Master of Science in Security by Design
Singapore University of Technology and Design (SUTD)
Part-time (24 months)
Academic Timeline and Duration
Part-time and full-time students taking the MSSD programme are expected to complete the programme requirements as follows:
FULL-TIME | PART-TIME | |
Programme Duration | Three consecutive terms | Six consecutive terms |
A student is required to complete 144 credits to graduate with a Master of Science in Security by Design.
Classes are usually held on weekday evenings from 7.00pm – 10.00pm for both full-time and part-time programme.
The duration for the full-time MSSD programme is three-terms. Each term is 14-weeks in duration with a 1-week break following week six. The course and project work in each term is given in the table below. Students are required to undertake a project or a thesis in Term three. This project is sponsored either by the faculty or by the employer in the case of company-sponsored students. In either cases, the project has to be approved by the faculty committee that oversees the MSSD programme. A limited number of students may have the opportunity to go abroad and work on a project or a thesis with a faculty member in a collaborating university at their own expense.
COURSES | CREDITS | FULL-TIME 1 year |
PART-TIME 2 years |
||
YR 1 | YR 1 | YR 2 | |||
TERM 1 | Foundations of Cybersecurity | 12 | 12 | 12 | |
Computer Networks | 12 | 12 | 12 | ||
Security Tools Laboratory 1 | 9 | 9 | |||
Project or Thesis | 3 | 12 | |||
Machine Learning | 12 | 12 | 12 | ||
Blockchain Systems & Applications | 12 | ||||
Total | 48 | 24 | 24 | ||
TERM 2 | Systems Security | 12 | 12 | 12 | |
Secure Software Engineering | 12 | 12 | 12 | ||
Security Tools Laboratory 2 | 9 | 9 | |||
Project or Thesis | 3 | 12 | |||
Secure Cyber Physical Systems | 12 | 12 | 12 | ||
Total | 48 | 24 | 24 | ||
TERM 3 | Project or Thesis | 48 | 6 | 24 | |
Security Tools Laboratory 1 Security Tools Laboratory 2 |
2×9 | 18 | |||
Total | 48 | 24 | 24 | ||
Sub Total | 72 | 72 | |||
Grand Total | 144 | 144 |
WHAT'S NEXT
Find out more
Frequently asked questions
Are there other similar programmes offered by AUs?
There are several undergraduate and graduate level programs available in Singapore that focus on cyber security. However, SUTD is the first university in Singapore to offer a Master of Science in Security by Design. Distinctive features of this programme include (a) focus on the design of security solutions, (b) a student-centric pedagogy that uses active learning, flipped classroom, and multidisciplinary projects, (c) access to one of a kind testbeds and test skids for experimentation, and (d) opportunity for international attachment to complete a project or a thesis.
How do I know if my programming skills are adequate for admission into MSSD?
Selected candidates will be given a test to assess their programming ability in one of the following programming languages: C/C++, Java, and Python. Applicants unable to pass this test, and who exhibit a strong academic background and/or work experience, will be given an option to go through an intensive course in computer programming before being formally admitted into the MSSD programme. Passing this intensive course will be a pre-requisite to formal entry in the MSSD programme.
How does the admission process work?
The MSSD Graduate Committee will screen all applications. Selected candidates will be invited for an interview with members of the committee.
Recommendations by the committee will be forwarded to the Head of the ISTD pillar who, in concert with Office of the Graduate School, will decide on a final list of applicants to be offered admission into the MSSD program.
What is "Security by Design"?
The term “Security by Design” refers to an approach where security considerations are embedded into system design and implemented before the system becomes operational. Thus, appropriate security policies, tools, and methods are embedded into the system during its implementation instead of doing so after the system is operational. Security by Design requires careful analysis of system requirements—both functional and non-functional – assuming that the system will operate in a malicious environment.
Can’t find what you need?