{"id":10243,"date":"2019-06-10T09:44:52","date_gmt":"2019-06-10T13:44:52","guid":{"rendered":"https:\/\/web.uri.edu\/cs\/?page_id=10243"},"modified":"2026-03-09T12:22:49","modified_gmt":"2026-03-09T16:22:49","slug":"curriculum","status":"publish","type":"page","link":"https:\/\/web.uri.edu\/cs\/academics\/professional-masters-cybersecurity\/curriculum\/","title":{"rendered":"Curriculum"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Professional Science Masters Degree in Cyber Security<\/h1>\n\n\n<section class=\"cl-wrapper cl-menu-wrapper\"><nav id=\"\" class=\"cl-menu  \" data-name=\"psm\" data-show-title=\"0\"><ul id=\"menu-psm\" class=\"cl-menu-list cl-menu-list-no-js\"><li id=\"menu-item-10252\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-10252\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/professional-masters-cybersecurity\/\">Overview<\/a><\/li>\n<li id=\"menu-item-10249\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-10249\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/professional-masters-cybersecurity\/curriculum\/\">Curriculum<\/a><\/li>\n<li id=\"menu-item-17000\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-17000\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/current-cybersecurity-graduates\/\">Active Students<\/a><\/li>\n<li id=\"menu-item-16559\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-16559\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/cybersecurity-scholarships\/\">Scholarships<\/a><\/li>\n<\/ul><\/nav><\/section>\n\n\n\n<h2 class=\"wp-block-heading\">Time to Degree<\/h2>\n\n\n\n<p>The Professional Science Masters Degree program can be completed at different paces to accommodate your schedule. Check <a href=\"https:\/\/web.uri.edu\/cs\/academics\/professional-masters-cybersecurity\/psm-program-schedules\/\">the sample schedules page<\/a> for more information about available program schedules.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Professional Outcomes<\/h2>\n\n\n\n<p>The PSM in Cyber Security is both an educational degree and job skill preparation. Students are guided through academic study to actionable skills that are used in the cyber security industry. The National Initiative for Cybersecurity Education (NICE) has produced a <a href=\"https:\/\/niccs.cisa.gov\/workforce-development\/nice-framework\">Cybersecurity Workforce Framework<\/a> to help employers build their workforce. As part of this initiative, educational institutions are encouraged to map programs to the framework&#8217;s knowledge, skills and abilities. The Professional Science Masters Degree in Cyber Security maps to the following NICE Framework categories:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Protection and Defense<\/li>\n\n\n\n<li>Investigation<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">CAE CyberAI Designation<\/h2>\n\n\n\n<p>URI\u2019s PSM curriculum now addresses the National Security Agency\u2019s CAE CyberAI Knowledge Unit framework, which defines workforce competencies for professionals working at the intersection of AI and cybersecurity. The AI Track satisfies most Core Knowledge Units in both the SecureAI program of study (securing AI systems) and the AICyber program of study (using AI in cybersecurity practice), giving graduates a great start on a credential pathway recognized by federal agencies and defense employers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Educational Learning Outcomes<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Protect and defend computer systems and networks from cybersecurity attacks.<br>1.1 Characterize privacy, legal and ethical issues of information security.<br>1.2. Identify vulnerabilities critical to the information assets of an organization.<br>1.3. Define the security controls sufficient to provide a required level of confidentiality, integrity, and availability in an organization\u2019s computer systems and networks.<\/li>\n\n\n\n<li>Diagnose and investigate cybersecurity events or crimes related to computer systems and digital evidence.<br>2.1. Diagnose attacks on an organization\u2019s computer systems and networks.<br>2.2. Propose solutions including development, modification and execution of incident response plans.<br>2.3. Apply critical thinking and problem-solving skills to detect current and future attacks on an organization\u2019s computer systems and networks.<\/li>\n\n\n\n<li>Effectively communicate in a professional setting to address information security issues.<br>3.1. Communication orally and in writing, proposed information security solutions to technical and non-technical decision-makers.<br>3.2. Apply business principles to analyze and interpret data for planning, decision-making, and problem solving in an information security environment.<\/li>\n\n\n\n<li>For the AI Track:\u00a0 Apply artificial intelligence methods to cybersecurity challenges and defend AI systems against adversarial threats.<br>4.1. Implement machine learning-based approaches to threat detection, log analysis, and anomaly identification.<br>4.2. Evaluate vulnerabilities in AI\/ML systems and apply mitigation strategies against adversarial attacks, data poisoning, and model manipulation.<br>4.3. Assess AI governance, risk, and compliance considerations including NIST AI RMF, MITRE ATLAS, and responsible AI practices.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Curriculum<\/h2>\n\n\n\n<div class=\"button-list alignright\" style=\"width: 300px;margin-left: 40px\"><a class=\"cl-button   prominent\" href=\"https:\/\/web.uri.edu\/cs\/academics\/professional-masters-cybersecurity\/course-descriptions\/\" title=\"\">Course Descriptions<\/a><\/div>\n\n\n\n<p>The degree requires 36 credits which consists of nine four-credit courses. This curriculum includes an experiential learning course, commonly satisfied by an internship or at your current employer. This capstone course will provide practical experience in the field of cybersecurity.