Cybersecurity Education and Research Overview


The Jayhawk SFS program is associated with eight different degree programs within KU's EECS Department.

Undergraduate students will, in the junior and senior year, complete their degree requirements as well as take two core security classes, are encouraged to take an elective cyber course and complete a senior year capstone project. Each student will work closely with one of 10 faculty on the advising team. Undergrads will also have the opportunity to participate directly in research projects.

Masters and Ph.D. students will join an EECS department that has a strong research portfolio in cybersecurity. Students will particpate directly in state-of-the-art research efforts of their advisors, selected from the 10 faculty on the advising team. Every MS student is expected to identify a focus area of study and complete the degree requirements for that focus area. The Security and Assurance focus area for MSCS/MSCoE degrees is designed to prepare students for security research and development for the national cybersecurity workforce or for further Ph.D.-level research in security. The Information Assurance and Management area benefits from a more practical focus and a stronger management emphasis in both the research and the course work.


Core Security Courses

  • Computer & Information Security
  • Information Security Management
  • Network Security
  • Introduction to Information and Computer Security
  • Information Security and Assurance
  • Security Management and Audit
  • Network Security and its Application
  • Introduction to Network Security
  • Introduction to Security Management
  • Computer Forensics
  • Introduction to Cryptography and Computer Security
  • Network Security

Research Capacity

KU’s program has a broad spectrum of research opportunity: from theory to application, hardware and cyber-physical systems to software and information systems, and physical-layer communication security to resilient and survivable networks. Generally the research can be described in three clusters:

  1. Information security and privacy
  2. Communication and network systems security
  3. High-assurance system design and verification