Major in Computer Science - Cyber Operations Track

The Computer Science major with a track in Cyber Operations requires 87–88 units. A minimum of 30 major units must be taken at Towson University.

Required Computer Science Courses
CIS 377INTRODUCTION TO CYBERSECURITY3
COSC 236INTRODUCTION TO COMPUTER SCIENCE I 1, 24
COSC 237INTRODUCTION TO COMPUTER SCIENCE II 24
COSC 290PRINCIPLES OF COMPUTER ORGANIZATION4
COSC 336DATA STRUCTURES AND ALGORITHM ANALYSIS4
COSC 350DATA COMMUNICATIONS AND NETWORKING3
COSC 412SOFTWARE ENGINEERING3
COSC 439OPERATING SYSTEMS3
COSC 455PROGRAMMING LANGUAGES: DESIGN & IMPLEMENTATION3
COSC 457DATABASE MANAGEMENT SYSTEMS3
Required Math Courses
MATH 263DISCRETE MATHEMATICS3-4
or MATH 267 INTRODUCTION TO ABSTRACT MATHEMATICS
MATH 273CALCULUS I4
MATH 274CALCULUS II4
MATH 314INTRODUCTION TO CRYPTOGRAPHY3
MATH 330INTRODUCTION TO STATISTICAL METHODS4
Required Cyber Operations Track Courses
COSC 340SYSTEMS PROGRAMMING3
COSC 440OPERATING SYSTEMS SECURITY3
COSC 450NETWORK SECURITY3
COSC 458APPLICATION SOFTWARE SECURITY3
COSC 481CASE STUDIES IN COMPUTER SECURITY3
COSC 485REVERSE ENGINEERING AND MALWARE ANALYSIS3
Science Requirement
Select two lab science courses from the following (the courses do not need to form a sequence):8
BIOLOGY I: INTRODUCTION TO CELLULAR BIOLOGY AND GENETICS [LECTURE]
and BIOLOGY I: INTRODUCTION TO CELLULAR BIOLOGY AND GENETICS [LAB]
BIOLOGY II: INTRODUCTION TO ECOLOGY AND EVOLUTION [LECTURE]
and BIOLOGY II: INTRODUCTION TO ECOLOGY AND EVOLUTION [LAB]
GENERAL CHEMISTRY I LECTURE
and GENERAL CHEMISTRY I LABORATORY
GENERAL CHEMISTRY II LECTURE
and GENERAL CHEMISTRY II LABORATORY
PHYSICAL GEOLOGY
GENERAL PHYSICS I CALCULUS-BASED
GENERAL PHYSICS II CALCULUS-BASED
Other Requirements
Must be completed with a grade equivalent of 2.00 or higher.
COMM 131PUBLIC SPEAKING (Core 5)3
COSC 418ETHICAL AND SOCIETAL CONCERNS OF COMPUTER SCIENTISTS (Core 14)3
ENGL 317WRITING FOR BUSINESS AND INDUSTRY (Core 9)3
Total Units87-88
1

COSC 175 is a prerequisite for COSC 236

2

COSC 236 and COSC 237, or their equivalents, must be taken at the same institution. 

Sample Four-Year Plan

The selected course sequence below is an example of the simplest path to degree completion. Based on course schedules, student needs, and student choice, individual plans may vary. Students should consult with their adviser to make the most appropriate elective choices and to ensure that they have completed the required number of units (120) to graduate.

Freshman
Term 1UnitsTerm 2Units
COMM 131 (Core 5)3COSC 23724
COSC 2361, 24MATH 2744
MATH 273 (Core 3)4Lab-Science (from approved list) (Core 7)4
Core 1 (or Core 2)3Core 2 (or Core 1)3
 14 15
Sophomore
Term 1UnitsTerm 2Units
COSC 3364CIS 3773
MATH 263 or 2673COSC 2904
Lab-Science (from approved list) (Core 8)4COSC 4123
Core 43MATH 3304
Elective3Core 63
 17 17
Junior
Term 1UnitsTerm 2Units
COSC 3403COSC 4393
COSC 3503COSC 4553
ENGL 317 (Core 9)3COSC 4573
MATH 3143Core 103
Elective3Core 133
 15 15
Senior
Term 1UnitsTerm 2Units
COSC 4403COSC 418 (Core 14)3
COSC 4503COSC 4813
COSC 4583COSC 4853
Core 113Elective3
Core 123 
 15 12
Total Units 120
1

COSC 175 and (MATH 119 or MATH 231 or a qualifying score in the Math placement test) is needed as a prerequisite to COSC 236.

2

COSC 236 and COSC 237 must be taken together at the same institution. 

  1. Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
  2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  3. Communicate effectively in a variety of professional contexts.
  4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  5. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  6. Apply computer science theory and software development fundamentals to produce computing-based solutions.
  7. Apply security principles and practices to maintain operations in the presence of risks and threats.