Master of Science in Computer Information Systems concentration in Security

CNSS - Logo

The Master of Science in Computer Information Systems concentration in Security provides in-depth knowledge of emerging security threats and solutions to prepare technical leaders to identify, develop, and implement highly secure systems and networks that support organizational goals.

Students who complete the Computer Information Systems master’s degree concentration in Security will be able to demonstrate:

  • Advanced knowledge in the analysis and documentation of requirements for architecture, design, and implementation of computer applications systems.
  • Proficiency in software and computing skills as they pertain to the design and implementation of database systems, data communications, systems analysis, and design.
  • Competence sufficient to identify current and emerging information technologies that may have strategic value for enterprise; assess where those technologies have value; and manage the implementation of those technologies in the enterprise.
  • Advanced knowledge of information security concepts, governance, biometric systems, and database systems security, as well as network security and cryptography.
  • Proficiency in risk management, such as asset assessments, architectural solutions, modeling, and design.
  • Competence in security policies, processes, technology, and operations.

A total of 40 credits is required. Students must complete both the Core Curriculum and the Concentration Requirements.

Core Curriculum

(Five courses/20 credits)

This course presents the foundations of data communications and takes a bottom-up approach to computer networks. The course concludes with an overview of basic network security and management concepts. Prereq: MET CS 200, or instructor's consent. This course may not be taken in conjunction with MET CS 425 (undergraduate) or MET CS 535. Only one of these courses can be counted towards degree requirements.  [ 4 cr. ]

Fall 2018
Section Type Instructor Location Days Times
B1 IND Arena KCB 102 T 6:00 pm – 8:45 pm
O1 IND Mansur ARR
O2 IND Rizinski ARR
Sum1 2018
Section Type Instructor Location Days Times
SC1 IND Arena HAR 322 T 6:00 pm – 9:30 pm
SEL IND Arena HAR 322 T 6:00 pm – 9:30 pm
SO1 IND Chitkushev ARR
Sum2 2018
Section Type Instructor Location Days Times
SO2 IND Chitkushev ARR

Students learn the latest relational and object-relational tools and techniques for persistent data and object modeling and management. Students gain extensive hands- on experience using Oracle or Microsoft SQL Server as they learn the Structured Query Language (SQL) and design and implement databases. Students design and implement a database system as a term project. Restrictions: Only for MS CIS. This course may not be taken in conjunction with MET CS 469 (undergraduate) or MET CS 579. Only one of these courses can be counted towards degree requirements.  [ 4 cr. ]

Fall 2018
Section Type Instructor Location Days Times
C1 IND Maiewski CGS 515 W 6:00 pm – 8:45 pm
D1 IND Matthews FLR 134 R 6:00 pm – 8:45 pm
E1 IND Matthews FLR 134 R 6:00 pm – 8:45 pm
O1 IND Mansur ARR
O2 IND Mansur ARR
Sum1 2018
Section Type Instructor Location Days Times
SC1 IND Matthews FLR 109 W 6:00 pm – 9:30 pm
SEL IND Matthews FLR 109 W 6:00 pm – 9:30 pm
SO1 IND Mansur ARR
Sum2 2018
Section Type Instructor Location Days Times
SO2 IND Mansur ARR

Object-oriented methods of information systems analysis and design for organizations with data- processing needs. System feasibility; requirements analysis; database utilization; Unified Modeling Language; software system architecture, design, and implementation, management; project control; and systems-level testing.   [ 4 cr. ]

Fall 2018
Section Type Instructor Location Days Times
D1 IND Guadagno KCB 102 R 6:00 pm – 8:45 pm
E1 IND Guadagno KCB 102 R 6:00 pm – 8:45 pm
O1 IND Williams ARR
O2 IND Polnar ARR
Sum1 2018
Section Type Instructor Location Days Times
BCL IND Siegel U 8:00 am – 3:30 pm
BHA IND Guadagno W 6:00 pm – 9:30 pm
SC1 IND Guadagno FLR 264 R 6:00 pm – 9:30 pm
SEL IND Guadagno FLR 264 R 6:00 pm – 9:30 pm
SO1 IND Polnar ARR
Sum2 2018
Section Type Instructor Location Days Times
SO2 IND Farr ARR

