Computing Security MS

Computing Security (thesis option), MS degree, typical course sequence

Course Sem. Cr. Hrs.
First Year
CSEC-604
Cryptography and Authentication
In this course, students will gain in depth knowledge of cryptography and authentication. Students will explore various cryptographic algorithms and authentication protocols, focusing on their design and implementation. Students will also work on a research or implementation project, based on cryptographic algorithms and/or authentication protocols. The applications of cryptography and authentication in the areas of computer networks and systems will also be investigated. (Prerequisite: MATH-190 or equivalent course.) Lecture 3 (Fall).
3
CSEC-742
Computer System Security
The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies. (Prerequisites: CSEC-600 or equivalent course. This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lab 2, Lecture 3 (Fall).
3
 
Research Electives
6
 
Advanced Electives
6
Second Year
CSEC-790
MS Thesis
This course is one of the capstone options in the MS in Computing Security program. It offers students the opportunity to investigate a selected topic and make an original contribution which extends knowledge within the computing security domain. Students must submit an acceptable proposal to a thesis committee (chair, reader, and observer) before they may be registered by the department for the MS Thesis. Students must defend their work in an open thesis defense and complete a written report of their work before a pass/fail grade is awarded. As part of their original work, students are expected to write and submit an article for publication in a peer reviewed journal or conference. (Enrollment in this course requires permission from the department offering the course.) Thesis (Fall, Spring, Summer).
6
 
Advanced Electives
6
Total Semester Credit Hours
30

Computing Security (project option), MS degree, typical course sequence

Course Sem. Cr. Hrs.
First Year
CSEC-604
Cryptography and Authentication
In this course, students will gain in depth knowledge of cryptography and authentication. Students will explore various cryptographic algorithms and authentication protocols, focusing on their design and implementation. Students will also work on a research or implementation project, based on cryptographic algorithms and/or authentication protocols. The applications of cryptography and authentication in the areas of computer networks and systems will also be investigated. (Prerequisite: MATH-190 or equivalent course.) Lecture 3 (Fall).
3
CSEC-742
Computer System Security
The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies. (Prerequisites: CSEC-600 or equivalent course. This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lab 2, Lecture 3 (Fall).
3
 
Research Electives
6
 
Advanced Electives
6
Second Year
CSEC-791
MS Project
This course is one of the capstone options in the MS in Computing Security program. It offers students the opportunity to investigate a selected topic within the computing security domain. A project involves some type of practical development with a deliverable. This may include development with computer equipment, software packages, and programming/scripting languages. Alternately, it may be the development and demonstration of an innovative process that addresses a current computing security issue or problem. Students must submit an acceptable proposal to a project committee (chair, and reader) before they may be registered by the department for the MS in CSEC Project. Students must defend their work in an open project defense and complete a written report of their work before a letter grade is awarded. A well-written professional report is required that details current thinking on the topic in the professional literature, the design and implementation of development that was done, and a critical evaluation of the results. (Enrollment in this course requires permission from the department offering the course.) Project (Fall, Spring, Summer).
3
 
Advanced Electives
9
Total Semester Credit Hours
30

Computing Security (capstone course option), MS degree, typical course sequence

Course Sem. Cr. Hrs.
First Year
CSEC-604
Cryptography and Authentication
In this course, students will gain in depth knowledge of cryptography and authentication. Students will explore various cryptographic algorithms and authentication protocols, focusing on their design and implementation. Students will also work on a research or implementation project, based on cryptographic algorithms and/or authentication protocols. The applications of cryptography and authentication in the areas of computer networks and systems will also be investigated. (Prerequisite: MATH-190 or equivalent course.) Lecture 3 (Fall).
3
CSEC-742
Computer System Security
The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies. (Prerequisites: CSEC-600 or equivalent course. This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lab 2, Lecture 3 (Fall).
3
 
Research Electives
6
 
Advanced Electives
6
Second Year
CSEC-793
Capstone for Computing Security
This course is one of the capstone options in the MS in Computing Security program. Students will apply their knowledge to solve real world problems in the areas of computing security. Students will work on a semester-long project involving some type of practical development with a deliverable. This may include development with computer equipment, software packages, and programming or scripting languages. Alternately, it may be the development and demonstration of an innovative process that addresses a current computing security issue or problem. A well-written professional report is required that details current thinking on the topic in the professional literature, the design and implementation of development that was done, and a critical evaluation of the results. The students will also present their findings in an open forum. Students are expected to submit a short proposal before they can be enrolled in the class. (Enrollment in this course requires permission from the department offering the course.) Lecture 3 (Spring).
3
 
Advanced Electives
9
Total Semester Credit Hours
30