M.S. in Cyber Security
ADMISSIONS REQUIREMENTS
Prospective students must have a bachelor’s degree in a computer science or related field. For other STEM graduates, prerequisite undergraduate-level foundation courses in computer programming, computer networks, data structures, and operating systems are required. University of Toledo equivalent courses are shown below. Admissions are made on an individual basis and take into consideration the applicant's previous academic record, test results, the intended area of study, and the needs and capacity of the College of Engineering.
Application requirements:
-
Degree: Applicants must hold a four-year bachelor's degree from a regionally accredited college or university
-
GPA: Applicants must have at least a 2.8/4.0 grade point average from previous undergraduate coursework or a 3.0/4.0 for previous graduate coursework
-
Application: UToledo application is required
-
GRE: Required for applicants whose degree is from a non-US institution.
-
Transcripts: Required
-
Statement of Purpose: Required (in response to a cyber security prompt)
-
Letters of Recommendation: 3 (with at least one from an employer or a professor)
-
Proof of English language proficiency: Required for students from non-English speaking countries. See University graduate admissions for minimum test score requirements and exceptions.
-
Resume: Required
Application priority deadlines for admissions decisions:
-
Fall: No deadline
-
Spring: No deadline
-
Summer: Contact program
For non-computer science STEM applicants, University of Toledo prerequisite coursework equivalencies for program admission are listed below.
Code | Title | Hours |
---|---|---|
Programming - one course or equivalent | ||
Object Oriented Programming and Data Structures | ||
Introduction To Object Oriented Programming | ||
Computer Networks - one course or equivalent | ||
Computer Networks And Data Communication | ||
Data Communications | ||
Data Structures and Algorithms - one course or equivalent | ||
Introduction to Algorithms | ||
Non-Linear Data Structures | ||
Operating Systems - one course or equivalent | ||
Operating Systems | ||
Operating Systems And Systems Programming |
PROGRAM REQUIREMENTS
The MS in Cyber Security degree has three capstone options: thesis, project, and coursework. The program requirements for each are described below.
Code | Title | Hours |
---|---|---|
Core Courses | 10 | |
Fundamentals of Cyber Security | ||
Network Security | ||
Hardware Oriented Security and Trust | ||
Engineering Elective Courses - see capstone for required cr hr | ||
Inside Cryptography | ||
Computer Security | ||
Computer Hacking and Forensic Analysis | ||
Advanced Systems Programming | ||
Wireless And Mobile Networks | ||
Cyber Security Seminar | ||
Independent Study in Cyber Security | ||
Experiential Learning in Cyber Security | ||
Graduate Engineering Internship | ||
Select up to two (thesis option) or up to three (project/coursework option) of the following: | ||
Advanced Engineering Systems Modeling | ||
Introduction to Fuzzy Systems and Applications | ||
Power Systems Management | ||
Programming for the World Wide Web | ||
Database Systems I | ||
Artificial Intelligence | ||
Machine Learning | ||
Biologically Inspired Computing | ||
Data Compression For Multimedia Communication | ||
Modern Communications Engineering I | ||
Modern Communications Engineering II | ||
Applied Probability and Statistics | ||
Advanced MATLAB for Engineers | ||
Advanced Engineering Mathematics I | ||
Non-Engineering Elective Courses | 3 | |
Information Systems Fundamentals | ||
Business Intelligence Management | ||
Data Mining | ||
Business Systems Analysis and Design | ||
Management of Information Systems Security | ||
Law And The Legal System | ||
Special Topics (Privacy and Data Security (College of Law, spring)) | ||
