Masters of Science in Cybersecurity

Overview

The Master of Science in Cybersecurity at Rochester Institute of Technology, Dubai gives students an understanding of the technological and ethical roles of cybersecurity in today's society and its importance across the breadth of computing disciplines. The degree enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in the cybersecurity industry, academia, or research careers, or to pursue a more advanced degree in a computing discipline.

The courses offered by this degree are suited to the opportunities available in both private and public sectors. In the private sectors, a considerable number of opportunities exist with banking institutions, cyber-social applications and private investigation professional service vendors. The courses we offer around web and application security, audits and forensics will be significant for these areas. In the public sector, the law enforcement and healthcare verticals will benefit significantly from the network security, forensics and cryptography modules we have on offer. To highlight this point further, our experience from engaging with government entities shows that there is a strong demand for home grown cryptography solutions, especially in the hardware encryption and decryption space. Similarly, with the rapid adoption of smart city technologies, offering a course related to big data and sensor security will be significant. The use of AI tools and techniques which are covered in the courses will empower individuals with the skills and approach needed to successfully contribute to the transformation of their organizations.

Offering the degree program in concert with local private and public institutions and fulfilling their research appetite, developing their workforces and enhancing the competence in selecting and deploying security solutions is an important consideration for Rochester Institute of Technology Dubai.

 

Typical Job Titles

Associate Detection and Response Engineer Backend Developer
Cyber Defense Solutions Engineer Cyber Security Analyst
Cyber Security Consultant GRC Consultant
Incident Response Analyst Information Technology Analyst
Security Engineer Systems Engineer

Mission Statement

The mission of the cybersecurity graduate program is to advance state of the art in cybersecurity and provide a world-class education by cultivating the knowledge, skills, mindset, and ethics needed for a successful career as a cybersecurity professional.

Program Educational Objectives

  • PEO 1: MS Cybersecurity graduates will have specialized education in a concentrated field of study in cybersecurity and develop professional attributes. These include communication, legal, and ethical skills and knowledge to deal with the impact of technology in a global and societal context.
  • PEO 2: The MS Cybersecurity program will foster an environment that encourages independent thinking and creativity that prepares its graduates to innovate original methods, ideas, and research in the field of cybersecurity or related disciplines sufficient to pursue a doctoral degree.

Program Learning Outcomes

  • Apply advanced knowledge and critical thinking to develop evidence-based solutions for cybersecurity problems.
  • Establish advanced knowledge and skills in a selected area of cybersecurity.
  • Communicate effectively in areas of cybersecurity incorporating broader contexts such as societal, economic, and global one.
  • Analyze cybersecurity issues incorporating interdisciplinary aspects such as law, business, international relations, and public policy.
  • Review and employ Technologies, Theories, and Methodologies Emerging in the Field of Cybersecurity

Curriculum

Typical Course Sequence

Total Credit Hours - 30

Core Courses

  • Students are required to take both core courses which are 3 credits each.
Course Sem. Cr. Hrs.
CSEC-604
Cryptography and Authentication
In this course, students will gain in depth knowledge of cryptography and authentication. Students will explore various cryptographic algorithms and authentication protocols, focusing on their design and implementation. Students will also work on a research or implementation project, based on cryptographic algorithms and/or authentication protocols. The applications of cryptography and authentication in the areas of computer networks and systems will also be investigated. This course requires prior knowledge in Discrete Mathematics.
3
CSEC-742
Computer System Security
The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies.
3


