- Describe cybersecurity and privacy mechanisms, standards and state-of-the-art capabilities.
- Describe potential cyber attacks and the actors that might perform them, and apply cyber defense methods to prepare a system to repel attacks.
- Perform security review of applications, systems and infrastructure.
- Design and implement system, network and infrastructure-level solutions to ensure the security and privacy of communications and data against specific security threats, while understanding the trade-offs between security, usability and performance.
- Use standard security terminology to communicate effectively with other cybersecurity professionals.
- Understand the ethical and legal implications of cyber attacks.
Cybersecurity and Privacy
Cybersecurity and Privacy
About
Cryptography and Security
-
Understand the difference between the symmetric key and public key cryptography approaches.
-
Select appropriate symmetric and public key cryptography protocols for a given application.
-
Develop an efficient implementation of a cryptographic protocol based on a Discrete Logarithm Problem, RSA (Factoring) Problem or Elliptic Curve Discrete Logarithm Problem.
Security and Privacy in Computing
-
Understand the various models to evaluate the security of computer systems.
-
Interpret security guarantees and assess the level of security provided by a cryptographic protocol.
-
Understand the various security goals for communication over an insecure network.
-
Identify the appropriate types of cryptographic primitives that should be used to achieve each of these goals.
-
Understand the advantages and limitations of using symmetric key versus public-key cryptography.
Network Protocols Security
-
Identify the appropriate security primitives that should be used to achieve specific security goals for communication over insecure networks.
-
Analyze the security of the main mechanisms used on the internet to secure communication between computer systems at various network layers, including physical, network, transport and application layers.
-
Describe common attacks against wired and wireless network protocols using standard terminology, allowing them to communicate effectively with other security professionals.
Requirements
Entry Requirements
- Completed application
- Application fee
- English proficiency score (unless undergraduate degree completed at a U.S. university)
- GRE/GMAT scores
- Portfolio (for applicants to the Hillier College of Architecture and Design)
- Letter of recommendation
- 1 for Master’s
- 3 for PhD
Fee Information
Tuition Fee
USD 34,326Application Fee
USD 75How to Apply
-
Completed application - NJIT accepts the Common Application for First-Year admission
-
Application fee (or a College Board or other fee waiver)
-
High school transcript
-
SAT (use code 2513) or ACT (use code 2580) - see Test-Optional Admission Policy for Fall 2023
-
Letter of recommendation
-
Portfolio (for applicants who wish to attend the Hillier College of Architecture and Design) - see Admission and Portfolio Requirements
Cybersecurity and Privacy
New Jersey Institute of Technology
United States of America,
Newark
Similar Programs
Other interesting programs for you
Find More ProgramsInformation Privacy and Cybersecurity Law
- Tuition Fee USD 30,642 / year
- Duration 12 / month(s)
Privacy Law and Cybersecurity
- Tuition Fee USD 59,260 / year
- Duration 12 / month(s)
Cybersecurity and Privacy - Professional Science Master's (PSM) Cyber Defense Option
- Tuition Fee USD 34,326 / year
- Application Fee USD 75
- Duration 2 / year(s)
