HIGHLIGHTS
CURRICULUM
COURSES

Program Highlights

Our 18-month MS-Cybersecurity program is designed for working professionals, our courses are held in the evenings and weekends. This allows you to complete your degree in a format that works with your schedule.
Courses are designed in hybrid/blended model. This means you’ll complete your course work asynchronously, online, and with limited in-person meetings.

MS Cybersecurity

36 credits (9 classes)

Fall Term (I)

CSCI 501: Cybersecurity fundamentals (4)
CSCI 510: Ethics, risk management, and cyber law (4)

January Term (I)

No Coursework

Spring Term (I)

CSCI 520: Secure software development (4)
CSCI 525: Network security (4)

Fall Term (II)

CSCI 530: Ethical hacking (4)
CSCI 540: Security Operations, Incident Response and Forensics (4)

January Term (II)

CSCI 545: Cybersecurity lab (4)

Spring Term (II)

CSCI 550: AI and cybersecurity (4)
CSCI 599: Cybersecurity capstone (4)

"Grounded in careful research and alignment with PLU’s mission, this program represents a bold and strategic next step for the university. It builds on our established strengths in Computer Science, Data Science, and Ethics, and responds directly to a critical and growing societal need." David Wolff, Professor of Computer Science

Course Descriptions

CSCI 501: Cybersecurity Fundamentals

A survey of the fundamental concepts, principles, and practices of cybersecurity.  Designed to provide students with a comprehensive understanding of the field.  Includes topics such as: basic cryptography, secure development lifecycle; common threats, vulnerabilities and exploits; confidentiality, integrity and availability; information lifecycle; privacy considerations; legal and regulatory issues. (4)

CSCI 510: Ethics, Risk Management and Cyber Law

This course explores risk management and incident response, ethics, policy and law from a cybersecurity perspective.  Includes topics such as: ethics frameworks; professional ethical obligations; ethical decision making; local and federal policy; privacy; legal and regulatory issues; risk management; risk assessment and analysis; cybercrime.  (4)

CSCI 520: Secure Software Development

This course provides an exploration of secure software development practices, emphasizing the integration of security throughout the software development lifecycle (SDLC). Students will learn to identify vulnerabilities, apply secure coding techniques, and implement security measures in software design and architecture. (4)

CSCI 525: Network Security

This course explores the concepts, technologies, and methodologies used to secure networks. It covers a range of topics from fundamental principles to advanced security techniques, preparing students to design, implement, and manage secure network infrastructures. Prerequisite CSCI 501. (4)

CSCI 530: Ethical Hacking

Explores the techniques and tools used by ethical hackers to identify vulnerabilities and assess and enhance the security posture of systems and networks. Students will explore the ethical and legal implications of hacking, distinguishing between malicious hacking and ethical practices aimed at improving security. Topics include penetration testing methodologies, vulnerability assessment, and the use of various hacking tools and techniques. (4)

CSCI 540: Security Operations, Incident Response and Forensics

Students will explore the critical functions of a Security Operations Center (SOC), including threat detection, incident response, and continuous monitoring. The curriculum emphasizes the importance of establishing robust security frameworks and protocols to protect sensitive information and maintain compliance with industry regulations. Topics include the use of Security Information and Event Management (SIEM) systems, and the implementation of threat intelligence to enhance situational awareness. The topic of digital forensics is covered, where students will gain hands-on experience with forensic tools and methodologies to investigate cyber incidents. Topics such as network forensics, malware analysis, and mobile device forensics will be explored, equipping students with the skills to analyze and interpret digital evidence. Additionally, the course will cover incident response strategies, including preparation, detection, analysis, containment, eradication, and recovery. Students will learn how to develop and implement incident response plans, conduct post-incident reviews, and communicate effectively with stakeholders during and after security events. (4)

CSCI 545: Cybersecurity Lab

This lab course provides students with practical experience in various aspects of cybersecurity, including network security, penetration testing, incident response, and secure coding practices. Students will engage in hands-on exercises, simulations, and projects that reinforce their understanding of cybersecurity concepts and tools.  Prerequisites CSCI 525, 530, and 540. (4)

CSCI 550: AI and Cybersecurity

This course explores the intersection of artificial intelligence (AI) and cybersecurity, focusing on how AI technologies can enhance security measures and how they can also introduce new vulnerabilities.  Students will gain understanding of AI applications in threat detection, incident response, and risk management as well as the ethical implications and challenges associated with these technologies. (4)

CSCI 599: Cybersecurity Capstone

This can take one of two forms: internship or project.  With the internship option, students secure and complete a cybersecurity-related internship, working with a faculty sponsor to set and assess learning goals.  The project option involves the completion and presentation of an independent study project that makes use of the knowledge obtained from the program’s curriculum to form connections between academic concepts and the application of those concepts in a real-world setting.  Students present their work at the end of the program and produce a comprehensive report. (4)

FIND OUT MORE

Ready to get started?