Research Electives

  • Students are required to choose 2 research electives courses for the thesis option or 3 research electives courses for the capstone option.
Course Sem. Cr. Hrs.
CSEC-659
Graduate Seminar on Blockchains and Smart Contracts
This course explores blockchain techniques, Ethereum’s capabilities, and developing smart contracts. Key topics include blockchains and cryptography, Ethereum clients, wallets, transactions, smart contracts, EVM, smart contract exploits, and defensive programming techniques. Students will learn various development and testing frameworks for smart contracts such as Truffle, Web3.py, and Brownie. Additionally, students will learn the state of art research in blockchains and cryptocurrencies. Strong programming and cryptography knowledge and skills are required to take this course.
3
CSEC-741
Internet of Things Security
This course is designed to provide students with knowledge of sensor network security with respect to practical implementations. In particular, secure sensor network design for Supervisor Control and Data Acquisition (SCADA) is discussed. SCADA encompasses technologies that manage and control much of the infrastructure that we depend on every day without realizing it. The failure or corruption of  CADA systems can not only be inconvenient but also hazardous when the resource is critical or life-threatening. Securing SCADA systems is of great strategic importance. The role of sensor networks in SCADA is discussed and sensor security protocols for SCADA applications are evaluated and studied. To be successful in this course students should be knowledgeable in basic networking, systems, and security technologies.
3
CSEC-750
Covert Communications
Students will be introduced to the history, theory, methodology and implementation of various kinds of covert communications. Students will explore future techniques and uses of covert communications.  ore specifically students will explore possible uses of covert communications in the management of botnets. To be successful in this course students should be knowledgeable in networking, systems, and security technologies.
3
CSEC-759
Graduate Seminar on Advanced Malware Forensics
For adversaries today, malware is still the main attack vector to penetrate the defense and establish a foothold within enterprise networks. In this course, students will learn state-of-the-art techniques for malware analysis, detection, and anti-forensics. Topics include the static, dynamic, and memory analysis of malware, along with malware evasion methods. Students will also study machine learning approaches for malware detection. They will investigate strengths and weaknesses in traditional malware detection schemes, analyze and improve reported solutions in the literature. Students need previous knowledge of computer viruses and malicious software to complete this course.
3
CSEC-769 Emerging Topics in Wireless Security 3


Advanced Courses/Focus Areas

  • Students are required to choose 4 advanced electives courses for the thesis option or 5 advanced electives courses for the capstone option.
Course Sem. Cr. Hrs.
CSEC-603
Enterprise Security
This course is designed to provide students with the advanced concepts needed to establish network security strategies to ensure adequate protection for the corporate environment and yet provide accessibility for the corporate community.
3
CSEC-620
Cyber Analytics and Machine Learning
The course provides students an opportunity to explore methods and applications in cyber analytics with advanced machine learning algorithms including deep learning. Students will learn how to use machine learning methods to solve cybersecurity problems such as network security, anomaly detection, malware analysis, etc. Students will also learn basic concepts and algorithms in machine learning such as clustering, neural networks, adversarial machine learning, etc. A key component of the course will be an independent exploratory project to solve a security program with machine learning algorithms. Students taking this course should have knowledge in Discrete Math, Probability and Statistics, and Linear Algebra. Students should also be able to program in Python.
3
CSEC-730
Advanced Computer Forensics
This course provides students with the latest techniques and methods needed for extracting, preserving and analyzing volatile and nonvolatile information from digital devices. Students will gain exposure to the spectrum of available computer forensics tools along with developing their own tools for “special need” situations. The core forensics procedures necessary for ensuring the admissibility of evidence in court, as well as the legal and ethical implications of the process, will be covered on both Unix and Windows platforms, under multiple file systems. Therefore, students must possess a knowledge of available filesystems on both platforms.
3
CSEC-731
Web Server and Application Security Audits
This course discusses the processes and procedures to perform a technical security audit of web servers and web based applications. Students will not only explore Web Servers and Applications/Services threats, but also apply the latest auditing techniques to identify vulnerabilities existing in or stemming from web servers and applications. Students will write and present their findings and recommendations in audit reports on web servers and application vulnerabilities. To be successful in this course students should be knowledgeable in a scripting language and comfortable with the administration of both Linux and Windows platforms.
3
CSEC-743
Computer Viruses Malicious Software
Computer malware is a computer program with malicious intent. In this course, students will study the history of computer malware, categorizations of malware such as computer viruses, worms, Trojan horses, spyware, etc. Other topics include, but are not limited to, basic structures and functions of malware, malware delivery mechanism, propagation models, anti-malware software, its methods and applications, reverse engineering techniques. Students will conduct research to understand the current state of the computer malware defense and offense.
3
CSEC-744
Network Security
Students will examine the areas of intrusion detection, evidence collection, network auditing, network security policy design and implementation as well as preparation for and defense against attacks. The issues and facilities available to both the intruder and data network administrator will be examined and evaluated with appropriate laboratory exercises to illustrate their effect. The students will be provided with an understanding of the principles and concepts of wired and wireless data network security. Students will perform a series of laboratory or homework experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption. Students will engage in attack/defend scenarios to test their deployments against other teams. Students should be knowledgeable in networking technologies.
3
CSEC-751 Information Security Policy and Law 3


