- Description
- PLOs
- Admission Requirements
- Degree Requirements
- Student Enrollment
- Admission
- Courses
- Brochure
- FAQ
- Contact
The Master of Science in Cyber Security program is designed to provide professional preparation for private, public and non-profit sector professionals in the field of cyber security. The curriculum delivered in an accelerated 18-month cohort model, requires completion of six (6) core and four (4) elective courses. The program culminates with a cyber-security research project supervised by a faculty member. The purpose of the Master of Science in Cyber Security program is to prepare students for professional careers in cyber security. The program aims to provide a learning experience for the students to develop technical skills in protecting IT infrastructures, operating system, and networks from intentional and unintentional information security breaches. The curriculum learning outcomes are designed for the acquisition of advanced expertise in the area of cyber security, including the protection of computers, networks, programs form unauthorized access, alternation or damage of data. The program’s strengths include a robust academic curriculum, high quality expert instructors, accelerated format (18-month model); and affordability. The Master of Science I Cyber Security will position its graduates to become leaders in the field of cyber security. A classes are scheduled to accommodate late afternoon, evening, and weekend classes.
Useful Links:
Program Learning Outcomes
- Identify, locate, and interpret cyber security research of cyber threats originated from policies, practices, and products to information systems and the infrastructure.
- Compare and contrast legal, ethical, technical and policy issues in cyber security.
- Evaluate different approaches to vulnerability assessment, risk mitigation, auditing, and information systems certification.
- Design and evaluate information systems in regard to their security and protection of its own data.
- Perform an advanced computer forensics investigation and evaluate system networks.
Following are general requirements for this course
- A bachelor's degree from a regionally accredited college or university.
- Good standing at the last institution
- A grade point average (GPA) of at least 2.5 on the last degree completed or at least 2.5 in the last 60 semester units attempted.
- International Students must provide an evidence of one of the following:
- A minimum score of 80 on the internet-based TOEFL exam (iBT)
- A minimum score of 213 on the computer-based TOEFL exam
- A score of 6.5 or higher on the IELTS,or
- A score of 53 or higher on the Pearson Test of English (PTE) Academic
Depending on the type of the undergraduate degree held, the applicants may be admitted with either a classified or conditional admission status.
Degree Requirements
https://www.csudh.edu/cyber-security-ms/degree-requirements/
Enrollment Data
Fall 2017 | Fall 2018 | Fall 2019 | Fall 2020 | Fall 2021 | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Program | Enroll | Grad | Enroll | Grad | Enroll | Grad | Enroll | Grad | Enroll | Grad |
BSCS | 317 | 23 | 333 | 38 | 427 | 57 | 469 | 60 | 473 | |
MSCS | 73 | 12 | 74 | 23 | 64 | 20 | 50 | 24 | 57 | |
BACT | 223 | 57 | 214 | 53 | 225 | 63 | 209 | 55 | 228 | |
BSIT | 25 | 1 | 37 | 5 | 61 | 4 | 81 | 10 | 87 | |
MSCY | 24 | 0 | 50 | 20 | 63 | 17 | 76 | |||
Total | 638 | 93 | 682 | 119 | 827 | 164 | 872 | 166 | 921 |
Full Admission
In order to be admitted with a classified status, the applicant must meet all general admission requirements and hold a bachelor’s degree in Computer Technology (CT), Information Technology (IT), Computer Science(CS) or a related subject.
Conditional Admission
The applicants holding bachelor’s degrees in the fields not related to Computer Science, may be considered for a conditional admission. Conditionally admitted students may have to fulfill additional requirements before they attain a classified status. These additional requirements, which will be determined by evaluating applicant’s transcripts and work-related experience, include an evidence of mastery of the key concepts in the following topic areas:
• Computer Hardware and Tools
• Computer Programming
• Operating System and Networking
• Dynamic Web Programming
• Network Security
• Introduction to Statistics
Or take the Cyber Security Certificate of Completion at CSUDH: (three 2-unit courses)
• IT Fundamentals
• Network and Hardware
• Cyber Security
https://www.csudh.edu/cyber-security-ms/course-descriptions/
The program consists of 30 units: six core courses totalling 18 units and 12 units of electives. The last course, CYB 590, is a culminating experience consisting of a student-developed cyber security research project conducted under the supervision of a faculty member.
Course descriptions can be found on the University Catalog link here. | |
(A) CORE COURSES (18 UNITS): | |
CYB 501 | Foundation of Information Security |
CYB 528 | Foundations of Cyber Forensics |
CYB 538 | Information Security Policy and Procedures |
CYB 555 | Information Assurance and Network Security |
CYB 584 | Software Project Planning and Management |
CYB 590 | Graduate Project |
(B) ELECTIVES (12 UNITS): | |
CYB 529 | Advanced Cyber Forensics |
CYB 548 | Advanced Operating Systems Security |
CYB 551 | Data Communications and Computer Network |
CYB 552 | Advanced Hacking Prevention |
CYB 562 | Advanced Communication System Security |
CYB 572 | Secure Cloud Computing |
Course Offerings
Brochure
Frequently Asked Questions
https://www.csudh.edu/cyber-security-ms/faqs/Admission Requirements