This course describes and compares contemporary and emerging information technology and its management. Students learn how to identify information technologies of strategic value to their organizations and how to manage their implementation. The course highlights the application of I.T. to business needs. CS 782 is at the advanced Masters (700) level, and it assumes that students understand IT systems at the level of CS 682 Systems Analysis and Design. Students who haven't completed CS 682 should contact their instructor to determine if they are adequately prepared. Prereq: MET CS 682, or instructor's consent.   [ 4 cr. ]

Fall 2018
Section Type Instructor Location Days Times
D1 IND Arakelian FLR 121 R 6:00 pm – 8:45 pm
O1 IND Arakelian ARR
O2 IND Williams ARR
Sum1 2018
Section Type Instructor Location Days Times
BCL IND Siegel S 8:30 am – 4:00 pm
SC1 IND Arakelian FLR 266 M 6:00 pm – 9:30 pm
SEL IND Arakelian FLR 266 M 6:00 pm – 9:30 pm
SO1 IND Arakelian ARR
Sum2 2018
Section Type Instructor Location Days Times
SO2 IND Williams ARR

And one of the following:

This course covers the concepts of object-oriented approach to software design and development using the Java programming language. It includes a detailed discussion of programming concepts starting with the fundamentals of data types, control structures methods, classes, applets, arrays and strings, and proceeding to advanced topics such as inheritance and polymorphism, interfaces, creating user interfaces, exceptions, and streams. Upon completion of this course the students will be able to apply software engineering criteria to design and implement Java applications that are secure, robust, and scalable. Prereq: MET CS 200 or MET CS 300 or Instructor's Consent. Not recommended for students without a programming background.   [ 4 cr. ]

Fall 2018
Section Type Instructor Location Days Times
E1 IND Donald KCB 104 M 6:00 pm – 8:45 pm
O2 IND Guardino ARR
BHA IND Staff ROOM M 6:00 pm – 8:45 pm
Sum2 2018
Section Type Instructor Location Days Times
SO1 IND Guardino ARR

This course covers the concepts of the object-oriented approach to software design and development using the Python programming language. It includes a detailed discussion of programming concepts starting with the fundamentals of data types, control structures methods, classes, arrays and strings, and proceeding to advanced topics such as inheritance and polymorphism, creating user interfaces, exceptions and streams. Upon completion of this course students will be capable of applying software engineering principles to design and implement Python applications that can be used in conjunction with analytics and big data. Prerequisite: MET CS 300 Foundations of Modern Computing, or instructor's consent.  [ 4 cr. ]

Fall 2018
Section Type Instructor Location Days Times
A1 IND Lu CAS 213 M 6:00 pm – 8:45 pm
C1 IND Aleksandrov CAS 226 W 6:00 pm – 8:45 pm
D1 IND Pinsky CGS 527 R 6:00 pm – 8:45 pm
O1 IND Pinsky ARR
O2 IND Pinsky ARR
Sum1 2018
Section Type Instructor Location Days Times
SC1 IND Aleksandrov HAR 228 T 6:00 pm – 9:30 pm
SC2 IND Pinsky HAR 212 W 6:00 pm – 9:30 pm
SO1 IND Pinsky ARR
Sum2 2018
Section Type Instructor Location Days Times
SO2 IND Pinsky ARR

Students who have completed courses on core curriculum subjects as part of their undergraduate degree program or have relevant work-related experience may request permission from the Department of Computer Science to replace the corresponding core courses with graduate-level computer information systems electives. Please refer to the MET CS Academic Policies Manual for further details.

Concentration Requirements

In addition to the MS in Computer Information Systems core curriculum (20 credits), students pursuing a concentration in Security must also take the following five required courses and electives:

Required Security Courses

(Five courses/20 credits)

The goal of this course is to provide Computer Information Systems students with the mathematical fundamentals required for successful quantitative analysis of problems in the field of business computing. The first part of the course introduces the mathematical prerequisites for understanding probability and statistics. Topics include combinatorial mathematics, functions, and the fundamentals of differentiation and integration. The second part of the course concentrates on the study of elementary probability theory, discrete and continuous distributions. Prereq: Academic background that includes the material covered in a standard course on college algebra or instructor's consent.  [ 4 cr. ]

Fall 2018
Section Type Instructor Location Days Times
A1 IND Gorlin CAS 324 M 6:00 pm – 8:45 pm
B1 IND Gorlin EPC 206 T 6:00 pm – 8:45 pm
E1 IND Gorlin EPC 206 T 6:00 pm – 8:45 pm
O1 IND Temkin ARR
O2 IND Temkin ARR
Sum1 2018
Section Type Instructor Location Days Times
BHA IND Enxing ROOM T 6:00 pm – 9:30 pm
SC1 IND Gorlin FLR 109 M 6:00 pm – 9:30 pm
SEL IND Gorlin FLR 109 M 6:00 pm – 9:30 pm
SO1 IND Temkin ARR
Sum2 2018
Section Type Instructor Location Days Times
SO2 IND Temkin ARR

