In ITU’s M.S. Information and Cybersecurity program, you’ll gain in-demand knowledge and skills that are critical to protecting sensitive government and business information. The curriculum gives you the technical expertise needed to take on a diverse range of industry-specific challenges, going far more in-depth than the thousands of cyber training courses being offered elsewhere. You’ll graduate with the ability to develop complex security solutions from the ground up.
As an ITU computer science student, you can:
- Get hands-on research experience in embedded systems, green energy, AI robotics, and more
- Learn from instructors who come from industry-leading companies like ARM, Fujitsu, and Intel, and receive insider insight into the latest trends
- Gain global perspective in current research developments through our unique partnerships with schools around the world, like Peking University in China
- Be part of a STEM program designed to teach students the skills required to thrive in Silicon Valley’s ever-evolving tech sector
- Bachelor’s degree with a minimum GPA of 2.75, or a Master’s degree with a minimum GPA of 3.0.
- Proof of English proficiency:* All applicants whose native language is not English and who did not receive either a bachelor’s or graduate degree from an English-speaking institution must take an English proficiency test.
- Test of English as a Foreign Language (TOEFL) examination: score of 72 or better for the internet-based test (iBT).
- International English Language Testing System (IELTS) examination: band score of 6.0 or better for the academic module. Demonstrated commitment to contribute to and complete the program
* U.S. citizens or U.S. Permanent Residents who have earned an undergraduate or graduate degree from a regionally accredited institution in the U.S. are waived from this requirement.
Here are our program learning outcomes:
- Secure organizations’ on-premise and cloudbased computing resources
- Demonstrate in depth knowledge of IS techniques to provide leadership for effective solutions to security problems.
- Have sound knowledge of IS techniques that play a role in organizational processes and decisionmaking.
- Communicate effectively risk management issues and their impacts to a variety of audiences.
- Understand the legal and appreciate the ethical importance of ICS for individuals as well as organizations.
- Business enabler in organizations such as finance, insurance, healthcare, e-commerce, and mail services.
- Work as security expert in federal agencies for whom cyber security is of highest importance such as DOD, DHS, and FBI.
The curriculum consists of 4 required (core) courses, a Capstone Project, an Internship, and a sufficient number of elective courses to accumulate 36 total credit units. The Internship courses must be chosen by students who are on Curricular Practical Training and only one Internship course is allowed per trimester.
- Cyber Attack Countermeasures
- Optimization Techniques
- Theory of Cryptographic Systems
- Big Data
- 4 Core Courses: 12 Credit Hours
- 1 Capstone Course: Project or Thesis: Up to 3 credit hours (counts as Elective)
- Internship: 1 Credit Hour
Elective Courses: 11-20 Credit Hours
- Elective Courses: 11-20 Credit Hours
- Cross-Disciplinary Course: Up to 3 credit hours (counts as Elective)
- Transfer Credits:: Up to 9 credit hours (counts as Elective)
36 Total Credit Hours
- ICS 501 Introduction to Cyber Security
- ICS 502 Cyber Attack Countermeasures
- ICS 601 Advanced Cyber Security
- ICS 680 Theory of Cryptographic Systems
Capstone Course or Thesis
- ICS 690 Capstone Project
- ICS 695 Master’s Thesis
- INT592 (GRN 900F-2) Internship Preparation (2)
- INT593 (GRN 900P-1) Internship part-time (1), full time (3)
The student can choose from the following elective courses explicitly listed below. Courses that are not listed below cannot be taken for credit in the MSICS program.
- AMS 510 Linear Algebra (3)
- AMS 540 Discrete Mathematics (3)
- AMS 750 Abstract Algebra (3)
- AMS 760 Practical Number Theory (3)
- CEN566 Routing in Computer Networks (3)
- CSC505 The UNIX/Linux OS (3)
- CSC507 Unix/Linux System Administration (3)
- CSC509 Windows Administration (3)
- CSC511 OO Programming with C++ (3)
- CSC512 Data Structures (3)
- CSC515 I-Phone Application Development (3)
- CSC518 OO Programming with Java (3)
- CSC519 Android Application Development (3)
- CSC520 Python Programming (3)
- CSC527 Mobile Web Development (3)
- CSC570 Web Security Fundamentals (3)
- CSC580 Computer Algorithms (3)
- CSC633 Machine Learning (3)
- CSC670 Network and Data Security (3)
- CSC730 Cryptography & Cryptanalysis (3)
- CSC750 Coding Theory (3)
- CSC760 Advanced Topics in Data Science (3)
- ICS550 Security Policies (3)
- ICS520 Personal Computer Security (3)
- ICS620 Computer Malware (3)
- ICS630 Digital Forensics Technology (3)
- ICS688 Special Topics (3)
- SWE510 Information Security Countermeasures (3)
- SWE520 Principles of Ethical Hacking (3)
- SWE530 Cloud Computing Security (3)
- SWE561 Cloud Computing (3)
For more information on program requirements and course, descriptions click here.