Required Core Courses
CYBR 620: Intro to Cybersecurity
This course introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.
Prospective students who have earned the CISSP designation within the past 5 years may, if admitted, substitute another course for CYBR 620 “Introduction to Cybersecurity” in their first semester of the CYBR MS program. Students should provide evidence of successful completion of the CISSP exam within that timeframe (such as a transcript or official documentation from the certifying authority) to UMBC as part of their application.
Prerequisite: Enrollment in the CYBR program or in at least the second semester of graduate study. Other students may be admitted with instructor permission.
CYBR 624: Cybersecurity Project
This is the capstone experience for graduate students in the MS Cybersecurity program. Normally taken in the final semester before graduation, the Cybersecurity Project provides an opportunity for students to carry out an individual piece of research (or project activity) on a specified topic in the cybersecurity or cyber operations domain. Their work should make an original contribution to the body of knowledge in the area of study or otherwise demonstrate the student’s comprehensive knowledge of cybersecurity or cyber operations.
Prerequisite: Enrollment in CYBR MS program and completion of at least CYBR 620, CYBR 650, CYBR 655.
CYBR 650: Managing Cybersecurity Operations
This course takes an operational approach to implementing and managing effective cybersecurity in highly networked enterprises. Topics include an evaluation of government and commercial security management models; security program development; risk assessment and mitigation; threat/vulnerability analysis and risk remediation; cybersecurity operations; incident handling; business continuity planning and disaster recovery; security policy formulation and implementation; large-scale cybersecurity program coordination; management controls related to cybersecurity programs; information-sharing; and privacy, legal, compliance, and ethical issues.
CYBR 652: Enterprise Security
This class will take a technical approach in protection of information assets and systems by integrating technical controls with policies, best practices, and guidelines of cybersecurity. Taking both a policy-based and technical approach, this course examines external and internal security threats in highly connected enterprises and risks to the core business relative to people, processes, data, facilities, and technologies. How to implement and manage effective the major technical components of security architectures (firewalls, virtual private networks, etc.) and selected methods of attacking enterprise architectures also will be addressed.
CYBR 655: Security of Distributed Systems
This course focuses on a broad range of topics relative to securing distributed systems. Students will gain an understanding of the principles and techniques behind the design of distributed systems along with their associated cybersecurity issues and remediation techniques. Cloud computing and the Internet of Things (IoT) will be some of the major types of distributed environments examined.
CYBR 658: Risk Analysis and Compliance
This course focuses on risk intelligence and risk-based planning for enterprise cybersecurity. This course analyzes external and internal security threats, failed systems development and system processes and explores their respective risk mitigation solutions through policies, best practices, operational procedures, and government regulations. Risk frameworks covered include NIST SP 800-53, SP 800-37, SP 800-39, and CERT/CC risk analysis guidelines.
Strategy & Policy Certificate Courses
Can be used as electives
CYBR 620: Intro to Cybersecurity
This course introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.
Prospective students who have earned the CISSP designation within the past 5 years may, if admitted, substitute another course for CYBR 620 “Introduction to Cybersecurity” in their first semester of the CYBR MS program. Students should provide evidence of successful completion of the CISSP exam within that timeframe (such as a transcript or official documentation from the certifying authority) to UMBC as part of their application.
Prerequisite: Enrollment in the CYBR program or in at least the second semester of graduate study. Other students may be admitted with instructor permission.
CYBR 621: Cyber Warfare
This course addresses some of the unique and emerging policy, doctrine, strategy, and operational requirements of conducting cyber warfare at the nation-state level. It provides students with a unified battlespace perspective and enhances their ability to manage and develop operational systems and concepts in a manner that results in the integrated, controlled, and effective use of cyber assets in warfare.
Prerequisite: Enrollment in the CYBR program or in at least the second semester of graduate study. Other students may be admitted with instructor permission.
CYBR 622: Global Cyber Capabilities and Trends
This course focuses on four general areas of cyber capabilities and trends in the global community: the theory and practice of cybersecurity and cyberwar; cyber capabilities of nation-states as well as non-state actors; trends in cyber-related strategies and policies; and cyber-related challenges facing the U.S. government. The course concludes with a national cybersecurity policy exercise that helps demonstrate the challenges and complexities of the dynamic and global cybersecurity environment.
