Return to: Graduate Majors (A-Z)
The Master of Science (M.S.) in Cybersecurity Intelligence and Information Security is an applied graduate major designed to develop information security/cybersecurity professionals who specialize in the intelligence function. The Major is grounded in an innovative STEM-based model for professional analytic education. Based on an integrated technical-analytic curriculum, the program includes a foundation of technical courses that address principles and practices for identifying, assessing, and managing threats to the confidentiality, integrity, and availability of an organization’s informational assets; the role of cryptographic algorithms and systems in protecting against those threats; and, the technical and operational aspects of data/computer communication networks, including network management and security. Specialized cyber intelligence courses prepare graduates to collect on, and assess the intentions, capabilities, and activities of potential adversaries, malign actors, and insiders in the cyber domain. Cyber Intelligence helps organizations to understand their specific attack surfaces and move beyond a cybersecurity model of perimeter defense to a model that is more proactive by strategically aligning the defensive capabilities with the value/risk of specific company assets.
Major Research Areas: Cybersecurity, Cyber Intelligence, Cyber Operations, Intelligence Analysis, Cyber Analytics, Information Analytics, National Security
Must meet University Admission and English Proficiency requirements as well as requirements for admission to the major, listed below.
- GRE is not required
- 250-500 word essay describing academic and professional background, reasons for pursuing the degree, and professional goals pertaining to information security and cyber intelligence
- Current professional resume or CV
- Two letters of recommendation, at least one of which should come from a faculty member familiar with the applicant’s academic performance and potential. If the applicant is unable to provide the letter from a former professor, with approval from the program’s admission coordinator, letters from other professional sources will be accepted.
- Technical foundation in computing that includes a fundamental knowledge of computer hardware and operating systems; an understanding of modern operating systems concepts and structure; knowledge of network protocols, architectures, and applications; an understanding of the principles of computational thinking and problem solving; and basic competency in an object-oriented programming language
- The technical foundation can be acquired through academic coursework or substantial work experience. An undergraduate degree in a computing discipline such as information technology, cybersecurity, computer science, computer engineering, or information systems, will meet the technical foundation requirement.
- An online “bridge” option is available for students with a solid academic record, who do not have an undergraduate degree in a computing discipline or a sufficient technical foundation.
- The graduate admissions committee may request a video or phone admission interview or additional documentation, if necessary.
Total Minimum Hours: 33 Credit Hours
- Core Requirements - 9 Credit Hours
- Additional Required Courses - 21 Credit Hours
- Practicum - 3 Credit Hours
Core Requirements (9 Credit Hours)
Additional Required Courses (21 Credit Hours)
No thesis is required.
During the semester in which the student is scheduled to graduate, the student will be required to submit an electronic portfolio demonstrating completion of core major competencies in cybersecurity and in the area of concentration. This competency-based portfolio will substitute for the written comprehensive exam because the portfolio permits the capstone assessment to align exactly with the degree program’s objectives. Each objective in the portfolio is reviewed and rated by graduate faculty for Content (demonstrating knowledge of accepted practices, procedures, and trends in the field) and Critical Thinking (ability the student’s ability to analyze a problem, organize a response, synthesize perspectives, and draw practical, testable conclusions).
Student competency in the major area may also be assessed through successful completion of practical/applied exercises (e.g., security operations analyses and/or cyber intelligence analytic scenarios) using knowledge and skills that correspond to the content of the major.
Practicum (3 Credit Hours)
Return to: Graduate Majors (A-Z)