MET CS 664 Artificial Intelligence
Sprg ‘26
Prerequisites: MET CS 248 and MET CS 342. - Study of the ideas and techniques that enable computers to behave intelligently. Search, constraint propagations, and reasoning. Knowledge representation, natural language, learning, question answering, inference, visual perception, and/or problem solving. Laboratory course. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Kalathur |
EPC 208 |
M |
6:00 pm – 8:45 pm |
MET CS 665 Software Design and Patterns
Sprg ‘26
Prerequisites: METCS342 and METCS565 or consent of instructor - Software design principles, the object-oriented paradigm, unified modeling language; creational, structural, and behavioral design patterns; OO analysis and design; software architectures and frameworks; code refactoring. Laboratory course. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Orsini |
FLR 123 |
R |
6:00 pm – 8:45 pm |
| O2 |
IND |
Kalathur |
|
ARR |
12:00 am – 12:00 am |
MET CS 674 Database Security
Sprg ‘26
The course provides a strong foundation in database security and auditing by utilizing Oracle scenarios and step-by-step examples. The following topics are covered: security, profiles, password policies, privileges, roles, Virtual Private Databases, and auditing. The course also covers advanced topics such as SQL injection, database management, and security issues, such as securing the DBMS, enforcing access controls, and related issues. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O2 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
MET CS 683 Mobile Application Development with Android
Sprg ‘26
Prerequisites: MET CS 342 OR MET CS 520 OR MET CS 521. Or consent of instructor. - Learn the principles, techniques, and issues associated with modern mobile application development using Android as the development platform. Topics covered will include Android application components (Activities, Services, Content Providers and Broadcast Receivers), ICC (Inter-component Communication), declarative UI design, data storage, asynchronous processing, Android sensing, 2D graphics, and Android security. You will use Kotlin as the main language for Android development and the latest Jetpack APIs. You will also develop your own app in Kotlin using Android Studio as your semester-long project. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O2 |
IND |
Zhang |
|
ARR |
12:00 am – 12:00 am |
MET CS 684 Enterprise Cybersecurity Management
Sprg ‘26
This course covers important topics that students need to understand in order to effectively manage a successful cybersecurity and privacy program, including governance, risk management, asset classification and incidence response. Students are first introduced to cybersecurity & privacy policy frameworks, governance, standards, and strategy. Risk tolerance is critical when building a cybersecurity and privacy program that supports business goals and strategies. Risk management fundamentals and assessment processes will be reviewed in depth including the methodology for identifying, quantifying, mitigating and controlling risks. Asset classification and the importance of protecting Intellectual Property (IP) will prepare students to understand and identify protection mechanisms needed to defend against malicious actors, including industry competitors and nation states. Incident Response programs will cover preparation and responses necessary to triage incidents and respond quickly to limit damage from malicious actors. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O2 |
IND |
Mukavetz |
|
ARR |
12:00 am – 12:00 am |
MET CS 685 Network Design and Management
Sprg ‘26
Prerequisites: METCS535 or METCS625 or consent of instructor. This course will cover contemporary integrated network management based on FCAPS (Fault, Configuration, Administration, Performance, and Security management) model. The introduction to the course will be an overview of data transmission techniques and networking technologies. The middle part of the course will be on Network Management Model, SNMP versions 1, 2 and 3, and MIBs. In the second part of the course, particular focus and emphasis will be given to current network management issues: various wireless networks technologies (WLAN, WiFi, WiMax), Voice-over-IP, Peer-to-Peer Networks, networking services, Identity Management, and Services Oriented Architecture Management. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O2 |
IND |
Rizinski |
|
ARR |
12:00 am – 12:00 am |
MET CS 688 Web Mining and Graph Analytics
Sprg ‘26
Prerequisites: MET CS 544, or MET CS 555 or equivalent knowledge, or instructor's consent. - The Web Mining and Graph Analytics course covers the areas of web mining, machine learning fundamentals, text mining, clustering, and graph analytics. This includes learning fundamentals of machine learning algorithms, how to evaluate algorithm performance, feature engineering, content extraction, sentiment analysis, distance metrics, fundamentals of clustering algorithms, how to evaluate clustering performance, and fundamentals of graph analysis algorithms, link analysis and community detection based on graphs. Laboratory Course. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Hajiyani |
FLR 123 |
M |
6:00 pm – 8:45 pm |
| O2 |
IND |
Rawassizadeh |
|
ARR |
12:00 am – 12:00 am |
MET CS 689 Designing and Implementing a Data Warehouse
Sprg ‘26
