Curriculum Designed for Cyber Security Engineers
The 30-unit program will consist of ten courses, including an integrative capstone course. Courses will be offered year-round with three semesters every year; Spring, Summer, and Fall. Each semester will last 14 weeks. Students will take two courses per semester. Courses will run for seven weeks each with a one or two week break in between semesters. This intensive format will allow students to focus on one course at a time and to still complete the degree program in 20 months.
Courses typically meet twice a week, after hours, for three-hour sessions. Additional homework, research, and study time will be required. Students will be advised to spend 15-18 hours per week in each course in order to be successful.
NOTE: Courses and units/course subject to change until classes start. Some students may be required to take CYBR 505, Computational Roots of Cyber Security, as a prerequisite.
Program Learning Outcomes
The curriculum is designed to achieve the following learning outcomes, in addition to the graduate learning outcomes shared across all of USD’s Master’s level programs. The Master of Science in Cyber Security Engineering program provides knowledge and skill in architecting, developing and fielding secure network solutions against cyber security threats. Throughout their studies, students will:
- Develop and implement encryption methodologies into secure system solutions.
- Examine and assess the role policy plays in engineering secure systems, technology for policy implementation and the role of policy in driving the composition of cyber security solutions.
- Apply the foundational elements of cyber security and engineering principles in architecting, developing and fielding secure network solutions against advanced persistent threats.
- Explore the role assurance plays in security, particularly in the development and deployment of software products, and how one must account for this in security planning.
- Design and evaluate trusted systems and implement designs into secure systems.
- Perform system assessments using knowledge of network forensics, technical knowledge that incorporates incident response and continuity planning, as well as knowledge of various types of penetrations an adversary might attempt on an information system.