SKIP TO COURSE REQUIREMENTS
Guidelines for completing the Cyber Operations MS Program
The Master of Science in Cyber Operations (MSCyOps) is a cohort-based graduate program emphasizing advanced technical training, ethical frameworks, and applied research in cybersecurity. Students move through the program as a unified group, following a fixed sequence of courses with no electives—each course is a required component of the degree. This structure fosters collaboration, continuity, and a shared learning experience.
Program Requirements
The MSCyOps program comprises 36 credits of graduate coursework, distributed as follows:
- 29 credits in cyber operations and related technical subjects
- 4 credits in risk assessment, cybersecurity law, policy, and ethics
- 3 credits dedicated to the capstone experience, distributed across multiple semesters of the program
Capstone Experience
The capstone spans multiple semesters and serves as the culminating academic requirement of the program. Students must enroll in capstone courses throughout the cohort sequence—typically one credit per designated semester (Fall, Spring, Fall). The capstone requirement may be fulfilled through one of the following pathways:
- Practical Research Project:
Students complete a hands-on research or applied project, submit a formal written report for evaluation by a graduate committee, and present and defend their work in an oral examination during the final semester. - Advanced Industry Certification (Alternative Option):
In lieu of a research project, students may fulfill the capstone requirement by earning an approved advanced industry certification such as CISSP, CASP+, or OSCP, subject to approval by the Graduate Program Director.
Regardless of the selected pathway, all students must participate in a set of common capstone activities and requirements during the first semester of the program. These shared experiences establish a foundation for the capstone process and include training in research methods, professional communication, and project planning.
Academic Standards
To maintain good academic standing, students must:
- Hold a minimum cumulative GPA of 3.0
- Achieve a grade of B or higher in all graduate courses
Advising and Course Planning
Students are encouraged to meet regularly with the Graduate Program Director to understand course sequencing, program expectations, and academic milestones.
Prerequisite Knowledge and Skills
Given the program’s technical rigor and accelerated pace, incoming students are expected to possess core competencies in the following areas:
- Python and C programming
- Assembly language
- PowerShell scripting
- Data structures and algorithms
- Systems administration
- Computer networking
- Linux fundamentals
Students lacking proficiency in these areas should complete preparatory coursework or equivalent training before beginning the program to ensure their readiness for success.
Program Requirements (36 credits)
The 36-credit, cohort-based graduate program is structured across four semesters, as outlined below:
Understanding the Operating Systems (OS) theory and the OS security concepts is required to perform critical roles in the cybersecurity and cyber operations fields. This course exposes the students to topics of the OS theory with an emphasis on security applications. The course begins with an introduction of low-level programming, including Assembly and C. It continues with the basic Unix-like operating system Application Programming Interfaces (APIs) along with the fundamentals of OS concepts.
Full course description for Secure System Programming and OS Theory
Cyber operations encompass both offensive and defensive security strategies, requiring a deep understanding of network security, system vulnerabilities, and operational tactics. This course provides a comprehensive foundation in cyber operations, focusing on security principles, network architecture, protocol analysis, and strategic cyber engagements. Students will analyze fundamental cybersecurity principles and evaluate how failures in security design lead to system vulnerabilities that can be exploited in offensive cyber operations. The course covers network traffic analysis, TCP/IP protocols, and cyber operations phases, including planning, execution, authority considerations, and post-operation assessment. Students will design defensive network architectures with multi-layered security controls, ensuring mission security objectives are met. Additionally, the course examines the balance between usability and security, addressing human behavior risks that undermine system security…
Full course description for Cyber Operations Fundamentals
The Cyber Operations Capstone Project is a culminating experience where students synthesize, apply, and critically evaluate cybersecurity concepts in a real-world context. Throughout the graduate program, students identify, formulate, and develop their capstone projects, producing a comprehensive, scholarly, and professional-level research project that reflects their advanced knowledge and technical expertise. This capstone follows a phased approach, where students solidify their project scope and research methodology in the initial phase and design, develop, and implement their solutions in the final phase. The project emphasizes evidence-based decision-making, integration of industry best practices, and rigorous academic research to address complex cybersecurity challenges. Students will critically analyze and synthesize relevant scholarly and professional literature, ensuring their work contributes meaningfully to the field of cyber operations. The capstone experience culminates in…
Full course description for Cyber Operations Capstone Project
This course covers advanced topics of digital forensics procedures, legal issues, and scientific principles. The course addresses the current and new issues in digital forensics by offering various topics such as windows, smart phones, memory, network forensics, Macintosh forensics, and updated and expanded coverage on legal issues. Moreover, the students will learn how to report their findings to present them to the court using the state-of-the-art tools in digital forensics.
