Master of Science in Cybersecurity Engineering Technology

Graduate Programs

MENU LINKS

Program Information

The Cybersecurity Engineering Technology master’s degree is designed to prepare the graduate with the technical knowledge and skills needed to conduct operations that protect and defend information and information systems by ensuring availability, integrity, authentication, confidentiality and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection and reaction capabilities. The thirty-four (34) semester credit hours Master of Science in Cyber-security Engineering Technology includes twelve (12) credits in core courses, twenty-one (21) credits in technical electives, and a one (1) credit seminar course which focuses on producing a research paper related to Information Assurance and Computer Security. 

The objectives of this degree program are to develop graduates who can plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. The program will train graduates who can ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. In Addition the objective of the degree program will develop graduates who can respond to computer security breaches and viruses. 

Program Outcomes

The educational objective of the Cybersecurity Engineering Technology master’s degree are as follows:

  1. To prepare graduates with the technical knowledge and skills needed protect and defend computer systems and networks by ensuring availability, integrity, authentication, confidentiality of digital information;
  2. To develop graduates who can plan, implement, upgrade, and monitor cyber security measures for the protection of computing infrastructure; and
  3. To develop graduates who are able to analyze and address computer security breaches. 

Program Learning Competencies/Outcomes

Upon completion of the graduate program, students will be able to:

  • Evaluate cyber security needs of an organization.
  • Assess cyber security risk management policies.
  • Measure the performance of cyber security systems.
  • Troubleshoot, maintain, and update cyber security systems.
  • Implement real-time cyber security solutions.
  • Design short- and long-term cyber security strategies and policies.

Admission Criteria

Admission requirements include a bachelor’s degree in a technology related field, such as Engineering Technology, Computer Science, Information Technology, Software or Computer Engineering, Networking, Information Security, or related disciplines. Applications from prospective students with bachelor’s degrees in non-technical fields may be considered for admission. All applicants must show a strong record of academic achievement, as indicated by official transcript(s), three letters of recommendation, and a statement of purpose.

Application Deadlines

» Fall Semester                   July 1st 
» Spring Semester               December 1st 
» Summer Session(s)          April 1st

Course Requirements for Graduation

The general requirements for those of the non-thesis program are: 

  1. A minimum of 34 semester credit hours in courses approved for graduate credit with a minimum average grade of “B” in all course work taken.
  2. A minimum of 18 semester credit hours in courses numbered 600 or above.
  3. Successful submission of a seminar paper is required.

Total Number of Credits and Distribution

Required Core Technology Courses – 12 credits
Elective Cybersecurity Engineering Technology Courses – 21 credits
Seminar Course – 1 credit
Total Credits Required – 34 credits

Cybersecurity Engineering Technology Curriculum Overview

(Note: Credit Hours are given in parentheses) 

Course # Core Required Courses Credits 
ETCS 600Statistical Applications for Technology(3) 
ETCS 606 Applied Research for Technology(3) 
ETCS 620Project Management for Technology(3) 
ETCS 687Legal and Ethical Issues in Cybersecurity(3) 
  12 
Course #Elective Courses 
ETCS 678 Mobile Wireless Networking and Security(3) 
ETCS 680Networking Technology for Industry(3) 
ETCS 681System Integrity for Cybersecurity(3) 
ETCS 682Cybersecurity Administration(3)
ETCS 683Network Intrusion, Detection and Incidence Response(3) 
ETCS 685Fundamentals of Network Security(3)
ETCS 686Advanced Network Security(3)
  21
Course #Seminar Course 
ETCS 690Master’s Seminar(3) 
  1
 Total Credits34 

Cybersecurity Engineering Technology Course Descriptions

(Note: Credit Hours are given in parentheses)

ETCS 600 
Statistical Applications for Technology (3)This course presents a broad treatment of statistics, concentrating on specific statistical techniques used in science and industry. 
Prerequisite(s): Graduate Standing

ETCS 606 Applied Research for Technology (3)This course studies the research methods and processes applicable to engineering and technology. Emphasis will be placed on defining research problems, collecting, analyzing, recording, and interpreting data. Students will be required to conduct a research project.
Prerequisite(s): Graduate Standing

ETCS 620 Project Management for Technology (3)This is the introductory project management course, which is a core course in the Master’s degree programs.
Prerequisite(s): Graduate Standing

ETCS 678 Mobile Wireless Networking and Security (3)
This course is a comprehensive examination of wireless local area networks, with an emphasis on the IEEE P802.11 family of WLAN standards. 
Prerequisite(s): Graduate Status or Permission of Instructor

ETCS 680
 Networking Technology for Industry (3)
An advanced study of network technology fundamentals. The course stresses the state of the art developments that support the World Wide Web and a wide array of specific applications. 
Prerequisite(s): Graduate Standing

ETCS 681 System Integrity for Cyber security (3)
This course identifies elements of system integrity for Cyber security including firewall design, types of security threats and responses to security attacks. This course also studies the use best practices design, implement, and monitor a network security plan. This course also examines security incident postmortem reporting and ongoing network security activities. 
Prerequisite(s): Graduate Status or Permission of Instructor.

ETCS 682 Cyber security Administration (3)
This course explores the concepts of governance and how it applies to information systems. Discussion includes the importance of compliance with laws, regulations, policies, and procedures as a means of minimizing risk through mandated security and control measures. Through this course, students also gain an understanding of Cyber security Auditing processes and principles. Prerequisite(s): Graduate Standing

ETCS 683 Network Intrusion, Detection and Incidence Response (3)
This course presents an exploration of the theory and implementation of intrusion detection and intrusion prevention. 
Prerequisite(s): ETCS 685 or Permission of Instructor

ETCS 685 Fundamentals of Network Security (3)This course presents topics include cryptography, cipher systems, practical security schemes, confidentiality, authentication, integrity, access control, nonrepudiation, and their integration across telecommunications (i.e., computer) networks 
Prerequisite(s): Graduate Status or Permission of Instructor

ETCS 686 Advance Network Security (3)This course covers advance information from topics presented in ETCS 685. Topics include cryptography, cipher systems, practical security schemes, confidentiality, authentication, integrity, access control, nonrepudiation, and their integration across telecommunications (i.e., computer) networks. 
Prerequisite(s): ETCS 685 or Permission of Instructor

ETCS 687 Legal and Ethical Issues in Cybersecurity (3)

This course focuses on the ways that law, ethics and Cyber security overlap and intersect. Besides laws related to Cyber security, the course examines laws related to intellectual property, civil litigation, criminal prosecutions, and privacy. 
Prerequisite(s): Graduate Standing

ETCS 690 Master’s Seminar (1)This course serves a dual role. First and foremost, this is a graduate seminar course with the major objective of preparing students for research in practical applications. It will challenge students with a critical and philosophical exploration of the ideas of Cyber security, and will consist of lectures, readings and class discussions in which every student is expected be an active participant. Since students come to this course with diverse interests in graduate work in Cyber security, the scope of readings and discussions on research and practical applications will be broad. The second role of this course is a capstone graduation requirement for all Masters’ students. For that purpose, the goal is to learn the practical skills of giving a presentation and writing a research paper. 
Prerequisite(s): Permission of Instructor

For more information on this program, please contact:

Academic Support Coordinator


Jennifer Whittington
Phone: 410 651 8593
Fax: 410 651 7673
Office: 3086 EASC Building
Email: jakenney@umes.edu

Scroll to Top