Nov 28, 2024  
USC Catalogue 2016-2017 
    
USC Catalogue 2016-2017 [ARCHIVED CATALOGUE]

Cyber Security Engineering (MS)


Associate Director of Informatics: Clifford Neumann, PhD

The Master of Science in Cyber Security Engineering is intended for: a) graduate students who desire to obtain jobs in which computer security knowledge and skills are required; b) graduate students who wish to continue on a path toward enrollment for a doctoral degree focusing on information security; c) individuals in degree programs or job fields that have responsibility for information security. The typical admitted student will have the following qualifications:

  • an undergraduate degree in computer science, electrical engineering or information security;
  • programming capability;
  • understanding of computer networking and computer operating systems.
  • desire to learn information security techniques and tools that are directly applicable to current information security challenges; and
  • above average mathematical foundation.

During completion of the program, students will learn the fundamentals of developing, engineering and operating secure information systems. They will become versed in the challenges and problems of secure operating systems, secure applications, secure networking, database security and privacy, use of cryptography and key management. They will learn to develop a security policy and how policy drives technology decisions. Students will gain the knowledge and skills necessary to administer environments that require high levels of information security, both from the standpoint of the principles of information protection and the role application technology has in meeting information protection needs. Students will understand the value of assets, the business model of threats, the threat matrix, mitigation strategies and how this integrates with the core organizational mission. They will understand why information security plans succeed or fail.

Students will have hands-on experience simulating real-world scenarios with extensive laboratory work that is designed by current and former information security practitioners.

Requirements for completion (28 units minimum)

Plus an additional 4-5 units that may be composed of items from the above list or