For students wanting additional specialization in their degree, the department offers four areas of concentration under the B.S. degree in Computer Science. The department also offers a specialized Cyber Operations Track that provides a rigorous curriculum in Cybersecurity with a focus on offensive cyber operations while balancing theoretical foundations and experiential learning.
The "cloud" refers to things you can access with the internet. Cloud computing is basically internet-based computing that allows you on-demand access to use other powerful computers, algorithms, or data outside of your own local computer.
Example of Cloud and Systems: Gmail is a cloud computing service that allows you to read and write emails in your account that are not on your computer.
Students may declare a Concentration in Cloud and Systems after completing CS 3423 Systems Programming with a grade of C– or better. All candidates for the Concentration in Cloud and Systems must fulfill the Core Curriculum requirements and the Computer Science degree requirements including, as part of the upper-division computer science electives in item B in the degree requirements, the following course:
plus three additional courses selected from the following (an elective can only be counted towards one concentration):
All courses in the concentration are elective courses. Visit the Course Catalog for more information.
Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs, and data from attack, damage, and unauthorized access.
Example of Cybersecurity: government agencies, the military, corporations, financial institutions, hospitals, and other groups collect, process, and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.
Students may declare a Concentration in Cybersecurity after completing CS 2123 (formerly CS 2124) Data Structures with a grade of C– or better. All candidates for the Concentration in Cybersecurity must fulfill the Core Curriculum requirements and the Computer Science degree requirements including, as part of the computer science electives in item B in the degree requirements, the following course:
plus three additional courses selected from the following:
All courses in the concentration are elective courses. Visit the Course Catalog for more information.
Data Science is a multidisciplinary blend of data inference, algorithmic development, and technology in order to solve analytically complex problems. At the core is data. Troves of raw information, streaming in and stored in enterprise data warehouses. Data science is ultimately about using this data in creative ways to generate value.
Example of Data Science: Netflix mines movie viewing patterns to understand what drives user interest and uses that to make decisions on which Netflix original series to produce.
Students may declare a Concentration in Data Science after completing CS 3343 Analysis of Algorithms with a grade of C– or better. All candidates for the Concentration in Data Science must fulfill the Core Curriculum requirements and the Computer Science degree requirements including, as part of the upper-division computer science electives in item B in the degree requirements, the following course:
plus two additional courses selected from the following:
All courses in the concentration are elective courses. Visit the Course Catalog for more information.
Software Engineering is more than just programming. It's about designing, writing, testing, and maintaining computer programs with the purpose of solving problems for many users. It's about creating robust and safe solutions that will withstand the test of time and will work for some of the unknown problems around the original obvious ones.
Example of Software Engineering: the City of San Antonio developed a computerized system to inform users of road and traffic conditions in the area of interest.
Students may declare a Concentration in Software Engineering after completing CS 3443 Application Programming with a grade of C– or better. All candidates for the Concentration in Software Engineering must fulfill the Core Curriculum requirements and the Computer Science degree requirements including, as part of the upper-division computer science electives in item B in the degree requirements, the following course:
All courses in the concentration are elective courses. Visit the Course Catalog for more information.
The National Security Agency (NSA) designated UTSA as one of its National Centers of Academic Excellence in Cyber Operations (CAE-CO) in 2018. UTSA's Bachelors of Science Cyber Operations Track is one of 20 NSA-certified CAE-CO programs in the nation.
As a result, UTSA's Department of Computer Science is able to offer undergraduate students majoring in Computer Science the option to pursue a specialized Cyber Operations Track and complete the requirements set out by the NSA’s CAE-CO program. Successfully completing the Cyber Operations Track opens up a variety of new opportunities that are only available to students with this specialization.
Students who successfully complete the Cyber Operations Track will have the designation recorded on their transcript in addition to receiving their regular Bachelor of Science in Computer Science diploma.
Cyber operations covers the entire scope of cyberspace and related operations, both technical and non-technical. As such, the Cyber Operations Track at UTSA provides a basic foundation programming languages, software reverse engineering, operating system theory, networking, cellular and mobile technologies, discrete math and algorithms, overview of cyber defense, security fundamental principles, vulnerabilities, legal and ethics, virtualization, cloud security, risk management and information systems, computer architecture, software security analysis, secure software development, digital forensics, systems programming, applied cryptography, user experience security, and offensive cyber operations.
Computer Science majors considering the Cyber Operations Track should have a strong interest in computer and information technology as it applies to cyberspace, networks, and the use of the internet. Students who enjoy working with systems of computers, who have an interest in the technical foundation for computer and network security, or who have a systematic way of thinking, have the greatest success in the major. No prior computer programming experience is required to be successful in this major.
Visit the Course Catalog for more information and requirements.