MASTER OF SCIENCE IN CYBER SECURITY
Birchwood University
Birchwood University is a world-renowned institution committed to academic excellence and industry-driven education. With multidisciplinary Centers of Excellence in fields like Data Science, Entrepreneurship, and Marketing, our programs integrate modern management practices with a strong theoretical foundation. Through innovative teaching, industry partnerships, and hands-on learning, we equip students with the skills and insights needed to excel in a global business landscape
The Master of Cyber Security prepares technology graduates for leadership roles in cybersecurity. Developed with industry experts, the program equips professionals to assess security needs, implement solutions, and manage secure systems. It builds expertise in evaluating, designing, and securing computer systems, preparing graduates for advanced roles beyond entry-level positions.
This will give you the knowledge and expertise to assess, design, and build secure computer systems, processes, and people involved in cyber security.
MCS500 | Networking and Kali Linux | 3 credit hours
This course provides fundamental concepts for Networking. It delves into different networking technologies. Topics included in this course are Network topology, IP addressing and subnetting, MAC address, OSI and TCP/IP model, IP routing, Network security devices, Routers, and routing protocols like EIGRP, OSPF, RIP and other protocols for communication like HTTP, HTTPS, FTP, Telnet, DHCP, ARP and the ports. It also includes knowledge of networking devices such as switches, L2 and L3 switches, servers, hub, routers, and repeaters. Compare physical interface and cabling types such as single-mode fiber, multimode, copper, connection media like Ethernet and point to point comparison between TCP and UDP protocol.
MCS505 | Networking Concept and Kali Linux | 3 credit hours
In this course, students will focus on the Kali Linux operating system, wherein the topics included are, Introduction to Kali Linux, setting up Kali Linux as a virtual machine on VMware Workstation, terminal, file system, useful commands, basic network commands, services, managing users, troubleshooting Kali Linux, installing, removing, and customizing and troubleshooting software using the Debian package manager, using Kali as a portable USB distribution including options for encryption, persistence, and self-destruction, and thoroughly administering, customizing, and configuring Kali Linux and creating your own packages and hosting your own customer package repositories.
MCS510 | Kali Linux for Hacking | 3 credit hours
This course presents the use of Kali Linux as an attacker machine, using more than 600 tools, using the terminal and commands for performing hacking. Perform scanning, vulnerability scanning, and create exploits and payloads to gain access to the target system. Perform penetration testing and information gathering to collect information on the target system.
MCS515 | Concepts of Hacking | 3 credit hours
In this course, the students will be made to examine the concepts of hacking, types of hackers, how hacking is done, phases of hacking (reconnaissance, scanning, gaining access, maintaining access, and covering tracks), how these phases are performed, and what tools and techniques are used for hacking. Tools like NMAP and NESSUS are used for scanning, and the Metasploit framework is used for the execution of exploits and payloads for controlling a system after gaining access to a system. Use of various password cracking techniques like brute-force attack and tools like Lophtcrack and Ophcrack. At the end of this course, students will have the tools to protect and safeguard an organization's operating computing environment. At the end of this course, students will have the tools to protect and safeguard an organization's operating computing environment.
Indexing & Partitioning
MCS520 | Engineering Hacking | 3 credit hours
This course focuses on the techniques used by the attackers to gain access to the system using social engineering attacks, session hijacking, and bypassing firewalls, IDS, and IPS. Techniques used in social engineering include phishing, shoulder surfing, dumpster diving, and using tools like ShellPhish to create fake pages. Knowing about different types of malware and the adverse effects of these malware on any system. Techniques like sniffing steal confidential information such as usernames and passwords using man-in-the-middle attacks performed by tools like Ettercap and Cain and Abel. Students will learn about different attacks like SQL injection, XSS attack, JSON injection attack, and directory traversal attack and understand the techniques for preserving an organization's system and people against these attacks. Hands-on training will be provided to the students to perform these attacks and the ways to encounter these attacks by use of the tool Burp Suite, allowing safe HTML.
Correlation
MCS525 | Internet of Things and Cryptography | 3 Credit Hours
This course focuses on techniques used by attackers to perform mobile hacking using tools to find vulnerabilities present in the mobile phone execution exploits and running payloads through the Metasploit framework. Tools like alpha devices are used for hacking Wi-Fi by capturing the four-way handshake and cracking the password using brute force or dictionary attack. It also includes cloud computing and IoT hacking which consists of detailed knowledge of IoT devices, layers of IoT, its security features, and cryptography techniques used for encryption and decryption using keys, such as public and private keys. This course provides students with the tools to protect the use and security of mobile devices.
MCS530 | Forensic Computing - 3 credit hours | Credit Hours
This course focuses on fundamental concepts of digital forensics. Use various tools and techniques to combat any cyber-attack, investigation, and extraction of data from digital evidence collected from the crime scene. Techniques are used for securing and collecting evidence from the crime scene.
MCS535 | Application And Device Control | 3 Credit Hours
This course focuses on security technology and students will be made familiar with the policies ensuring the listing of only good files. Policies used for securing networks with BYOD, and prevention of damaged or malicious applications.
MCS535 | Application And Device Control | 3 Credit Hours
This course will teach you the basic accounting concepts and tools necessary to enable managers to effectively and purposefully manage their company's financial resources. The course begins with basic concepts such as cash flow analysis, balance sheet interpretation, and ratio analysis, building your knowledge base and progressing to more advanced topics such as capital budgeting, risk and return, and various investment decision-making techniques. Using case analysis, the course concludes with a discussion of how companies raise money in the short and long term and how the capital markets can help in such a funding process.
MCS540 | Administration and Audits | 6 Credit Hours
This course includes Security Administrators, Network Security, and Cyber Security Audits. Students can choose any two courses and will get training for both the courses