At this time, MET is not accepting applications to the Master of Science in Telecommunication degree program. Consider exploring our range of online, on-campus, and blended graduate degree and certificate programs. Please email csadmissions@bu.edu with any questions you may have. Our graduate admissions advisors are available to connect with you and see how a BU education can help you achieve your professional and personal goals.
Learn to Manage Complex Telecom Projects
The Master of Science in Telecommunication at Boston University’s Metropolitan College (MET) is designed to integrate knowledge of the computer science, engineering, managerial, and legal aspects of networking and telecommunications. As implementation of 5G services gain momentum globally and network structure revenue increases, there will be new challenges and opportunities for communication service providers and those in the telecom field—and BU MET’s Telecommunication master’s can prepare you for the work ahead.
Advance Your Career in Telecommunication
Focusing on the knowledge and critical skills essential for success in the field, the BU MET Telecommunication degree program is designed to help you develop a solid understanding of basic networking technologies, systems, and services while enhancing your ability to compare networking and telecommunication products and services, and manage complex telecommunication projects.
A National Center of Academic Excellence
Boston University has been designated a Center of Academic Excellence (CAE) in Cyber Defense and Research by the National Security Agency and Department of Homeland Security. Our information security programs are certified by the Committee on National Security Systems (CNSS).
Learn More
Why Study Telecommunication at BU MET?
- Recognized & Certified: Boston University is recognized by the National Security Agency and the Department of Homeland Security as a Center of Academic Excellence (CAE) in Cyber Defense and Research. BU MET’s information security programs are certified by the Committee on National Security Systems (CNSS).
- Active Learning Environment: BU MET’s computer science courses ensure you get the attention you need, while introducing case studies and real-world projects that emphasize technical and theoretical knowledge—combining in-depth, practical experience with the critical skills needed to remain on the forefront of the information technology field. In addition, BU’s Center for Reliable Information Systems and Cyber Security (RISCS) offers opportunities to collaborate and participate in research on system reliability and information security.
- Engaged Faculty: In BU MET’s computer science graduate programs, you benefit from working closely with highly qualified faculty and seasoned industry leaders in a wide range of technology fields who are committed to teaching the latest technologies within the framework of ideas, concepts, and methods that drive innovation.
- Extensive Network: Study information systems alongside peers with solid IT experience, learn from faculty who have valuable contacts across several sectors, and benefit from an alumni community with strong professional connections.
- Student Support: Enjoy an exceptional student-to-instructor ratio, ensuring close interaction with faculty mentors and access to support.
- Valuable Resources: Make use of Boston University’s extensive resources, including the Center for Career Development, Fitness & Recreation Center, IT Help Centers, Mugar Memorial Library, the George Sherman Union, and many others.
- Flexible Options: Study at the pace that works for you, evenings on campus with courses that begin fall, spring, and summer.
- Track Record: Learn from the best—BU MET’s Department of Computer Science was established in 1979 and is the longest-running computer science department BU. Over its four decades, the department has played an important role in the emergence of IT at the University and throughout the region.
- Merit Scholarships: All applicants are automatically considered, and admitted students are nominated based on eligibility.
Master the Tools to Excel in Networking and Telecommunication
Offered through BU MET’s Department of Computer Science, the Master of Science in Telecommunication is designed for both those seeking entry to an information technology career and those seeking to advance in one. Our faculty consists of academic leaders who are engaged in innovative research and skilled industry experts with experience building networks, ensuring information security for top global companies, and developing applications.
Telecommunication Concentration Options
BU MET’s MS in Telecommunication degree program offers a concentration in:
Security
Graduate with Expertise
Metropolitan College’s Telecommunication master’s degree will equip you with:
- Advanced knowledge of data communication protocols and networks, including, but not limited to, error control and flow control, distributed synchronization, error detection and correction, forwarding and techniques to implement it, performance analysis of networks, and management of large networks.