<\/p>\n\n\n\n<p>The degree requires five specific core courses. Students are free to choose four more courses that focus on areas of their own interest.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Choose Your Path: Standard Track or AI Track<\/h2>\n\n\n\n<p>The PSM in Cybersecurity is offered in two tracks, both consisting of nine four-credit courses (36 credits). Standard Track:\u00a0 The foundational cybersecurity curriculum covering network security, incident response, penetration testing, forensics, and professional practice. AI Track (NEW):\u00a0 The same rigorous cybersecurity foundation, with two specialized AI courses replacing two electives. Students gain expertise in securing machine learning systems and applying AI tools to cybersecurity operations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Background Material<\/h3>\n\n\n\n<p>Fundamentals for Cyber Security is a self-paced program for enrolled students in basic technology concepts, available for students coming from less technical backgrounds. This material is provided the summer before the program begins.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Core Courses<\/h3>\n\n\n<div class=\"cl-wrapper cl-card-wrapper\"><a class=\"cl-card   right\" href=\"https:\/\/web.uri.edu\/cs\/academics\/professional-masters-cybersecurity\/experiential-learning\" title=\"\"><div class=\"cl-card-container text\"><div class=\"cl-card-text\"><h2>Experiential Learning<\/h2><p>Important information before registering for internship experience.<\/p><\/div><\/div><div class=\"cl-card-container button\">Learn about CSF 590<\/div><\/a><\/div>\n\n\n\n<p>Students take all five of the core courses. These courses guide students into the field by introducing concepts at a predictable and well-paced rate.<\/p>\n\n\n\n<p>CSF 430 &#8211; Introduction to Information Assurance<br>CSF 432 &#8211; Introduction to Network and Systems Security<br>CSF 534 &#8211; Advanced Topics in Network and Systems Security<br>CSF 580 &#8211; Professional Skills for Cyber Security<br>CSF 590 &#8211; Cyber Security Internship<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">AI Track Concentration Courses\u00a0<\/h3>\n\n\n\n<p>[NEW] Students in the AI Track choose these two courses in place of two standard electives:<\/p>\n\n\n\n<p>CSF 592 \u2013 Machine Learning Security An in-depth exploration of the security of machine learning systems, focusing on vulnerabilities of modern classifiers to adversarial attacks and defenses. Topics include PyTorch programming for ML, white-box and black-box evasion attacks (FGSM, PGD, C&amp;W, APGD), and defenses such as gradient masking, model ensembles, autoencoders, and adversarial training. Satisfies NSA CAE SecureAI Core Knowledge Units.<\/p>\n\n\n\n<p>CSF 470 \u2013 Applied AI for Cybersecurity Applies supervised, unsupervised, and reinforcement learning to cybersecurity problems including log analysis, static code analysis, deobfuscation, threat detection, and anomaly detection. Students also examine how threat actors leverage AI and evaluate ethical, privacy, and adversarial implications. Prerequisite: CSF 432. Satisfies NSA CAE AICyber Core Knowledge Units.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Industry Certification Alignment:\u00a0 CompTIA SecAI+<\/h4>\n\n\n\n<p>URI\u2019s AI Track coursework prepares students, with additional self-study,\u00a0 to sit for the CompTIA SecAI+ certification, launched in 2026. SecAI+ is the cybersecurity industry\u2019s first credential validating expertise in both securing AI systems and leveraging AI tools for cyber defense. Exam domains include AI Concepts (17%), Securing AI Systems (40%), AI-Assisted Security (24%), and AI Governance, Risk &amp; Compliance (19%).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Concentration Course Electives<\/h3>\n\n\n\n<p>Students choose four concentration courses. These courses target specific concepts and practices within the wide field of cybersecurity technology. A complete list of courses can be found by browsing the <a href=\"https:\/\/web.uri.edu\/cs\/academics\/professional-masters-cybersecurity\/course-descriptions\/\">course descriptions page<\/a>.<\/p>\n\n\n\n<p>CSF 410 &#8211; Digital Forensics I<br>CSF 524 &#8211; Advanced Incident Response<br>CSF 536 &#8211; Advanced Intrusion Detection and Defense<br>CSF 538 &#8211; Penetration Testing<br>CSF 540 &#8211; Intro to Malware Analysis<br>CSF 560 &#8211; Cyber Threat Intelligence<br><a href=\"https:\/\/web.uri.edu\/cs\/academics\/professional-masters-cybersecurity\/course-descriptions\/\">All other 500-level CSF courses<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Professional Science Masters Degree in Cyber Security Time to Degree The Professional Science Masters Degree program can be completed at different paces to accommodate your schedule. Check the sample schedules page for more information about available program schedules. Professional Outcomes The PSM in Cyber Security is both an educational degree and job skill preparation. Students [&hellip;]<\/p>\n","protected":false},"author":1962,"featured_media":0,"parent":10228,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-10243","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/10243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/users\/1962"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/comments?post=10243"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/10243\/revisions"}],"predecessor-version":[{"id":18392,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/10243\/revisions\/18392"}],"up":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/10228"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/media?parent=10243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}