Faculty of Sciences

Master of Science in Cybersecurity and Cyberdefence

English
This program is offered in Collaboration with Université Bretagne Sud, leading to a double degree: Master in Cybersecurity and Cyberdefence conferred by USEK and a Master in Cybersecurity conferred by UBS.

Presentation

The Master of Science in Cybersecurity and Cyberdefence at USEK is offered in Collaboration with Université Bretagne Sud. The program is comprised of 10 courses, 3 laboratory courses, an internship of 240 hours and a master’s project, all-encompassing thirty six credit hours (36).

Mission

The mission of the MS in Cybersecurity and Cyber...
defense is to generate qualified cybersecurity professionals by providing them with the knowledge to design, plan and manage cyber systems to protect organizations, governments and infrastructures from the ever-changing security threats and infiltration techniques such as hackers, network outages, viruses and cyber-attacks.

Program Educational Objectives

1. Graduates will be ready for advanced careers in computer science and networking, and related fields, as well as further graduate study.
2. Graduates will provide full solution for software problem from system design to solution development. They will be committed for long-life learning.
3. Graduates will have the ability to function and communicate effectively as ethically and socially responsible computer science professionals.

Program Outcomes

a. An ability to analyze a problem, and identify and define the computing requirements appropriate to its solution.
b. An ability to design, implements, and evaluates a computer-based system, component, or program to meet desired needs.
c. An ability to function effectively on teams to accomplish a common goal.
d. An understanding of professional, ethical, legal, security and social issues and responsibilities.
e. An ability to communicate effectively with a range of audiences.
f. Recognition of the need for and an ability to engage in continuing professional development.
g. An ability to apply mathematical foundations, algorithmic principles, and computer science theory in the modelling and design of computer-based systems in a way that demonstrates comprehension of the trade-offs involved in design choices.