- Competence sufficient to design, specify, and develop data transfer protocols for specific purposes; design, specify, plan, and define networks of any size; and analyze, evaluate, and select network technologies.
Certificate-to-Degree Pathway
BU MET graduate certificate programs can serve as building blocks to a master’s degree. To be eligible for the degree, you must apply for admission and be accepted into the degree program. Consult with a graduate admissions advisor to learn more about this option.
The following graduate certificate programs have courses that may be applied to the master’s degree:
Master’s in Telecommunication Curriculum
A total of 40 credits is required. A minimum passing grade for a course in the graduate program is a C (2.0) but an average grade of B (3.0) must be maintained to be in good academic standing and to be eligible to graduate.
Core Courses
(Six courses/24 credits)
MET CS 535 Computer Networks
Fall ‘23
This course provides a robust understanding of networking. It teaches the fundamentals of networking systems, their architecture, function and operation and how those fundamentals are reflected in current network technologies. Students will learn the principles that underlie all networks and the application of those principles (or not) to current network protocols and systems. The course explains how layers of different scope are combined to create a network. There will be a basic introduction to Physical Media, the functions that make up protocols, such as error detection, delimiting, lost and duplicate detection; and the synchronization required for the feedback mechanisms: flow and retransmission control, etc. Students will be introduced to how these functions are used in current protocols, such as Ethernet, WiFi, VLANs, TCP/IP, wireless communication, routing, congestion management, QoS, network management, security, and the common network applications as well as some past applications with unique design solutions. Prereq: MET CS 575 and MET CS 201 or MET CS 231 or MET CS 232. Or instructor's consent. Restrictions: This course may not be taken in conjunction with MET CS 625 or MET CS 425 (undergraduate). Only one of these courses can be counted towards degree requirements. [ 4 cr. ]
Section |
Type |
Instructor |
Location |
Days |
Times |
A1 |
IND |
Day |
SOC B57 |
T |
12:30 pm – 3:15 pm |
O2 |
IND |
Day |
ROOM |
ARR |
– |
MET CS 575 Operating Systems
Summer ‘23
Fall ‘23
Overview of operating system characteristics, design objectives, and structures. Topics include concurrent processes, coordination of asynchronous events, file systems, resource sharing, memory management, security, scheduling and deadlock problems. Prereq: MET CS472, and MET CS231 or MET CS232, or instructor's consent. [ 4 cr. ]
Sum1 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
SC1 |
IND |
Nourai |
CAS 216 |
T |
6:00 pm – 9:30 pm |
Fall 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
A1 |
IND |
Nourai |
STH 113 |
T |
6:00 pm – 8:45 pm |
A2 |
IND |
Nourai |
FLR 121 |
R |
6:00 pm – 8:45 pm |
MET CS 635 Network Media Technologies
The purpose of this course is to provide students with a deeper understanding of Media-specific Technologies not only so that they will be able to use the ones covered in this course, but more importantly be able to analyze and evaluate new technologies. This course applies the principles from CS 535 to understand the engineering that lead to them as well as the special problems that confront network technologies that operate directly over the physical media. These Media specific layers have three problems to solve: the usual one of multiple users of a common resource, accommodating the particular characteristics of the media, and providing (to the degree possible) a media- independent service to the layers above. While CS 535 provides a high-level view of some of these technologies, in this course, they are considered in much greater detail as to how these technologies address their requirements and take advantage of the assumptions made. The emphasis is on those technologies that are either representative of a type or take a unique perspective on the problem. Hence, the traditional data link protocols, such as HDLC, modern Ethernet (primarily VLANs), WiFi (802.11) represent the first type, while media technologies, such as DOCSIS, RFIDs, IoT, and cellular mobile networks are representative of the second. The course will consider how these technologies solve mobility, routing, congestion, QoS (multi-media), security, etc. A major project is part of this course. Prereq: MET CS 231 or MET CS 232 and either MET CS 625 or MET CS 535; or instructor's consent. [ 4 cr. ]