Prerequisites: CS 579 or CS 669 or consent of the instructor - This course surveys state-of-the art technologies in DW and Big Data. It describes logical, physical and semantic foundation of modern DW infrastructure. Students will create a cube using OLAP and implement decision support benchmarks on Hadoop/Spark vs Vertica database. Upon successful completion, students will be familiar with tradeoffs in DW design and architecture. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O2 |
IND |
Polnar |
|
ARR |
12:00 am – 12:00 am |
MET CS 693 Digital Forensics and Investigations
Sprg ‘26
Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Learn what computer forensics and investigation is as a profession and gain an understanding of the overall investigative process. Operating system architectures and disk structures are discussed. Studies how to set up an investigator's office and laboratory, as well as what computer forensic hardware and software tools are available. Other topics covered include importance of digital evidence controls and how to process crime and incident scenes, details of data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness requirements. Provides a range of laboratory and hands-on assignments either in solo or in teams. With rapid growth of computer systems and digital data this area has grown in importance. Prereq: Working knowledge of windows computers, including installing and removing software. Access to a PC meeting the minimum system requirements defined in the course syllabus. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| E1 |
IND |
Arena |
MET 101 |
S |
9:00 am – 12:00 pm |
| O2 |
IND |
Navarro |
|
ARR |
12:00 am – 12:00 am |
MET CS 694 Mobile Forensics and Security
Sprg ‘26
Overview of mobile forensics investigation techniques and tools. Topics include mobile forensics procedures and principles, related legal issues, mobile platform internals, bypassing passcode, rooting or jailbreaking process, logical and physical acquisition, data recovery and analysis, and reporting. Provides in-depth coverage of both iOS and Android platforms. Laboratory and hands-on exercises using current tools are provided and required. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
STH 113 |
T |
6:00 pm – 8:45 pm |
MET CS 699 Data Mining
Sprg ‘26
Prerequisites: MET CS 521, MET LB 103 and MET LB 104; and either MET CS 579 or MET CS 669; or consent of instructor. - Study basic concepts and techniques of data mining. Topics include data preparation, classification, performance evaluation, association rule mining, regression and clustering. You will learn underlying theories of data mining algorithms in the class and practice those algorithms through assignments and a semester-long class project using R. After finishing this course, you will be able to independently perform data mining tasks to solve real-world problems. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A2 |
IND |
Lee |
MCS B33 |
W |
6:00 pm – 8:45 pm |
MET CS 763 Secure Software Development
Sprg ‘26
Prerequisites: MET CS 248 or consent of instructor - Overview of techniques and tools to develop secure software. Focus on the application of security. Topics include secure software development processes, threat modeling, secure requirements and architectures, vulnerability and malware analysis using static code analysis and dynamic analysis tools, vulnerabilities in C/C and Java programs, Crypto and secure APIs, vulnerabilities in web applications and mobile applications, and security testing. Hands-on lab and programming exercises using current tools are provided and required. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
KCB 102 |
M |
6:00 pm – 8:45 pm |
MET CS 766 Deep Reinforcement Learning
Sprg ‘26
Prerequisites: MET CS 577 or consent of instructor. - This course focuses on reinforcement learning, covering fundamental concepts and advanced techniques. It begins with an introduction to reinforcement learning and key concepts, such as exploitation versus exploration and Markov Decision Processes. As the course progresses, it delves into state transition diagrams, the Bellman equation, and solutions to the Multi-Armed Bandits problem. Students will explore challenges and methods related to control and prediction. Then, they learn tabular methods, including Monte Carlo, Dynamic Programming, Temporal Difference Learning, SARSA, and Q-Learning. Afterwards, the course also extends into reviewing neural network concepts, covering convolutional and recurrent neural networks, and moves on to approximation methods for both discrete and continuous spaces, including DQN and its variants. Policy gradient methods, actor-critic methods. Finally, ethical considerations in AI and safety issues are also discussed. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Mohan |
PHO 201 |
W |
6:00 pm – 8:45 pm |
MET CS 767 Advanced Machine Learning and Neural Networks
Sprg ‘26
Prerequisites: MET CS 521; MET CS 622, MET CS 673 or MET CS 682; MET CS 577 strongly recommended; or consent of instructor. Theories and methods for learning from data. The course covers a variety of approaches, including Supervised and Unsupervised Learning, Regression, k-means, KNN's, Neural Nets and Deep Learning, Transformers, Recurrent Neural Nets, Adversarial Learning, Bayesian Learning, and Genetic Algorithms. The underpinnings are covered: perceptron's, backpropagation, attention, and transformers. Each student creates a term project. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Mohan |
CDS 263 |
R |
6:00 pm – 8:45 pm |
| O2 |
IND |
Alizadeh-Shabdiz |
|
ARR |
12:00 am – 12:00 am |
MET CS 775 Advanced Networking
Sprg ‘26
Prerequisites: MET CS 535 or consent of instructor - This seminar course provides a strong foundation in networking and Internet architecture, data transfer protocols, including TCP, SCTP, QUIC, and IPv6, and a deep look at network resource allocation with an emphasis on protocol- independent hardware for Deep Packet Inspection (DPI) and congestion management. The course goes into greater depth of current topics such as: naming and addressing, synchronization, congestion management and resource allocation (routing) and how they manifest in different environments. There will be assigned readings from the professor that require considerable class participation, both in presenting material and discussing it. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Day |
STH 113 |
R |
12:30 pm – 3:15 pm |
| E1 |
IND |
Day |
STH 113 |
R |
12:30 pm – 3:15 pm |
MET CS 777 Big Data Analytics
Sprg ‘26
Prerequisite: (MET CS 521 & MET CS 544 & MET CS 555) or MET CS 577 or consent of instructor. An introduction to large-scale data analytics, focusing on both the foundational concepts and practical tools used in the field. Big Data analytics involves extracting meaningful, non-trivial insights from vast and complex datasets. You will explore key software tools and programming techniques commonly used by data scientists working with distributed systems. You will also learn core technologies for storing and processing large volumes of data, with a particular emphasis on cluster computing frameworks that follow the MapReduce paradigm, including Hadoop MapReduce and Apache Spark. Through hands-on assignments and projects, you will gain practical experience by implementing data processing algorithms and running them on real-world cloud platforms such as Amazon Web Services (AWS) and Google Cloud, utilizing educational credits and accounts provided for the course. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Alizadeh-Shabdiz |
MCS B31 |
M |
6:00 pm – 8:45 pm |
MET CS 779 Advanced Database Management
Sprg ‘26
Graduate Prerequisites: (METCS579 OR METCS669) or consent of the instructor - This course covers advanced aspects of database management including normalization and denormalization, query optimization, distributed databases, data warehousing, and big data. There is extensive coverage and hands on work with SQL, and database instance tuning. Course covers various modern database architectures including relational, key value, object relational and document store models as well as various approaches to scale out, integrate and implement database systems through replication and cloud based instances. Students learn about unstructured "big data" architectures and databases, and gain hands-on experience with Spark and MongoDB. Students complete a term project exploring an advanced database technology of their choice. Prereq: MET CS 579 or MET CS 669; or instructor's consent. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Polnar |
CAS 222 |
R |
6:00 pm – 8:45 pm |
| O1 |
IND |
Polnar |
|
ARR |
12:00 am – 12:00 am |
MET CS 781 Advanced Health Informatics
Sprg ‘26
Prerequisites: MET CS 580 or consent of instructor. This course studies health care data and information, health care information systems (HCIS), and explores the challenges of managing information technology (IT). You will learn the architecture, design, and user requirements of information systems in health care, with a focus on IT aspects of Health Informatics, specifically the design, development, operation, and management of HCIS. The first part of the course introduces foundational concepts, including information processing needs and information management in health care environments. Next, you will engage in a detailed examination of HCIS, including hospital process modeling, architecture, quality assessment, and applicable tools. The course concludes by addressing the management of HCIS and related issues, and the extension of these topics to other healthcare organizations. Throughout the course, you will gain hands-on experience by participating in a term project focused on HCIS research and development. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| O2 |
IND |
D'Amore |
|
ARR |
12:00 am – 12:00 am |
MET CS 787 AI and Cybersecurity
Prerequisites: MET CS 577 or consent of instructor. This course provides an in-depth exploration of the critical intersection between Artificial Intelligence (AI) and cybersecurity, focusing on two interconnected themes: protecting AI systems from vulnerabilities and harnessing the power of AI to tackle cybersecurity challenges. As AI becomes a cornerstone of modern technology, ensuring the security of AI-powered systems against adversarial attacks, backdoor attacks, and model theft is essential. Simultaneously, AI offers transformative capabilities for malware detection, intrusion prevention, and malware analysis. Through a combination of theoretical foundations, hands-on exercises, and real-world case studies, students will delve into topics such as adversarial machine learning, backdoor injection and defense, IP protection, and privacy-preserving AI. They will also learn how to design and implement AI-driven tools for identifying and mitigating cyber threats in dynamic environments. The course emphasizes practical applications, encouraging students to build resilient AI systems and utilize advanced AI techniques to enhance system security and detect emerging threats. Hands-on labs based on existing tools are provided and required. [ 4 cr. ]
