MSIT in Cybersecurity - Critical Infrastructure

Area of Study Overview

Return to the School of Applied Science and Technology Homepage

The Cybersecurity - Critical Infrastructure area of study blends both information technology (IT) and operational technology (OT) and focuses specifically on securing critical infrastructures in sectors such as energy, water, gas, and transportation. The program prepares students, especially those currently in the utility industry, to advance professionally in the cybersecurity field and prepares IT professionals to transition into the utility industry.

Credit Distribution

I. Core Courses (15-18* Credits)

MSI-501Foundations of Information Technology

3

MSI-502Telecommunications and Networking

3

MSI-503Object-Oriented Application Development

3

MSI-504Information Systems Analysis, Modeling, and Design

3

MSI-505Principles of Database Design

3

APS-510Project Management for Technology

3

II. Area of Study (15 Credits)

CYB-521Foundations of Utility Cybersecurity

3

CYB-522Cybersecurity Risk Management in Utility Environments

3

CYB-523Protective Security Controls in Utility Systems and Networks

3

CYB-524Monitoring, Detection, Response, and Recovery in Utility Environments

3

CYB-525Integrating Cybersecurity into the System Life Cycle

3

III. Capstone (6 Credits)

APS-700Master Project in Applied Science and Technology

6

Total Credit Hours: 36-39

Note:

MSI-501: This course is required for learners who need a refresher or who lack the prerequisite knowledge in IT as determined during the application evaluation period.

Learning Outcomes

Upon successful completion of the area of study in Cybersecurity - Critical Infrastructure, graduates will be able to:

  • employ cyber prevention, defense, and mitigation tools and techniques against cyberthreats and vulnerabilities;
  • apply cybersecurity best practices and technologies to monitor, maintain, and protect the enterprise-wide information infrastructure and assets;
  • secure data and information using modern cryptographic protocols, tools, and techniques;
  • assess and analyze software, hardware, and firmware vulnerabilities and implement appropriate prevention and mitigation measures;
  • integrate digital forensics and cyber-investigation techniques in response to cyberattacks against networks and computer systems;
  • apply cybersecurity risk management methodologies and frameworks to defend information systems and assets; and
  • consider the human, legal, privacy, ethical, and governance aspects related to protecting critical cyberinfrastructure.