Students
Tuition Fee
Not Available
Start Date
Not Available
Medium of studying
Not Available
Duration
60 months
Details
Program Details
Degree
Masters
Timing
Part time
Course Language
English
About Program

Program Overview


Cybersecurity, Master of Science

The Master of Science in Cybersecurity is a graduate program offered by the Whiting School of Engineering at Johns Hopkins University. This program is designed to provide students with a comprehensive understanding of cybersecurity principles, practices, and technologies.


Admission Requirements

Applicants to the Master of Science in Cybersecurity program must meet the general requirements for admission to graduate study at Johns Hopkins University. The applicant's prior education must include the following courses:


  • One year of Calculus (2 semesters or 3 quarters)
  • One semester/term of advanced math (Discrete Math is strongly preferred but Linear Algebra or Differential Equations will be accepted)
  • One semester/term of Java (C++ will be accepted but the student must be knowledgeable in Java)
  • One semester/term of Data Structures
  • One semester/term of Computer Organization (e.g., assembly language and machine organization)

Applicants whose prior education does not include the courses listed above may still enroll under provisional status, followed by full admission status once they have completed the missing courses.


Program Requirements

The Master of Science in Cybersecurity requires the completion of ten courses (30 credits) within five years. Students are required to choose a focus area to follow. Three core courses (9 credits) must be completed, and at least five additional courses (15 credits) must be from the Cybersecurity program.


Core Courses

The core courses for the Master of Science in Cybersecurity are:


  • EN.605.621: Foundations of Algorithms
  • EN.695.601: Foundations of Information Assurance
  • EN.695.641: Cryptology

One or more foundation courses can be waived by the student's advisor if a student has received an A or B in equivalent graduate courses.


Focus Areas

Students are required to choose one of the following focus areas:


  • Analysis
  • Assured Autonomy
  • Cyber Artificial Intelligence
  • Cyber Operations
  • Networks
  • Space Cyber
  • Systems

Each focus area has a list of required and elective courses. Students must take at least three courses from the selected focus area, including at least one 700-level course.


Courses by Focus Area

The courses for each focus area are as follows:


Analysis

  • EN.695.642: Intrusion Detection
  • EN.695.643: Introduction to Ethical Hacking
  • EN.695.644: Computer Forensics
  • EN.695.646: Engineering Runtime Malware Detection
  • EN.695.647: Cyber Threat Hunting and Intelligence
  • EN.695.741: Information Assurance Analysis
  • EN.695.742: Digital Forensics Technologies and Techniques
  • EN.695.744: Reverse Engineering and Vulnerability Analysis
  • EN.695.749: Cyber Exercise
  • EN.605.728: Quantum Computation

Assured Autonomy

  • EN.695.634: Intelligent Vehicles: Cybersecurity for Connected and Autonomous Vehicles
  • EN.695.637: Introduction to Assured AI and Autonomy
  • EN.695.715: Assured Autonomy
  • EN.695.737: AI for Assured Autonomy
  • EN.605.613: Introduction to Robotics
  • EN.605.624: Logic: Systems, Semantics, and Models
  • EN.605.636: Autonomic Computing
  • EN.605.649: Principles and Methods in Machine Learning
  • EN.605.746: Advanced Machine Learning

Cyber Artificial Intelligence

  • EN.695.631: AI for Cybersecurity
  • EN.695.634: Intelligent Vehicles: Cybersecurity for Connected and Autonomous Vehicles
  • EN.695.637: Introduction to Assured AI and Autonomy
  • EN.695.715: Assured Autonomy
  • EN.695.737: AI for Assured Autonomy
  • EN.695.738: Generative AI for Cybersecurity
  • EN.695.739: Generative AI and Synthetic Threats
  • EN.605.613: Introduction to Robotics
  • EN.605.624: Logic: Systems, Semantics, and Models
  • EN.605.636: Autonomic Computing
  • EN.605.649: Principles and Methods in Machine Learning
  • EN.605.746: Advanced Machine Learning
  • EN.635.603: AI/ML Ops

Cyber Operations

  • EN.695.615: Cyber Physical Systems Security
  • EN.695.622: Web Security
  • EN.695.643: Introduction to Ethical Hacking
  • EN.695.741: Information Assurance Analysis
  • EN.695.742: Digital Forensics Technologies and Techniques
  • EN.605.731: Survey of Cloud Computing Security
  • EN.635.775: Cyber Operations, Risk, and Compliance

Networks

  • EN.695.621: Public Key Infrastructure and Managing E-Security
  • EN.695.622: Web Security
  • EN.695.623: Information Security and Privacy
  • EN.695.624: Introduction to Internet of Things Security and Privacy
  • EN.695.721: Network Security
  • EN.695.722: Covert Channels
  • EN.695.723: Advanced Web Security
  • EN.695.791: Information Assurance Architectures and Technologies
  • EN.605.671: Principles of Data Communications Networks
  • EN.605.674: Network Programming
  • EN.605.675: Protocol Design
  • EN.605.731: Survey of Cloud Computing Security
  • EN.605.771: Wired and Wireless Local and Metropolitan Area Networks
  • EN.635.611: Principles of Network Engineering
  • EN.635.673: Protecting Critical Infrastructure Against Cyber Attacks
  • EN.635.711: Advanced Topics in Network Engineering

Space Cyber

  • EN.695.642: Intrusion Detection
  • EN.695.644: Computer Forensics
  • EN.695.721: Network Security
  • EN.695.741: Information Assurance Analysis
  • EN.695.742: Digital Forensics Technologies and Techniques
  • EN.695.744: Reverse Engineering and Vulnerability Analysis
  • EN.695.791: Information Assurance Architectures and Technologies
  • EN.605.674: Network Programming
  • EN.605.716: Modeling and Simulation of Complex Systems
  • EN.605.728: Quantum Computation
  • EN.675.641: Space Systems Cybersecurity

Systems

  • EN.695.611: Embedded Computer Systems-Vulnerabilities, Intrusions, and Protection Mechanisms
  • EN.695.612: Operating Systems Security
  • EN.695.613: Securing Industrial Control Systems
  • EN.695.614: Security Engineering
  • EN.695.615: Cyber Physical Systems Security
  • EN.695.617: Zero Trust Principles and Practice
  • EN.695.711: Java Security
  • EN.695.712: Authentication Technologies
  • EN.695.715: Assured Autonomy
  • EN.605.601: Foundations of Software Engineering
  • EN.605.609: DevOps and Secure Software Development
  • EN.605.612: Operating Systems
  • EN.605.704: Object-Oriented Analysis and Design
  • EN.605.715: Software Development for Real-Time Embedded Systems
  • EN.605.716: Modeling and Simulation of Complex Systems
  • EN.605.729: Formal Methods
  • EN.635.673: Protecting Critical Infrastructure Against Cyber Attacks
  • EN.635.676: Cybersecurity in Information Systems

Independent Study

  • EN.695.795: Capstone Project in Cybersecurity
  • EN.695.801: Independent Study in Cybersecurity I
  • EN.695.802: Independent Study in Cybersecurity II

Please refer to the course schedule published each term for exact dates, times, locations, fees, and instructors.


See More