MET CS 685 Network Design and Management
Fall ‘23
. This course will cover contemporary integrated network management based on FCAPS (Fault, Configuration, Administration, Performance, and Security management) model. The introduction to the course will be an overview of data transmission techniques and networking technologies. The middle part of the course will be on Network Management Model, SNMP versions 1, 2 and 3, and MIBs. In the second part of the course, particular focus and emphasis will be given to current network management issues: various wireless networks technologies (WLAN, WiFi, WiMax), Voice-over-IP, Peer-to-Peer Networks, networking services, Identity Management, and Services Oriented Architecture Management. Prereq: MET CS 535 or MET CS 625. or instructor's consent. [ 4 cr. ]
Section |
Type |
Instructor |
Location |
Days |
Times |
A1 |
IND |
Arena |
EOP 260 |
R |
6:00 pm – 8:45 pm |
MET CS 690 Network Security
Summer ‘23
Fall ‘23
This course will cover advanced network security issues and solutions. The main focus on the first part of the course will be on Security basics, i.e. security services, access controls, vulnerabilities, threats and risk, network architectures and attacks. In the second part of the course, particular focus and emphasis will be given to network security capabilities and mechanisms (Access Control on wire-line and wireless networks), IPsec, Firewalls, Deep Packet Inspection and Transport security. The final portion of the course will address Network Application security (Email, Ad-hoc, XML/SAML and Services Oriented Architecture security. As part of our course review we will explore a number of Network Use Cases. Prereq: MET CS 535 or MET CS 625; Familiarity with OSI and TCP/IP protocol stack; Background-familiarity with binary numbers, prime numbers, binary- hexadecimal-decimal conversions, etc; Familiarity with computer programming concepts; or instructor's consent. [ 4 cr. ]
Sum1 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
SO1 |
IND |
Matthews |
ROOM |
ARR |
– |
Fall 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
A1 |
IND |
Matthews |
PSY B33 |
R |
6:00 pm – 8:45 pm |
E1 |
IND |
Matthews |
PSY B33 |
R |
6:00 pm – 8:45 pm |
MET CS 775 Advanced Networking
Fall ‘23
This seminar course provides a strong foundation in networking and Internet architecture, data transfer protocols, including TCP, SCTP, QUIC, and IPv6, and a deep look at network resource allocation with an emphasis on protocol- independent hardware for Deep Packet Inspection (DPI) and congestion management. The course goes into greater depth of current topics such as: naming and addressing, synchronization, congestion management and resource allocation (routing) and how they manifest in different environments. There will be assigned readings from the professor that require considerable class participation, both in presenting material and discussing it.
Prereq: MET CS 535 OR MET CS 625,or instructor's consent required. [ 4 cr. ]
Section |
Type |
Instructor |
Location |
Days |
Times |
A1 |
IND |
Day |
SHA 202 |
R |
12:30 pm – 3:15 pm |
E1 |
IND |
Day |
SHA 202 |
R |
12:30 pm – 3:15 pm |
Students who have completed courses on core curriculum subjects as part of their undergraduate degree program or have relevant work-related experience may request permission from the Department of Computer Science to replace the corresponding core courses with graduate-level computer science electives. Please refer to MET CS Academic Policy Manual for further details.
