Master of Science in Cybersecurity

The MSc in Cybersecurity program emphasizes a rigorous foundation in the core disciplines of information security and software engineering. The program is designed in line with the best practices of prominent universities offering similar programs. The program offers students fundamental knowledge, skills, and first-hand experience in cybersecurity by balancing theory and practice, engaging students in active learning, and encouraging collaboration on projects drawn from real-world contexts. Our students enter the program with a strong foundation in computer science or applied computing. They leave the program with a deep knowledge of cybersecurity

Classes

MCS 501: Cryptography

This technical course thoroughly explores the principles as well as practices of cryptography in Information Technology systems, concentrating on securing communication and data through various and available encryption methods. Key topics to be covered in this course include asymmetric and symmetric encryption techniques, digital signatures, cryptographic protocols, hash functions, as well as cryptographic attacks.

MCS 502: Vulnerability and Security Assessment

This course provides students with comprehensive knowledge and practical skills essential for identifying, evaluating, and mitigating vulnerabilities in digital systems and networks. Through a combination of theoretical frameworks and hands-on practical exercises, students delve into various methodologies and tools used in vulnerability assessment and penetration testing, preparing them for real-world scenarios in cybersecurity.

MCS 503: Advanced Secure Software Engineering

The Secure Software Development course focuses on imparting students with essential skills for building secure and resilient software applications. Covering secure coding practices, threat modeling, authentication mechanisms, encryption, and secure software development lifecycle (SDLC) methodologies, the course emphasizes integrating security into every phase of the software development process. Through hands-on exercises and real-world examples, students learn to design and develop software solutions that adhere to industry-standard security principles, ensuring the protection of sensitive data from malicious threats

MCS 504: Advanced Network Security

This course provides an in-depth study of network security principles and techniques for protecting computer networks from unauthorized access, attacks, and data breaches. Topics include network vulnerabilities, encryption protocols, intrusion detection systems, firewalls, virtual private networks (VPNs), and secure network design.

MCS 506: Computer forensics

This course focuses on applying scientific methods to retrieve, preserve, and evaluate electronic proof from computers, storage systems, and digital networks. Computer forensics is crucial in cybersecurity, law enforcement, incident response, and judicial processes. Subjects covered are forensic investigation processes, evidence collecting and preservation, file system analysis, network forensics, and legal aspects of digital investigations.

MCS 507: Advanced Ethical Hacking and Penetration Testing

The Advanced Ethical Hacking and Penetration Testing course offers students an in-depth exploration of the techniques, tools, and methodologies used in both offensive hacking and defensive security measures within work and Internet Hacking and Defense. The course emphasizes real-world attack methodologies employed by experienced penetration testers, covering a wide range of techniques from weaponizing Python, manipulating network access and control, and exploiting network devices, to advanced exploit writing against modern operating systems. Through hands-on labs and exercises, students will conduct sophisticated attack vectors to understand and mitigate potential security flaws.

MCS 508: Security for Emerging Technologies

This course provides an exploration of security principles, challenges, and solutions related to emerging technologies such as Artificial Intelligence (AI), the Internet of Things (IoT), and other new technological paradigms. It addresses the cybersecurity threats that accompany these technologies, emphasizing the design and implementation of robust security frameworks. The course aims to equip students with the tools to secure modern emerging technologies and systems against evolving threats.

MCS 521: Special topics in Cybersecurity

The course "Special Topics in Cybersecurity" offers an in-depth exploration of emerging trends, advanced concepts, and specialized areas within the field of cybersecurity. Through a combination of theoretical study, practical exercises, and case studies,  Students delve into cutting-edge topics relevant to the rapidly evolving landscape of cybersecurity.

MCS 522: Advanced Cryptography and Cryptanalysis

The advanced cryptography and cryptanalysis course delves into the advanced theories and methodologies of cryptography, with a strong focus on cryptanalysis—the study of breaking cryptographic systems.

