iSchool Curriculum
Information Sciences graduate students are eligible for ICSSP scholarships if they are in the MS/IM (Master of Science in Information Management) or Ph.D. degree program. Interested Ph.D. students should contact Prof. Masooda Bashir (mnb@illinois.edu) for more information on curriculum requirements.
The Master of Science in Information Management (MS/IM) degree from the UIUC School of Information Sciences (IS) is a 1.5-year, 40-credit program. MS/IM students will take part in the ICSSP during their first and second year of their degree programs through specialized career pathways that includes a Privacy, Security and Ethics track. The ICSSP will take advantage of the 28 hours of elective courses that can be taken based on the selected career pathway either at the IS or other colleges, including computer security courses offered through the CS department. MS/IM students enrolled in the ICSSP are required to adhere to the following cybersecurity road map:
- Satisfy core requirements of the MSIM curriculum.
This includes IS 507 Data, Statistical Models and Information; IS 504, Sociotechnical Information Systems; and IS 515 Information Modeling or IS 455 Database Design and Prototyping. Students must also take IS 584 PVO, Information Ethics. For the remainder of the courses, students will select specific courses that fit within their existing electives options in consultation with the student’s advisor.
- Take 16 hours of core courses in security.
These include CS 461 or CS463, IS 464 or equivalent, IS 584 PVO, and IS583 IFO.
- Take 8 hours from the specified list of courses.
Students will take a sequence of 2 courses selected from the currently available information assurance/trust courses (a list of security-related courses at UIUC is available), such as:
-
- Applied Cryptography:
- Human Aspects of Security & Privacy:
-
- CS 462 Issues of Law and Policy in Computer Science (SP26)
- CS 464 Topics in Societal and Ethical Impacts of Computer Technology (FA25: CD1 Cyber Dystopia)
- CS 465 User Interface Design (FA25)
- CS 467 Social Visualization
- CS 470 Social and Information Networks (FA25)
- CS 498 RC Law & Policy Issues in CS (FA25)
- CS 562 Advanced Topics in Security, Privacy, and Machine Learning (FA25)
- CS 563 Advanced Computer Security
- CS 565 Human-Computer Interaction
- CS 567 Social Signals and Social Media
- CS 591 IC Interactive Computing (FA25)
- CS 591 SP Security and Privacy (FA25)
- CS 598 CAC Inclusive Cybersecurity & Privacy
- CS 598 CAG Security and Privacy for IoT in Homes
- CS 598 ECH or RBO Antisocial Computing
- CS 598 UCP Usable Cybersecurity & Privacy
- ECE 479 IoT and Cognitive Computing
- ECE 598 DI Digital Identity
- ECE 598 DP Deploying Privacy (SP26)
- INFO 390 JB Information Security & Global Society
- INFO 490 JBG/JBU Digital Forensics II (SP26)
- INFO 490 DFU/DFG Digital Forensics I (FA25)
- INFO 490 Fundamentals of Info Security
- IS 364 Privacy and Info Technology
- IS 390 BS Blockchain and Society (FA25)
- IS 464 Information Assurance
- IS 467 Ethics and Policy for Data Science (FA25)
- IS 524 Data Governance
- IS 584 IFC Int. Freedom and Censorship (SP26)
- IS 584 PVO Privacy in the Internet Age (FA25)
- IS 594 IPO Information Policy
- IS 597 HCD Human Centered Data Science (FA25)
- IS 597 TML Trustworthy Machine Learning
- Machine Learning and Artificial Intelligence:
- CS 441 Applied Machine Learning (FA25)
- CS 442 Trustworthy Machine Learning
- CS 446/ECE 449 Machine Learning (FA25)
- CS 521 FMC Formal Methods and Machine Learning in Programming Systems (FA25)
- CS 521 LCC Machine Learning and Compilers (FA25)
- CS 540 Deep Learning Theory (FA25)
- CS 547 Deep Learning
- CS 568 User-Centered Machine Learning
- CS 598 BL: Adversarial Machine Learning
- IS 492 AIG Introduction to Gen AI for Human-AI Collaboration (FA25)
- Data, Systems, and Cyberinfrastructures:
- CS 341 System Programming (FA25)
- CS 411 Database Systems (FA25)
- CS 412 Introduction to Data Mining (FA25)
- CS 423 Operating Systems Design (FA25)
- CS 427 Software Engineering I (FA25)
- CS 425/ECE 428 Distributed Systems (FA25)
- CS 438/ECE 438 Communication Networks (FA25)
- CS 439/ECE 439 Wireless Networks (FA25)
- CS 511 Advanced Data Management (FA25)
- CS 512 Data Mining Principles (FA25)
- CS 598 AB Endpoint Threat Detection and Investigation
- CS 598 DH Secure Computation
- CS 598 EKS Smart Cities, Homes & Beyond (SP26)
- CS 598 OSS Operating System Security
- ECE 365 Data Science and Engineering (FA25)
- ECE 484 Principles of Safe Autonomy (FA25)
- ECE 498 AL3 / ECE 598 AL1 Trust Critical Infrastructures (FA25)
- ECE 542/CS 536 Design of Fault-Tolerant Digital Systems
- ECE 573 Power System Control
- ECE/CS 584 Embedded System Verification (FA25)
- ENG 498 FSA Foundations in Secure Systems Administration (SP26)
- ENG 498 FSN Foundations in Secure Networking for Cyber-Social Systems
- IS 496 CN3 Computer Networks
- Approved Track: Students may work with Professor Bashir and the ICSSP leadership team to create an approved concentration area.
- Research project in the area of security.
Students will work in collaboration with a faculty member to satisfy the Upper Level Writing Requirement as well as the ICSSP research paper requirement. This will involve two semesters of IS 589: Independent Study.
- ICSSP Seminar.
Students must register every semester for CS 491, the Information Assurance & Trust Seminar.