Cybersecurity and Threat Intelligence
The Master of Cybersecurity and Threat Intelligence (MCTI) is offered by the School of Computer Science.
This professionally oriented master's is unique in its core focus on threat intelligence, Security Incident and Event Management (SIEM), intrusion prevention, malware analysis, penetration testing, and computer forensics, and in its integration of experiential lab-based learning. It covers the most challenging and technical aspects of the cybersecurity field and ensures that graduates are equipped with the professional capabilities to respond ethically and with a global social awareness of the implications of their work. Students gain hands-on experience with real and simulated security attacks such that graduates are primed to help organizations create security frameworks, protect sensitive data from threats, and analyse violations to help prevent future breaches.
Administrative Staff
Director
Ali Dehghantanha (150 Research Lane Suite 120C)
graddir@socs.uoguelph.ca
Graduate Program Assistant
Simar Dhindsa (150 Research Lane, Suite 120)
cybergrad@socs.uoguelph.ca
Program Manager
Rick Moroz (150 Research Lane, Suite 120B)
rmoroz@uoguelph.ca
Graduate Faculty
This list may include Regular Graduate Faculty, Associated Graduate Faculty and/or Graduate Faculty from other universities.
Luiza Antoine
B.Sc. Politehnica Bucharest (Romania), M.Sc., PhD Alberta - Associate Professor
Graduate Faculty
Neil Bruce
B.Sc. Guelph, M.A.Sc., Waterloo, PhD York - Associate Professor
Graduate Faculty
Ritu Chaturvedi
PhD Windsor - Assistant Professor
Graduate Faculty
Rozita Dara
B.Sc. Shahid Teheshti, M.Sc. Guelph, PhD Waterloo - Associate Professor
Graduate Faculty
Ali Dehghantanha
BSE Azad, M.Sc., PhD Putra Malaysia - Associate Professor
Graduate Faculty
David Flata
B.Sc., M.Sc., PhD Saskatchewan - Associate Professor
Graduate Faculty
Dan Gillis
B.Sc., M.Sc., PhD Guelph - Associate Professor
Graduate Faculty
Minglun Gong
B.Eng. Harbin Engineering, M.Sc. Tsinghua, PhD Alberta - Professor and Director
Graduate Faculty
Gary Gréwal
B.Sc. Brock, M.Sc., PhD Guelph - Associate Professor
Graduate Faculty
Andrew Hamilton-Wright
B.Sc., M.Sc. Guelph, PhD Waterloo - Associate Professor
Graduate Faculty
Hassan Khan
B.Sc. NUST, M.Sc. Southern California, PhD Waterloo - Assistant Professor
Graduate Faculty
Stefan C. Kremer
B.Sc. Guelph, PhD Alberta - Professor
Graduate Faculty
Xiaodong Lin
B.A.Sc. Nanjing, M.Sc. East China Normal, PhD Beijing, PhD Waterloo - Professor
Graduate Faculty
Pascal Matsakis
B.Sc., M.Sc., PhD Paul Sabatier (France) - Professor
Graduate Faculty
Judi R. McCuaig
B.Ed., B.Sc., MS, PhD Saskatchewan - Associate Professor
Graduate Faculty
Denis Nikitenko
B.Sc. Ryerson, M.Sc., PhD Guelph - Assistant Professor
Graduate Faculty
Charlie F. Obimbo
M.Sc. Kiev, PhD New Brunswick - Professor
Graduate Faculty
Joseph Sawada
B.Sc., PhD Victoria (British Columbia) - Professor
Graduate Faculty
Stacey Scott
B.Sc. Dalhousie, PhD Calgary - Professor
Graduate Faculty
Fei Song
B.Sc. Jilin (China), M.Sc. Academia Sinica (China), PhD Waterloo - Associate Professor
Graduate Faculty
Guatam Srivastava
B.Sc. Briar Cliff, M.Sc., PhD Victoria - Associate Professor, Brandon University
Associated Graduate Faculty
Mark Wineberg
B.Sc. Toronto, M.Sc., PhD Carleton - Associate Professor
Graduate Faculty
Michael A. Wirth
B.Sc. New England (Australia), M.Sc. Manitoba, PhD RMIT Melbourne - Associate Professor
Graduate Faculty
Yan Yan
B.Sc. Northwestern Polytech, PhD Saskatchewan - Assistant Professor
Graduate Faculty
MCTI Program
Admission Requirements
Admission to the Master of Cybersecurity and Threat Intelligence program may be granted on the School of Computer Science’s recommendation to:
- Applicants who have successfully completed an undergraduate degree/baccalaureate in an honours program or the equivalent (having achieved a grade average of at least 75%, B, in the last four semesters of study) in computer science, computer engineering, or a related subject area (or hold a minor in one of these areas) from a recognized university; and
- Applicants who have relevant experience or background knowledge of Data Communication and Networking (such as a course equivalent to CIS*3210 Computer Networks) and Computer Programming (such as a course equivalent to CIS*2500 Intermediate Programming).
