For up-to-date program information, please visit www.utica.edu/programs
For up-to-date program information, please visit www.utica.edu/programs
Online Program
Cybersecurity In today’s information intensive environment, cyber-related incidents – such as online fraud, cyber crime, cyber terrorism, and cyber espionage – are on the rise. Our national security, personal safety, and economic health are at risk. To address the growing need for professionals with the advanced knowledge to anticipate and repel sophisticated cyber attacks and infiltration attempts on computer systems, Utica College designed the online Master of Science degree program in Cybersecurity. A leader in economic crime programs for over 20 years, Utica College has designed this innovative new program to combine hands-on education in state-of-the-art cybersecurity and computer forensic practices with coursework on leadership and planning adapted specifically to the cyberspace realm. Utica’s online M.S. in Cybersecurity offers students advanced training and hands-on experience in intelligence, critical infrastructures, and investigative principles as they relate to cybercrime, including: • • • • •
An understanding of the major concepts in cybersecurity, computer forensics, cyber intelligence and counterintelligence, and cyber terrorism The application of cybersecurity technology to field operations Ethics as applied to cybersecurity operations and policy A practical knowledge of cybercrime investigations, including methods of maintaining the integrity of cyber evidence. The program offers three specializations targeted to students with different interests in this exciting field.
Computer Forensics Designed for students interested in collecting and preparing evidence of computer crimes such as fraud, child pornography, and cyber espionage, the curriculum emphasizes a comprehensive understanding of the computer forensic tools and techniques used to investigate and analyze digital devices and network-related incidents. Coursework also focuses on the collection and preservation of digital evidence from a variety of environments.
INTELLIGENCE Designed for professionals interested in cyber intelligence and counterintelligence, cyber counterterrorism, and cyber countersabotage, the curriculum covers analysis of global and national cybersecurity policies, the study and protection of critical infrastructures, as well as operations involving cyber threats and defense.
CYBER OPERATIONS Designed for students interested in understanding the technical, legal, and ethical aspects of cyber attack and cyber defense operations. Coursework for this specialization focuses on penetration testing, vulnerability assessment, data hiding and anonymity, and advanced cyber protection mechanisms.
student learning goals • • • • 50
Develop an understanding of cybersecurity tools, techniques, and technologies Demonstrate an understanding of how traditional intelligence methods and procedures are applied to the cybersecurity domain Demonstrate critical thinking and information application related to the discipline of cybersecurity, intelligence, and forensics Demonstrate an understanding of cybercrime investigations and the application of computer forensics tools and techniques
• • • •
Design and discuss a research project based on the scientific method Show how ethical issues impact decision making in the cybersecurity area Develop an understanding of different forms of malware Develop an understanding of risk assessment methods related to cybersecurity and national critical infrastructures
academic requirements (30 credit hours) Major Core Requirements (18 credit hours) CYB 605 – Principles of Cybersecurity (3) CYB 610 – Cyber Intelligence (3) CYB 633 – National Critical Infrastructures and National Security (3) CYB 673 – Principles of Cybercrime Investigations (3) CYB 695 – Capstone Project I & II (6) & 696
Computer Forensics Specialization Requirements CYB 624 CYB 651 CYB 652 CYB 653 CYB 659
– – – – or –
(12 credit hours)
Advanced Topics in Cybercrime Investigations (3) Computer Forensics Investigations I (3) Computer Forensics Investigations II (3) Advanced Telecommunications Forensics (3) Advanced Topics in Computer Forensics (3)
Intelligence Specialization Requirements (12 credit hours) CYB 615 CYB 616 CYB 617 CYB 667 CYB 689
– – or – – –
Cyber Counterintelligence (3) Domestic Terrorism and Extremist Groups (3) Counterterrorism and Cyber Conflict (3) Critical Incident Command, Response and All Hazards (3) Advanced Topics in Cybersecurity (3)
Cyber Operations Specialization Requirements (12 credit hours) CYB 640 CYB 641 CYB 642 CYB 643 CYB 649
– – – – or –
Tactics, Techniques and Procedures (3) Computer and Network Operations (3) Access Methods and Data Hiding (3) Autonomous Cyber Operations (3) Advanced Topics in Cyber Operations (3)
Students in this program may opt to take up to two specializations under the following conditions: 1) They must have the approval of their academic adviser and the Program Director. 2) Students may take either one or two but not three specializations. continued
51