Master of Science in Cybersecurity Engineering Technology

Graduate Programs

MENU LINKS

Program Information

The Cybersecurity Engineering Technology master’s degree is designed to prepare the graduate with the technical knowledge and skills needed to conduct operations that protect and defend information and information systems by ensuring availability, integrity, authentication, confidentiality and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection and reaction capabilities. The thirty-six (36) semester credit hours Master of Science in Cyber-security Engineering Technology includes twelve (12) credits in core courses, twenty-one (21) credits in technical electives, and a one (3) credit seminar course which focuses on producing a research paper related to Information Assurance and Computer Security. 

The objectives of this degree program are to develop graduates who can plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. The program will train graduates who can ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. In Addition the objective of the degree program will develop graduates who can respond to computer security breaches and viruses. 

Program Outcomes

The educational objective of the Cybersecurity Engineering Technology master’s degree are as follows:

  1. To prepare graduates with the technical knowledge and skills needed protect and defend computer systems and networks by ensuring availability, integrity, authentication, confidentiality of digital information;
  2. To develop graduates who can plan, implement, upgrade, and monitor cyber security measures for the protection of computing infrastructure; and
  3. To develop graduates who are able to analyze and address computer security breaches. 

Program Learning Competencies/Outcomes

Upon completion of the graduate program, students will be able to:

  • Evaluate cyber security needs of an organization.
  • Assess cyber security risk management policies.
  • Measure the performance of cyber security systems.
  • Troubleshoot, maintain, and update cyber security systems.
  • Implement real-time cyber security solutions.
  • Design short- and long-term cyber security strategies and policies.

Admission Criteria

Admission requirements include a bachelor’s degree in a technology related field, such as Engineering Technology, Computer Science, Information Technology, Software or Computer Engineering, Networking, Information Security, or related disciplines. Applications from prospective students with bachelor’s degrees in non-technical fields may be considered for admission. All applicants must show a strong record of academic achievement, as indicated by official transcript(s), three letters of recommendation, and a statement of purpose.

Application Deadlines

» Fall Semester                   July 1st 
» Spring Semester               December 1st 
» Summer Session(s)          April 1st

Course Requirements for Graduation

The general requirements for those of the non-thesis program are: 

  1. A minimum of 36 semester credit hours in courses approved for graduate credit with a minimum average grade of “B” in all course work taken.
  2. A minimum of 18 semester credit hours in courses numbered 600 or above.
  3. Successful submission of a seminar paper is required.

Total Number of Credits and Distribution

Required Core Technology Courses – 12 credits
Elective Cybersecurity Engineering Technology Courses – 21 credits
Seminar Course – 3 credits
Total Credits Required – 36 credits

Cybersecurity Engineering Technology Curriculum Overview

(Note: Credit Hours are given in parentheses) 

CORE: Select 12 credits from the following list of courses:
Course # 
Core Required Courses Credits 
ETCS 600Statistical Applications for Technology(3) 
ETCS 606 Applied Research for Technology(3) 
ETCS 620Project Management for Technology(3) 
ETCS 687Legal and Ethical Issues in Cybersecurity(3) 
  12 
Elective Courses: Select 21 credits from the following list of courses:
Course #
Elective Courses 
ETCS 625 Lean Management Principles for Cyber Systems (3)
ETCS 630 Introduction to Cybersecurity for Industrial Control Systems (3)
ETCS 635 Introduction to Cybersecurity and Cryptography Applications (3)
ETCS 640 Artificial Intelligence, Blockchain and Cybersecurity (3)
ETCS 645 Critical Infrastructure Cybersecurity (3)
ETCS 650 Capital Project Cost Analysis for Cyber Systems(3)
ETCS 678 Mobile Wireless Networking and Security(3)
ETCS 680Networking Technology for Industry(3) 
ETCS 681System Integrity for Cybersecurity(3) 
ETCS 682Cybersecurity Administration(3)
ETCS 683Network Intrusion, Detection and Incidence Response(3) 
ETCS 685Fundamentals of Network Security(3)
ETCS 686Advanced Network Security(3)
ETCS 688                                                   Contemporary Issues in Cybersecurity        (3)
  21
Seminar: Select 3 credits from the following list of courses:
Course #
Seminar Course 
ETCS 690Master’s Seminar(3) 
 Total Credits36 

Cybersecurity Engineering Technology Course Descriptions

(Note: Credit Hours are given in parentheses)

ETCS 600 
Statistical Applications for Technology (3)

This course presents a broad treatment of statistics, concentrating on specific statistical techniques used in science and industry. 
Prerequisite(s): Graduate Standing

ETCS 606 Applied Research for Technology (3)

This course studies the research methods and processes applicable to engineering and technology. Emphasis will be placed on defining research problems, collecting, analyzing, recording, and interpreting data. Students will be required to conduct a research project.
Prerequisite(s): Graduate Standing

ETCS 620 Project Management for Technology (3)

This is the introductory project management course, which is a core course in the Master’s degree programs.
Prerequisite(s): Graduate Standing

ETCS 625  Lean Management Principles for Cyber Systems (3) 

This course discusses information and cybersecurity production processes, cyber systems, and change management through the lens of Lean principles. It also presents material on how to integrate Lean tools with information production and cyber systems to form an integrated, learning environment. The class discusses Lean tools and techniques like Lean management, Six Sigma, cycle time, value stream mapping, spaghetti charting, value-added vs. non-value-added activities, and bottlenecks for cyber technology tools and environments.

