Academics - Minors :: ECE :: UD

UD Cybersecurity Initiative (CSI) Educational Programs

Michael Chertoff
Cybersecurity expert Chertoff speaks on battling cyber attacks

Ensuring the security of national, corporate, and private computers, systems, networks and overall infrastructure is a key national challenge. Moreover, trained cybersecurity graduates are of critical importance to small and large regional employers, including the Financial Services industry, critical infrastructure providers, and National Defense-focused entities and contractors. To build regional capacity that addresses these national needs, the University of Delaware and partners are leading research and education programs focused on establishing a pipeline of graduates skilled in the latest theories and tools required to address today’s and tomorrow’s most challenging Cybersecurity issues.

For more information on UD's CybersecurityInitiative go to

CSI educational programs offered at UD

Cybersecurity Minor

A minor in Cybersecurity may be earned by a student in any University bachelor's degree program. This minor provides students with an opportunity to help infuse cybersecurity fundamentals into other degree programs. To qualify for a Minor in Cybersecurity, students must complete a minimum of 18 credits as described below with a minimum grade of C- in each course.

Course Requirements

(1) All students must take the following four courses:

Introduction to Cybersecurity
System Hardening and Protection
Operating Systems
Computer Networks I

(2) And two of the following courses:

Web Applications Security
Pen Test and Reverse Engineering
Applied Cryptography
Cloud Computing and Security
Scada Systems and Security
Embedded Computer Systems
Secure Software Design
Digital Forensics
Topics in Cybersecurity
Advanced Cybersecurity
Coding Theory and Cryptography
Criminal Evidence

TOTAL CREDITS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

(a) The listed 400 and 600-level courses are open to any student who has completed the necessary prerequisites (or obtained permission of instructor). Other courses can be included upon approval by the minor administration committee.

Further inquiries about the Cybersecurity Minor can be made to Professor Chase Cotton at (302) 831-8517 or


Cybersecurity Master's

 U.S. Cyber Challenge camp at UD
U.S. Sen. Tom Carper and Gov. Jack Markell join those involved in the U.S. Cyber Challenge camp at UD.

The cybersecurity master’s program is structured to enable professionals to gain advanced training in this field and is now offered on campus and online. Unlike other programs that are solely focused on IT security, this program emphasizes design of secure software and systems, security analytics, and secure business systems. It will train individuals that have a traditional background in engineering, computer science, information systems, or related fields to have strong security skills enabling them to develop new secure systems and/or software, to exploit analytics for security purposes, or to develop and manage secure business systems. Thus graduates of this program will be skilled in the latest theories and practices required to address the most challenging cybersecurity issues facing the world today.

The ECE Cybersecurity Master’s program requires 30 credit hours in a thesis, non-thesis or online option. The non-thesis option requires all 30 credits to be completed through coursework, while the thesis-option requires 24 credit hours of coursework and six credits of master’s thesis (CPEG 869). The curriculum requirements for the thesis and non-thesis options are:

  • 15 credits of Fundamentals of Cybersecurity courses
  • 15 credits of elective courses in a chosen Concentration Area
    • Concentration Areas are: (I) Secure Software, (II) Secure Systems, (III) Security Analytics, and (IV) Security Management.
    • Elective courses are to be taken primarily from a single chosen Concentration Area, with a maximum of six (6) credits taken from an alternative Concentration Area, or as additional Fundamentals of Cybersecurity courses.
    • In the thesis option, six (6) credits of master’s thesis are to be completed in lieu of six (6) Concentration Area elective credits.
  • Fundamentals of Cybersecurity and Concentration Area courses are listed below. Note that individual courses are typically three (3) credits, i.e., the 30 credit hours required for the master’s degree typically equates to 10 courses (or eight (8) courses and a thesis for the thesis option).

    Fundamentals of Cybersecurity

    Students must complete 15 credits, or five (5) courses, of Fundamentals of Cybersecurity. Courses designated as Fundamentals of Cybersecurity are:

    • CPEG 665 Introduction to Cybersecurity (CYBER I)
    • CPEG 697 Advanced Cybersecurity (CYBER II)
    • CPEG 694 System Hardening & Protection (DEFENSE)
    • CPEG 695 Digital Forensics
    • CPEG 676 Secure Software Design
    • CPEG 671 Pen Test and Reverse Engineering
    • CPEG 672 Applied Cryptography

    Concentration Areas

    Students must complete 15 credits, or five (5) courses, of electives. Elective courses are to be taken primarily from a single chosen Concentration Area. Of these five (5) elective courses, a maximum of two (2) can be taken outside the single Concentration Area (from one of the other Concentration Areas or from the set of Fundamentals of Cybersecurity courses). The Concentration Areas and courses within each area are listed below.

    Secure Software

    The Secure Software concentration is designed for a professional responsible for developing secure software systems. Secure Software electives are:

    • CPEG 670 Web Applications Security
    • CISC 621 Algorithm Design and Analysis
    • CISC 663 Operating Systems
    • CISC 672 Compiler Construction or CPEG 621 Compiler Design
    • CISC 675 Software Engineering Principles and Practices
    • CISC 611/CPEG 611 Software Process Management
    • CISC 612/CPEG 612 Software Design
    • CISC 613/CPEG 613 Software Requirements Engineering
    • CISC 614/CPEG 614 Formal Methods in Software Engineering
    • CISC 615/CPEG 615 Software Testing and Maintenance
    • CPEG 676 Secure Software Design
    Secure Systems

    The Secure Systems concentration is designed for a professional responsible for secure systems that can include wireless and network communication systems, embedded systems, and related physical systems. Secure Systems electives are:

    • ELEG 635 Digital Communication
    • ELEG 658 Advanced Mobile Services
    • ELEG 617 The Smart Grid
    • CPEG 696 Topics in Cybersecurity (Simulation-based Cybersecurity)
    • ELEG 812 Wireless Digital Communication
    • CPEG 675 Embedded Computer Systems
    • CISC 650 / ELEG 651 Computer Networks
    • CISC 853 Network Management
    • CPEG 673 Virtualization and Cloud Security
    • CISC 886 Multi-Agent Systems
    • CPEG 674 SCADA Systems and Security
    • CPEG 853 Computer System Reliability
    Security Analytics

    The Security Analytics concentration is designed for a professional responsible for utilizing big data, analytics, and statistical learning methods to identify and characterize anomalous behavior and security risks. Security Analytics electives are:

    • ELEG 815 Analytics I - Statistical Learning
    • ELEG 817/FASN 817 Large Scale Machine Learning
    • CISC 683 Introduction to Data Mining
    • CISC 637 Database Systems
    • CPEG 657 Search and Data Mining
    • CISC 681 Artificial Intelligence
    • CISC 684 Introduction to Machine Learning
    • CISC 689 TPCS: Artificial Intelligence: Machine Learning
    • ELEG 630 Information Theory
    Security Management

    The Security Management concentration is designed for a professional responsible for instituting and managing security controls within an enterprise. Security Management electives are:

    • MISY 850 Security and Control
    • FINC 855 Financial Institutions & Markets
    • BUAD 840 Ethical Issues in Domestic and Global Business Environments
    • MISY 840 Project Management and Costing
    • ACCT 806 Systems Analysis and Design
    • BUAD 870 Leadership and Organizational Behavior
    • BUAD 877 Skills for Change Agents
    • MISY 810 Telecommunications and Networking

Bookmark and Share