Download the brochure
36 credits
Specialization
ENG510Advanced Academic English
2 credits
This graduate level course gives students the opportunity to enhance their writing abilities and develop their critical thinking. It attempts to help students achieve greater competency in reading, writing, reflection, and discussion emphasizing the responsibilities of written inquiry and structured reasoning. Students are expected to investigate questions that are at issue for themselves and their audience and for which they do not already have answers. In other words, this course should help students write about what they have learned through their research rather than simply write an argument supporting one side of an issue or another.
CYB555Advanced Database Systems
3 credits
The objective of this course is to study the advanced paradigms of database management systems. The content of this course consists of four main parts : The first part introduces advanced concepts of DBMS such as query optimization, concurrency control and recovery. The second part presents the distributed DBMS. It details the architecture of these systems in order to identify their different types such as client/server DBMS, distributed DBMS, federated DBMS and multi-DBMS. It finally focuses on the fragmentation and data allocation in distributed databases. The third part presents the analytical databases, specifically data warehouses. It explains the difference between the online analytical processing (OLAP) and online transactional processing (OLTP), the ETL process (extraction, transformation and loading) of these warehouses and their logical and physical modeling. The fourth part introduces database Security : Database encryption, Network security, Site authentication (3rd party Agency, Public/private key,…), User authentication, Authorization, Access control and application security (SQL Injection, Invalidated input, Password in Script…) .
CYB600Component Based Software Engineering
3 credits
Modularity is an important concept for the development and maintenance of software. After the modularity via the object paradigm, the growth of the system’s complexity suggests the use another paradigm : the software component. This course aims to master the concepts, techniques and models for the development of systems by components. This is what is called component-based development. Thus, students will discover how to define and use "frameworks" and patterns for component development.
CYB560Cryptography and Steganography
3 credits
The objectives of this course are to provide cryptographic and information security topics and algorithms, such as symmetric key and public key encryptions, block and stream ciphers, message authentication, program and OS security as well as network and Web security.
CYB545Cyber Security Ethics and Law
1 credits
This course will examine the ethics and current laws of cyber security technologies, in terms of the often competing priorities of governments, corporations and the citizen. Topics include ethics, relevant laws, regulations, policies, standards, psychology, and hacker culture. The course will include a set of ethical principles set down internationally, in terms of fundamental rights (e.g. privacy and protection of personal data), which applies to the cyber domain, just as it applies to the physical domain.
CYB565Distributed Database Systems and Security
3 credits
This course provides an in-depth discussion of the concepts and design principles used in distributed database systems and the related security concern. It covers the architectural foundations of distributed database management systems topics as well as the application and the system level topics. Application level topics include distributed database design models in addition to the fragmentation, replication, and allocation techniques as well as security. System level topics include query processing, query optimization algorithms, transaction management, reliability protocols, concurrency control, type of failures and recovery in distributed database systems.
CYB650Internship (240 hours)
1 credits
Students need to get the approval of the head of the department about the internship. They need to describe briefly the type of work they are going to do during their internship. Instructors need to meet with students at least once every four weeks. During this progress meeting, students need to show the instructors what they did during the four-week period and what they are planning to do in the coming four weeks. By the end of the semester, students will have 15 minutes presentation.
CYB573Lab - Cybernatic Crises Simulation
2 credits
This lab aims to simulate the functioning of a Security Operation Center (SOC). So, students learn how to implement the dynamic threat analysis procedures, participate in the design of an adapted and dynamic security policy, and pilot the implementation of this security policy by means of anticipation, detection and monitoring of attacks. Furthermore, they also learn how to implement the response procedures adapted to the threat in accordance with the legal framework.
CYB571Lab - Operating & Embedded System's Security
1 credits
CYB572Lab - Qualification Testing
1 credits
The vulnerability of a software is often linked to its quality. Thus, quality becomes a prerequisite for safety. This course aims to introduce and master the main concepts of quality assurance (particular attention is paid to the definition of quality assurance processes : standards, manuals and quality plans). Students will see the concepts and techniques of software review and testing. The purpose is to know how to design and implement quality assurance during a software project.
CYB570Network Management and Security
3 credits
The purpose of this course is to introduce the principles of security in fixed and mobile networks. The course starts with an introduction to information security concepts, security services and security mechanisms. In the second part, we discuss the concepts of symmetric and asymmetric cryptography, the hash function and the signature and key sharing procedures and we apply these concepts to secure the data communication using the SSL and the IPSec protocols. In the third part, we discuss security in wireless networks, intrusions and filtering mechanisms through the use of firewalls. Finally, we discuss security management and risk management concepts.
CYB575Operating & Embedded System's Security
3 credits
The objective of this course is mastering the principles and mechanisms of the security of classic operating systems (windows and Linux) and embedded systems : (Android, router). To do this aim, it will also be necessary to know the memory plan of the operating systems that are most often encountered, the security model and the software architecture model (driver, service, application). Students will be required to configure the security of both conventional and embedded OS.
CYB580Platforms and Development Protection
3 credits
The objective of this course is to master the rules that make it possible to secure the software development, to master the protection of the software itself and parries in the face of attacks. At the end of this course, students will have to know how to implement and configure security solutions. For example, they will know how to implement cryptology solutions and key management.
CYB550Software Engineering
3 credits
This course is the presentation of the software engineering principles, methodologies and metrics. The topics of software engineering process and quality are presented in an integrative approach, stressing software improvements through measurements of software products and processes. The Unified Modeling Language (UML) is used throughout the course. Topics are : Software development process, domain analysis, object oriented programming, software reuse, client-server framework, design patterns, user interfaces, dynamic modeling, software architecture, software testing, software quality, risk analysis and cost estimation.
Capstone
CYB670Master’s Project I
1 credits
This course pushes the students to demonstrate preparedness to start their careers as professionals in the cybersecurity field by undertaking an investigation of a research topic relevant to the profession and by appraising its practical experience. The research topic will give the students the opportunity to marshal the relevant knowledge and skills from various courses and laboratories of the program.
CYB680Master’s Project II
3 credits
This course pushes the students to demonstrate preparedness to start their careers as professionals in the cybersecurity field by undertaking an investigation of a research topic relevant to the profession and by appraising its practical experience. The research topic will give the students the opportunity to marshal the relevant knowledge and skills from various courses and laboratories of the program.
Holy Spirit University of Kaslik
Tel.: (+961) 9 600 000
Fax : (+961) 9 600 100
© Copyright USEK 2017
Subscribe to our newsletter
Find USEK