General Electives
(Four courses/16 credits)
Students who are not pursuing a concentration in Security must select four general electives. Electives other than those listed below must be approved by the student’s advisor. Students should make sure that they have all prerequisites required by the selected course. At least three courses must be at the 600-level or above:
MET CS 599 Biometrics
In this course we will study the fundamental and design applications of various biometric systems based on fingerprints, voice, face, hand geometry, palm print, iris, retina, and other modalities. Multimodal biometric systems that use two or more of the above characteristics will be discussed. Biometric system performance and issues related to the security and privacy aspects of these systems will also be addressed. [ 4 cr. ]
MET CS 601 Web Application Development
Summer ‘23
Fall ‘23
This course focuses on building core competencies in web design and development. It begins with a complete immersion into HTML essentially XHTML and Dynamic HTML (DHTML). Students are exposed to Cascading Style Sheets (CSS), as well as Dynamic CSS. The fundamentals of JavaScript language including object-oriented JavaScript is covered comprehensively. AJAX with XML and JSON are covered, as they are the primary means to transfer data from client and server. Prereq: MET CS 200, MET CS 231, MET CS 232 or MET CS 300. Or instructor consent. [ 4 cr. ]
Sum1 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
SC1 |
IND |
Sheehan |
MCS B33 |
W |
6:00 pm – 9:30 pm |
SO1 |
IND |
Hur |
ROOM |
ARR |
– |
Fall 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
A1 |
IND |
Sheehan |
CAS 203 |
R |
6:00 pm – 8:45 pm |
O2 |
IND |
Hur |
ROOM |
ARR |
– |
MET CS 632 Information Technology Project Management
Summer ‘23
Fall ‘23
This course provides students with a comprehensive overview of the principles, processes, and practices of software project management. Students learn techniques for planning, organizing, scheduling, and controlling software projects. There is substantial focus on software cost estimation and software risk management. Students will obtain practical project management skills and competencies related to the definition of a software project, establishment of project communications, managing project changes, and managing distributed software teams and projects. Effective Fall 2020, this course fulfills a single unit in the following BU Hub area: Teamwork/Collaboration. [ 4 cr. ]
Sum1 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
SA1 |
IND |
Kanabar |
CAS 203 |
MW |
6:00 pm – 9:30 pm |
SO1 |
IND |
Kanabar |
ROOM |
ARR |
– |
Fall 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
O1 |
IND |
Kanabar |
ROOM |
ARR |
– |
MET CS 633 Software Quality, Testing, and Security Management
Fall ‘23
Theory and practice of security and quality assurance and testing for each step of the software development cycle. Verification vs. validation. Test case design techniques, test coverage criteria, security development and verification practices, and tools for static and dynamic analysis. Standards. Test-driven development. QA for maintenance and legacy applications. From a project management knowledge perspective, this course covers the methods, tools and techniques associated with the following processes -- Plan Quality, Perform Quality Assurance, and Perform Quality Control. [ 4 cr. ]
Section |
Type |
Instructor |
Location |
Days |
Times |
A1 |
IND |
Elentukh |
FLR 123 |
W |
6:00 pm – 8:45 pm |
A2 |
IND |
Elentukh |
FLR 152 |
F |
11:15 am – 2:00 pm |
E1 |
IND |
Elentukh |
FLR 123 |
W |
6:00 pm – 8:45 pm |
MET CS 664 Artificial Intelligence
Fall ‘23
Study of the ideas and techniques that enable computers to behave intelligently. Search, constraint propagations, and reasoning. Knowledge representation, natural language, learning, question answering, inference, visual perception, and/or problem solving. Laboratory course. Prereq: MET CS 341, MET CS 342, MET CS 520 or MET CS 521. Or instructor's consent. [ 4 cr. ]
Section |
Type |
Instructor |
Location |
Days |
Times |
A1 |
IND |
Berry |
KCB 102 |
W |
6:00 pm – 8:45 pm |
O1 |
IND |
Braude |
ROOM |
ARR |
– |
MET CS 674 Database Security
Fall ‘23
The course provides a strong foundation in database security and auditing. This course utilizes Oracle scenarios and step-by-step examples. The following topics are covered: security, profiles, password policies, privileges and roles, Virtual Private Databases, and auditing. The course also covers advanced topics such as SQL injection, database management security issues such as securing the DBMS, enforcing access controls, and related issues. Prereq: MET CS 579 or MET CS 669; or instructor's consent. [ 4 cr. ]
