MS, Information Technology in Cybersecurity - Critical Infrastructure

Concentration Overview

Return to the Heavin School of Arts, Sciences, and Technology Homepage

The Master of Science (MS) degree in Information Technology, Cybersecurity - Critical Infrastructure concentration blends both information technology (IT) and operational technology (OT) and focuses specifically on securing critical infrastructures in sectors such as energy, water, gas, and transportation. The program prepares students, especially those currently in the utility industry, to advance professionally in the cybersecurity field and prepares IT professionals to transition into the utility industry.

Credit Distribution

I. Core Courses (15-18* Credits)

MSI-5010Foundations of Information Technology*

3

MSI-5020Telecommunications and Networking

3

MSI-5030Object-Oriented Application Development

3

MSI-5040Information Systems Analysis, Modeling, and Design

3

MSI-5050Principles of Database Design

3

APS-5100Project Management for Technology

3

II. Concentration (15 Credits)

CYB-5210Foundations of Utility Cybersecurity

3

CYB-5220Cybersecurity Risk Management in Utility Environments

3

CYB-5230Protective Security Controls in Utility Systems and Networks

3

CYB-5240Monitoring, Detection, Response, and Recovery in Utility Environments

3

CYB-5250Integrating Cybersecurity into the System Life Cycle

3

III. Capstone (6 Credits)

APS-7000Master Project in Applied Science and Technology

6

Total Credit Hours: 36-39

* MSI-5010: Foundations of Information Technology is required for learners who need a refresher or who lack the prerequisite knowledge in IT as determined during the application evaluation period.

Learning Outcomes

Upon successful completion of the concentration in Cybersecurity - Critical Infrastructure, graduates will be able to:

  • investigate cybersecurity risks based on ranking criteria;
  • apply appropriate models for security risk mitigation;
  • analyze new technology and identify/develop solution sets for cybersecurity vulnerability concerns;
  • construct research-based recommendations to resolve security incidents and to mitigate vulnerabilities and threats;
  • develop cybersecurity solution requirements for IT/OT vendors and suppliers;
  • implement industry best practices for existing and future systems;
  • implement security controls as defined by industry standards and cybersecurity frameworks; and
  • integrate security into the entire system lifecycle (planning, architecture, design, development, implementation/operation, maintenance, and disposal).