Prerequisite(s): Graduate Standing                       

ETCS 630  Introduction to Cybersecurity for Industrial Control Systems (3)      

This course focuses on the methodology to conduct cyber-security risk assessments for critical cyber and cyber-physical systems such as industrial and facility-related control systems. Students will learn risk assessment methodology techniques to identify, classify, and analyze threats and vulnerabilities in cyber and cyber-physical systems. Students will also conduct a critical review and impact analysis to assist in the design of risk mitigation strategies for industrial and facility-related control systems.

Prerequisite(s): Graduate Standing

ETCS 635  Introduction to Cybersecurity and Cryptography Applications (3)    

This course aims to introduce the fundamental and practical knowledge of cryptography and its applications. As such, the course covers essential cryptographic technologies that can be utilized to guarantee the security of applications such as file systems, computer systems, networks, Internet, email systems, and the World Wide Web. The cover will cover essential cryptographic technologies include authentication, encryption, private and public key crypto systems. Lastly, the course will also cover security analysis including assessing and identifying risks, defining security requirements, and ethical issues.

Prerequisite(s): Graduate Standing

ETCS 640  Artificial Intelligence, Blockchain and Cybersecurity (3)      

This course is designed to provide the student with a broad overview of Artificial Intelligence (AI) terminology, theory, and methodology while focusing on the cybersecurity issues and solutions surrounding AI.         

Prerequisite(s): Graduate Standing

ETCS 645  Critical Infrastructure Cybersecurity (3)  

This course covers advance information pertaining to the sixteen critical infrastructure sectors defined by the US Department of Homeland Security Presidential Policy Directive 21 (PPD-21) and how cybersecurity is implemented and assessed in each sector.      

Prerequisite(s): Graduate Standing

ETCS 650  Capital Project Cost Analysis for Cyber Systems  (3)

The course introduces concepts and economic analysis procedures to assist with decision-making for cyber systems. This course covers the methods employed by cyber systems managers to develop a business case for information technology capital projects. 

Prerequisite(s): Graduate Standing                  

ETCS 678 Mobile Wireless Networking and Security (3)
This course is a comprehensive examination of wireless local area networks, with an emphasis on the IEEE P802.11 family of WLAN standards. 
Prerequisite(s): Graduate Status or Permission of Instructor

ETCS 680
 Networking Technology for Industry (3)

An advanced study of network technology fundamentals. The course stresses the state of the art developments that support the World Wide Web and a wide array of specific applications. 
Prerequisite(s): Graduate Standing

ETCS 681 System Integrity for Cyber security (3)
This course identifies elements of system integrity for Cyber security including firewall design, types of security threats and responses to security attacks. This course also studies the use best practices design, implement, and monitor a network security plan. This course also examines security incident postmortem reporting and ongoing network security activities. 
Prerequisite(s): Graduate Status or Permission of Instructor.

ETCS 682 Cyber security Administration (3)
This course explores the concepts of governance and how it applies to information systems. Discussion includes the importance of compliance with laws, regulations, policies, and procedures as a means of minimizing risk through mandated security and control measures. Through this course, students also gain an understanding of Cyber security Auditing processes and principles. Prerequisite(s): Graduate Standing

ETCS 683 Network Intrusion, Detection and Incidence Response (3)
This course presents an exploration of the theory and implementation of intrusion detection and intrusion prevention. 
Prerequisite(s): ETCS 685 or Permission of Instructor

ETCS 685 Fundamentals of Network Security (3)

This course presents topics include cryptography, cipher systems, practical security schemes, confidentiality, authentication, integrity, access control, nonrepudiation, and their integration across telecommunications (i.e., computer) networks 
Prerequisite(s): Graduate Status or Permission of Instructor

ETCS 686 Advance Network Security (3)

This course covers advance information from topics presented in ETCS 685. Topics include cryptography, cipher systems, practical security schemes, confidentiality, authentication, integrity, access control, nonrepudiation, and their integration across telecommunications (i.e., computer) networks. 
Prerequisite(s): ETCS 685 or Permission of Instructor

ETCS 687 Legal and Ethical Issues in Cybersecurity (3)

This course focuses on the ways that law, ethics and Cyber security overlap and intersect. Besides laws related to Cyber security, the course examines laws related to intellectual property, civil litigation, criminal prosecutions, and privacy. 
Prerequisite(s): Graduate Standing

ETCS 688 Contemporary Issues in Cybersecurity (3)

This course is designed to have the student evaluate and discuss topics in the news regarding cybersecurity.  The student will select two recent issues, and perform in-depth case-studies on them through the semester.  The process will be peer-reviewed and encourage participation with classmates on their case studies, giving the student a well-rounded view of current events in cybersecurity.

Prerequisite(s): Graduate Status or Permission of Instructor

ETCS 690 Master’s Seminar (3)

This course serves a dual role. First and foremost, this is a graduate seminar course with the major objective of preparing students for research in practical applications. It will challenge students with a critical and philosophical exploration of the ideas of Cyber security, and will consist of lectures, readings and class discussions in which every student is expected be an active participant. Since students come to this course with diverse interests in graduate work in Cyber security, the scope of readings and discussions on research and practical applications will be broad. The second role of this course is a capstone graduation requirement for all Masters’ students. For that purpose, the goal is to learn the practical skills of giving a presentation and writing a research paper. 
Prerequisite(s): Permission of Instructor

For more information on this program, please contact:

Academic Support Coordinator


Jennifer Whittington
Phone: 410 651 8593
Fax: 410 651 7673
Office: 3086 EASC Building
Email: jakenney@umes.edu

Scroll to Top