In today’s information intensive environment, cyber related incidents (such as online fraud, cyber crime, cyber terrorism, and cyber espionage) are on the rise. Our national security, personal safety, and economic health are at risk. To address the growing need for professionals with the advanced knowledge to anticipate and repel sophisticated cyber attacks and infiltration attempts on computer systems, Utica College designed the online Master of Science degree program in Cybersecurity.
A leader in economic crime programs for over 20 years, Utica College has designed this innovative new program to combine hands on education in state-of-the-art cybersecurity and computer forensic practices with coursework on leadership and planning adapted specifically to the cyberspace realm.
Utica’s online M.S. in Cybersecurity offers students advanced education and hands-on experience in intelligence, national critical infrastructures, and investigative principles including:
- An understanding of the major concepts in cybersecurity, computer forensics, cyber intelligence and counterintelligence, cyber terrorism, and electronic crime.
- The application of cybersecurity technology to field operations.
- Ethics and legal issues as applied to cybersecurity operations and policy
- A practical knowledge of cybercrime investigations, including methods of maintaining the integrity of cyber evidence.
The faculty have identified several advising specializations, groups of courses within the elective offerings that provide students with a focused path of study. Elective specializations are not formal parts of the curriculum but options within the elective section of the program. Students do not have to focus on a specialization but can with the consent of their advisor, simply elect to take courses that meet their needs or interests. The specializations identified by the faculty are:
- Computer Forensics
- Cyber Operations
- Data Analytics
- Electronic Crime
- Malware Analysis
Student Learning Goals
- Apply cybersecurity and risk management tools, techniques and technologies to a wide variety of cybersecurity problems
- Demonstrate an understanding of how traditional intelligence methods and procedures are applied to the cybersecurity domain
- Demonstrate critical thinking, research and writing skills related to the domain of cybersecurity
- Demonstrate an understanding of cyber-attack methods and techniques (including malware)
- Demonstrate an understanding of the technical, legal, ethical, social, cultural and international aspects of cybersecurity and cyber conflict
*Utica College has been designated as a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency (NSA) and the Department of Homeland Security. This prestigious five-year designation (2014 - 2019) puts Utica College in the elite ranks of colleges and universities with cybersecurity curricula, faculty and facilities that meet or exceed very stringent national criteria
Academic Requirements (30 - 33 Credit Hours)
Required for students who have not completed foundational computer software or networking courses, or who have no practical training and experience in computer software or networking.
Major Core Requirements (18 credit hours)
Computer Forensics Specialization Requirements (12 credit hours)
Designed for students interested in collecting and preparing evidence of computer crimes such as fraud, child pornography, and cyber espionage, this specialization emphasizes a comprehensive understanding of the computer forensic tools and techniques used to investigate and analyze computers and digital devices. Coursework focuses on the collection and preservation of digital evidence from a variety of environments including computer networks and live systems.
Cyber Operations Specialization Requirements (12 credit hours)
Designed for students interested in understanding the technical, legal, and ethical aspects of cyber attack and cyber defense operations. Coursework focuses on penetration testing, vulnerability assessment, steganography, data hiding and anonymity, and advanced cyber protection mechanisms.
Data Analytics Specialization Requirements (12 credit hours)
The Data Analytics specialization focuses on two aspects of the data science field: using theoretical models in the collection, design, and analysis of quantitative and qualitative data, and the real-world process of creating and implementing solutions based on that data. Students will learn to be data thinkers by understanding the power of data, the limits of data analysis, and then apply their learning to projects. Projects encompass the whole data analysis process from data acquisition and wrangling, analysis, and conclude by communicating identified findings and solutions.
Take 4 of the 5 courses
Intelligence Requirements Specialization Requirements (12 credit hours)
Designed for students interested in cyber intelligence and counterintelligence, cyber counterterrorism, and cyber counter sabotage. Coursework focuses on analysis of global and national cybersecurity policies, the study and protection of critical infrastructures, as well as operations involving cyber threats and defense.
Electronic Crime Specialization Requirements (12 Credits)
Designed for students interested in understanding the technical, legal, and ethical aspects of electronic crime, white collar crime and fraud investigation. Coursework focuses on risk and compliance, legal issues, fraud management and advanced techniques for performing fraud analysis.
Malware Analysis Specialization Requirements (12 Credits)
Designed for students interested in understanding the intricacies of different forms of malware. Coursework focuses on how to detect malware infections, how to recognize the effects of malware infections, and how to perform malware analysis and incident response.
Cyber Policy Specialization Requirements (12 Credits)
The Cyber Policy and Risk Analysis specialization examines cybersecurity from a privacy, risk management, and ethical perspective. Students evaluate various methodologies of designing and evaluating cyber policy from a national and global perspective. Coursework focuses on cyber risk management frameworks, the legal foundations of information security, data privacy, and ethical issues in cybersecurity.
Students in this program may opt to take multiple specializations under the following conditions:
1. They must have the approval of their academic advisor and the Program Director.
2. Courses should be taken in sequential order. Each specialization should be completed before starting the other.
3. Courses may not be taken in tandem nor can eight week courses be doubled up.
4. The Capstone project 695 and 696 can only be taken upon the completion of the specializations.
Utica College Incorporated is registered with the Florida Department of State, Division of Corporations, to do business in Florida as a non-profit corporation. Utica College is licensed by the Commission for Independent Education, Florida Department of Education, effective March 2013. Additional information regarding this institution may be obtained by contacting the Commission at 325 West Gaines Street, Suite 1414, Tallahassee, FL 32399-0400, (888) 224-6684. Utica College President Laura Casamento is the administrator of the Florida campus. Students will be notified of any administrative changes. The transfer of credits received by Utica College from another institution is solely at the discretion of the accepting institution; no guarantee of transfer is made or implied by Utica College.
Residencies held in the spring are located in Florida at The State College of Florida, 7131 Professional Parkway East, Sarasota, FL 34240. Residencies held in the summer or fall are located in New York at Utica College, 1600 Burrstone Road, Utica, NY 13502.
Florida students dissatisfied with the outcome of their grievances may appeal to the Commission for Independent Education at 325 West Gaines Street, Suite 1414, Tallahassee, FL 32399-0400, (888) 224-6684.
Students are provided additional learning resources such as access to the Utica online library, and links to scholarly articles and video demonstration.
Hardware and software requirements are loaded into the introduction pages of every course, but can also be found through Engage Quick Reference Guide online at the following website https://engage.utica.edu/learn/mod/page/view.php?id=136371. If you have any questions or issues, you can always contact the Personal Support Center by phone at 866-264-1537 or by e-mail at firstname.lastname@example.org.