Students
Tuition Fee
Not Available
Start Date
Not Available
Medium of studying
Not Available
Duration
Not Available
Details
Program Details
Degree
Masters
Major
Computer Science | Cybersecurity | Software Engineering
Area of study
Information and Communication Technologies
Course Language
English
About Program

Program Overview


Online MSCS Degree Advising

Contents

  1. Applicants
  2. Degree Plan
  3. Multiple Degree Programs
    • Multiple Concentrations
    • Switching Concentrations
  4. Graduation
    • Admission To Candidacy Due Dates
    • Admission To Candidacy Process
    • E-Signature
    • After You Submit Your Form
    • Transferring Courses
    • Transfer Restrictions
    • Documenting Transfer Courses
  5. Semester Course Offerings
    • Course Schedules
    • Course Information
    • Repeating a Course
  6. Concentrations
    • Cybersecurity (CYS)
    • Data Mining and Intelligent Systems (DMIS)
    • Software Engineering (SE)

Applicants

Applicants should see the program and recruiting information.


Degree Plan

A degree plan is not required but may help plan courses from the start of the degree to the end. A template is available for use.


Multiple Degree Programs

If taking additional classes for a separate concentration or certificate, those courses do not count towards this degree. Only the courses listed below in the selected concentration will count towards the degree.


Multiple Concentrations

Students must have exactly one concentration. Students cannot select more than one concentration or no concentration.


Switching Concentrations

Students may switch concentrations by submitting a change of program request through the graduate school.


Graduation

There are three steps to complete before graduating:


  1. Complete the admission to candidacy form at the start of the graduation semester.
  2. Apply for graduation.
  3. Complete coursework with a cumulative GPA of at least 3.0.

Admission To Candidacy Form Due Dates

  • Graduation Semester: Date Due To Advisor
    • Spring 2026: 23-Jan-2026
    • Summer 2026: 22-May-2026
    • Fall 2026: 17-Aug-2026

Admission To Candidacy Process

After getting final grades for the semester prior to graduation:


  • Fill out the admission to candidacy form.
  • Rename the form with the first and last name.
  • Write the name and split out Last, then First, then Middle (leave blank if no middle name).
  • Double-check the UT student ID and write in the format XXXYYZZZZ.
  • Use the UT email address.
  • The major is “Computer Science”.
  • The degree program is “Master of Science”.
  • Click the Distance Education (online only) radio button.
  • The form must be e-signed and not an e-facsimile of the signature.
  • The form must list all courses planned to apply to the degree in chronological order.

Electronic Signature

The e-signature must resemble the graphic above, with the name and the date and time.


After You Submit Your Form

The form will be forwarded for the second signature, and if everything is correct, it will be forwarded and submitted to the graduate school.


Transfer Credits

If already taken some classes towards an MS in Computer Science from an accredited university or institute, up to four courses or twelve credit hours may be transferred. However, these courses must be approved by the advisor and will be documented on the MS candidacy form.


Transfer Restrictions

The course to be transferred must:


  • Be taken for graduate credit.
  • Be a course transcribed for graduate credit and in which the student earned at least a grade of B.
  • Not have been used for a previous degree.
  • Be approved by the student’s graduate committee and the Dean of the Graduate School on the Admission to Candidacy form.
  • The equivalent course has not been attempted at UT.
  • The course(s) must have been taken within six years prior to receiving the online MSCS degree.

Documenting Transferred Courses

If planning to transfer courses from another school, include:


  1. The syllabus of each course planned to transfer.
  2. The online MSCS degree course planned to substitute for the transferred course.
  3. A copy of the transcript for which the course was taken.
  4. State plainly and clearly the certification that the course(s) planned to transfer was not used for any other conferred degree.

Course Offerings

Register for classes.


Course Schedules

Course schedules can be found.


Course Information

Course information for some offerings can be found.


Registration Requirements

Students are required to register for at least one course in the fall or spring semesters. Students are not required to register for courses in the summer.


Repeating a Course

Students who earn below a C who wish to repeat a course must apply to repeat. Applications are processed by the graduate school.


Concentrations

Each concentration requires taking two core courses, at least four focused courses, and several electives for a total of 10 courses. Students may count any additional focused course as an elective.


Cybersecurity

Core

  • COSC530: Computer Systems Organization
  • COSC566: Software Security

Focused

  • COSC533: Cloud and Web Architectures
  • COSC534: Network Security
  • COSC559: Human-Computer Interaction
  • COSC561: Compilers Construction
  • COSC569: Human Factors in Cybersecurity
  • COSC583: Applied Cryptography
  • ECE553: Computer Networks

Electives

  • COSC522: Machine Learning
  • COSC523: Artificial Intelligence
  • COSC524: Natural Language Processing
  • COSC525: Deep Learning
  • COSC526: Data Engineering
  • COSC540: Advanced Software Engineering
  • COSC545: Digital Archeology
  • COSC565: Databases and Scripting Languages
  • COSC581: Algorithms
  • ECE517: Reinforcement Learning

Data Mining and Intelligent Systems

Core

  • COSC522: Machine Learning
  • COSC523: Artificial Intelligence

Focused

  • COSC524: Natural Language Processing
  • COSC525: Deep Learning
  • COSC526: Data Engineering
  • COSC530: Computer Systems Organization
  • COSC533: Cloud and Web Architectures
  • COSC545: Digital Archeology
  • ECE517: Reinforcement Learning
  • ECE553: Computer Networks

Electives

  • COSC534: Network Security
  • COSC540: Advanced Software Engineering
  • COSC559: Human-Computer Interaction
  • COSC561: Compilers Construction
  • COSC565: Databases and Scripting Languages
  • COSC566: Software Security
  • COSC569: Human Factors in Cybersecurity
  • COSC581: Algorithms
  • COSC583: Applied Cryptography

Software Engineering

Core

  • COSC540: Advanced Software Engineering
  • COSC581: Algorithms

Focused

  • COSC526: Data Engineering
  • COSC530: Computer Systems Organization
  • COSC533: Cloud and Web Architectures
  • COSC545: Digital Archeology
  • COSC559: Human-Computer Interaction
  • COSC561: Compilers Construction
  • COSC565: Databases and Scripting Languages

Electives

  • COSC522: Machine Learning
  • COSC523: Artificial Intelligence
  • COSC524: Natural Language Processing
  • COSC525: Deep Learning
  • COSC534: Network Security
  • COSC566: Software Security
  • COSC569: Human Factors in Cybersecurity
  • COSC583: Applied Cryptography
  • ECE517: Reinforcement Learning
  • ECE553: Computer Networks
See More