Section |
Type |
Instructor |
Location |
Days |
Times |
O1 |
IND |
Staff |
ROOM |
ARR |
– |
MET CS 684 Enterprise Cybersecurity Management
Summer ‘23
Fall ‘23
This course covers important topics that students need to understand in order to effectively manage a successful cybersecurity and privacy program, including governance, risk management, asset classification and incidence response. Students are first introduced to cybersecurity & privacy policy frameworks, governance, standards, and strategy. Risk tolerance is critical when building a cybersecurity and privacy program that supports business goals and strategies. Risk management fundamentals and assessment processes will be reviewed in depth including the methodology for identifying, quantifying, mitigating and controlling risks. Asset classification and the importance of protecting Intellectual Property (IP) will prepare students to understand and identify protection mechanisms needed to defend against malicious actors, including industry competitors and nation states. Incident Response programs will cover preparation and responses necessary to triage incidents and respond quickly to limit damage from malicious actors. [ 4 cr. ]
Sum1 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
SO1 |
IND |
Ballesteros |
ROOM |
ARR |
– |
Fall 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
A1 |
IND |
Campbell |
STH B20 |
W |
6:00 pm – 8:45 pm |
O2 |
IND |
Pak |
ROOM |
ARR |
– |
MET CS 693 Digital Forensics and Investigations
Fall ‘23
Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Learn what computer forensics and investigation is as a profession and gain an understanding of the overall investigative process. Operating system architectures and disk structures are discussed. Studies how to set up an investigator's office and laboratory, as well as what computer forensic hardware and software tools are available. Other topics covered include importance of digital evidence controls and how to process crime and incident scenes, details of data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness requirements. Provides a range of laboratory and hands-on assignments either in solo or in teams. With rapid growth of computer systems and digital data this area has grown in importance. Prereq: Working knowledge of windows computers, including installing and removing software. Access to a PC meeting the minimum system requirements defined in the course syllabus. [ 4 cr. ]
Section |
Type |
Instructor |
Location |
Days |
Times |
E1 |
IND |
Arena |
CAS 214 |
S |
9:00 am – 12:00 pm |
O1 |
IND |
Navarro |
ROOM |
ARR |
– |
MET CS 694 Mobile Forensics and Security
Summer ‘23
Overview of mobile forensics investigation techniques and tools. Topics include mobile forensics procedures and principles, related legal issues, mobile platform internals, bypassing passcode, rooting or jailbreaking process, logical and physical acquisition, data recovery and analysis, and reporting. Provides in-depth coverage of both iOS and Android platforms. Laboratory and hands-on exercises using current tools are provided and required. [ 4 cr. ]
Section |
Type |
Instructor |
Location |
Days |
Times |
SO1 |
IND |
Navarro |
ROOM |
ARR |
– |
MET CS 695 Cybersecurity
Summer ‘23
Fall ‘23
This course introduces fundamental concepts, principles of cybersecurity and their use in the development of security mechanisms and policies. Topics include basic risk assessment and management; basic legal and ethics issues, various cyber attacks, defense methods and tools; security principles, models and components; different crypto protocols, techniques and tools, including symmetric and asymmetric encryption algorithms, hashing, public key infrastructure, and how they can be used; security threats and defense to hardware, operating systems, networks and applications in modern computing environments. Hands-on labs using current tools are provided and required. Prerequisite: METCS535 or METCS625 or instructor's consent. [ 4 cr. ]
Sum2 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
SO2 |
IND |
Zhang |
ROOM |
ARR |
– |
Fall 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
A1 |
IND |
Zhang |
PHO 205 |
T |
6:00 pm – 8:45 pm |
E1 |
IND |
Zhang |
PHO 205 |
T |
6:00 pm – 8:45 pm |
MET CS 699 Data Mining
Summer ‘23
Fall ‘23