Statistical Computing | ||
Capstone option | 17 | |
MS thesis (9 cr hr CYBR 6960) | ||
Cyber Security Research and Thesis | ||
Engineering electives - 8 cr hr | ||
MS project (6 cr hr CYBR 6920) | ||
Cyber Security Project | ||
Engineering electives - 11 cr hr | ||
Coursework only (3 cr hr CYBR 6800) | ||
Experiential Learning in Cyber Security | ||
Engineering electives - 14 cr hr | ||
Total Hours | 30 |
Example Plan of Study for the Thesis Option:
First Year | ||
---|---|---|
First Term | Hours | |
EECS 5720 | Fundamentals of Cyber Security | 3 |
EECS 5760 | Computer Security | 3 |
EECS 6650 | Hardware Oriented Security and Trust | 3 |
CYBR 5930 | Cyber Security Seminar | 0 |
Hours | 9 | |
Second Term | ||
EECS 5640 | Inside Cryptography | 3 |
EECS 5790 | Network Security | 4 |
CYBR 6990 | Independent Study in Cyber Security | 2 |
CYBR 5930 | Cyber Security Seminar | 0 |
Hours | 9 | |
Third Term | ||
CYBR 6960 | Cyber Security Research and Thesis | 1 |
Hours | 1 | |
Second Year | ||
First Term | ||
INFS 6710 | Management of Information Systems Security | 3 |
CYBR 6960 | Cyber Security Research and Thesis | 6 |
CYBR 5930 | Cyber Security Seminar | 0 |
Hours | 9 | |
Second Term | ||
CYBR 6960 | Cyber Security Research and Thesis | 2 |
CYBR 5930 | Cyber Security Seminar | 0 |
Hours | 2 | |
Total Hours | 30 |
Example plan of study for the Project Option:
First Year | ||
---|---|---|
First Term | Hours | |
EECS 5720 | Fundamentals of Cyber Security | 3 |
EECS 5760 | Computer Security | 3 |
EECS 6650 | Hardware Oriented Security and Trust | 3 |
CYBR 5930 | Cyber Security Seminar | 0 |
Hours | 9 | |
Second Term | ||
EECS 5640 | Inside Cryptography | 3 |
EECS 5790 | Network Security | 4 |
CYBR 6990 | Independent Study in Cyber Security | 2 |
CYBR 5930 | Cyber Security Seminar | 0 |
Hours | 9 | |
Second Year | ||
First Term | ||
CYBR 6920 | Cyber Security Project | 3 |
CYBR 6800 | Experiential Learning in Cyber Security | 3 |
INFS 6710 | Management of Information Systems Security | 3 |
CYBR 5930 | Cyber Security Seminar | 0 |
Hours | 9 | |
Second Term | ||
CYBR 6920 | Cyber Security Project | 3 |
CYBR 5930 | Cyber Security Seminar | 0 |
Hours | 3 | |
Total Hours | 30 |
Example Plan of Study for the Coursework-only Option:
First Year | ||
---|---|---|
First Term | Hours | |
EECS 5720 | Fundamentals of Cyber Security | 3 |
EECS 5760 | Computer Security | 3 |
EECS 6650 | Hardware Oriented Security and Trust | 3 |
CYBR 5930 | Cyber Security Seminar | 0 |
Hours | 9 | |
Second Term | ||
EECS 5640 | Inside Cryptography | 3 |
EECS 5790 | Network Security | 4 |
LAWT 6600 | Special Topics (Privacy and Data Security) | 2 |
CYBR 5930 | Cyber Security Seminar | 0 |
Hours | 9 | |
Second Year | ||
First Term | ||
EECS 5750 | Machine Learning | 3 |
CYBR 6990 | Independent Study in Cyber Security | 3 |
CYBR 6800 | Experiential Learning in Cyber Security | 3 |
CYBR 5930 | Cyber Security Seminar | 0 |
Hours | 9 | |
Second Term | ||
EECS 5770 | Computer Hacking and Forensic Analysis | 3 |
CYBR 5930 | Cyber Security Seminar | 0 |
Hours | 3 | |
Total Hours | 30 |
- PLO 1. Understand the cyber security challenges in contemporary networks and software systems.
- PLO 2. Demonstrate the proficiency in various tools and utilities used in cyber security.
- PLO 3. Evaluate security mechanisms in terms of their effectiveness and appropriateness for computer and network systems.
- PLO 4. Understand the ethical issues related to securing information systems and critical infrastructure.
- PLO 5. Communicate effectively, both orally and in writing, with other security professionals.
- PLO 6. Apply appropriate security methods and mechanisms to protect enterprise network systems.
- PLO 7. (Thesis and Project Capstones) Research cyber security issues, discovery new knowledge, and present the research results to professionals in industry or academia.