Building on the cryptography foundation presented in the prerequisite course, Cryptography 501, this course emphasizes both the creation and breaking of cryptographic mechanisms. Students will explore complex cryptographic algorithms, advanced encryption techniques, cryptographic protocols, and cutting-edge cryptanalysis methods. The course will cover topics such as advanced symmetric and asymmetric encryption techniques, cryptographic hash functions, digital signatures, and an in-depth study of cryptographic attacks, including modern cryptanalysis techniques and countermeasures

MCS 523: Database Security

This course provides an in-depth exploration of security mechanisms and best practices related to the protection of databases. The course covers a range of topics including database security models, access control, encryption, SQL injection, auditing, and compliance. Students will learn to identify vulnerabilities within database environments, implement robust security measures, and ensure the confidentiality, integrity, and availability of data. This course emphasizes both theoretical concepts and practical skills necessary to secure modern database systems against various threats and attacks.

MCS 524: Web Application Security

This course covers the security challenges and solutions associated with web applications. It focuses on understanding the vulnerabilities in web technologies, the techniques used by attackers to exploit these vulnerabilities, and the strategies for defending against such attacks. Through theoretical knowledge and practical exercises, students will learn how to secure web applications throughout the development lifecycle, from design to deployment and maintenance.

MCS 600 A: Thesis A

Students enrolled in the thesis option prepare an MSc thesis proposal that includes the research problem(s) to be addressed by the proposed cybersecurity research, a thorough literature review of the related works, the objectives, the methodology to be followed, the results and contributions expected from the proposed research, as well as timeline and schedule of the proposed research. The research proposal will be evaluated according to the university regulations and college/department internal procedures.

Students are expected to write a report, referred to as a thesis, on the results of an original investigation, in conjunction with a master’s Advisory Committee. Length and style of the thesis vary by college/department. All these are filed with the Office of Graduate Studies. A Master’s Advisory Committee will be formed for each student. The Chair of the Committee must have research and graduate student advising experience. This Committee will assist the student in the formulation of the Thesis Proposal, and later advise the student in the execution of the research, the Thesis write-up, and help the student to prepare for the oral defense.

MCS 600 B: Thesis B

Students enrolled in the thesis option prepare an MSc thesis proposal that includes the research problem(s) to be addressed by the proposed cybersecurity research, a thorough literature review of the related works, the objectives, the methodology to be followed, the results and contributions expected from the proposed research, as well as timeline and schedule of the proposed research. The research proposal will be evaluated according to the university regulations and college/department internal procedures.

Students are expected to write a report, referred to as a thesis, on the results of an original investigation, in conjunction with a master’s Advisory Committee. Length and style of the thesis vary by college/department. All these are filed with the Office of Graduate Studies. A Master’s Advisory Committee will be formed for each student. The Chair of the Committee must have research and graduate student advising experience. This Committee will assist the student in the formulation of the Thesis Proposal, and later advise the student in the execution of the research, the Thesis write-up, and help the student to prepare for the oral defense.

MCS 601 A: Project A

This course first prepares the student for the project that shall be completed by students who take the coursework (project) path. Students work closely with the supervisor to define the scope of the Cybersecurity project (of appropriate complexity) and understand its requirements, identify the tools required to do the project, and review relevant related literature. The student shall submit a written report to his supervisor at the end of the semester.

Following the project preparation study, the students apply the knowledge gained throughout the program. The project can take the form of a theoretical or experimental study (analysis, evaluation, comparison, etc.) or the design and/or implementation and/or maintenance of one or more components of a system. Students write a report describing their work and perform an oral presentation in front of an examination committee.

MCS 601 B: Project B

This course first prepares the student for the project that shall be completed by students who take the coursework (project) path. Students work closely with the supervisor to define the scope of the Cybersecurity project (of appropriate complexity) and understand its requirements, identify the tools required to do the project, and review relevant related literature. The student shall submit a written report to his supervisor at the end of the semester.

Following the project preparation study, the students apply the knowledge gained throughout the program. The project can take the form of a theoretical or experimental study (analysis, evaluation, comparison, etc.) or the design and/or implementation and/or maintenance of one or more components of a system. Students write a report describing their work and perform an oral presentation in front of an examination committee.