Computer Science Department

Master of Science in Information and Cybersecurity

Nearly every day there are incidents of computer hacking into bank records, business databases, government information, and more, causing untold damage to our economy and security.

In the Information and Cybersecurity (MSIC) program at ITU, you’ll benefit from a graduate education that goes beyond the typical cybersecurity program so you’re prepared to combat this global problem. Topics you’ll explore include network security, risk and data management, preventative measures, computer ethics, digital signatures, and cryptography.

Once you graduate, you’ll have the technical skills, experience, and knowledge to develop solutions from the ground up, making you into an in-demand cybersecurity professional in Silicon Valley and beyond.

58% of students are involved in internships 54 countries represented in our student body.
>50% Annual Earnings are double the national average in Silicon Valley. 25% Less Fee: Compared to Average Tuition for a Master’s Degree in The US. “Finance and Fee”.

Curriculum

Our 39 credit hour curriculum is completed in 16 months. The 39 credit hours are composed of core courses, electives, cross disciplinary electives, capstone or thesis, and an internship.

Program Structure

Required Courses

  • 3 Core Courses (9 credit hours)
  • Elective Courses (15 credit hours)
  • Capstone course – Project or Thesis (3 credit hours)
  • Internship know more
  • Nugget courses (up to 3 credit hours)
    • ITU Presents (1 credit hour)
    • ITU Nuggets (2 credit hours)

Elective Courses

A sufficient number of Elective Courses must be completed to bring the total of credit hours to 39.

A minimum 3.0 cumulative GPA (Grade Point Average) is required for granting of the Master’s degree.

 

Core Courses

    ICS 602 Cryptography and Advanced Cybersecurity
    ICS 503 Cybersecurity & Network Defense
    ICS 530 Ethical Hacking & Attack Countermeasures

    Capstone Courses

    SWE 690 Capstone Project
    or
    SWE 695 Master’s Thesis

    Internship

    Click here to know more.

     

    Transfer Credits

    Up to 9 credit hours from a graduate program of a regionally accredited school with department chair’s approval.

     

    ITU Presents

    PRE 500 ITU Presents (1/3). *Students must take three ITU Presents courses for a total of 1 credit hour.

     

    ITU Nugget Courses

    1/3 credit to 2 credit courses

    IDS 558 1 Blockchain and Peer to Peer Software
    IDS 525 1 Digital Forensic in Finance & Accounting
    IDS 526 1 HTML/CSS Programming & JavaScript
    IDS 520 1 Introduction to AI & Machine Learning
    IDS 568 1 Introduction to Cryptography
    IDS 569 1 Introduction to Cybersecurity
    IDS 567 1 Introduction to Digital Forensics
    IDS 540 1 Introduction to Python Programming
    IDS 570 1 Mobile and Wireless Ethical Hacking
    IDS 515 1 Mobile Applications (iOS, Android, and IoT)
    IDS 566 1 Python for Cybersecurity
    IDS 527 1 Python for Excel and data analysis programming

    Elective Courses

    In each of the 3 MS programs (MSCS, MSIC, MSSE) Electives must be chosen from the list below so that the total number of credit hours is at least 39. All electives count in each program, except when explicitly stated otherwise.

