2014-2015 Graduate Course Catalog [ARCHIVED CATALOG]
Cybersecurity, MS
|
|
Return to: College of Engineering and Computer Science
Contact:
Dr. Susan Older, Associate Professor, sueo@ecs.syr.edu
4-181 Center for Science and Technology
315-443-4679
Faculty:
Drs. Susan Older, sueo@ecs.syr.edu, Shiu-Kai Chin, skchin@syr.edu, Stephen Chapin, chapin@syr.edu, Howard Blair, blair@syr.edu, James Royer, jsroyer@syr.edu, Wenliang Du, wedu@syr.edu, Heng Yin, heyin@syr.edu, Chilukuri Mohan, ckmohan@syr.edu, Jae Oh, jcoh@syr.edu
Description:
Students will be taking four core courses and six elective courses, for a total of 30 credits, with a final GPA of 3.0 in these courses, and a GPA of 2.8 in all courses taken at SU.
Admission:
- BS in computer science, computer engineering, or closely related field with at least 3.0 GPA;
- GRE with at least 70th percentile quantitative and 50th percentile other scores.
- TOEFL score of at least 90 for international students
- Basic systems knowledge
- Fundamentals of traps, interrupts, and trap handling at the instruction-set architecture (ISA)
- level, not at the cycle-simulation level
- Concurrency and coordination mechanisms (semaphores, locking, critical regions)
- Access-control matrices, basics of access-control lists and capabilities
- Systems programming basics: makefiles, C (including the care required by pointers and memory management), systems calls, shell scripting, pipes and filters, non-IDE programming
- Data structures: stacks, queues, lists, hash tables, trees
- Discrete mathematics: symbolic logic and formal proofs (i.e., use of inference rules), sets, relations
- High-level programming experience
Financial Support:
Some, but not all, students are provided merit-based tuition scholarships.
Learning Outcomes:
This program has been designed to produce graduates who possess the abilities to;
- identify and analyze vulnerabilities in systems;
- assess risks faced by systems;
- develop countermeasures to remedy risks;
- develop systems that are secure; and deliver software components or systems that have verifiable assurance properties.
|