Computer engineers participate in some of the most forward-looking work in industry and government today, particularly telecommunications, computer networks and microelectronics. You become a resourceful expert in such dynamic ﬁelds as computer networks, VLSI design and testing, embedded systems design and computer architecture. Focusing on principles and concepts underlying the design and integration of hardware and software components and systems, this online Master’s in Computer Engineering gives you what you must know to become a serious professional, conﬁdent in electronically controlled systems and devices.
Students in this MS Degree program qualify to receive NSA Certificates in Information Assurance. Click here for more details.
Two sequences each contain two courses—one course in each sequence may be a core course in Group l. Both sequences must be in EL or CS courses and at least one must be an EL sequence. Approved course sequences are provided in the ECE Graduate Student Manual.
Approved electives may be chosen with adviser approval from graduate offerings in EL, CS and, occasionally, pertinent courses from other departments. With adviser approval, students may select other groups or individual courses provided they relate to the various facets of computer engineering.
As the demand for skilled information-security professionals continues to grow, computer and network professionals now can turn to this online, in-demand Master’s to emerge as sophisticated practitioners in cyber security, the science of protecting vital computer networks and electronic infrastructures from attack. Acquire a solid foundation in key technologies — computer and network security, digital forensics, cryptography, and biometrics. Study with internationally recognized faculty from Information Systems and Internet Security (ISIS) Laboratory. With industry continuing to place top priority on safeguarding its data and information systems, you become well-prepared for careers in developing security products, as security-application programmers, security analysts, penetration testers, vulnerability analysts and security architects.