    List of Elective Courses for all 3 MS Programs
    » AMS 510 Linear Algebra 
    » AMS 512 Applied Mathematics Methods 
    » AMS 520 Optimization Techniques 
    » AMS 530 Numerical Analysis 
    » AMS 540 Discrete Mathematics 
    » AMS 552 Probability, Statistics, and Reliability for Engineers 
    » AMS 722 Advanced Applied Mathematics Methods 
    » CSC 501 Discrete Structures 
    » CSC 502 Principles of OS & Distributed 
    » CSC 505 The UNIX/Linux OS 
    » CSC 509 C Programming 
    » CSC 511 OO Programming with C++ 
    » CSC 512 Data Structures 
    » CSC 515 iPhone Application Development 
    » CSC 518 OO Programming with Java 
    » CSC 519 Android Phone Application Development 
    » CSC 520 Python Programming 
    » CSC 522 R Language Programming 
    » CSC 525 HTML/CSS Programming 
    » CSC 527 Mobile Web Programming 
    » CSC 530 JavaScript Programming 
    » CSC 532 Client Programming with JS/ jQuery 
    » CSC 535 Server Programming With PHP 
    » CSC 545 Programming In GO 
    » CSC 550 Big Data 
    » CSC 555 Bio Informatics 
    » CSC 560 Introduction to Data Science 
    » CSC 575 Topics in Computer Science 
    » CSC 580 Computer Algorithms 
    » CSC 610 Ruby on Rails 
    » CSC 615 Angular JS 
    » CSC 620 Programming Language Theory 
    » CSC 625 Advanced HTML5 
    » CSC 630 Scala Programming 
    » CSC 631 Data Mining 
    » CSC 633 Machine Learning 
    » CSC 640 Artificial Intelligence 
    » CSC 650 Big Data Analytics (CPO-SAS/ SPSS) 
    » CSC 660 Advanced Data Science 
    » CSC 680 Advanced Computer Algorithms 
    » CSC 688 Special Topics (1 to 3 credit hours) 
    » CSC 689 Independent Study (1 to 3 credit hours) 
    » CSC 720 Formal Methods 
    » CSC 730 Cryptography & Cryptanalysis 
    » CSC 750 Coding Theory 
    » ECE 502 Advanced Python Applications 
    » ECE 503 AI Math fundamentals with Python application 
    » ECE 505 Machine Learning Fundamentals 
    » ECE 655 Deep Learning Fundamentals (Keras/TensorFlow 2.0, Pytorch) 
    » ECE 656 Reinforcement Learning (Pytorch) 
    » ECE 657 Natural Language Processing 108 (Keras/TensorFlow 2.0, Pytorch) 
    » ECE 660 Parallel Implementation of ML Algorithms with GPUs (Python Mumba programming, Cuda programming with C++) 
    » ECE 661 AI application development in Engineering and Science (self-driving cars, advanced computer vision/face recognition, AI application in Cybersecurity) 
    » ECE 662 AI application development in business (Fintech/algorithmic trading) 
    » ECE 663 Machine Learning project deployment and production (dockers and Kubernetes, Edge AI, iPhone/Android deployment) 
    » ICS 520 Personal Computer Security 
    » ICS 525 Principles of Ethical Hacking 
    » ICS 530 Cloud Computing Security 
    » ICS 535 Cloud and Virtualization Security (CPO) 
    » ICS 550 Security Policies » ICS 570 Web Security Fundamentals 
    » ICS 620 Computer Malware » ICS 630 Digital Forensics Technology 
    » ICS 670 Network & Data Security » ICS 680 Theory of Cryptographic Systems 
    » ICS 688 Special Topics (1 to 3 credit hours) 
    » ICS 689 Independent Study (1 to 3 credit hours) 
    » SWE 500 Software Engineering 
    » SWE 518 User Interface Design & Implementation 
    » SWE 525 Version Control Tools/GIT 
    » SWE 540 SQA/Manual Testing 
    » SWE 542 SQA/manual/auto/perf Testing 
    » SWE 544 SQA/Software Testing Tools 
    » SWE 546 SQA/Performance Testing 
    » SWE 550 Software Project Management (CPO-ACP) 
    » SWE 560 Principles of Database Systems 
    » SWE 561 Cloud Computing 
    » SWE 562 Oracle Database Management/ Administration 
    » SWE 570 Internet of Things Architecture and Security 
    » SWE 600 Advanced Software Engineering 
    » SWE 602 Software Requirements Elicitation 
    » SWE 632 Software Risk Management 
    » SWE 633 Software Refactoring 
    » SWE 680 Software Architecture 
    » SWE 688 Special Topics (1 to 3 credit hours) 
    » SWE 689 Independent Study (1 to 3 credit hours)

    Admission Requirements

    • Click here for Admission Requirements.

    *U.S. citizens or U.S. Permanent Residents who have earned an undergraduate or graduate degree from a regionally accredited institution in the U.S. are waived from this requirement.

    *Who has 2+ years of work experience in the United States are waived from this requirement.

     

     

    Who
    should
    apply

    ITU’s Information & Cybersecurity program is designed for students who want to acquire in-demand technology skills while learning in a collaborative and entrepreneurial environment in Silicon Valley.

    Learning Outcomes

     

    • Be able to secure organizations’ on-premise and cloud-based computing resources.
    • Demonstrate in depth knowledge of IS techniques to provide leadership for effective solutions to security problems.
    • Have sound knowledge of IS techniques that play a role in organizational processes and decision making.
    • Communicate effectively risk management issues and their impacts to a variety of audiences.
    • Understand the legal and appreciate the ethical importance of ICS for individuals as well as organizations.
    • Business enabler in organizations such as finance, insurance, healthcare, e-commerce, and mail services.
    • Work as security expert in federal agencies for whom cyber security is of highest importance such as DOD, DHS, and FBI.