For students wanting additional specialization in their degree, the department offers four areas of concentration under the B.S. degree in Computer Science. The department also offers a specialized Cyber Operations Track that provides a rigorous curriculum in Cybersecurity with a focus on offensive cyber operations while balancing theoretical foundations and experiential learning.

What can I do with a Cloud and Systems concentration?

The "cloud" refers to things you can access with the internet. Cloud computing is basically internet-based computing that allows you on-demand access to use other powerful computers, algorithms, or data outside of your own local computer.
Example of Cloud and Systems: Gmail is a cloud computing service that allows you to read and write emails in your account that are not on your computer.

Students may declare a Concentration in Cloud and Systems after completing CS 3423 Systems Programming with a grade of C– or better. All candidates for the Concentration in Cloud and Systems must fulfill the Core Curriculum requirements and the Computer Science degree requirements including, as part of the upper-division computer science electives in item B in the degree requirements, the following course:

  • CS 4843 Cloud Computing

plus three additional courses selected from the following (an elective can only be counted towards one concentration):

  • CS 3873 Computer Networks
  • CS 4243 Large-Scale Data Management
  • CS 4633 Simulation Techniques
  • CS 4663 Distributed & Cloud Systems Security
  • CS 4713 Compiler Construction
  • CS 4823 Parallel Programming
  • CS 4833 Embedded Systems
  • CS 4853 Advanced Systems Programming
  • CS 4863 Distributed Computing and Systems
  • CS 4963 Advanced Topics in Systems and Cloud

All courses in the concentration are elective courses. Visit the Course Catalog for more information.

What can I do with a Cybersecurity concentration?

Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs, and data from attack, damage, and unauthorized access.
Example of Cybersecurity: government agencies, the military, corporations, financial institutions, hospitals, and other groups collect, process, and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.

Students may declare a Concentration in Cybersecurity after completing CS 2123 (formerly CS 2124) Data Structures with a grade of C– or better. All candidates for the Concentration in Cybersecurity must fulfill the Core Curriculum requirements and the Computer Science degree requirements including, as part of the computer science electives in item B in the degree requirements, the following course:

  • CS 3113 Principles of Cyber Security

plus three additional courses selected from the following:

  • CS 3433 Computer & Information Security
  • CS 4353 Unix and Network Security
  • CS 4363 Cryptography
  • CS 4453 Penetration Testing
  • CS 4463 Steganography
  • CS 4473 Cryptocurrencies and Bitcoins
  • CS 4483 Cyber Security Foundations and Practice
  • CS 4493 Advanced Topics in Cyber Security
  • CS 4643 Mobile and Wireless Network and Technologies
  • CS 4653 Software and Malware Reverse Engineering
  • CS 4663 Distributed and Cloud Systems Security
  • CS 4673 Cyber Operations
  • CS 4683 Secure Software Development and Analysis

All courses in the concentration are elective courses. Visit the Course Catalog for more information.

What can I do with a Data Science concentration?

Data Science is a multidisciplinary blend of data inference, algorithmic development, and technology in order to solve analytically complex problems. At the core is data. Troves of raw information, streaming in and stored in enterprise data warehouses. Data science is ultimately about using this data in creative ways to generate value.
Example of Data Science: Netflix mines movie viewing patterns to understand what drives user interest and uses that to make decisions on which Netflix original series to produce.

Students may declare a Concentration in Data Science after completing CS 3343 Analysis of Algorithms with a grade of C– or better. All candidates for the Concentration in Data Science must fulfill the Core Curriculum requirements and the Computer Science degree requirements including, as part of the upper-division computer science electives in item B in the degree requirements, the following course:

  • CS 3743 Database Systems
  • CS 3753 Data Science

plus two additional courses selected from the following:

  • CS 3793 Artificial Intelligence
  • CS 4223 Bioinformatics I: Algorithms for Biological Data
  • CS 4233 Bioinformatics II: Statistical Learning for Biological Data
  • CS 4243 Large-Scale Data Management
  • CS 4253 Machine Learning
  • CS 4263 Deep Learning
  • CS 4303 Introduction to Optimization
  • CS 4333 Probability and Computing
  • CS 4373 Data Mining
  • CS 4973 Advanced Topics in Data Science

All courses in the concentration are elective courses. Visit the Course Catalog for more information.

What can I do with a Software Engineering Concentration?

Software Engineering is more than just programming. It's about designing, writing, testing, and maintaining computer programs with the purpose of solving problems for many users. It's about creating robust and safe solutions that will withstand the test of time and will work for some of the unknown problems around the original obvious ones.
Example of Software Engineering: the City of San Antonio developed a computerized system to inform users of road and traffic conditions in the area of interest.

Students may declare a Concentration in Software Engineering after completing CS 3443 Application Programming with a grade of C– or better. All candidates for the Concentration in Software Engineering must fulfill the Core Curriculum requirements and the Computer Science degree requirements including, as part of the upper-division computer science electives in item B in the degree requirements, the following course:

  • CS 3773 Software Engineering
plus two additional courses selected from the following:
  • CS 3723 Programming Languages
  • CS 4393 User Interfaces
  • CS 4413 Web Technologies
  • CS 4613 Senior Design I
  • CS 4623 Senior Design II
  • CS 4683 Secure Software Development and Analysis
  • CS 4723 Software Validation and Quality Assurance
  • CS 4743 Enterprise Software Engineering
  • CS 4773 Object-Oriented Systems
  • CS 4783 Advanced Software Engineering

All courses in the concentration are elective courses. Visit the Course Catalog for more information.

The National Security Agency (NSA) designated UTSA as one of its National Centers of Academic Excellence in Cyber Operations (CAE-CO) in 2018. UTSA's Bachelors of Science Cyber Operations Track is one of 20 NSA-certified CAE-CO programs in the nation.

As a result, UTSA's Department of Computer Science is able to offer undergraduate students majoring in Computer Science the option to pursue a specialized Cyber Operations Track and complete the requirements set out by the NSA’s CAE-CO program. Successfully completing the Cyber Operations Track opens up a variety of new opportunities that are only available to students with this specialization.

Students who successfully complete the Cyber Operations Track will have the designation recorded on their transcript in addition to receiving their regular Bachelor of Science in Computer Science diploma.

What is Cyber Operations?

Cyber operations covers the entire scope of cyberspace and related operations, both technical and non-technical. As such, the Cyber Operations Track at UTSA provides a basic foundation programming languages, software reverse engineering, operating system theory, networking, cellular and mobile technologies, discrete math and algorithms, overview of cyber defense, security fundamental principles, vulnerabilities, legal and ethics, virtualization, cloud security, risk management and information systems, computer architecture, software security analysis, secure software development, digital forensics, systems programming, applied cryptography, user experience security, and offensive cyber operations.

Who might be interested in this track?

Computer Science majors considering the Cyber Operations Track should have a strong interest in computer and information technology as it applies to cyberspace, networks, and the use of the internet. Students who enjoy working with systems of computers, who have an interest in the technical foundation for computer and network security, or who have a systematic way of thinking, have the greatest success in the major. No prior computer programming experience is required to be successful in this major.

Visit the Course Catalog for more information and requirements.