MSIT in Cybersecurity - Critical Infrastructure

Area of Study Overview

Return to the School of Applied Science and Technology Homepage

The Cybersecurity - Critical Infrastructure area of study blends both information technology (IT) and operational technology (OT) and focuses specifically on securing critical infrastructures in sectors such as energy, water, gas, and transportation. The program prepares students, especially those currently in the utility industry, to advance professionally in the cybersecurity field and prepares IT professionals to transition into the utility industry.

Credit Distribution

I. Core Courses (15-18* Credits)

MSI-501Foundations of Information Technology*

3

MSI-502Telecommunications and Networking

3

MSI-503Object-Oriented Application Development

3

MSI-504Information Systems Analysis, Modeling, and Design

3

MSI-505Principles of Database Design

3

APS-510Project Management for Technology

3

II. Area of Study (15 Credits)

CYB-521Foundations of Utility Cybersecurity

3

CYB-522Cybersecurity Risk Management in Utility Environments

3

CYB-523Protective Security Controls in Utility Systems and Networks

3

CYB-524Monitoring, Detection, Response, and Recovery in Utility Environments

3

CYB-525Integrating Cybersecurity into the System Life Cycle

3

III. Capstone (6 Credits)

APS-700Master Project in Applied Science and Technology

6

Total Credit Hours: 36-39

* MSI-501: This course is required for learners who need a refresher or who lack the prerequisite knowledge in IT as determined during the application evaluation period.

Learning Outcomes

Upon successful completion of the area of study in Cybersecurity - Critical Infrastructure, graduates will be able to:

  • investigate cybersecurity risks based on ranking criteria;
  • apply appropriate models for security risk mitigation;
  • analyze new technology and identify/develop solution sets for cybersecurity vulnerability concerns;
  • construct research-based recommendations to resolve security incidents and to mitigate vulnerabilities and threats;
  • develop cybersecurity solution requirements for IT/OT vendors and suppliers;
  • implement industry best practices for existing and future systems;
  • implement security controls as defined by industry standards and cybersecurity frameworks; and
  • integrate security into the entire system lifecycle (planning, architecture, design, development, implementation/operation, maintenance, and disposal).