亚洲色吧

Master of Science in Security by Design

Design large-scale cyber-physical security systems. Not just enterprise networks, you will also contribute to the security of key public infrastructure such as power grids, water treatment plants to transportation networks and more.

Applications for 2025 are closed. See you in 2026.
LOCATION

Singapore University of Technology and Design (亚洲色吧)

PROGRAMME MODE & CANDIDATURE
Full-time (12 months)
Part-time (24 months)
GRADUATE WITH

Master of Science (Security by Design)

Academic Timeline and Duration

Part-time and full-time students听taking the MSSD programme are expected to complete听the programme听requirements as follows:

 

FULL-TIME PART-TIME
Programme Duration Three consecutive terms Six consecutive terms

 

A student is required to complete 144 credits to graduate with a Master of Science in Security by Design.

 

Classes听are usually held on听weekday evenings from 7.00pm 鈥 10.00pm for both full-time and part-time programme.

 

The duration for the full-time MSSD programme is three-terms. Each term is 14-weeks in duration with a 1-week break following week six. The course and project work in each term is given in the table below. Students are required to undertake a project听or a thesis听in Term three. This project is sponsored either by the faculty or by the employer in the case of company-sponsored students. In either cases, the project has to be听approved by the faculty committee that oversees the MSSD programme. A limited number of students may have the opportunity to go abroad and work on a project or a thesis with a faculty member in a collaborating university at their own expense.

 

COURSES CREDITS FULL-TIME
1 year
PART-TIME
2 years
YR 1 YR 1 YR 2
TERM 1 Foundations of Cybersecurity 12 12 12
Computer Networks 12 12 12
Security Tools Laboratory 1 9 9
Project or Thesis 3 12
Machine Learning 12 12 12
Blockchain Systems & Applications 12
Total 48 24 24
TERM 2 Systems Security 12 12 12
Secure Software Engineering 12 12 12
Security Tools Laboratory 2 9 9
Project or Thesis 3 12
Secure Cyber Physical Systems 12 12 12
Total 48 24 24
TERM 3 Project or Thesis 48 6 听24
Security Tools Laboratory 1
Security Tools Laboratory听2
2脳9 18
Total 48 24 24
Sub Total 72 72
Grand Total 144 144
WHAT'S NEXT

Find out more

Frequently asked questions

Are there other similar programmes offered by AUs?

There are several undergraduate and graduate level programs available in Singapore that focus on cyber security. However, 亚洲色吧 is the first university in Singapore to offer a Master of Science in Security by Design. Distinctive features of this programme include (a) focus on the design of security solutions, (b) a student-centric pedagogy that uses active learning, flipped classroom, and multidisciplinary projects, (c) access to one of a kind testbeds and test skids for experimentation, and (d) opportunity for international attachment to complete a project or a thesis.


How do I know if my programming skills are adequate for admission into MSSD?

Selected candidates will be given a test to assess their programming ability in one of the following programming languages: C/C++, Java, and Python. Applicants unable to pass this test, and who exhibit a strong academic background and/or work experience, will be given an option to go through an intensive course in computer programming before being formally admitted into the MSSD programme. Passing this intensive course will be a pre-requisite to formal entry in the MSSD programme.


How does the admission process work?

The MSSD Graduate Committee will screen all applications. Selected candidates will be invited for an interview with members of the committee.

Recommendations by the committee will be forwarded to the Head of the ISTD pillar who, in concert with Office of the Graduate School, will decide on a final list of applicants to be offered admission into the MSSD program.


What is "Security by Design"?

The term 鈥淪ecurity by Design鈥 refers to an approach where security considerations are embedded into system design and implemented before the system becomes operational. Thus, appropriate security policies, tools, and methods are embedded into the system during its implementation instead of doing so after the system is operational. Security by Design requires careful analysis of system requirements鈥攂oth functional and non-functional 鈥 assuming that the system will operate in a malicious environment.


Can’t find what you need?

Reach out to us

Submit an enquiry to our friendly Graduate team.

Get the latest updates

Subscribe to our mailing list to stay updated on the latest events and news within the 亚洲色吧 graduate student community.