Full course description for Digital Forensics I
This course covers how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. The required technical details of how each operating system works and how to find artifacts is also covered. Topics like File systems, data recovery, memory forensics, executable layouts are discussed in details. Moreover, Hands-On Network Forensics that starts with the core concepts within network forensics, including coding, networking, forensics tools, and methodologies for forensic investigations are covered.
Full course description for Digital Forensics II
The increasing interconnectedness of digital systems and the rapid evolution of malicious software (malware) pose significant threats to individuals, businesses, and critical infrastructure. As cyber threats grow more sophisticated, the ability to analyze, dissect, and reverse-engineer malware is essential for threat intelligence, incident response, and cybersecurity defense. This course provides an in-depth exploration of malware analysis and reverse engineering methodologies, equipping students with the technical skills to investigate, understand, and mitigate malicious software. Students will analyze the characteristics, propagation methods, and impact of various types of malware, assessing their persistence mechanisms and interaction with host systems and networks. Using modern forensic tools, students will apply advanced static and dynamic analysis techniques to deobfuscate and reverse-engineer malware samples. The course also covers attacker techniques designed to evade…
Full course description for Malware Analysis and Reverse Engineering
The Cyber Operations Capstone Project is a culminating experience where students synthesize, apply, and critically evaluate cybersecurity concepts in a real-world context. Throughout the graduate program, students identify, formulate, and develop their capstone projects, producing a comprehensive, scholarly, and professional-level research project that reflects their advanced knowledge and technical expertise. This capstone follows a phased approach, where students solidify their project scope and research methodology in the initial phase and design, develop, and implement their solutions in the final phase. The project emphasizes evidence-based decision-making, integration of industry best practices, and rigorous academic research to address complex cybersecurity challenges. Students will critically analyze and synthesize relevant scholarly and professional literature, ensuring their work contributes meaningfully to the field of cyber operations. The capstone experience culminates in…
Full course description for Cyber Operations Capstone Project
Vulnerability analysis and its connection to exploit development are core skills for one involved in cyber operations. This course covers vulnerability discovery and exploitation. The focus is to understand the pattern of vulnerabilities and attacks to allow students to experience protection, risk mitigation, and identify vulnerabilities in new contexts. Topics will include buffer overflows, privilege escalation attacks, input validation issues, vulnerability discovery (fuzzing and crash dump analysis), exploit development, and mitigations (e.g., DEP, ASLR, ¿).
Full course description for Vulnerability Discovery and Exploitation
This course covers cryptography from both theoretical and practical perspective. The course provides details about advanced cryptography and its applications in the cybersecurity world. Students will learn various cryptographic algorithms and protocols and their relationships from both attack and defense perspectives. Various cryptographic tools to secure contemporary networks will be discussed as well. Students should be able to use advanced cryptographic algorithms based on elliptic curve cryptography.
