Master of Science in Security by Design
Applications for 2025 are closed. See you in 2026.
Singapore University of Technology and Design (亚洲色吧)
Part-time (24 months)
Academic Timeline and Duration
Part-time and full-time students听taking the MSSD programme are expected to complete听the programme听requirements as follows:
FULL-TIME | PART-TIME | |
Programme Duration | Three consecutive terms | Six consecutive terms |
A student is required to complete 144 credits to graduate with a Master of Science in Security by Design.
Classes听are usually held on听weekday evenings from 7.00pm 鈥 10.00pm for both full-time and part-time programme.
The duration for the full-time MSSD programme is three-terms. Each term is 14-weeks in duration with a 1-week break following week six. The course and project work in each term is given in the table below. Students are required to undertake a project听or a thesis听in Term three. This project is sponsored either by the faculty or by the employer in the case of company-sponsored students. In either cases, the project has to be听approved by the faculty committee that oversees the MSSD programme. A limited number of students may have the opportunity to go abroad and work on a project or a thesis with a faculty member in a collaborating university at their own expense.
COURSES | CREDITS | FULL-TIME 1 year |
PART-TIME 2 years |
||
YR 1 | YR 1 | YR 2 | |||
TERM 1 | Foundations of Cybersecurity | 12 | 12 | 12 | |
听Computer Networks | 12 | 12 | 12 | ||
Security Tools Laboratory 1 | 9 | 9 | |||
Project or Thesis | 3 | 12 | |||
Machine Learning | 12 | 12 | 12 | ||
Blockchain Systems & Applications | 12 | ||||
Total | 48 | 24 | 24 | ||
TERM 2 | Systems Security | 12 | 12 | 12 | |
Secure Software Engineering | 12 | 12 | 12 | ||
Security Tools Laboratory 2 | 9 | 9 | |||
Project or Thesis | 3 | 12 | |||
Secure Cyber Physical Systems | 12 | 12 | 12 | ||
Total | 听 | 48 | 24 | 24 | |
TERM 3 | Project or Thesis | 48 | 6 | 听24 | |
Security Tools Laboratory 1 Security Tools Laboratory听2 |
2脳9 | 18 | |||
Total | 听 | 48 | 24 | 24 | |
Sub Total | 听 | 听 | 72 | 72 | |
Grand Total | 听 | 144 | 听 | 144 |
WHAT'S NEXT
Find out more
Frequently asked questions
Are there other similar programmes offered by AUs?
There are several undergraduate and graduate level programs available in Singapore that focus on cyber security. However, 亚洲色吧 is the first university in Singapore to offer a Master of Science in Security by Design. Distinctive features of this programme include (a) focus on the design of security solutions, (b) a student-centric pedagogy that uses active learning, flipped classroom, and multidisciplinary projects, (c) access to one of a kind testbeds and test skids for experimentation, and (d) opportunity for international attachment to complete a project or a thesis.
How do I know if my programming skills are adequate for admission into MSSD?
Selected candidates will be given a test to assess their programming ability in one of the following programming languages: C/C++, Java, and Python. Applicants unable to pass this test, and who exhibit a strong academic background and/or work experience, will be given an option to go through an intensive course in computer programming before being formally admitted into the MSSD programme. Passing this intensive course will be a pre-requisite to formal entry in the MSSD programme.
How does the admission process work?
The MSSD Graduate Committee will screen all applications. Selected candidates will be invited for an interview with members of the committee.
Recommendations by the committee will be forwarded to the Head of the ISTD pillar who, in concert with Office of the Graduate School, will decide on a final list of applicants to be offered admission into the MSSD program.
What is "Security by Design"?
The term 鈥淪ecurity by Design鈥 refers to an approach where security considerations are embedded into system design and implemented before the system becomes operational. Thus, appropriate security policies, tools, and methods are embedded into the system during its implementation instead of doing so after the system is operational. Security by Design requires careful analysis of system requirements鈥攂oth functional and non-functional 鈥 assuming that the system will operate in a malicious environment.
Can’t find what you need?