MET CS 788 Generative AI
Sprg ‘26
Prerequisites: MET CS 577, Python programming, mathematics required for machine learning, and familiarity with neural networks. Or consent of instructor. - The first part of the course covers statistical concepts required for generative artificial intelligence. We review regressions and optimization methods as well as traditional neural network architectures, including perceptron and multilayer perceptron. Next, we move to Convolutional Neural Networks and Recurrent Neural Networks and close this part with Attention and Transformers. The second part of the course focuses on generative neural networks. We start with traditional self-supervised learning algorithms (Self Organized Map and Restricted Boltzmann Machine), then explore Auto Encoder architectures and Generative Adversarial Networks and move toward architectures that construct generative models, including recent advances in NLP, including LLMs, and Retrieval Augmented Methods. Finally, we describe the Neural Radiance Field, 3D Gaussian Splatting, and text-2-image models. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Rawassizadeh |
CAS B06A |
R |
6:00 pm – 8:45 pm |
MET CS 790 Computer Vision in AI
Sprg ‘26
Prerequisites: MET CS 566 or instructor's consent. - Students enrolled in this course will gain comprehensive insights into fundamental and advanced concepts within the dynamic realm of computer vision. The curriculum will focus on cutting-edge applications of deep neural networks in computer vision. Through hands-on experiences and practical exercises, students will learn to leverage computer vision and machine learning techniques to solve real-world challenges. This course not only equips students with theoretical knowledge but empowers them to apply these concepts effectively, fostering a deep understanding of how computer vision can be harnessed to address complex problems in diverse industries. [ 4 cr. ]
| Section |
Type |
Instructor |
Location |
Days |
Times |
| A1 |
IND |
Zhang |
MCS B31 |
T |
6:00 pm – 8:45 pm |
MET CS 793 Special Topics in Computer Science
The course changes from semester to semester. More than one special topics course can be offered in a given semester. Course descriptions for all sections are listed below. For more information, please contact MET Department of Computer Science. [ 4 cr. ]
Computer Science Faculty
Tuition & Financial Assistance
Competitive Tuition
Our part-time rates are substantially lower than those of the traditional, full-time residential programs yet provide access to the same high-quality BU education.
Learn More
Comprehensive Financial Assistance
Our services include
scholarships, graduate loans, and payment plans.
Learn More
How Much Does This Program Cost?
BU MET Programs offer the flexibility of part-time or full-time study. Tuition, fees, and total program cost are determined by enrollment status. If you enroll in 1–2 courses (4–8 units) in a semester, you are charged the part-time per-unit rate. If you enroll in 3–4 courses (12–16 units) in a semester, you are charged the full-time semester rate.
MS in Computer Science, Security Concentration (On Campus)
| Enrollment Status |
Part Time |
Full Time |
| Courses per Semester |
2 courses (8 units) |
4 courses (16 units) |
3 courses (12 units) |
| Time to Degree |
5 semesters (20 months) |
3 semesters (12–16 months)*** |
4 semesters (16–20 months)*** |
| Tuition* |
$567–$1,005 per unit** |
$34,935 per semester |
$34,935 per semester |
| Fees per Semester* |
$75 |
$501 |
$501 |
| Total Degree Cost* |
$31,815– $35,319 |
$78,987 |
$110,403 |
*Based on 2025–2026 Boston University tuition and fee rates.
**Cost per unit is determined by course number (100–599 = $567/unit, 600–999 = $1,005/unit).
***Summer semester enrollment is not required for international students to maintain F-1 visa status. Enrollment in summer semester coursework will expedite completion of program and reduce total program cost.
International students seeking an F-1 visa for on-campus study must enroll full time and demonstrate availability of funds to cover the Estimated Cost of Graduate Study; those who wish to study online may enroll part-time but are not eligible for a visa. Learn more about International Student Tuition & Fees.
Questions? Please contact us to hear from an Admissions Advisor who can help you determine the best enrollment pathway. For information regarding financial aid, visit BU MET’s Financial Aid page.
Get Started
Please visit the BU MET admissions page for details on how to apply, financial assistance, tuition and fees, requirements for international students, and more.
Apply Now
What to Read Next: MET Computer Science & IT Knowledge Center
News & Events
Events
Admitted Student Webinar: Online Students Meet Your BU Classmates!
Day:
November 13th, 2025
Time:
1:00pm - 1:45pm
Online
Details
Events
Jacques Pépin Lecture Series: Flavors of Anatolia with Ana Sortun
Day:
November 13th, 2025
Time:
6:00pm - 8:00pm
808 Commonwealth Avenue, Room 128
Details
Events
Graduate Information Session - In Person
Day:
November 13th, 2025
Time:
6:30pm - 7:30pm
1010 Commonwealth Avenue, Boston, MA.
Details
Back to Programs