Program Description:
The program strengths include a unique blend of faculty expertise, well-equipped computer science and engineering laboratory facilities, and a balance of theory, practice, hardware, and software. The M.S. degree in Cyber Security is designed for individuals who want to develop skills to identify and resolve cybersecurity threats. The degree is focused on developing knowledge and skill applicable to protecting computer systems and computer networks. Students with backgrounds in computer science, computer engineering, information systems or electrical engineering may apply to the program. Professionals working in the industry who have a strong technical background and related work experience are also encouraged to apply.
Admissions Requirements:
The admission process is competitive. Success applicants will usually meet the following expectations:
- A Bachelor of Science degree in Computer Science, Computer Engineering, or a related field.
- A 3.0 GPA
- A 298 combined (verbal + quantitative) GRE score
Students with a GPA below 3.0 may be eligible for admission if their combined GRE score exceeds 298. Likewise, students with a combined GRE below 298 may be eligible if their GPA is higher than 3.0.
The GRE is not required for students that completed a baccalaureate degree from a regionally accredited U.S. institution with a cumulative GPA of 3.0 or higher.
For applicants with a graduate degree in a science, math, or engineering field from a U.S. institution.
If you do not meet the admission expectations above, you may still be considered for admission. We will take into account your current academic and professional achievements when making this decision. In particular, students with a higher GPA in the last two years of their undergraduate degree, or high grades in computer science and mathematics coursework are often eligible for admission.
Program Prerequisites:
At least one year of formal coursework in computer programming. Formal coursework in data structures, computer organization, and operating systems is also required.
The material covered in these courses should be equal to Wright State University courses:
- CS 3100/5100 Data Structures and Algorithms
- CEG 4350/6350 Operating Systems Internals and Design
- CEG 3310/5310 Computer Organization
If you do not have a year of formal coursework in computer programming, you may show programming proficiency by:
- Taking an exam upon enrollment; or
- Taking the six-credit-hour preparatory course CS 5160 Fundamentals of Computer Science.
Math Prerequisites
- One semester of calculus
- Knowledge of linear or matrix algebra
- Coursework in probability, statistics, and discrete math is preferred
Students lacking other prerequisite coursework may be assigned additional prerequisite courses upon admission.
Program Learning Outcomes:
- The ability to integrate and apply graduate cybersecurity knowledge to solve complex cybersecurity issues and challenges.
- The ability to understand and integrate new knowledge within the field of cybersecurity into their professional activities.
- The ability to recognize the need for, and engage in, life-long learning.
- A deeper understanding of the breadth and depth of cyberspace and the inefficiencies and shortcomings of our existing evaluation systems to deal with cybersecurity threats.
- An understanding of the unique characteristics of cyberspace and how these unique characteristics affect/influence cybersecurity threats.
- The ability to identify social, political, and economic factors/impacts of cyber threats and be able to identify and discuss ethical issues related to cybersecurity and privacy.
- Recognition of the basic concepts of cybersecurity defense and be able to use software tools for malware identification and elimination, data encryption and transmission, and key-based authentication.
Facilities:
University and college systems include a variety of servers and workstations running current operating systems including Linux, Mac OS, and Windows. Department facilities provide specialized systems and support equipment tailored to specific curriculum and research areas including Linux-based Operating Systems and Internet Security lab, an Immersive Visualization and Animation Theater lab, and a variety of workstations and personal computers providing software tools for project design and development. The program also has access to one of the most advanced visualization and presentation environments in the nation, the Appenzeller Visualization Laboratory, located in the Joshi Research Center. The Department has laboratories dedicated to research in assistive technologies, RFID, computer vision, medical image analysis, parallel and distributed computing, evolvable hardware, database systems, data mining, mobile information and communications, software engineering, artificial intelligence, advanced computer networking, semantic web services-oriented computing, scientific workflows, business process management, bioinformatics, and cybersecurity.
For additional information: