Cybersecurity
Master of Science

028cc096-c29a-4107-ab6b-3a5aa98afb16

Quick Facts


Credits Required: 33*
Cost Per Credit: $1332.00
Loading...
Image
McClelland Hall Building

Designated Center for
Academic Excellence
in Cyber Defense

Image
Center for Academic Excellence in Cybersecurity Seal
College of Engineering
Eller College of Management
Program Details

The University of Arizona’s online Master’s in Cybersecurity is designed for working professionals who want to gain technical mastery in the rapidly growing field of cybersecurity. Leveraging three of the strongest departments at the University of Arizona, this unique program is a joint program administered by Management Information Systems (MIS) at the Eller College of Management, Electrical and Computer Engineering, and Systems and Industrial Engineering at the College of Engineering.

In this challenging yet inclusive online program, you will learn how to assess, prevent, and manage information and systems security-related risks by applying systems security management and post-breach practices through hands-on, interactive classes taught by the University of Arizona’s excellent faculty.

The 33-credit, interdisciplinary cybersecurity program enables you to complete a common core of courses and then select either the Information Systems or Physical Systems track.

Start studying right away — the program offers six admission dates throughout the year, with accelerated 7-week courses.

*Residents of some U.S. Territories may not be eligible. Please see our Eligibility & State Authorization page for more information.

Courses

Students will complete 33 units of coursework, including 12 units of Common Core and 21 units of their selected track. Common Core courses:

Gain a general knowledge of measures to ensure confidentiality, availability and integrity of information systems. Topics include hardware, software and network security; INFOSEC, OPSEC and NSTISS overviews; national policy, threats, countermeasures and risk management.

Learn how to discover knowledge and acquire business intelligence from massive datasets. Overview of the most important data mining techniques – classification, clustering, association rule mining, visualization, and prediction – used to discover patterns in fraud detection, consumer behavior, credit approval, etc.

 

Explore various techniques for eliminating security vulnerabilities, defining security specifications/plans, and incorporating countermeasures in order to achieve overall system assurance.

Develop an in-depth knowledge of data communications and networking requirements, including networking technologies, hardware and software.

Concentrations

Image
man looking at laptop screen with code
INFORMATION SYSTEMS TRACK

The Information Systems track is offered in an accelerated 7-week format, consisting of 21 units. 

The objective of our MIS 516 course is to provide students a thorough and operational knowledge of information security so that this critical area is recognized as a management issue and not an IT issue.

The information security arena contains a broad array of multi-level models for assessing, planning, implementing and monitoring the mitigation of security risks. At the very core of this information security spectrum are the actual system and network devices which store, manage, transmit and secure information. This course is designed to provide a working knowledge of issues and techniques surrounding the proper safeguarding of operating systems and related components. Filled with Information Assurance topics, this course offers a solid base for system administrators and technical managers.

Corporations today are said to be data rich but information poor. For example, retailers can easily process and capture millions of transactions every day. In addition, the widespread proliferation of economic activity on the Internet leaves behind a rich trail of micro-level data on consumers, their purchases, retailers and their offerings, auction bidding, music sharing, so on and so forth. Data mining techniques can help companies discover knowledge and acquire business intelligence from these massive datasets. This course will cover data mining for business intelligence. Data mining refers to extracting or “mining” knowledge from large amounts of data. It consists of several techniques that aim at discovering rich and interesting patterns that can bring value or “business intelligence” to organizations. Examples of such patterns include fraud detection, consumer behavior, and credit approval. The course will cover the most important data mining techniques -- classification, clustering, association rule mining, visualization, prediction.

This course is designed to provide students with a hands-on introduction to the fundamental concepts and tools of modern cyber threat intelligence. Students will become familiar with the cyber threat intelligence lifecycle, identifying, collecting, and integrating intelligence feeds, common intelligence formats, and standard cyber threat intelligence technologies (e.g., CIF servers, TAXII servers, SIEM's etc.).

This course introduces students to the principles and techniques of the cybersecurity practice known as penetration testing (pen testing), or ethical hacking, and covers the full pen test life cycle. Students discover how system vulnerabilities can be exploited and learn how to avoid such problems. Students will review various tools and methods commonly used to compromise information and control systems. Ethical hacking, also known as penetration testing, is the act of breaking into a system with the permission and legal consent of the organization or individual who owns and operates the system, with the purpose of identifying vulnerabilities to strengthening the organization's security. Students will conduct hands-on penetration tests in a lab environment to practice the concepts presented and tools reviewed in the course. This course is an ethical hacking course and students will learn hacking techniques within a controlled environment for the goal of better securing the IT resources of their rightful owners.

The focus of this course is the usage of common tools used during penetration assessments and hardening system defenses. Students will draw from previous classes to combine skills in online defense and penetration exercises of systems in a virtual environment. Along with course labs, this course will apply theory and techniques to provide the following learning base - knowledge, comprehension, and application.

Image
Woman looking at computer with code
PHYSICAL SYSTEMS TRACK

The Physical Systems track is offered in a 16-week format, consisting of 21 units.

This course provides an introduction to technical aspects of cyber security. It describes threats and types of attacks against computers and networks to enable students to understand and analyze security requirements and define security policies. Security mechanisms and enforcement issues will be introduced. Students will be immersed in the cyber-security discipline through a combination of intense coursework, open-ended and real-world problems, and hands-on experiments.

Machine learning deals with the automated classification, identification, and/or characterizations of an unknown system and its parameters. There are an overwhelming number of application-driven fields that can benefit from machine learning techniques. This course will introduce you to machine learning and develop core principles that allow you to determine which algorithm to use, or design a novel approach to solving to engineering task at hand. This course will also use software technology to supplement the theory learned in the class with applications using real-world data.

Cloud computing is the model for ubiquitous, convenient, on-demand access to a shared pool of configurable computing resources. With the interest in cloud computing, the security challenges are raising concerns. This class discusses the cloud computing architecture and components along with the threat modelling and discusses physical, database, network, virtualization, services, and users level security concerns and their solutions.

Statistical methodology of estimation, testing hypotheses, goodness-of-fit, nonparametric methods and decision theory as it relates to engineering practice. Significant emphasis on the underlying statistical modeling and assumptions.

The purpose of the course is to give students a comprehensive introduction to digital communication principles. The major part of the course is devoted to studying how to translate information into a digital signal to be transmitted, and how to retrieve the information back from the received signal in the presence of noise and intersymbol interference (ISI). Various digital modulation schemes are discussed through the concept of signal space. Analytical and simulation models for digital modulation systems are designed and implemented in the presence of noise and ISI. Optimal receiver models for digital base-band and band-pass modulation schemes are covered in detail.

Process and tools for systems engineering of large-scale, complex systems: requirements, performance measures, concept exploration, multi-criteria tradeoff studies, life cycle models, system modeling, etc.

In the process of earning the Master’s in Cybersecurity, students could also earn the Department of MIS’s Enterprise Security Certificate, which leverages the department’s designation – by the National Security Agency and the Department of Homeland Security – as a Center of Academic Excellence in Cyber Defense.

Image
NSA seal
Image
US department of Homeland Security Seal
A man working with computers

Outcomes

As a result of this program, students will:

  • Understand the breadth and scope of security issues on personal, corporate, national, and global levels
  • Assess, prevent, and manage information or systems security-related risks
  • Perform system hardening, vulnerability testing, and forensic investigation procedures
  • Apply data analytics to develop threat intelligence for current and future information or systems security endeavors