-
100% Online
-
On-Demand24/7
-
Self-Pay24/7
-
Self-Enroll24/7
-
Self-Paced
-
Total Courses
14 -
Price Per Course
$500 -
Total Tuition
$7,000
Secure your career’s future. Learn the latest cutting-edge technologies, tools, and techniques in cyber security with UCC’s 100% online MS Computer Science in Cyber Security
As digital and online technology use continues to grow and expand, it is important to gain the knowledge needed to prepare and protect systems from vulnerabilities and impacts. The University of the Commonwealth Caribbean’s (UCC) 100% online MS Computer Science in Cyber Security provides insight into how critical cyber security is to a business and its customers. It provides a base knowledge of the key industry tools, techniques, strategies, and processes used to reduce and prevent unwanted activity such as cyber-attacks and data breaches.
Â
Courses focus on how to keep information systems and networks safe in all businesses and industries in all sectors (e.g. healthcare agencies, government agencies, etc.) and in personal environments to reduce the risk of exposure of confidential information. On completion, you will be able to understand the range of cyber security concepts that are researched recommended to help keep systems and environments safe.
Â
The cyber security specialization comprises three courses: Computer and Digital Forensics, Cryptography and End-Point Security.
You’ll learn how to…
- Analyze and apply legal frameworks to evaluate computer activity in specific situations and discuss the impact on stakeholders.
- Define and apply computer and digital forensics analysis processes and tools to investigate digital incidents.
- Evaluate and implement risk mitigation tactics to secure information systems and networks in personal and professional settings.
- Design and utilize reliable computer and digital analysis evidence collection topologies and tools to support investigations.
- Apply cryptographic concepts, protocols, and implementations to achieve security goals and functionality in communications, and secure transactions against attacks.
And elevate your skills and career…
Â
A fast-paced career, cyber security is an ever-growing industry, and it is projected to grow by 11% in 2023 and 20% in 2025. Build the cyber-crime fighting knowledge and skills you need for a career in cyber security in roles such as:
Â
- IT Security Analyst
- Senior Security Architect
- Cybersecurity Analyst
- Digital Forensic ExaminerÂ
- Software Engineer
With a program designed for your needs…
Â
UCC’s MS Computer Science in Cyber Security is ideally suited to those looking to develop careers in this high-demand skills area, but don’t have the time for a career break. It encompasses the skills and knowledge behind protecting information systems from vulnerabilities and the threat of online harm, including of security tools, techniques, strategies, and applications.
Â
Course content is delivered entirely online and students study at their own pace, fitting in their learning around existing life commitments including family and full-time work.
Program Courses
Explore how to analyze and design computer algorithms and data structures. You’ll examine methods for evaluating algorithm efficiency and implementation of various data objects, programming styles, and performance expectations. Course topics include the key areas required to understand algorithmic design patterns, such as data concepts, arrays, stacks, queues, trees, and graphs. These concepts are applied to create effective programs and solve problems in coding design. You’ll also learn the importance of enhancing a program’s performance to ensure it is optimized and reusable for overall growth.Â
Learn how to develop a new software program solution using the appropriate computer architectural design. Core topics focus on understanding the critical hardware and software functionality needed to ensure a solution can be designed that will meet the requirements for usability, performance, and support expectations of the program. You’ll also learn strategies for making architectural decisions critical for successful implementations. Â
Develop an understanding of key security concepts, security issues and procedures in computer and mobile networks. You’ll explore various types of security such as LANs, WANs, databases, and network operating systems. You will also analyze threats to computer networks by exploring designs of network infrastructure, potential security flaws, risk assessment and mitigation, and security concepts that impact various communication networks. You’ll learn what network security capabilities are needed in architecture and how to apply them based on different situations. As a result, you’ll gain a comprehensive understanding of when to use network intrusion detection and forensics technologies, cryptographic and authentication systems, access control mechanisms, internet routing and other protocols.Â
Examine the fundamentals of data warehousing and data mining and gain a deeper understanding of how data mining is used through hands-on experience in a variety of areas including:
Â
- Big Data analysis
- prediction
- classification
- identification
- clustering
- association
Â
You’ll also learn how data mining and databases work hand-in-hand from a user perspective in various data modelling, statistical analysis, designing schemas, querying databases, and manipulating databases. On completion, you’ll understand key strategies on how to apply data mining technology to real-world applications, evaluate trends, and optimal design solutions.
Examine the overall core aspects of operating systems design and implementation. You’ll explore key topics including developing knowledge of operating systems by reviewing different types of OS to understand system concepts (process and memory management, process coordination, device drivers, file systems, starvation/deadlock), functionalities of files system management (such as log-structured file systems, distributed file systems, memory-based file systems), user interface, programs and implementation approaches and steps. You’ll also use case studies to understand design approaches on how operating system types (batch, time-sharing/multitask, distributed, network, mobile, Microsoft windows, Apple iOS, Linux, etc.) may be used in a particular solution scenario and how they impact coding decisions.
