Course Requirements
Introductory Courses
Course | Title | Quarter Hours |
---|---|---|
CSEC 418 | INTRODUCTION TO HOST SECURITY (FORMERLY CNS 418) | 4 |
NET 405 | NETWORK FUNDAMENTALS (FORMERLY TDC 405) | 4 |
NET 411 | INTRODUCTION TO COMPUTER AND NETWORK SYSTEMS (FORMERLY TDC 411) | 4 |
NET 413 | INTRODUCTION TO LAN TECHNOLOGIES (FORMERLY TDC 413) | 4 |
Foundation Courses
Course | Title | Quarter Hours |
---|---|---|
CSEC 440 | INFORMATION SECURITY MANAGEMENT (FORMERLY CNS 440) | 4 |
CSEC 450 | DIGITAL FORENSIC TECHNIQUES (FORMERLY CNS 450) | 4 |
CSEC 477 | GOVERNANCE POLICIES IN INFORMATION ASSURANCE (FORMERLY CNS 477) | 4 |
NET 463 | COMPUTER NETWORKS AND DATA SYSTEMS (FORMERLY TDC 463) | 4 |
NET 477 | NETWORK SECURITY (FORMERLY TDC 477) | 4 |
Advanced Courses
A maximum of four (4) Advanced Courses can be taken before completing the Foundation Courses and fulfilling the GPA Requirement.
Course | Title | Quarter Hours |
---|---|---|
CSEC 488 | SECURITY TESTING AND ASSESSMENT (FORMERLY CNS 488) | 4 |
CSEC 533 | ENTERPRISE SECURITY INFRASTRUCTURE CONTROLS AND REGULATORY COMPLIANCE (FORMERLY CNS 533) | 4 |
NET 577 | NETWORK SECURITY II (FORMERLY TDC 577) | 4 |
Select eight (8) Credit Hours from the following: | 8 | |
Any 400 or 500-level CSEC course that is not already a requirement in the degree | ||
IT AUDITING | ||
BUSINESS CONTINUITY/DISASTER RECOVERY THEORIES AND STRATEGIES | ||
BUSINESS CONTINUITY/DISASTER RECOVERY MANAGEMENT AND TACTICS | ||
PROTOCOLS AND TECHNIQUES FOR DATA NETWORKS (FORMERLY TDC 563) |
Major Elective Courses
Students must complete four (4) Credit Hours of CSEC courses in the range of 420 or higher or a course from the list of courses that follow. That course cannot be used to fulfill a student's Concentration Area or Foundation Courses requirements.
Course | Title | Quarter Hours |
---|---|---|
DATA ANALYSIS AND REGRESSION | ||
ADVANCED DATA ANALYSIS | ||
SCRIPTING FOR DATA ANALYSIS | ||
WEB APPLICATIONS | ||
FRAMEWORK FOR WEB APPLICATION DEVELOPMENT | ||
COMPUTER SECURITY | ||
CRYPTOLOGY | ||
DATA VISUALIZATION | ||
DISTRIBUTED SYSTEMS II | ||
PROGRAMMING MACHINE LEARNING APPLICATIONS | ||
FOUNDATIONS OF COMPUTER SECURITY | ||
CYBER-PHYSICAL SYSTEM SECURITY | ||
SECURE ELECTRONIC COMMERCE | ||
IT AUDITING | ||
FUNDAMENTALS OF DATA SCIENCE | ||
LEGAL RESPONSIBILITIES IN INFORMATION TECHNOLOGY | ||
BUSINESS CONTINUITY/DISASTER RECOVERY THEORIES AND STRATEGIES | ||
BUSINESS CONTINUITY/DISASTER RECOVERY MANAGEMENT AND TACTICS | ||
FOUNDATIONS OF NETWORK TECHNOLOGIES (FORMERLY TDC 460) | ||
TELECOMMUNICATIONS PRACTICUM (FORMERLY TDC 511) | ||
ADVANCED NETWORK TECHNOLOGIES AND DESIGN (FORMERLY TDC 560) | ||
COMPUTER-COMMUNICATION NETWORK DESIGN & ANALYSIS (FORMERLY TDC 562) | ||
PROTOCOLS AND TECHNIQUES FOR DATA NETWORKS (FORMERLY TDC 563) | ||
TELECOMMUNICATION SYSTEMS DESIGN AND MANAGEMENT (FORMERLY TDC 567) | ||
NETWORK MANAGEMENT (FORMERLY TDC 568) | ||
NETWORK SECURITY II (FORMERLY TDC 577) | ||
SOFTWARE TESTING AND QUALITY ASSURANCE | ||
CONTINUOUS DELIVERY AND DevOps | ||
OBJECT-ORIENTED ENTERPRISE COMPUTING | ||
REQUIREMENTS ENGINEERING | ||
SOFTWARE SECURITY ARCHITECTURE | ||
SOFTWARE SECURITY ASSESSMENT | ||
SOFTWARE RISK MANAGEMENT |
CDM Open Elective Courses
Students must complete four (4) Credit Hours of CDM Open Elective. Open Elective courses must be within the range of 421-699 and must be chosen among CSC, CSE, CSEC, NET, SE, IS, ECT, IT, PM, IPD, HIT, HCI, and GAM courses.
Capstone Options
Four (4) credit hours are required for the capstone requirement. Students have the option of completing the Information Security Governance course (4 credit hours) or the Computer, Information and Network Security Capstone course (4 credit hours) or completing a Master's Research Project (up to 8 credit hours) to fulfill their Capstone requirement. If a student chooses to complete a Master's Research project for 8 credit hours, 4 credit hours of CSC 695 replace one major or open elective course in the M.S. in Computer, Information, and Network Security program. A student who completes a Master's Research project also has the option of completing a Master's Thesis.
Information Security Governance Course
Computer, Information and Network Security Capstone Course
Master's Research
- Students interested in a more-in-depth study of a particular area can choose to work with a faculty member (not necessarily their academic advisor) on an independent study or research project. The student will register for up to 8 credit hours of CSC 695. If a student chooses to complete a Master's Research project for 8 credit hours, 4 credit hours of CSC 695 replace one more or open elective course in the M.S. in Computer, Information and Network Security program.
Master's Thesis
- A student who has made an original contribution to the area (typically, through work done by CSC 695) may choose to complete a Master's Thesis. The student and the student's research advisor should form a Master's Thesis Committee of 3 faculty. The student will need to submit to the committee a thesis detailing the results of the research project. After a public defense, the committee will decide whether to accept the thesis. In that case, the student will be allowed to register for the 0 credit course CSC 698 and the transcript will show the thesis title as the course topic.