Program Overview
Master of Science in Digital Forensics and Cybersecurity
Overview
The Master of Science in Digital Forensics and Cybersecurity is a graduate program that prepares students for careers in information technology security analysis, cyber defense management, and risk management. The program offers three tracks: Cybersecurity, Cyber Operations, and Digital Forensics.
Program of Study
The program includes 30-33 credits of coursework over two semesters, followed by a 3-6 credit summer internship or thesis. Students can complete the program through full-time or part-time study, with evening classes available.
Tracks
Cybersecurity
This track covers computer hardware and operating systems, cybersecurity threats and controls, network monitoring, vulnerability scanning, anomaly and intrusion detection, incident response methods, and machine learning and artificial intelligence in cyber defense.
- Fall Courses:
- Advanced Data Analysis
- System Administration and Operating System Concepts
- Cyber Threats and Defense
- Computer Forensics
- Open Source Intelligence and Social Network Analysis
- Database Security and Forensics
- Spring Courses:
- Information Security Analysis
- Cyber Incident Analysis
- Security Implementation
- Hacking for Penetration Testers (TBH2)
- SCADA Security and Forensics
- Cloud Security and Forensics
- Cyber Law and Ethics
- Cyber Incident Analysis
- Summer Courses:
- Internship/Thesis
Cyber Operations
This track prepares students for proactive threat hunting and offensive/defensive operations. Students will learn how to identify adversary motivations, actively identify network surveillance and advanced persistent threats, exploit adversary vulnerabilities, respond to nation-state attacks, and understand the national/international legal parameters relevant to cyberattacks.
- Core Courses:
- Advanced Networking
- Cyberlaw and Ethics
- Hacking for Penetration Testers
- Reverse Engineering Malware
- Cyber Threat Hunting
- Cyber Vulnerability Exploitation
- Introduction to Information and Cyber Security
- Mathematical Methods for Information Security
- Thesis/Internship Course:
- 6 credits in an internship or thesis
- Electives:
- Open Source Intelligence and Social Network Analysis (OSINT and SNA)
- Memory Forensics and Analysis
- International Cyber Conflicts
- Supervisory Control And Data Acquisition (SCADA) Forensics
- Multimedia Forensic
- Computer Forensics
Digital Forensics
This track covers the collection, preservation, and analysis of data found in electronic devices. Students will also learn the concepts of handling digital forensics cases and managing a forensics lab.
- Core Courses:
- Data Analytics for Cyber Security OR Business Analytics and Data Mining
- System Administration and Operating System Concepts
- Mobile Forensics
- Memory Forensics and Analysis
- Multimedia Forensics
- Forensic Laboratory Operations & Management
- Computer Forensics
- Introduction to Information and Cyber Security
- Thesis/Internship Course:
- 6 credits in an internship or thesis
- Electives:
- Database Security and Forensics
- Open Source Intelligence and Social Network Analysis (OSINT and SNA)
- Cyberlaw and Ethics
- Supervisory Control And Data Acquisition (SCADA) Forensics
- Cloud Security & Forensics
- Incident Handling
Career Paths
Graduates of this program can pursue careers in various industries, including:
- Information technology security analysis
- Cyber defense management
- Risk management
- Intelligence agencies
- Security operation centers
- Consulting firms
- Forensics laboratories
- Police agencies
- Forensics consulting firms
- Federal law enforcement agencies
Why Enroll in this Program?
This program is designed for students who want to earn a specialized master's degree in digital forensics and cybersecurity. It is especially attractive to recent graduates with degrees in emergency preparedness, homeland security, cybersecurity, informatics, applied engineering, mathematics, and computer science.
Admissions Requirements
- Deadlines:
- Fall: Rolling
- Spring: December 15
- Summer: May 1
- Required Application Materials:
- Transcripts from all schools attended
- Three Letters of recommendation
- Resume
- Personal Statement
Student Learning Objectives
- Demonstrate comprehension of top five foundational concepts in information technology, including programming, operating systems, cryptography, databases, and networking.
- Report ideas in written, oral, web, and interactive formats to diverse audiences.
- Have operational knowledge of cybersecurity tools in the domains of anti-virus, anti-malware, network defense, intrusion detection, and encryption.
- Conduct security risk analysis and audits aimed at both assessment and mitigation of risks.
- Collect and analyze forensic data in order to establish timelines and artifacts across a range of digital devices and formats.
Supplemental Degree Programs
Graduate students can typically request a supplemental degree in one or more subordinate degrees without needing to go through the full admissions process again.
- Africana Studies CGS
- Community College Leadership CGS
- Demography CGS
- Emergency Preparedness, Homeland Security and Cybersecurity CGS
- Information Security CGS
- International Education Management CGS