Prerequisite: Enrollment in the CYBR program or in at least the second semester of graduate study. Other students may be admitted with instructor permission.
CYBR 623: Cybersecurity Law & Policy
Students will be exposed to the national and international policy and legal considerations related to cybersecurity and cyberspace such as privacy, intellectual property, cybercrime, homeland security (i.e., critical infrastructure protection) and cyberwarfare, and the organizations involved in the formulation of such laws and policies. Broader technology issues also are discussed to demonstrate the interdisciplinary influences and concerns that must be addressed in developing or implementing effective national cybersecurity laws and policies.
Prerequisite: Enrollment in the CYBR program or in at least the second semester of graduate study. Other students may be admitted with instructor permission.
Operations Certificate Courses
Can be used as electives
CYBR 620: Intro to Cybersecurity
This course introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.
Prospective students who have earned the CISSP designation within the past 5 years may, if admitted, substitute another course for CYBR 620 “Introduction to Cybersecurity” in their first semester of the CYBR MS program. Students should provide evidence of successful completion of the CISSP exam within that timeframe (such as a transcript or official documentation from the certifying authority) to UMBC as part of their application.
Prerequisite: Enrollment in the CYBR program or in at least the second semester of graduate study. Other students may be admitted with instructor permission.
CYBR 650: Managing Cybersecurity Operations
This course takes an operational approach to implementing and managing effective cybersecurity in highly networked enterprises. Topics include an evaluation of government and commercial security management models; security program development; risk assessment and mitigation; threat/vulnerability analysis and risk remediation; cybersecurity operations; incident handling; business continuity planning and disaster recovery; security policy formulation and implementation; large-scale cybersecurity program coordination; management controls related to cybersecurity programs; information-sharing; and privacy, legal, compliance, and ethical issues.
CYBR 658: Risk Analysis and Compliance
This course focuses the student on a broad range of topics relative to risk-based planning for enterprise cybersecurity. The intent is focusing on creating risk assessment and modeling approaches to solve cybersecurity issues so that organizations can build security framework and sustain a healthy security posture. This course analyzes external and internal security threats, failed systems development and system processes and explores their respective risk mitigation solutions through policies, best practices, operational procedures, and government regulations. Risk frameworks covered include NIST SP 800-12, SP 800-37, SP 800-39, and CERT/CC risk analysis guidelines.
Additional Elective
Choose from other available electives to complete the requirements for this program
Emergency Management Specialty Track
Courses offered through the Emergency Health Services program. Can be used as electives and towards the Post-Baccalaureate certificate in Emergency Management.
EHS 634: Disaster Mitigation
Mitigation is the process by which society limits the negative effects of events it cannot totally prevent. This course provides the theory and legal underpinnings of mitigation as a primary component of emergency management and examines various methodologies for initiating and implementing successful mitigation programs in a rapidly changing world.
EHS 636: Disaster Response
The most visible of the emergency management phases, disaster response is a complicated multi-institutional operation requiring sophisticated planning, logistics and communications. This course covers the new National Incident Management System, response-related research and implementation methods.
EHS 637: Disaster Recovery
Federal, state, local and private nonprofit disaster recovery methods and policies are the core of this course, with examples of international disaster recovery dynamics.
EHS 638: Disaster Preparedness
As the core of effective and efficient response, preparedness consists of a complication array of policies, methods and programs, each with its own political and economic context. This course addresses these issues within the context of the current fears of terrorism and potential mega-events.
Other Electives
Selected courses shown below. Other relevant technical and non-technical electives from Cybersecurity, Computer Science, Data Science, and other programs are available and may be taken with GPD approval. Consult the Graduate Catalog for the latest offerings.
CYBR 601: Practical Data Networking
This course is an introduction to concepts, technologies, terminology, and applied skills used in data networking. The course covers fundamentals of data communications and computer networking with an emphasis on the practical applications of networking and computer technology and real-world applications for cybersecurity practitioners. Students will discuss internetworking theory, network topologies, network configuration management, network model, components, along with their protocols, types of wired and wireless networks and more. The role of networking technologies in cybersecurity operations will be emphasized throughout the course. Lectures/readings will be reinforced by networking simulations and hands-on labs to demonstrate practical competence.
