MS Cybersecurity

Home » Academics » Graduate Programs » MS Cybersecurity

Ensuring the security of the world’s and our own nation’s computers, systems, and networks is a key national security challenge. Thus, establishing high-quality Cybersecurity educational programs is a top national priority as well as a regional imperative since trained Cybersecurity graduates are of critical importance to several large employer groups in this region.

The University of Delaware’s Cybersecurity master’s program is structured to enable professionals to gain advanced training in this field. Unlike other programs that are solely focused on IT security, this program emphasizes design of secure software and systems, security analytics, and secure business systems. We train individuals that have a traditional background in engineering, computer science, information systems, or related fields to have strong security skills that enable them to develop new secure systems and/or software, to exploit analytics for security purposes, or to develop and manage secure business systems. Graduates of this program are skilled in the latest theories and practices required to address the most challenging cybersecurity issues facing the world today.

The master’s program has two program level outcomes.

  • Students will understand the fundamental concepts of cybersecurity and how cybersecurity objectives impact the design, development, and management of computers and networks and the software that those systems depend upon. This acquired knowledge will prepare the graduating student to both practice as a security professional in the security industry, or provide similar functions to enterprises that either need security professionals, or need in depth security knowledge for the safe development of their products and services.
  • Students will have hands‐on capabilities in all of these potential applications areas to allow them to make meaningful contributions immediately. Essential acquired knowledge and skills will include cybersecurity fundamentals, best practices, secure design techniques for software and systems, defensive hardening, attack detection, incident response, and remediation. These outcomes are based on the observation that cybersecurity is practiced in a broad range of settings, including team meetings, documenting policy, performing architectural design and reviews, and performing engineering audits, as well as while sitting at the keyboard writing software, securing systems, analyzing traces, and analyzing software.

Program Requirements

The following program is a specific version of the ECE Cybersecurity Master’s that has been accredited by the National Security Agency (NSA) and Department of Homeland Security (DHS). This non­-thesis program requires all 30 credits to be completed through coursework.

Electives/Concentrations (12 credits)

Students must complete 12 credits, or four (4) courses, of electives. Elective courses are to be taken primarily from a single chosen Concentration Area. Of these four (4) elective courses, a maximum of two (2) can be taken outside the single Concentration Area (from one of the other Concentration Areas or from the set of Fundamentals of Cybersecurity courses). The Concentration Areas and courses within each area are listed below.

Concentration Area: Secure Software

The Secure Software concentration is designed for a professional responsible for developing secure software systems. Secure Software electives are:

  • CPEG 670 Web Applications Security
  • CISC 621 Algorithm Design and Analysis
  • CISC 663 Operating Systems
  • CISC 672 Compiler Construction or CPEG 621 Compiler Design
  • CISC 675 Software Engineering Principles and Practices
  • CISC 611/CPEG 611 Software Process Management
  • CISC 612/CPEG 612 Software Design
  • CISC 613/CPEG 613 Software Requirements Engineering
  • CISC 614/CPEG 614 Formal Methods in Software Engineering
  • CISC 615/CPEG 615 Software Testing and Maintenance
  • CPEG 676 Secure Software Design
Concentration Area: Secure Systems

The Secure Systems concentration is designed for a professional responsible for secure systems that can include wireless and network communication systems, embedded systems, and related physical systems. Secure Systems electives are:

  • ELEG 635 Digital Communication
  • ELEG 658 Advanced Mobile Services
  • ELEG 617 The Smart Grid
  • CPEG 696 Topics in Cybersecurity (Simulation­ based Cybersecurity)
  • ELEG 812 Wireless Digital Communication
  • CPEG 675 Embedded Computer Systems
  • CISC 650 / ELEG 651 Computer Networks
  • CISC 853 Network Management
  • CPEG 673 Virtualization and Cloud Security
  • CISC 886 Multi­Agent Systems
  • CPEG 674 SCADA Systems and Security
  • CPEG 853 Computer System Reliability
Concentration Area: Security Analytics

The Security Analytics concentration is designed for a professional responsible for utilizing big data, analytics, and statistical learning methods to identify and characterize anomalous behavior and security risks. Security Analytics electives are:

  • ELEG 815 Analytics I ­ Statistical Learning
  • ELEG 817/FASN 817 Large Scale Machine Learning
  • CISC 683 Introduction to Data Mining
  • CISC 637 Database Systems
  • CPEG 657 Search and Data Mining
  • CISC 681 Artificial Intelligence
  • CISC 684 Introduction to Machine Learning
  • CISC 689 TPCS: Artificial Intelligence: Machine Learning
  • ELEG 630 Information Theory
Concentration Area: Security Management

The Security Management concentration is designed for a professional responsible for instituting and managing security controls within an enterprise. Security Management electives are:

  • MISY 850 Security and Control
  • FINC 855 Capital Markets & Financial Institutions
  • BUAD 840 Ethical Issues in Domestic and Global Business Environments
  • MISY 840 Project Management and Costing
  • ACCT 806 Systems Analysis, Design and Implementation
  • BUAD 870 Leadership and Organizational Behavior
  • BUAD 877 Skills for Change Agents
  • MISY 810 Telecommunications and Networking