Master of Science in Cybersecurity Engineering Technology

  • Graduate Programs


     Menu Links


     Program Information
     Educational Objectives  
     Student Learning Outcomes 
     Admission Criteria
     Application Deadlines

     Course Requirements for Graduation
     Total Number of Credits and Their Distribution
     Curriculum Overview
     Course Descriptions
     Cybersecruity Program Flyer 

    Program Information


    The Cybersecurity Engineering Technology master’s degree is designed to prepare the graduate with the technical knowledge and skills needed to conduct operations that protect and defend information and information systems by ensuring availability, integrity, authentication, confidentiality and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection and reaction capabilities. The thirty-four (34) semester credit hours Master of Science in Cyber-security Engineering Technology includes twelve (12) credits in core courses, twenty-one (21) credits in technical electives, and a one (1) credit seminar course which focuses on producing a research paper related to Information Assurance and Computer Security. 

    The objectives of this degree program are to develop graduates who can plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. The program will train graduates who can ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. In Addition the objective of the degree program will develop graduates who can respond to computer security breaches and viruses. 

    Educational Objectives


    The educational objective of the Cybersecurity Engineering Technology master’s degree are as follows:
    1. To prepare graduates with the technical knowledge and skills needed protect and defend computer systems and networks by ensuring availability, integrity, authentication, confidentiality of digital information;
    2. To develop graduates who can plan, implement, upgrade, and monitor cyber security measures for the protection of computing infrastructure; and
    3. To develop graduates who are able to analyze and address computer security breaches. 

    Student Learning Outcomes


    Upon completion of the graduate program, students will be able to:
    • Evaluate cyber security needs of an organization.
    • Assess cyber security risk management policies.
    • Measure the performance of cyber security systems.
    • Troubleshoot, maintain, and update cyber security systems.
    • Implement real-time cyber security solutions.
    • Design short- and long-term cyber security strategies and policies.

    Admission Criteria


    Admission requirements include a bachelor's degree in a technology related field, such as: Engineering Technology, Computer Science, Information Technology, Software or Computer Engineering, Networking, Information Security or related disciplines. Applications from candidates with bachelor's degrees in non-technical fields may be considered for admission if they provide evidence of work experience in the field of Cyber security (such as a letter from their current supervisor) and possess one or more industry standard security certifications such as CompTia Security+, Certified Information Systems Security Professional (CISSP), Global Information Assurance Certification (GIAC) Security Expert (SE), Cyber Security Program Plan (CSPP), or Certified Cyber Forensics Professional (CCFP). All applicants must show a strong record of academic achievement, as indicated by official transcript(s), three letters of recommendation, and satisfactory scores on either the Graduate Record Examination (GRE) or the Graduate Management Admission Test (GMAT).


    » Fall Semester                   July 1st 
    » Spring Semester               December 1st 
    » Summer Session(s)          April 1st

    Course Requirements for Graduation

     
    The general requirements for those of the non-thesis program are: 
    1. A minimum of 34 semester credit hours in courses approved for graduate credit with a minimum average grade of "B" in all course work taken.
    2. A minimum of 18 semester credit hours in courses numbered 600 or above.
    3. Successful submission of a seminar paper is required.

    Total Number of Credits and Distribution


    Required Core Technology Courses - 12 credits
    Elective Cybersecurity Engineering Technology Courses - 21 credits
    Seminar Course - 1 credit
    Total Credits Required - 34 credits

    Cybersecurity Engineering Technology Curriculum Overview

    (Note: Credit Hours are given in parentheses) 

    Course #  Core Required Courses  Credits 
    ETCS 600 Statistical Applications for Technology (3) 
    ETCS 606  Applied Research for Technology (3) 
    ETCS 620 Project Management for Technology (3) 
    ETCS 687 Legal and Ethical Issues in Cybersecurity (3) 
        12 
    Course # Elective Courses  
    ETCS 678  Mobile Wireless Networking and Security (3) 
    ETCS 680 Networking Technology for Industry (3) 
    ETCS 681 System Integrity for Cybersecurity (3) 
    ETCS 682 Cybersecurity Administration (3)
    ETCS 683 Network Intrusion, Detection and Incidence Response (3) 
    ETCS 685 Fundamentals of Network Security (3)
    ETCS 686 Advanced Network Security (3)
        21
    Course # Seminar Course  
    ETCS 690 Master's Seminar (3) 
        1
      Total Credits 34 


