Master of Science, Major in Computer Science with Concentration in Cyber Security

Lewis University

USA,Illinois

 0 Shortlist

24 Months

Duration

CAD 41,820/year

Tuition Fee

CAD 0 FREE

Application Fee

Apply Date

USA, Illinois

Type: University

Location Type: Semi-Urban

Founded: 1932

Total Students: 6,200 +

Campus Detail

Main Campus Address

1 University Pkwy, Romeoville, IL 60446, United States

Master of Science, Major in Computer Science with Concentration in Cyber Security

Program Overview

The Master of Science in Computer Science (MSCS) program provides graduate-level preparation for students in one of today’s most high-demand fields, Computer Science. The degree provides the necessary background and experience in the development of various computational and infrastructure systems, including large-scale databases, distributed systems, secured applications, intelligent systems, and secured networking and cloud infrastructure. It provides students with the ability to research and implement the latest technologies and apply them to problems in computer science. Additionally, students can choose a concentration to specialize in the areas of artificial intelligence, cybersecurity, digital forensics, enterprise and cloud computing, and software engineering. A graduate of the MSCS program will be prepared for a wide range of careers  in the areas of technology development, business, education, health care, engineering, and government, or for further graduate study.

Apply current technologies to meet the challenges of today while creating new technologies that meet the challenges of tomorrow.
The benefit of a master's degree in computer science has become an increasingly valuable field for professionals in the sciences, IT, engineering, cyber security, and application development.

Why Lewis for your Master's Degree in Computer Science?

  • Ranked as one of U.S. News & World Report's “Top Tier Colleges”
  • Faculty connections in the computer science industry bring job opportunities and real-world projects to Lewis
  • New facilities and labs, including a software engineering and security and networking labs
  • Access to the latest versions of commercial and open-source software
  • Small average class size allows for high interaction with our experienced faculty
  • Internship co-op program with Argonne National Laboratory and several other employers
  • Hands-on projects for multiple industries and organizations, with a heavy emphasis on service
  • Classes offered during weekday evenings and online allowing for flexibility for working professionals.
  • Heavy integration of classroom technology to enable students to participate even on weeks when they can't come to campus in person.
  • Foundation courses offered for working professionals wishing to change their career, so that they can quickly build an informed understanding of Computer Science.
  • Adjunct faculty who are leaders in their fields, who actually practice the material they teach.
  • Balanced curriculum that combines theory and practice, allowing for a deeper understanding of computer science technologies

Cyber Security Concentration
In this concentration you will learn how to identify the risks an organization faces due to cyber threats, and recommend steps to combat those risks.

  • Create new responses to emerging cyber security problems to enable response to new attacks as they evolve.
  • Describe how cyber-attacks against an organization can be monitored and investigated for actionable intelligence.
  • Create tools for encrypting data, authenticating users, and verifying the integrity of data.
  • Identify components of a modem information system and the threats that challenge security.
  • Design software and networks that resist and mitigate cyber-attacks.
  • Specify tools and architectures to help secure information systems both proactively and reactively.
  • Reverse-engineer malware to determine how to defeat it.
  • Extract and examine digital evidence from diverse platforms and media.
  • Create tools for penetrating into systems and networks to identify and counteract vulnerabilities.