CYBR 641: Cybercrime Investigations
This course examines US and international cybercrime law, legal procedures, and best practices needed to conduct effective and evidentiary-compliant computer forensics activities (such as search and seizure, chain of custody, documentation, courtroom preparation, etc.) and the dedication to gather facts that can lead to prosecutable legal outcomes. Students will be introduced to these topics through required readings, case studies, in-class lecture, scholarly articles, judicial opinions and classroom discussions.
CYBR 642: Introduction to Digital Forensics
This interactive hands-on course will provide an introduction to computer and network technical incident handling and forensics activities. Topics include disk and file system imaging and forensics, packet capture and analysis, basic malware examination, log file analysis, analysis of volatile data (such as RAM), the incident handling process, and more.
CYBR 644: Cyber Practitioner Development Lab
This course provides an opportunity for students to carry out applied technical cybersecurity activities that prepares them for professional certification examinations required by the cybersecurity industry. It allows students to put into supervised practice the theoretical concepts provided elsewhere in the CYBR curriculum. Course topics and syllabi will vary from semester to semester but may include applied security, network administration, and other operational topics.
CYBR 691: Special Topics in Cybersecurity
Courses on specialized or emerging cybersecurity topics offered on a timely or as-needed basis ranging from mobile device security and secure software development to military operational cyber planning and other specialized items.
Prerequisites: Completion of at least 3 CYBR graduate credits. Course-specific prerequisites may be required by the instructor. Non-Cybersecurity students may be admitted with instructor permission.
CMPE 685: Principles of Communications Networks
This course provides an overview of network communications terms, concepts, architectures, protocols, and technologies. Upon completion of the course, students will be able to construct, and assess the completeness of, architectures for simple LAN and WAN communications networks. Topics include wire/fiber and wireless WANs and LANs, the OSI and TCP/IP models, propagation media, analog and digital data and signals, error detection, error correction, data link layer protocols, multiple access techniques, medium access control, circuit and packet switching, X.25, TCP/IP, ATM, Ethernet, switches, routers, routing techniques, congestion control, queuing theory, quality of service (QoS) metrics, network architectures, and network security.
Note: Computer Science (CMSC) courses may a) have pre-requisite requirements, b) meet twice weekly, or c) meet during the day. Consult the registration system for course meeting times and/or the instructor to discuss your suitability for these courses.
CMSC 644: Information Assurance
Selected recent research topics in information assurance, such as social engineering, buffer overflow, malicious code, spyware, denial of service, information warfare, computer forensics, recovery and response, enterprise security, clandestine channels and emissions security, security analysis, security models and formal techniques, best practices and national policy for information assurance. This course will minimize discussion of intrusion detection, firewalls, operating systems security and mathematical cryptology, which are emphasized in other CMSC security courses.
Prerequisite: CMSC 421, CMSC 441 and CMSC 481 or consent of instructor.
CMSC 652: Cryptography and Data Security
Conventional and public-key cryptography. Selected cryptosystems, including DES and RSA. Digital signatures, pseudo-random number generation, cryptographic protocols and cryptanalytic techniques. Applications of cryptography to e-commerce.
Prerequisites: CMSC 441 and MATH 221 or consent of instructor.
CMSC 687: Introduction to Network Security
The objective of this course is to teach the fundamental concepts, architectures and protocols related to network security. Topics covered include: overview of network security; basics of cryptography; threat models; authentication and authorization mechanisms and standards; public key infrastructure; electronic mail security; network layer security; transport layer and web security; packet filtering, firewalls, intrusion detection, and virtual private networks; recent topics in network security.
Prerequisites: CMSC 341 and CMSC 481 or consent of instructor.
CYBR 688: Software Reverse Engineering
This course explores a variety of analysis techniques used to understand the inner workings of a binary program or system of programs. This includes systems analysis, static code analysis, and dynamic code analysis. Students will gain hands-on experience using reverse engineering tools including system monitors, disassemblers, and debuggers, to perform important tasks such as evaluating program security, constructing interoperable software, and understanding the nature of malware. By the end of the course, students should be able to apply a variety of tools and techniques in order to answer questions about a program’s functionality without referring to its original source code.
CMSC 691: Special Topics in Computer Science
Technical courses on specialized or emerging computer science topics offered on a periodic or as-needed basis. Topics may include the semantic web, data privacy, forensics, or malware analysis.
Prerequisite: Depending on the course(s) offered, technical pre-requisites will be indicated; contact the section’s instructor for pre-requisites and eligibility.
Looking for more info?