Curriculum Requirements
Master of Science in Cybersecurity
Major Requirements
Information, Network, and Cybersecurity | Credits: | |
CSCI 620 | Operating System Security | 3 |
In this course students are introduced to advanced concepts in operating systems with emphasis on security. Students will study contemporary operating systems including UNIX and Windows. Topics include the application of policies for security administration, directory services, file system security, audit and logging, cryptographic enabled applications, cryptographic programming interfaces, and operating system integrity verification techniques. Equivalent to ITEC 445. Classroom Hours - Laboratory and/or Studio Hours – Course Credits: 3-0-3 |
||
CSCI 651 | Algorithm Concepts | 3 |
Abstract Data Structures are reviewed. The course covers the study of both the design and analysis of algorithms. Design methods include: divide-and-conquer; the greedy method; dynamic programming; basic traversal and search techniques algebraic and geometric problems as well as parallel algorithms (PRAM). Space and time complexity; performance evaluation; and NP-Hard and NP-Complete classes are also covered. The purpose of this approach to the subject is to enable students to design and analyze new algorithms for themselve. Classroom Hours - Laboratory and/or Studio Hours – Course Credits: 3-0-3 |
||
INCS 618 | Computer Security Risk Management and Legal Issues | 3 |
This course explores several domains in the Information Security Common Body of Knowledge. Students in this course will be introduced to the following domains within Information Security: Security Management Practices, Security Architecture and Models, Business Continuity Planning (BCP), Disaster Recovery Planning (DRP), Law, Investigations, Ethics, Physical Security, Operations Security, Access Control Systems and Methodology, Network and Internet Security. 3-0-3 |
||
Total: 9 Credits | ||
Computer Security | Credits: | |
INCS 615 | Advanced Network and Internet Security | 3 |
In this course, students are introduced to the design of secure computer networks. Exploitation of weaknesses in the design of network infrastructure and security flaws in network protocols are presented and discussed. Network operation systems and network architectures are reviewed, together with the respective security related issues. Issues related to the security of content and applications such as emails, DNS, web servers are also addressed. Security techniques including intrusion detection, forensics, cryptography, authentication and access control are analyzed. Security issues in IPSEC, SSL/ TLS and the SSH protocol are presented. Classroom Hours - Laboratory and/or Studio Hours – Course Credits: 3-0-3 |
||
INCS 741 | Cryptography | 3 |
In this course we introduce the students to key issues in cryptography. Topics covered include definitions of security, digital signatures, cryptographic hash functions, authentication, symmetric and asymmetric encryption, stream ciphers, and zero knowledge proof systems. Classroom Hours - Laboratory and/or Studio Hours – Course Credits: 3-0-3 |
||
INCS 745 | Intrusion Detection and Hacker Exploits | 3 |
Prerequisite: Prerequisite: CSCI 620 and INCS 615 Methods used in computer and network hacking are studied with the intention of learning how to better to protect systems from such intrusions. Methods used by hackers include reconnaissance techniques, system scanning, and gaining system access by network and application level attacks, and denial of service attacks. The course will extensively study Internet related protocols, methods of traffic analysis, tools and techniques for implementing traffic filtering and monitoring, and intrusion detection techniques. Students will study common hacking and evasion techniques for compromising intrusion detection systems. Classroom Hours - Laboratory and/or Studio Hours – Course Credits: 3-0-3 |
||
Total: 9 Credits | ||
Thesis Track1 | Credits: | |
INCS 890 | MS Thesis I2 | 3 |
This is the first of a two-course sequence spanning two semesters of research. The master's thesis provides an opportunity for the students to undertake an in-depth investigation of a specific topic within Computer Science. This course requires the students to explore an original and appropriately phrased research question, and carry out and document a comprehensive literature review, research and experimentation in the chosen problem area with a good deal of individual responsibility. The course culminates in a preliminary draft of the thesis document to be presented to the thesis faculty advisor. Classroom Hours - Laboratory and/or Studio Hours – Course Credits: 3-0-3 |
||
INCS 891 | MS Thesis II2 | 3 |
Prerequisite: Prerequisite: INCS 890 This is the second of a two-course sequence for master's thesis. Students will continue the research and experimentation started in the first course in the sequence. The course culminates in an oral defense of the thesis project in front of a thesis committee consisting of the student's thesis faculty advisor and other members. By the end of the semester, students will complete a publication-quality master's thesis to be archived in the NYIT library. Classroom Hours - Laboratory and/or Studio Hours – Course Credits: 3-0-3 |
||
Total: 6 Credits | ||
[1] Thesis track is not offered at the Vancouver campus. [2] Non-Thesis Track students do not take these courses. |
||
Electives | Credits: | |
CSCI/INCS XXX | Any graduate course within the College of Engineering and Computing Sciences approved by the chair/advisor3 | 6–12 |
Please view all course descriptions: http://www.nyit.edu/courses | ||
INCS 712 | Digital Forensics4 | 3 |
Prerequisite: Prerequisite: INCS 615 Digital forensics is concerned with the post-analysis of information systems that have already been compromised, usually by criminal actors. It is a field that encompasses a range of topics, including computer forensics, memory forensics, network forensics, and incident response. This course is an introduction to the investigation procedures that are used in digital forensics. These procedures, depending on the type of crime, reconstruct the events that led to the compromise. Students who take this course will gain an in depth understanding of handling digital evidence, gathering and investigating artifacts and evidence, and effectively managing security incidents, including incident response techniques for preventing and addressing cyberattacks. Classroom Hours - Laboratory and/or Studio Hours – Course Credits: 3-0-3 |
||
INCS 775 | Data Center Security4 | 3 |
Prerequisite: Prerequisite: INCS 745 Data Center Security is concerned with the study of computer architectures and systems that provide critical computing infrastructure. This infrastructure combines hardware devices including computers, firewalls, routers, switches, and software applications such as email systems, Web servers, and computer desktop operating systems, to implement and manage organization wide secure computing capability. Examples of critical systems include intranet, extranet, and Internet systems. Classroom Hours - Laboratory and/or Studio Hours – Course Credits: 3-0-3 |
||
Total: 6–12 Credits | ||
[3] Thesis Track must choose six credits. Non-Thesis Track must choose 12 credits. [4] All Vancouver campus students are required to take these courses in place of six credits of electives. |
||
Total Required Credits = 30 |