This course enables IT professional leaders to identify emerging security risks and implement highly secure networks to support organizational goals. Discussion of methodologies for identifying, quantifying, mitigating and controlling risks. Students implement a comprehensive IT risk management plans (RMP) that identify alternate sites for processing mission-critical applications, and techniques to recover infrastructure, systems, networks, data and user access. The course also discusses related topics such as: disaster recovery, handling information security; protection of property, personnel and facilities; protection of sensitive and classified information, privacy issues, and criminal terrorist and hostile activities.  [ 4 cr. ]

Fall 2018
Section Type Instructor Location Days Times
D1 IND Burgoyne CAS 227 R 6:00 pm – 8:45 pm
O2 IND Pak ARR
BCL IND Rachamadugu ROOM S 8:30 am – 4:00 pm
Sum1 2018
Section Type Instructor Location Days Times
SO1 IND Burgoyne ARR

The course provides an in-depth presentation of security issues in computer systems, networks, and applications. Formal security models are presented and illustrated on operating system security aspects, more specifically memory protection, access control and authentication, file system security, backup and recovery management, intrusion and virus protection mechanisms. Application level security focuses on language level security and various security policies; conventional and public keys encryption, authentication, message digest and digital signatures. Internet and intranet topics include security in IP, routers, proxy servers, and firewalls, application- level gateways, Web servers, file and mail servers. Discussion of remote access issues, such as dial-up servers, modems, VPN gateways and clients. Prereq: MET CS 535 or MET CS 625. Or instructor's consent.   [ 4 cr. ]

Fall 2018
Section Type Instructor Location Days Times
B1 IND Jacobs FLR 134 T 6:00 pm – 8:45 pm
E1 IND Jacobs FLR 134 T 6:00 pm – 8:45 pm
BCL IND Rachamadugu ROOM U 8:00 am – 3:30 pm
BHA IND Dyer ROOM W 6:00 pm – 8:45 pm
Sum2 2018
Section Type Instructor Location Days Times
SO1 IND Pak ARR

And two courses selected from the following:

In this course we will study the fundamental and design applications of various biometric systems based on fingerprints, voice, face, hand geometry, palm print, iris, retina, and other modalities. Multimodal biometric systems that use two or more of the above characteristics will be discussed. Biometric system performance and issues related to the security and privacy aspects of these systems will also be addressed.   [ 4 cr. ]

The course provides a strong foundation in database security and auditing. This course utilizes Oracle scenarios and step-by-step examples. The following topics are covered: security, profiles, password policies, privileges and roles, Virtual Private Databases, and auditing. The course also covers advanced topics such as SQL injection, database management security issues such as securing the DBMS, enforcing access controls, and related issues. Prereq: MET CS 579 or MET CS 669; or instructor's consent.  [ 4 cr. ]

Section Type Instructor Location Days Times
A1 IND Ultrino CGS 115 M 6:00 pm – 8:45 pm
E1 IND Ultrino CGS 115 M 6:00 pm – 8:45 pm
O1 IND Carroll ARR

This course will cover advanced network security issues and solutions. The main focus on the first part of the course will be on Security basics, i.e. security services, access controls, vulnerabilities, threats and risk, network architectures and attacks. In the second part of the course, particular focus and emphasis will be given to network security capabilities and mechanisms (Access Control on wire-line and wireless networks), IPsec, Firewalls, Deep Packet Inspection and Transport security. The final portion of the course will address Network Application security (Email, Ad-hoc, XML/SAML and Services Oriented Architecture security. As part of our course review we will explore a number of Network Use Cases. Prereq: MET CS 535 or MET CS 625; Familiarity with OSI and TCP/IP protocol stack; Background-familiarity with binary numbers, prime numbers, binary- hexadecimal-decimal conversions, etc; Familiarity with computer programming concepts; or instructor's consent.  [ 4 cr. ]

Fall 2018
Section Type Instructor Location Days Times
A1 IND Jacobs CGS 121 M 6:00 pm – 8:45 pm
E1 IND Jacobs CGS 121 M 6:00 pm – 8:45 pm
Sum1 2018
Section Type Instructor Location Days Times
SO1 IND Heister ARR

Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Learn what computer forensics and investigation is as a profession and gain an understanding of the overall investigative process. Operating system architectures and disk structures are discussed. Studies how to set up an investigator's office and laboratory, as well as what computer forensic hardware and software tools are available. Other topics covered include importance of digital evidence controls and how to process crime and incident scenes, details of data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness requirements. Provides a range of laboratory and hands-on assignments either in solo or in teams. With rapid growth of computer systems and digital data this area has grown in importance. Prereq: Working knowledge of windows computers, including installing and removing software. Access to a PC meeting the minimum system requirements defined in the course syllabus.  [ 4 cr. ]

Fall 2018
Section Type Instructor Location Days Times
C1 IND Arena CGS 113 W 6:00 pm – 8:45 pm
E1 IND Arena CGS 113 W 6:00 pm – 8:45 pm
O1 IND Navarro ARR
Sum1 2018
Section Type Instructor Location Days Times
SC1 IND Sheehan COM 215 W 6:00 pm – 9:30 pm
SEL IND Sheehan COM 215 W 6:00 pm – 9:30 pm

Overview of mobile forensics investigation techniques and tools. Topics include mobile forensics procedures and principles, related legal issues, mobile platform internals, bypassing passcode, rooting or jailbreaking process, logical and physical acquisition, data recovery and analysis, and reporting. Provides in-depth coverage of both iOS and Android platforms. Laboratory and hands-on exercises using current tools are provided and required.  [ 4 cr. ]

Section Type Instructor Location Days Times
SO1 IND Navarro ARR

This course provides a comprehensive understanding of network forensic analysis principles. Within the context of forensics security, network infrastructures, topologies, and protocols are introduced. Students understand the relationship between network forensic analysis and network security technologies. Students will learn to identify network security incidents and potential sources of digital evidence and demonstrate the ability to perform basic network data acquisition and analysis using computer based applications and utilities. Students will also identify potential applications for the integration of network forensic technologies and demonstrate the ability to accurately document network forensic processes and analysis. Prereq: MET CS 625 and MET CS 695; or instructor's consent.  [ 4 cr. ]

Section Type Instructor Location Days Times
C1 IND Khasnabish CGS 115 W 6:00 pm – 8:45 pm
E1 IND Khasnabish CGS 115 W 6:00 pm – 8:45 pm

The course covers the main concepts and principles of cryptography with the main emphasis put on public key cryptography. It begins with the review of integers and a thorough coverage of the fundamentals of finite group theory followed by the RSA and ElGamal ciphers. Primitive roots in cyclic groups and the discrete log problem are discussed. Baby-step Giant-step and the Index Calculus probabilistic algorithms to compute discrete logs in cyclic groups are presented. Naor -- Reingold and Blum -- Blum -- Shub Random Number Generators as well as Fermat, Euler and Miller-Rabin primality tests are thoroughly covered. Pollard's Rho, Pollard's and Quadratic Sieve factorization algorithms are presented. The course ends with the coverage of some oblivious transfer protocols and zero-knowledge proofs. There are numerous programming assignments in the course. Prereq: MET CS 248, or instructor's consent.  [ 4 cr. ]

Section Type Instructor Location Days Times
C1 IND Pascoe CAS 222 W 6:00 pm – 8:45 pm

This course builds on the material covered in CS 789 Cryptography. It begins with the coverage of commutative rings, finite fields, rings of polynomials, and finding of the greatest common divisor in the ring of polynomials. Irreducible polynomials are discussed. Field extensions and fields Fᴩ [x]/P are thoroughly covered. The main emphasis is put on elliptic curves over Fᴩ and F₂ and the ElGamal cipher on elliptic curves is presented. Block ciphers DES and double and triple DES are introduced. AES and WHIRLPOOL block ciphers and modes of operation are covered. The course continues with the introduction of message integrity and message authentication. In the last part of the course cryptographic hash functions SHA-512 and WHIRLPOOL as well as various digital signatures are introduced. Finally, entity authentication and key management issues are discussed. Prereq: MET CS 789; or instructor's consent.  [ 4 cr. ]

Degree requirements for the blended format MS in Computer Information Systems concentration in Security can be viewed here.

Degree requirements for the online MS in Computer Information Systems concentration in Security can be viewed here.

View all Computer Science & IT graduate courses.