This course aims to study basic concepts and techniques of data mining. The topics include data preparation, classification, performance evaluation, association rule mining, ?regressions and clustering. We will discuss basic data mining algorithms in the class, and students will practice data mining techniques using Python or R. Prereq: CS 521, and CS 546 and either CS 579 or CS 669. Or instructor's consent. [ 4 cr. ]
Sum1 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
SC1 |
IND |
Lee |
STH 113 |
R |
6:00 pm – 9:30 pm |
SO1 |
IND |
Joner |
ROOM |
ARR |
– |
Fall 2023
Section |
Type |
Instructor |
Location |
Days |
Times |
A1 |
IND |
Lee |
KCB 102 |
W |
2:30 pm – 5:15 pm |
A2 |
IND |
Lee |
SOC B57 |
R |
6:00 pm – 8:45 pm |
O2 |
IND |
Joner |
ROOM |
ARR |
– |
MET CS 701 Rich Internet Application Development
Fall ‘23
The Rich Internet Application (RIA) Development course concentrates primarily on building rich client web applications in the browser for desktop and mobile devices. The course is divided into various modules covering in depth the following technologies: HTML5, AngularJS, and Ionic framework. Along with the fundamentals underlying these technologies, several applications will be showcased as case studies. Students work with these technologies starting with simple applications and then examining real world complex applications. At the end of this course, students would have mastered the latest and widely used RIA methodologies. Course Prerequisites: METCS520 (Information Structures) and METCS601 (Web Application Development), or instructor's consent. [ 4 cr. ]
Section |
Type |
Instructor |
Location |
Days |
Times |
O1 |
IND |
Winderbaum |
|
ARR |
– |
MET CS 703 Network Forensics
This course provides a comprehensive understanding of network forensic analysis principles. Within the context of forensics security, network infrastructures, topologies, and protocols are introduced. Students understand the relationship between network forensic analysis and network security technologies. Students will learn to identify network security incidents and potential sources of digital evidence and demonstrate the ability to perform basic network data acquisition and analysis using computer based applications and utilities. Students will also identify potential applications for the integration of network forensic technologies and demonstrate the ability to accurately document network forensic processes and analysis. Prereq: MET CS 625 and MET CS 695; or instructor's consent. [ 4 cr. ]
MET CS 783 Enterprise Architecture
This course builds upon the strong technical foundation of our MSCIS and MSCS curricula, by providing students with the CIO-level management perspective and skills of an enterprise architect, in the context of the technologies that implement those architectures. Current technologies and processes explored in the enterprise architecture context include blockchain, microservices, multimodal/analytic databases, DevOps, SAFe (Scaled Agile Framework), containers/Docker, and some leverage of AI techniques. We cover both the migration of legacy enterprise systems and de novo enterprise architecture development, vendor selection and management, cybersecurity in the enterprise, and complex system integration. Enterprise architecture decisions are presented in the context of the business goals and alignment that are critical for success, given globalization and the reality that "all companies are now technology companies." The course content is rich with case studies that illustrate practical application of enterprise architecture approaches and lessons learned. The course also includes a number of realistic enterprise architecture assignments and an incremental term project with components spanning the course, to provide students with hands on enterprise architecture experience. Students develop the understanding and skills needed to define and implement successful enterprise architectures that provide real strategic and concrete value to organizations, such as substantially reducing IT costs while improving performance, agility and alignment of information technology to business goals. On-campus classrooms follow a "flipped classroom" format, where significant class time is devoted to in-class group workshops. Prereq: MET CS 682. Or strategic IT experience. Or instructor's consent. [ 4 cr. ]
MET CS 789 Cryptography
Fall ‘23
