• Swansea University Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Ross University School of Veterinary Medicine Featured Masters Courses
  • University of Southampton Featured Masters Courses
  • Jacobs University Bremen gGmbH Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Anglia Ruskin University Featured Masters Courses
  • Goldsmiths, University of London Featured Masters Courses
Middlesex University Featured Masters Courses
University of Manchester Featured Masters Courses
Imperial College London Featured Masters Courses
Queen Mary University of London Featured Masters Courses
Bath Spa University Featured Masters Courses

Course content

Master of Science in Cyber Security
The Master of Science degree in Cyber Security Engineering (MS CSE) offers a comprehensive approach to the Secure Development Lifecycle. Curriculum within the program focuses on three primary facets of cybersecurity: protection, detection and correction. Graduates with the MS in Cyber Security Engineering will have the skills and knowledge to protect pre-existing infrastructures, detect intrusions or abuses and respond to attacks in such a way that minimizes the losses and facilitates re-engineering information infrastructures to eliminate vulnerabilities. Graduates will be ready for careers within industry such as Cyber Security Analyst, Cyber Security Engineer, and many other career paths within the field of software engineering that require secure development lifecycle training. Courses are offered in the evening to accommodate the busy schedules of working professionals. The curriculum of the MS in Cyber Security Engineering is designed to prepare students for Secure Software Lifecycle Professional (CSSLP) certification.

Curriculum
The Master of Science in Cyber Security Engineering degree curriculum operates around three basic principles:

- Protection – hardening our information infrastructures to make them more resistant to attack

- Detection – since no amount of protection can provide 100% security, detection of intrusions by outsiders or abuses of privilege by insiders becomes critical

- Correction – how to respond to attacks to minimize losses and facilitate re-engineering our information infrastructures to eliminate vulnerabilities being exploited and resume operations at a higher level of assurance.

In addition to these processes and the enabling technologies that accompany them, students learn how to make decisions regarding investments of scarce resources in information assurance, using cost-benefit analyses to support management decisions. The combination of advanced studies in computer science techniques and methods with the practical engineering considerations associated with cyber-security theory and practice provide students with a unique combination of skills to enable them to become cyber-security practitioners and leaders.

Loading...

Loading...

Loading...

Loading...


Enquire About This Course

Recipient: University of Washington Bothell

Insert previous message below for editing? 
You haven’t included a message. Providing a specific message means universities will take your enquiry more seriously and helps them provide the information you need.
Why not add a message here
* required field
Send a copy to me for my own records.

Your enquiry has been emailed successfully




Cookie Policy    X