Master's Degrees: MSISE Goals

Master's Degrees:

The Master of Science in Information Security Engineering (MSISE) degree program prepares student to be the architects, designers, and lead builders of information security for an enterprise, defined here as an organization of sufficient size and complexity to have a dedicated information security team. Graduates will take on enterprise security technical leadership roles with titles such as Technical Director for Information Security, Senior Security Analyst, Senior Security Administrator, Information Systems Security Manager, Information Systems Security Officer, Information Security Manager, and Chief Information Security Officer. Graduates may also work as consultants who carry out the responsibilities of those positions, or who advise organizations on information security engineering issues. The MSISE program is designed to provide a sound theoretical framework delivered through a practitioner lens, but also to ensure that the graduate is capable of establishing adaptive security paradigms.

Learning Outcomes

By the end of this program, you will be able to:

  • Formulate and implement policies and solutions that demonstrate a thorough understanding of security foundations and practical applications of information technology.
  • Demonstrate a solid foundation in information security strategies and apply their knowledge by assessing an information security situation and prescribing an appropriate security approach.
  • Construct an information security approach that balances organizational needs with those of confidentiality, integrity and availability. Solutions require a comprehensive approach that aligns with policy, technology, and organizational education, training and awareness programs.
  • Effectively communicate information security assessments, plans and actions for technical and nontechnical audiences/stakeholders.
  • Identify emerging information security issues, utilize knowledge of information security theory to investigate causes and solutions, and delineate strategies guided by evolving information security research and theory.
  • Analyze and design technical information security controls and safeguards, including system specific policies, network, and platform security countermeasures and access controls.
  • Conduct threat assessments (offensive measures), appraise/prioritize vulnerabilities (defensive perspectives), and appraise technical risks for enterprise information assets/needs/requirements.
  • Apply a standards-based approach to minimize risk through the implementation of the principles and applications of information security.
  • Evaluate the appropriate security solutions required to design/build a security architecture - this includes the integration of intrusion detection, defensive infrastructures, penetration testing, and vulnerability analysis.
  • Formulate plans for adaptive detection of threats, including leading/oversight of intrusion/malware detection, incident response, forensics, reverse engineering, and e-discovery initiatives and actions.