Gain an introduction to the origins of programming languages and how they have evolved over the years. Learn about abstractions in programming languages, including both data type abstractions and control structure abstractions, and how different programming languages, like Java and Lisp, implement these abstractions and the programming paradigms to which they belong. Finally, develop your understanding of advanced features of programming languages, such as exceptions and polymorphism and their purpose.
Gain a foundation for assessing risk frameworks associated with inter-organizational and external breaches of security, setting up an IT security organization, system development considerations, and technical issues. You’ll cover a range of topics including:Â
- strategyÂ
- business continuityÂ
- legal issuesÂ
- risk managementÂ
- disaster preparedness/recoveryÂ
- training and awarenessÂ
- policies and proceduresÂ
- physical securityÂ
- public key infrastructure and encryptionÂ
- industrial espionageÂ
- privacyÂ
- software licensure compliance
Modern business is conducted by economic organizations in a highly competitive market environment. Managers often make decisions under severe time pressure without sufficient information. Ethical decision making in business cannot be considered apart from the complexity and uncertainty of actual situations. Therefore, the focus of the course is on ethical questions from the point of view of the practicing manager, with the aim of making ethical decisions that are consistent with effective corporate management.
Â
Develop your understanding of theoretical and practical insights and developments in the fields of business ethics and sustainable business and learn the principles, practices, and ethical concerns/challenges organizations face in their daily operations. You will also gain an understanding of the theoretical basis of business ethics: stakeholder-theory, theories of responsibility and normative ethical theory, as well as intercultural ethics.
Gain foundation knowledge on the importance of machine learning in artificial intelligence and explore modern algorithms in machine learning, focusing on practical applications to understand how to structure data into models that can be created and utilized. A core emphasis is placed on understanding the components needed when using data and information to develop such as software libraries, regression, classification, mixture models, neural networks, deep learning, ensemble methods and reinforcement learning. You’ll also gain knowledge of machine learning techniques and how they can be applied in various processes and real-world solutions.Â
Learn about the legal impact of computer activity such as computer crime, intellectual property, privacy issues, risks, and vulnerabilities. You’ll explore key areas such as malware analysis, network forensics, operating systems, and mobile device forensics and learn the various topologies, protocols, and tools that are used in performing a forensic analysis. In addition, you’ll examine how criminal justice, government, private agencies, and law enforcement use computer forensics evidence to track, locate and extract the digital information needed for legal investigations. Finally, you will also research computer forensic analyst skills through course exercises to understand what tasks and skills are required.Â
Explore the fundamentals and mathematical methods that are central to cryptography. You’ll gain an understanding of various concepts such as:Â
- asymmetric and symmetric cryptographyÂ
- public-key encryptionÂ
- message integrityÂ
- hash functionsÂ
- block-cypher design and analysisÂ
- number theoryÂ
- digital signatures for secure communicationÂ
You will also develop an understanding of how these concepts can be implemented and secured by creating algorithms to encrypt information and other security measures for overall efficiency. On completion, you’ll be able to analyze commonly used cryptographic primitives, types of attacks, and cryptographic protocols for computer security systems by exploring different solutions and architectures.Â
Learn how to control endpoint risk to confidential information and data. You’ll become aware of events that may occur to prevent hacking by securing how the end user may access an application such as from a mobile device, laptop, servers, and other devices. You’ll also gain an understanding of various end-point security software components such as protective web browsing security, data encryption and classification, loT security, block phishing, and other safeguard practices to prevent threats. As a result, you’ll be able to understand how end-point security setup on a network reduces access to personal identifiable information (PII), banking accounts, classified data, intellectual property, and other sensitive information.
Develop a comprehensive understanding of research in computer science. You’ll examine the concepts and theories underlying research, as well as the practice of research. Â
Â
The course has an applied focus. Your readings and assignments are designed to identify a feasible research topic and develop a research proposal for an academic project or dissertation. You will also examine how research problems and questions may be identified, and the process of achieving thoughtful, effective and efficient research design. Â
Â
Learn about the importance of the literature review and how it can be carried out for optimal effectiveness in research and gain an overview of research methodologies and methods as well as the techniques of the research process. You will study the philosophical and epistemological assumptions underpinning the research approaches and methodologies, as well as their role in determining the design and implementation of the research. Finally, you will  gain an understanding of the ethical aspects of research.Â
A continuation of Research Methods for Computer Science I in which you’ll complete the project or dissertation presented in the first course.
For entry into this program you will need…
Â
- An accredited bachelor’s degree
- UCC Global teaches all programs and courses in English. Applicants whose most recent education was not in English will need to demonstrate English language proficiency by completing an approved English language test such as the Test of English as a Foreign Language (TOEFL). Both TOEFL Paper-based (PBT) and TOEFL Internet-based (IBT) are accepted.
Get enrolled
Accelerate your career in your own time. Enroll now to get started today.
The information below is required for social login
Login to your Account
JOIN FOR FREE
Let’s begin with setting up your account to keep track of your progress