Full course description for Applied Cryptography
In an era of sophisticated cyber threats, organizations rely on proactive threat intelligence and hunting strategies to defend against advanced network intrusions and data breaches. This course equips students with the knowledge and practical skills to collect, analyze, and apply Cyber Threat Intelligence (CTI) at tactical, operational, and strategic levels to enhance cyber threat-hunting operations and defensive cybersecurity mechanisms. Students will evaluate cyber threat intelligence frameworks, including MITRE ATT&CK, to identify adversary tactics, techniques, and procedures (TTPs) and detect advanced cyber threats. The course covers correlating Indicators of Compromise (IoCs) from multiple intelligence sources, including Open-Source Intelligence (OSINT), to strengthen proactive threat detection and response. Emphasis is placed on implementing intelligence-sharing frameworks and protocols to facilitate active cyber defense through threat-hunting and coordinated threat mitigation…
Full course description for Cyber Threat Hunting and Intelligence
Virtualization technology has rapidly expanded to become a core feature of various components of enterprise environments. It allows efficient use of physical IT infrastructure by sharing its capabilities among many users or environments. Virtualization is also an integral element to cloud computing and key technology in cybersecurity. Cloud computing provides organizations the ability to create and use IT services efficiently and rapidly without spending capital resources upfront. This course will discuss the capabilities and limitations of modern approaches to virtualization and the variety, complexity, and capabilities of modern cloud platforms and cloud security.
The course will include hands-on lab exercises using leading Cloud infrastructure providers (ex. Amazon Web Services and Microsoft Azure). The course will review the applied concepts and techniques with end-to-end Cloud security architecture with real-world case studies using Web/Mobile based applications, and Internet…
Full course description for Virtualization and Cloud Security
As wireless and mobile technologies continue to evolve, they play an increasingly critical role in global communications, cybersecurity, and cyber operations. This course provides an in-depth exploration of cellular and wireless network architectures, emphasizing their security features, vulnerabilities, and risk mitigation strategies.
Students will analyze the core architectures and security mechanisms of various generations of cellular networks, assessing operational differences and security challenges unique to wireless environments. The course covers modern encryption standards, authentication protocols, and access control policies, equipping students with the skills to design and implement secure wireless networks. Additionally, students will assess security protocols used in wireless communications to ensure authentication, data integrity, and confidentiality. Through hands-on exercises, students will investigate and mitigate threats to wireless and mobile networks, identifying…
Full course description for Securing Wireless and Mobile Technologies
This course provides a comprehensive exploration of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems, which serve as the backbone of critical infrastructure across manufacturing, energy, transportation, and utility sectors. Students will develop an in-depth understanding of ICS/SCADA architectures, their operational environments, and the evolving cybersecurity threats targeting these systems. The course examines the vulnerabilities inherent in industrial automation, the complexities of embedded systems, and the security frameworks designed to mitigate attacks. Through hands-on exercises, case studies, and industry-standard tools, students will gain practical experience in securing and assessing ICS environments.
Full course description for Industrial Control Systems Security and Resilience
The Cyber Operations Capstone Project is a culminating experience where students synthesize, apply, and critically evaluate cybersecurity concepts in a real-world context. Throughout the graduate program, students identify, formulate, and develop their capstone projects, producing a comprehensive, scholarly, and professional-level research project that reflects their advanced knowledge and technical expertise. This capstone follows a phased approach, where students solidify their project scope and research methodology in the initial phase and design, develop, and implement their solutions in the final phase. The project emphasizes evidence-based decision-making, integration of industry best practices, and rigorous academic research to address complex cybersecurity challenges. Students will critically analyze and synthesize relevant scholarly and professional literature, ensuring their work contributes meaningfully to the field of cyber operations. The capstone experience culminates in…
Full course description for Cyber Operations Capstone Project
Any IT development project contains significant risks. However, keeping the status quo is also risky in rapidly changing technological and competitive environments. This course is designed to familiarize the student with risk analysis concepts derived from many sources including financial, actuarial and statistical studies, insurance and risk analysis, software quality assurance methodologies, management and audit trails and many others. Student will learn to assess the risk in an information systems portfolio and develop strategies for managing the many risk types discussed: Prerequisites: MIS 600.
Full course description for Risk Analysis in Information Technology
With Information Technology playing an ever greater role in organizations, and the widespread availability of technology with the ability to collect and create information on everyone, many new ethical issues have been created. This course will frame many current ethic issues in IT and help the student develop methods of analyzing and dealing with these issues in real world situations. Topics may include issues such as privacy, copyright and intellectual property, employee monitoring approaches, multinational information flows, corporate intelligence and others. Hacking, computer security, viruses and other acts of destruction will be reviewed from an ethical perspective.
Full course description for Cyber Ethics