Queen's School of Computing

Programs of Study

The cybersecurity graduate programs are specializations of the existing graduate degree programs at Queen's or RMC. Students must first be accepted into the relevant unit, and then to the cybersecurity Graduate Specialization. See "How to Apply" for application procedures and requirements.

The cybersecurity CREATE program offers an enriched experience in cybersecurity, including specialized courses in cybersecurity, and professional development, a range of technical courses, a social science course, an internship, and a red team/blue team exercise. It is designed to prepare you for a career in cybersecurity.

The following course lists are referenced below:

  • SS Social science courses. MPA 535 Cyber Threat, MPAXX Managing Cyber/Information Operations, MBA503 Advanced Topics in Management II.
  • CORE Core cyber courses: EE579 Computer System and Network Security, CISC866 Introduction to Cybersecurity.
  • CYBER Other cyber courses: CISC848 Software Security and Reliability, MATH818: Cryptography, EE547 Digital Forensics, EE569 Malware Analysis, EE593 Advanced Network Traffic Analysis, EE595 Cyber Threat and Attack Techniques.

PhD by Research Thesis at Queen's

The cybersecurity specialization PhD consists of the four steps outlined in the School of Computing's PhD program, augmented with a specialization in cybersecurity. The four steps are breadth, topic proposal, comprehensive examination, and thesis. See the School's graduate website for procedural and scheduling details and overall requirements.

Breadth: In the breadth step, students accumulate breadth "tokens" (graduate-level courses or equivalent experience) in the three core areas of computer science, Theory, Applications and Systems, (plus potentially an Interdisciplinary token). The School requires at total of ten tokens, with at least two in each of the three core areas. A previous MSc thesis normally counts as a token, as does industrial experience on a topic equivalent to a graduate course.

In the cybersecurity specialization, breadth tokens must include at least one course from CORE, one course from SS (interdisciplinary token), and two courses from CYBER. Professionsal development activities must also be taken.

The breadth step should be completed by the end of the third term (first year) in the program. See the School's graduate website for details.

Internship: Students should normally complete a 2-term internship with one of our industrial or government partners.

Topic Proposal: In the topic proposal step, a 6-page research topic proposal document is submitted for approval. The document gives a description of a proposed subject area and research topic to be pursued, including a brief outline of the key and most pertinent literature contributions for the proposed topic. The PhD supervisory committee provides feedback on the document, including expected weights of the literature survey and research plan components of the PhD comprehensive examination. This step is to be completed by the end of the third term after initial registration in the PhD program. See the School's graduate website for details.

Comprehensive Examination: In the comprehensive examination step, students must show that they are well-versed of the state of the art in the area in which they intend to pursue research, that they have a critical perspective of the area, and that they are able to formulate a research plan to explore open problems and research opportunities. A formal PhD research proposal paper is submitted, presented and defended at an oral examination. The research proposal paper is a 40-page maximum document to be submitted before the end of the sixth term after initial registration in the PhD program. It should normally cover background material (e.g., motivation and literature survey), the problem to be tackled, methods to be used (e.g., research plans and experimental design), results sought, evaluation metrics (i.e. how research success will be measured), and milestones (including progress to date). The proportions of text for the literature survey and for the research plans will have already been communicated to the student through the feedback received on their topic proposal step. See the School's graduate website for details.

Thesis: In the thesis step, the proposed research is conducted and completed, and a formal dissertation is written and formally defended at an oral thesis examination. See the School's graduate website for details.

All cybersecurity CREATE PhD students are eligible for financial support from the CREATE program.

PhD by Research Thesis at RMC

Under development

MSc by Research at Queen's

The research pattern MSc in cybersecurity is a specialization of the MSc program of the School of Computing, combining four graduate courses with professional development and an MSc research thesis.

Students should normally complete a 1-term internship with one of our industrial or government partners.

All cybersecurity CREATE research MSc students are eligible for financial support from the CREATE program.

We plan to make it possible to take this program part-time by offering some courses online or in short formats, so that proximity to Kingston is not essential.

MSc by research at RMC

The research pattern MASc in cybersecurity is a specialization of the MASc program of the Department of Electrical Engineering and Computer Engineering, combining six graduate courses with an MSc research thesis. The course selection must include: PROF, one course from SS, one course from CORE, and one course from CYBER.

Students should normally complete a 1-term internship with one of our industrial or government partners.

All cybersecurity CREATE research MSc students are eligible for financial support from the CREATE program.

We plan to make it possible to take this program part-time by offering some courses online or in short formats, so that proximity to Kingston is not essential.

MSc by Courses and Project at Queen's

The project pattern MSc in cybersecurity is a specialization of the Project MSc program of the School of Computing, combining six graduate courses with a one-term research project. For the cybersecurity specialization, the course selection must include: professional development, one course from SS, one course from CORE, and two courses from CYBER.

Project MSc students are self-funded, and normally receive no financial support from the cybersecurity CREATE program.

MEng by Courses and Project at RMC

The project pattern MEng in cybersecurity is a specialization of the Project MEng program of the Department of Electrical Engineering and Computer Engineering, combining eight graduate courses with a project. The course selection must include: professional development, one course from SS, one course from CORE, and one course from CYBER.

Students should normally complete a 1-term internship with one of our industrial or government partners.

Project MSc students are self-funded, and normally receive no financial support from the cybersecurity CREATE program.

Master's of Public Administration at RMC

Either the Research Pattern or Project Patterns version may be taken, with a research topic on social, legal, or political aspects of cybsersecurity.

The MPA specialization is a specialization of the MPA program offered by RMC. As well as the requirements for that program, for students taking the cybersecurity specialization, course selection must include: professional development, and two courses from SS.