    Cybersecurity Engineering Technology Course Descriptions


    (Note: Credit Hours are given in parentheses)

    ETCS 600 
    Statistical Applications for Technology (3)

    This course presents a broad treatment of statistics, concentrating on specific statistical techniques used in science and industry. 
    Prerequisite(s): Graduate Standing

    ETCS 606 Applied Research for Technology (3)

    This course studies the research methods and processes applicable to engineering and technology. Emphasis will be placed on defining research problems, collecting, analyzing, recording, and interpreting data. Students will be required to conduct a research project.
    Prerequisite(s): Graduate Standing

    ETCS 620 Project Management for Technology (3)

    This is the introductory project management course, which is a core course in the Master’s degree programs.
    Prerequisite(s): Graduate Standing

    ETCS 678 Mobile Wireless Networking and Security (3)

    This course is a comprehensive examination of wireless local area networks, with an emphasis on the IEEE P802.11 family of WLAN standards. 
    Prerequisite(s): Graduate Status or Permission of Instructor

    ETCS 680
     Networking Technology for Industry (3)

    An advanced study of network technology fundamentals. The course stresses the state of the art developments that support the World Wide Web and a wide array of specific applications. 
    Prerequisite(s): Graduate Standing

    ETCS 681 System Integrity for Cyber security (3)

    This course identifies elements of system integrity for Cyber security including firewall design, types of security threats and responses to security attacks. This course also studies the use best practices design, implement, and monitor a network security plan. This course also examines security incident postmortem reporting and ongoing network security activities. 
    Prerequisite(s): Graduate Status or Permission of Instructor.

    ETCS 682 Cyber security Administration (3)

    This course explores the concepts of governance and how it applies to information systems. Discussion includes the importance of compliance with laws, regulations, policies, and procedures as a means of minimizing risk through mandated security and control measures. Through this course, students also gain an understanding of Cyber security Auditing processes and principles. Prerequisite(s): Graduate Standing

    ETCS 683 Network Intrusion, Detection and Incidence Response (3)

    This course presents an exploration of the theory and implementation of intrusion detection and intrusion prevention. 
    Prerequisite(s): ETCS 685 or Permission of Instructor

    ETCS 685 Fundamentals of Network Security (3)

    This course presents topics include cryptography, cipher systems, practical security schemes, confidentiality, authentication, integrity, access control, nonrepudiation, and their integration across telecommunications (i.e., computer) networks 
    Prerequisite(s): Graduate Status or Permission of Instructor

    ETCS 686 Advance Network Security (3)

    This course covers advance information from topics presented in ETCS 685. Topics include cryptography, cipher systems, practical security schemes, confidentiality, authentication, integrity, access control, nonrepudiation, and their integration across telecommunications (i.e., computer) networks. 
    Prerequisite(s): ETCS 685 or Permission of Instructor

    ETCS 687 Legal and Ethical Issues in Cybersecurity (3)

    This course focuses on the ways that law, ethics and Cyber security overlap and intersect. Besides laws related to Cyber security, the course examines laws related to intellectual property, civil litigation, criminal prosecutions, and privacy. 
    Prerequisite(s): Graduate Standing

    ETCS 690 Master’s Seminar (1)

    This course serves a dual role. First and foremost, this is a graduate seminar course with the major objective of preparing students for research in practical applications. It will challenge students with a critical and philosophical exploration of the ideas of Cyber security, and will consist of lectures, readings and class discussions in which every student is expected be an active participant. Since students come to this course with diverse interests in graduate work in Cyber security, the scope of readings and discussions on research and practical applications will be broad. The second role of this course is a capstone graduation requirement for all Masters’ students. For that purpose, the goal is to learn the practical skills of giving a presentation and writing a research paper. 
    Prerequisite(s): Permission of Instructor

    For more information on this program, please contact:


    Ms. Etahe Johnson
    Academic Program Coordinator 
    Department of Technology 
    University of Maryland Eastern Shore 
    11931 Art Shell Plaza 
    Princess Anne, MD 21853-1299 
    (410) 651-6131
    Email: ejohnson2@umes.edu


  • University System of Maryland University of Maryland Eastern Shore University of Maryland Eastern Shore University of Maryland Eastern Shore University of Maryland Eastern Shore