Thesis/Capstone

  • Thesis: In addition to the 6 credits thesis, students of this option take 2 core courses, choose 2 research electives and choose 4 advanced electives which are 3 credits each.
  • Capstone: Students of this option take 2 core courses, choose 3 research electives and choose 5 advanced electives which are 3 credits each.
Course Sem. Cr. Hrs.
CSEC-790
MS Thesis
This course is one of the capstone options in the MS in Cybersecurity program. It offers students the opportunity to investigate a selected topic and make an original contribution which extends knowledge within the Cybersecurity domain. Students must submit an acceptable proposal to a thesis committee (chair, reader, and observer) before they may be registered by the department for the MS Thesis. Students must defend their work in an open thesis defense and complete a written report of their work before a pass/fail grade is awarded. As part of their original work, students are expected to write and submit an article for publication in a peer reviewed journal or conference. (Pre-requisites: Permission of Department).
6
--
MS Capstone Option
This course is one of the capstone options in the MS in Cybersecurity program. Students will apply their knowledge to solve real-world problems in the areas of Cybersecurity. Students will work on an individual semester-long project involving some type of practical development with a deliverable. This may include development with computer equipment, software packages, and programming or scripting languages. Alternately, it may be the development and demonstration of an innovative process that addresses a current Cybersecurity issue or problem. A well-written professional report is required that details current thinking on the topic in the professional literature, the design and implementation of development that was done, and a critical evaluation of the results. The students will also present their findings in an open forum. Students are expected to submit a short proposal before they can be enrolled in the class. (Pre-requisites: Permission of Department).

 

Notes:

1. Students must maintain a cumulative GPA of 3.0 or above at all times. A student with a cumulative GPA of less than 3.0 will be placed on probation (which may lead to suspension). University rules on probation and suspension apply.
2. The minimum passing grade for graduate-level courses is “C”.
3. All the graduate work must be completed within seven years, starting from the time the first course is applied towards the degree.
4. The thesis option can be done over two semesters and the student can enroll into the thesis option only after the minimum of two research electives are completed with the minimum passing grade. Enrollment into the thesis program requires a research proposal to be approved beforehand with a minimum of three committee members.
5. Students are required to take a minimum of two research electives. However, if students are interested in taking a third or fourth research elective, they can do so and swap it with an advanced elective.
6. Applicants wishing to enter this master’s program should have an undergraduate degree in computing related areas with a solid education in mathematics, statistics and computer programming and networking fundamentals. Programs that may provide the necessary background are degrees in Cybersecurity, Computer Science, Information Technology, Software Engineering, Computer Engineering – depending upon the student’s previous coursework and/or work experience. The specific pre-requisites are:
7. Applicants that do not meet the pre-requisites can bridge the gaps through one or more courses and are prescribed per applicant based on the evidence submitted. The courses that they are prescribed would need to be completed credit-bearing evidence of prerequisite completion (with a letter grade of “B” or above).
8. Students who have been admitted to the program before completing pre-requisite requirements must satisfactorily complete bridge coursework within the first two semesters of matriculation to continue in the program. Prior approval of the department Chair is required before any other courses in the program may be taken.
 

To graduate, students need to complete all the requirements as listed in the curriculum graduation policy

Website last updated: December 23, 2024