Master of Science in Information Assurance and Cybersecurity

Graduate study in Information Assurance and Cybersecurity is accessible both to students who have completed undergraduate Computer Science or Management Information Science majors or minors and to those with baccalaureate degrees in technical fields with the equivalent of a Computer Science or Management Information Science minor in formal coursework or professional experience. Applicants who do not possess the appropriate academic, technical, or experiential backgrounds may be required to take stem work courses to ensure a minimum standard of technical competence. Stem work decisions are made on an individual basis by the department chair.

Additional information: Reference the Program Landing Page for additional information, such as cost, delivery format, contact information, or to schedule a visit.

Applicants seeking admission to the graduate program in Information Assurance and Cybersecurity must submit the following directly to the Office of Graduate Admissions:

  1. Graduate Application
  2. Application fee
  3. Official transcript from the baccalaureate degree granting institution
  4. Up-to-date Resume
  5. Two letters of recommendation that address the applicant's qualification for graduate study

Admission preference is given to applicants with a GPA of 3.0 or higher. 

Stem Requirement

At the minimum, students are expected to present a background comparable to that provided in the following courses as described in the Undergraduate Catalog of Sam Houston State University:

Prerequisite courses

Required Courses
COSC 2327Introduction to Computer Networks3
COSC 3318Data Base Management Systems3
MATH 1420Calculus I4
STAT 3379Statistical Methods in Practice3

Students who have not fulfilled the prerequisites in formal coursework are required to take one or more of the graduate stem courses, in addition to the 30 semester credit hours required in the MS in Information Assurance and Cybersecurity.

Graduate Stem Course Requirements

Graduate Stem Course Requirements
COSC 5301Quantitative Foundations of Computer Science3
COSC 5302Computer Science Core Topics3

The degree requires a minimum of thirty hours of graduate credit. All MS students in Non-Thesis Option are obligated to fulfill and achieve a passing grade in written or oral comprehensive exams for core subjects where they obtained a grade of B or lower. Exams are conducted during their terminal semester. Should a student fail one or more examinations, a re-examination shall be permitted per department approval. A third examination may be permitted only with the approval of the appropriate academic dean and the department. Students must be enrolled at SHSU in the semester in which the comprehensive exams are administered.

Once enrolled in DFSC 6347, a student must be continually enrolled each semester until graduation.

An MS Project committee will be established either before or during the student’s penultimate semester. The committee should consist of a committee chair (supervisor) and a minimum of two additional committee members, all holding the appropriate graduate faculty status. With the approval of the department, academic dean, and Dean of The Graduate School, the committee may include one member who is not employed by SHSU, as per Academic Policy Statement 950601. The selection of the committee chair hinges on the student's preference, faculty availability, and expertise. Once a faculty member agrees to assume the role of chair, the student, under the chair's guidance, will proceed to select the remaining committee members. Subsequently, the committee's constitution needs approval from both the Graduate Coordinator and the Dean. Any alterations to the committee's composition will similarly require approval through the same process.

Master of Science in Information Assurance and Cybersecurity
Specified Courses
COSC 5325Operating System Security3
COSC 5335Database Security3
DFSC 5310Principle and Policy in Information Assurance3
DFSC 5315Network and Cyber Security3
DFSC 5336Business Continuity Management3
DFSC 6347Directed Management and Development Project 13
Prescribed Electives
Select four graduate courses in DFSC or any approved COSC graduate courses 212
Total Hours30
1

Once enrolled in DFSC 6347, the student must enroll in this course until graduation.

2

COSC 5301 and COSC 5302 do not count towards the degree plan.

Stem Requirement

At the minimum, students are expected to present a background comparable to that provided in the following courses as described in the Undergraduate Catalog of Sam Houston State University:

Prerequisite courses

Prerequisite Courses
COSC 2327Introduction to Computer Networks3
COSC 3318Data Base Management Systems3
MATH 1420Calculus I4
STAT 3379Statistical Methods in Practice3

Students who have not fulfilled the prerequisites in formal coursework are required to take one or more of the graduate stem courses, in addition to the 30 semester credit hours required in the MS in Information Assurance and Cybersecurity.

Graduate Stem Course Requirements

Graduate Stem Course Requirements
COSC 5301Quantitative Foundations of Computer Science3
COSC 5302Computer Science Core Topics3

The Texas Higher Education Coordinating Board (THECB) marketable skills initiative is part of the state’s 60x30TX plan and was designed to help students articulate their skills to employers.  Marketable skills are those skills valued by employers and/or graduate programs that can be applied in a variety of work or education settings and may include interpersonal, cognitive, and applied skill areas.

The MS in Information Assurance and Cybersecurity is designed to provide graduates with the following marketable skills:

  • Establish and operate an investigator’s lab, and process digital evidence.
  • Develop plans to safeguard digital files against unauthorized modification and destruction.
  • Create plans and implement strategies for preventing attacks to a network.
  • Analyze and assess risk and identify vulnerabilities in an organization's network.
  • Acquire the professional competency and cybersecurity expertise necessary for roles and responsibilities in business, industry, and governmental positions.