The course covers the main concepts and principles of cryptography with the main emphasis put on public key cryptography. It begins with the review of integers and a thorough coverage of the fundamentals of finite group theory followed by the RSA and ElGamal ciphers. Primitive roots in cyclic groups and the discrete log problem are discussed. Baby-step Giant-step and the Index Calculus probabilistic algorithms to compute discrete logs in cyclic groups are presented. Naor -- Reingold and Blum -- Blum -- Shub Random Number Generators as well as Fermat, Euler and Miller-Rabin primality tests are thoroughly covered. Pollard's Rho, Pollard's and Quadratic Sieve factorization algorithms are presented. The course ends with the coverage of some oblivious transfer protocols and zero-knowledge proofs. There are numerous programming assignments in the course. Prereq: MET CS 248, or instructor's consent. [ 4 cr. ]
Section |
Type |
Instructor |
Location |
Days |
Times |
A1 |
IND |
Pascoe |
COM 109 |
M |
6:00 pm – 8:45 pm |
MET CS 793 Special Topics in Computer Science
The course MET CS 793 Special Topics in Computer Science changes from semester to semester. More than one CS793 can be offered in a given semester. Course descriptions for all sections are listed below. For more information, please contact MET Department of Computer Science. [ 4 cr. ]
MET CS 799 Advanced Cryptography
This course builds on the material covered in CS 789 Cryptography. It begins with the coverage of commutative rings, finite fields, rings of polynomials, and finding of the greatest common divisor in the ring of polynomials. Irreducible polynomials are discussed. Field extensions and fields Fᴩ [x]/P are thoroughly covered. The main emphasis is put on elliptic curves over Fᴩ and F₂ and the ElGamal cipher on elliptic curves is presented. Block ciphers DES and double and triple DES are introduced. AES and WHIRLPOOL block ciphers and modes of operation are covered. The course continues with the introduction of message integrity and message authentication. In the last part of the course cryptographic hash functions SHA-512 and WHIRLPOOL as well as various digital signatures are introduced. Finally, entity authentication and key management issues are discussed. Prereq: MET CS 789; or instructor's consent. [ 4 cr. ]
Master’s Thesis in Telecommunication
(8 credits)
Students majoring in Telecommunication may elect a thesis option to be completed within twelve months. This option is available to Master of Science in Telecommunication candidates who have completed at least seven courses toward their degree and have a GPA of 3.7 or higher. Students are responsible for finding a thesis advisor and a principal reader within the department. The advisor must be a full-time faculty member; the principal reader may be part-time faculty with a PhD (unless waived by the department).
MET CS 810 Master's Thesis in Computer Science
This thesis must be completed within 12 months. Students majoring in Computer Science may elect a thesis option. This option is available to Master of Science in Computer Science candidates who have completed at least seven courses toward their degree and have a GPA of 3.7 or higher. Students are responsible for finding a thesis advisor and a principal reader within the department. The advisor must be a full-time faculty member; the principal reader may be part-time faculty member with a doctorate. Permission must be obtained by the department. 4cr. [ 4 cr. ]
MET CS 811 Master's Thesis in Computer Science
This thesis must be completed within 12 months. Students majoring in Computer Science may elect a thesis option. This option is available to Master of Science in Computer Science candidates who have completed at least seven courses toward their degree and have a GPA of 3.7 or higher. Students are responsible for finding a thesis advisor and a principal reader within the department. The advisor must be a full-time faculty member; the principal reader may be part-time faculty member with a doctorate. Permission must be obtained by the department. 4cr. [ 4 cr. ]
Tuition & Financial Assistance
Competitive Tuition
Our part-time rates are substantially lower than those of the traditional, full-time residential programs yet provide access to the same high-quality BU education.
Learn More
Comprehensive Financial Assistance
Our services include
scholarships, graduate loans, and payment plans.
Learn More
Get Started
Please visit the BU MET admissions page for details on how to apply, financial assistance, tuition and fees, requirements for international students, and more.
Apply Now
News & Events
Events
June 14th, 2023
at:
6:00pm - 6:45pm
Graduate Admissions Webinar
Details
Events
June 21st, 2023
at:
11:00am - 11:45am
Financing your BU MET Graduate Education (for DOMESTIC students)
Details
Events
June 21st, 2023
at:
6:30pm - 7:30pm
Graduate Admissions Information Session – In Person
Details
Back to Programs