Successful applicants must also meet the University of Guelph’s English Proficiency requirements for admission. If an applicant’s first language is not English, an English Language Proficiency test will be required during the application phase.
All applications will be reviewed by the cybersecurity admissions committee. Students are admitted for a September start date. The School of Computer Science office should be consulted for admission deadlines.
Learning Outcomes
Upon successful completion of the Master of Cybersecurity and Threat Intelligence at the University of Guelph, graduates will have the capacity to practice the following.
- Security Analysis and Design
- Analyse various threats that an organization is facing and demonstrate vulnerabilities in existing systems and processes; and
- Define and implement security policies for organizations of different sizes using well-established security controls.
- Security Architecture
- Evaluate existing network architectures and identify attack surfaces and vulnerabilities;
- Implement methods to build a defensible architecture; and
- Build mechanisms to continuously monitor the activities in the secured enterprise network architecture.
- Threat Intelligence
- Follow best practices and ethical issues revolving around collection, labelling, storage, and sharing of data from sources of interest;
- Analyse and correlate data from various sources to draw meaningful conclusions about potential malicious activity; and
- Use artificial intelligence to design smart data driven systems to respond to Advanced Persistent Threats.
- Digital Forensics
- Identify, collect, analyse, and preserve evidences from a variety of traditional and modern computing platforms; and
- Solve and document compromised cases through incident handling and forensics investigation methodologies to develop investigation plans.
- Penetration Testing
- Conduct structured discovery of security vulnerabilities in systems, networks, and web services; and
- Propose concrete methods to fix discovered security vulnerabilities.
- Professional Capacity
- Demonstrate ethical behaviour consistent with academic integrity and the professional code of ethics as required in cybersecurity and threat intelligence;
- Collaborate and conduct in-depth research about different cyber threats and prepare relevant technical and non-technical reports; and
- Demonstrate entrustable professional skills including initiative, responsibility, accountability, and decision making in complex situations.
Program Requirements
The Master of Cybersecurity and Threat Intelligence is a coursework master's degree focused on training individuals to become technically skilled and ethically-minded cybersecurity professionals. Students develop mastery in security analysis and design, security architecture, threat intelligence, digital forensics, and penetration testing. Hands-on training in the cybersecurity teaching lab, the Security Operations Centre, enables students to work with real and simulated security attacks independently and collaboratively. Students may choose to complete their program through an independent project wherein students partner with an industry or academic partner to produce an evidence-based solution to a complex cybersecurity problem.
All students in the Master of Cybersecurity and Threat Intelligence program are required to complete a minimum of 4.00 graduate credits, including CIS*6590 Professional Seminar in Cybersecurity. The remaining 3.50 credits must be completed from the following list of courses:
Code | Title | Credits |
---|---|---|
CIS*6510 | Cybersecurity and Defense in Depth | 0.50 |
CIS*6520 | Advanced Digital Forensics and Incident Response | 0.50 |
CIS*6530 | Cyber Threat Intelligence and Adversarial Risk Analysis | 0.50 |
CIS*6540 | Advanced Penetration Testing and Exploit Development | 0.50 |
CIS*6550 | Privacy, Compliance, and Human Aspects of Cybersecurity | 0.50 |
CIS*6560 | Cybersecurity and Threat Intelligence Project | 1.00 |
CIS*6570 | Advanced Cryptography and Cryptanalysis | 0.50 |
CIS*6580 | Security Monitoring and Cyber Threat Hunting | 0.50 |
CIS*6670 | Special Topics in Cybersecurity | 0.50 |