Study Plan MIS


​​Master in Information Security​​​

​​

Total Program Credits

    42 credits

Degree requirements

Successful completion of a 42 credit hours distributed as follows:

39 credit hours from the core courses.
3 credit hour from a capstone project.​
42 credit hours required:


​​​​Program Structure

 

Number & Type of Courses

Credit Hours

13 Core Courses

39

1   Capstone Course

  3

Total (14)

42

 

Study Plan​

 

First Semester​​​​

Pre-Requisite

Credit Hours

Course Title

Course Code

None​

3

Research Methodology

RES500

None​

3

Business and Information Technology

IT500

6

Total

 

Second Semester

Pre-Requisite

Credit Hours

Course Title

Course Code

None

3

Introduction to Cyber Security and Digital Crime

CS507

None​​

3

Cryptography Fundamentals 

CS512​

  6

Total

 

Third Semester

Pre-Requisite

Credit Hours

Course Title

Course Code

IT500, CS507​

3 / Lab

Enterprise Cyber Security

CS562

IT500, CS507​

3

Innovative Solutions in Complex Organizations

IT575

  6

Total
 

Fourth Semester

Pre-RequisiteCredit HoursCourse TitleCourse Code

CS562​

3 / Lab

Cyber Defense in Web Based Attacks

CS564

CS507, CS562​

3

Cyber Security Defense and Countermeasures

CS664

 6

Total

 

Fifth Semester

Pre-Requisite

Credit Hours

Course Title

Course Code

CS562​

3 / Lab

Securing the Enterprise Infrastructure with Cyber Security Techniques

CS566

CS664​

3 / Lab

Ethical Hacking and Penetration Testing

CS683

  6

Total


Sixth Semester

Pre-RequisiteCredit HoursCourse TitleCourse Code

CS683​

3 / Lab

Digital Forensics and Investigations

CS663

CS664​

3 / Lab

Advanced Principles of  Cyber Security

CS666

 6

Total

 

Seventh Semester

Pre-Requisite

Credit Hours

Course Title

Course Code

IT500​

3

Information Security Legal and Ethical Issues

CS685

Department Approval​

3

Capstone Project - Information Security

CS699

 6

Total


SEU Master of Science in Information Security

Course list and Prerequisites

 

RES 500 Research Methodology:

This course will provide the students with the basics of academic writing and a broad introduction to the methodological foundations and tools to make research. The course covers the basics of academic writing for graduate level students and introduces the language of research, ethical principles and challenges, and the elements of the research process within quantitative, qualitative, and mixed methods approaches. Participants will use theoretical aspects to begin to critically review literature relevant to their field of interests. Students will learn how to identify problems to study, develop hypotheses and research questions, specify independent and dependent variables, check for the validity and reliability of studies and design research projects. They will be exposed to a broad range of designs used in their researches from laboratory and field experiments, surveys, content analysis, focus groups and in-depth interviewing

Prerequisite: None

 

IT500 Business and Information Technology:

This course is appropriate for students with limited experience in IT. It provides an overview of information technologies used to maximize organizational efficiency and effectiveness.

Prerequisite: None

 

CS507 Introduction to Cyber Security and Digital Crime:

This course provides an introduction to cyber security and digital crime to information technology professionals interested in data security. Students will learn about information security threats, dangers, and risks that organizations face and will develop the ability to analyze potential vulnerabilities that can have an adverse impact on digital assets.

Prerequisite:None

 

CS562 Enterprise Cyber Security:

This course provides students with insight into the cyber security issues surrounding an enterprise including securing organizational data, responding to cyber based security breaches, emerging technologies, and ensuring a secured computing environment for safeguarding company information.

Prerequisites: IT500 and CS507

 

IT575 Innovative Solutions in Complex Organizations:

This course presents real world business problems that require effective IT solutions in complex organizations including collaboration with local and multinational vendors. Students analyze existing technology in the workplace and evaluate new trends including cloud computing, virtualization, and mobile solutions for remote employees in an effort to gain or maintain technological competitive advantages.

Prerequisites: IT500 and CS507

 

CS566 Securing the Enterprise Infrastructure with Cyber Security Techniques:

The course reinforces cyber security methods in critical infrastructures equipping students with the knowledge and hands on experience of protecting large Windows Based infrastructure services.  Students will also gain insight into complex cyber security system design, deployment, and ongoing maintenance.

Prerequisite: CS562

 

CS564 Cyber Defense in Web Based Attacks:

This course includes a focus on external cyber security threats including the Internet, information networks and the World-Wide Web.  There will be a detailed view into social media, search engines, and current trends that integrate social media outlets into the enterprise as a means of achieving strategic objectives.

Prerequisite: CS562

 

CS664 Cyber Security Defense and Countermeasures:

This course prepares students to defend enterprise networks from web based and internal attacks using techniques such as system hardening, encryption, policy enforcement and software/hardware intrusion detection systems to protect enterprise data assets.

Prerequisite: CS507, CS562

 

CS512​Cryptography Fundamentals ​:

This course provides students with a thorough review of cryptography and cryptographic techniques as they apply to the area of information and computer security. Students will learn about various cryptography techniques along with their advantages and disadvantages. Additionally, discussion will be provided on the various systems that are used to provide secure and encrypted end-to-end communications to include: pre-shared keys, hashing algorithms, certificates, public-key/private key infrastructures and shared secret keys.​

Prerequisite: None

 

CS666 Advanced Principles of Cyber Security:

This course provides students with an overview of cyber security which includes a comprehensive view of organizational issues involved with privacy, information security, and cyber crime focused on information networks and systems.

Prerequisite: CS664

 

CS683 Ethical Hacking and Penetration Testing:

This course provides students with the experience needed to secure information systems against attacks such as viruses, worms, as well as other system weaknesses that pose a significant danger to organizational data. Students learn ethical hacking and penetration testing to uncover common techniques used by cyber criminals to exploit system vulnerabilities.

Prerequisite: CS664

 

IT685 Information Security Legal and Ethical Issues:

This course examines how law, ethics, and technology intersect in organizations that rely on information technology. Students will gain an understanding and insight into issues arising from privacy, secrecy, access control, and policy enforcement, as well as other legal and ethical dilemmas prevalent in today's organizations.

Prerequisite: IT500

 

CS663 Digital Forensics and Investigations:

This course provides students with insight to cyber security professional intrusion detection methods, information security tools, and preventative measures to information security risks. Students will learn how to respond to cyber breaches including the recovery, preservation, analysis of digital crime scene evidence, and proper incident response to cyber criminals.

Prerequisite: CS683

 

CS699 Capstone Project - Information Security:

The capstone course allows the students to review an organization's needs and address all the challenges involved with implementing and/or changing information technology focusing on information security in a complex organization. Students will analyze organizational objectives and propose a solution and a full implementation plan. The proposed solution must address strategies for overcoming the challenges of information security related projects such as assessing risks, reduction of funding, and keeping the support of executive management. Students will utilize skills gained throughout the program to demonstrate the ability to design an information security project from conception to post deployment. Prerequisite: Successful completion of all core and specialization coursework

Prerequisite: Department Approval

 

Course Specifications

To view the course descriptions click here .

 

​​