{"id":1344,"date":"2013-04-01T12:34:22","date_gmt":"2013-04-01T12:34:22","guid":{"rendered":"http:\/\/www.uwb.edu\/?p=1344"},"modified":"2025-09-16T14:30:06","modified_gmt":"2025-09-16T21:30:06","slug":"curriculum","status":"publish","type":"page","link":"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum","title":{"rendered":"Curriculum"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p>Students in the master&#8217;s program take three <a href=\"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum\/core-courses\">core courses<\/a> in <strong>Information Assurance and Cybersecurity, Network and Systems Security, and Secure Software Development<\/strong>. Core classes prepare future cybersecurity engineers with a solid computer science foundation to build secure network systems, conduct threat modeling, impact policy development and implementation, follow ethical best practices, and understand risk management.<\/p>\n\n\n\n<p>A variety of <a href=\"\/stem\/graduate\/cybersecurity\/curriculum\/elective-courses\">electives<\/a> (minimum 10 credits cybersecurity electives, maximum 10 credits of CSS electives) such as <strong>human factors in cybersecurity, machine learning, security in emerging wireless and mobile networks, ethical penetration testing, IoT, and malware and attack reverse engineering<\/strong> give students the opportunity to delve into cybersecurity and software engineering topics.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/www.uwb.edu\/stem\/wp-content\/uploads\/2023\/05\/gml-stem-student-classroom002-square.jpg\" alt=\"Man with dark curly hair with glasses wearing a green shirt working on a computer.\" class=\"wp-image-10000031260 size-full\" srcset=\"https:\/\/www.uwb.edu\/stem\/wp-content\/uploads\/2023\/05\/gml-stem-student-classroom002-square.jpg 600w, https:\/\/www.uwb.edu\/stem\/wp-content\/uploads\/2023\/05\/gml-stem-student-classroom002-square-300x300.jpg 300w, https:\/\/www.uwb.edu\/stem\/wp-content\/uploads\/2023\/05\/gml-stem-student-classroom002-square-150x150.jpg 150w, https:\/\/www.uwb.edu\/stem\/wp-content\/uploads\/2023\/05\/gml-stem-student-classroom002-square-125x125.jpg 125w, https:\/\/www.uwb.edu\/stem\/wp-content\/uploads\/2023\/05\/gml-stem-student-classroom002-square-400x400.jpg 400w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To prepare for the culminating thesis or project, the curriculum includes a 1-credit <a href=\"\/stem\/graduate\/cybersecurity\/curriculum\/core-courses#researchseminar\">faculty research seminar<\/a> for students to interact and learn about current faculty research. In order to fully engage their <a href=\"\/stem\/graduate\/cybersecurity\/curriculum\/core-courses#writing\">writing abilities<\/a>, a forthcoming process to evaluate students\u2019 knowledge of the skills covered in CSSKL 511: Technical Writing (1 cr) will allow students to waive this course if proficiency is determined. Students who do not demonstrate this proficiency via past coursework will be required to take the course. All students will be required to take CSSSKL 594: Scientific Writing for Thesis\/Project (2 cr), and there is no waiver available for this course. <\/p>\n\n\n\n<p>Master&#8217;s program candidates complete their degree requirements with a 10-credit <a href=\"\/stem\/graduate\/cybersecurity\/curriculum\/culminating-experience\">culminating experience<\/a>. Students can choose from four options to fulfill this requirement: project, thesis, coursework, or internship.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Curriculum Structure<\/h2>\n\n\n\n<p>Master&#8217;s Program &#8211; Total 48-49 Credits<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th class=\"has-text-align-left\" data-align=\"left\" scope=\"row\">Courses<\/th><th scope=\"col\">Credits<\/th><\/tr><\/thead><tbody><tr><th class=\"has-text-align-left\" data-align=\"left\" scope=\"row\"><a href=\"\/stem\/graduate\/cybersecurity\/curriculum\/core-courses\">Core Courses in Cybersecurity Engineering<\/a><\/th><td>15<\/td><\/tr><tr><th class=\"has-text-align-left\" data-align=\"left\" scope=\"row\"><a href=\"\/stem\/graduate\/cybersecurity\/curriculum\/elective-courses\">Elective Courses<\/a> (minimum 10 credits cybersecurity electives, maximum 10 credits CSS electives)<\/th><td>20<\/td><\/tr><tr><th class=\"has-text-align-left\" data-align=\"left\" scope=\"row\"><a href=\"\/stem\/graduate\/cybersecurity\/curriculum\/core-courses#writing\">Graduate-level Technical &amp; Scientific Writing<\/a><\/th><td>2-3<\/td><\/tr><tr><th class=\"has-text-align-left\" data-align=\"left\" scope=\"row\"><a href=\"\/stem\/graduate\/cybersecurity\/curriculum\/core-courses#researchseminar\">Faculty Research Seminar<\/a><\/th><td>1<\/td><\/tr><tr><th class=\"has-text-align-left\" data-align=\"left\" scope=\"row\"><a href=\"\/stem\/graduate\/cybersecurity\/curriculum\/culminating-experience\">Culminating Experience<\/a><\/th><td>10<\/td><\/tr><tr><th class=\"has-text-align-left\" data-align=\"left\" scope=\"row\">TOTAL<\/th><td>48-49<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The master&#8217;s degree is designed to accommodate the needs of working professionals. Enrollment is either part time or full time, with courses meeting in the evening two or three times a week. Most students complete the program in just over two years. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Students in the master&#8217;s program take three core courses in Information Assurance and Cybersecurity, Network and Systems Security, and Secure Software Development. Core classes prepare future cybersecurity engineers with a solid computer science foundation to build secure network systems, conduct threat modeling, impact policy development and implementation, follow ethical best practices, and understand risk&#8230;<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":23490,"menu_order":72,"comment_status":"open","ping_status":"open","template":"","meta":{"_acf_changed":false,"_is_archived":false,"_archived_contact_email":"","footnotes":""},"class_list":["post-1344","page","type-page","status-publish","hentry"],"acf":{"related_links":{"toggle_visibility":false,"link_1":"","link_2":"","link_3":"","link_4":"","link_5":""},"highlight_box":{"toggle_visibility":false,"title":"","content":"","button":"","button_style":"angled-purple-button","button_screen_reader_text":""},"contact_type_1":{"toggle_visibility":true,"contact_title":"School of Science, Technology, Engineering &amp; Mathematics","email":"stemgrad@uw.edu","phone":"425.352.5490","box":"","address_line_1":"","address_line_2":"","location":""},"contact_type_2":{"toggle_visibility":false,"contact_title":"","email":"","phone":"","box":"","address_line_1":"","address_line_2":"","location":""},"social_media":{"toggle_visibility":false,"facebook_url":"","instagram_url":"","linkedin_url":"","twitter_url":"","youtube_url":""},"blog_archive_sidebar_visibility":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Curriculum - School of Science, Technology, Engineering &amp; Mathematics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Curriculum - School of Science, Technology, Engineering &amp; Mathematics\" \/>\n<meta property=\"og:description\" content=\"Overview Students in the master&#8217;s program take three core courses in Information Assurance and Cybersecurity, Network and Systems Security, and Secure Software Development. Core classes prepare future cybersecurity engineers with a solid computer science foundation to build secure network systems, conduct threat modeling, impact policy development and implementation, follow ethical best practices, and understand risk...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum\" \/>\n<meta property=\"og:site_name\" content=\"School of Science, Technology, Engineering &amp; Mathematics\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-16T21:30:06+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum\",\"url\":\"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum\",\"name\":\"Curriculum - School of Science, Technology, Engineering &amp; Mathematics\",\"isPartOf\":{\"@id\":\"\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uwb.edu\/stem\/wp-content\/uploads\/2023\/05\/gml-stem-student-classroom002-square.jpg\",\"datePublished\":\"2013-04-01T12:34:22+00:00\",\"dateModified\":\"2025-09-16T21:30:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum#primaryimage\",\"url\":\"https:\/\/www.uwb.edu\/stem\/wp-content\/uploads\/2023\/05\/gml-stem-student-classroom002-square.jpg\",\"contentUrl\":\"https:\/\/www.uwb.edu\/stem\/wp-content\/uploads\/2023\/05\/gml-stem-student-classroom002-square.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uwb.edu\/stem\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Graduate Programs\",\"item\":\"https:\/\/www.uwb.edu\/stem\/graduate\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Master of Science in Cybersecurity Engineering\",\"item\":\"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Curriculum\"}]},{\"@type\":\"WebSite\",\"@id\":\"\/#website\",\"url\":\"\/\",\"name\":\"School of Science, Technology, Engineering &amp; Mathematics\",\"description\":\"Just another UW Bothell site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Curriculum - School of Science, Technology, Engineering &amp; Mathematics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum","og_locale":"en_US","og_type":"article","og_title":"Curriculum - School of Science, Technology, Engineering &amp; Mathematics","og_description":"Overview Students in the master&#8217;s program take three core courses in Information Assurance and Cybersecurity, Network and Systems Security, and Secure Software Development. Core classes prepare future cybersecurity engineers with a solid computer science foundation to build secure network systems, conduct threat modeling, impact policy development and implementation, follow ethical best practices, and understand risk...","og_url":"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum","og_site_name":"School of Science, Technology, Engineering &amp; Mathematics","article_modified_time":"2025-09-16T21:30:06+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum","url":"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum","name":"Curriculum - School of Science, Technology, Engineering &amp; Mathematics","isPartOf":{"@id":"\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum#primaryimage"},"image":{"@id":"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum#primaryimage"},"thumbnailUrl":"https:\/\/www.uwb.edu\/stem\/wp-content\/uploads\/2023\/05\/gml-stem-student-classroom002-square.jpg","datePublished":"2013-04-01T12:34:22+00:00","dateModified":"2025-09-16T21:30:06+00:00","breadcrumb":{"@id":"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum#primaryimage","url":"https:\/\/www.uwb.edu\/stem\/wp-content\/uploads\/2023\/05\/gml-stem-student-classroom002-square.jpg","contentUrl":"https:\/\/www.uwb.edu\/stem\/wp-content\/uploads\/2023\/05\/gml-stem-student-classroom002-square.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity\/curriculum#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uwb.edu\/stem\/"},{"@type":"ListItem","position":2,"name":"Graduate Programs","item":"https:\/\/www.uwb.edu\/stem\/graduate"},{"@type":"ListItem","position":3,"name":"Master of Science in Cybersecurity Engineering","item":"https:\/\/www.uwb.edu\/stem\/graduate\/cybersecurity"},{"@type":"ListItem","position":4,"name":"Curriculum"}]},{"@type":"WebSite","@id":"\/#website","url":"\/","name":"School of Science, Technology, Engineering &amp; Mathematics","description":"Just another UW Bothell site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/pages\/1344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/comments?post=1344"}],"version-history":[{"count":29,"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/pages\/1344\/revisions"}],"predecessor-version":[{"id":35599,"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/pages\/1344\/revisions\/35599"}],"up":[{"embeddable":true,"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/pages\/23490"}],"wp:attachment":[{"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/media?parent=1344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}