Fordham University            The Jesuit University of New York
 


Master of Science in Cybersecurity
LINCOLN CENTER

The rapid expansion of cyberspace has also exposed its weaknesses, leaving it vulnerable to external intrusion

Fordham School of Professional and Continuing Studies will train you to be a cybersecurity specialist, positioning you as an expert who can bridge the gap between technological innovations and concurrent developments in cyberthreats.

  • 10-course, 30-credit master’s program, completed in 12 months
  • Designed for working professionals: Meet for one weekend a month, and take the rest of your courses online!
  • Offered at our easy-to-reach Lincoln Center campus in midtown Manhattan
  • Financial aid is available

Students in the program will:

  • receive a technology-based education using methods in computing and informational science, engineering, and social science;
  • learn from experienced professors and high-level professionals in the field, who will focus on theory as well as practice;
  • engage in in finding solutions to emerging global cyberthreats;
  • become familiar with the field’s legal, ethical, and policy issues.

Cybersecurity is a fast-growing field with high-paying job opportunities:

  • Software developer
  • Computer network architect
  • Intelligence analyst
  • Positions at the Department of Homeland Security, in areas such as cyber risk and strategic analysis, digital forensics, and intelligence

Courses and Degree Requirements
Fordham's Master of Science in Cybersecurity requires a total of ten courses of three credits each for a total of 30 credit hours.

Prerequisites for entry:
B.A. or B.S. in the disciplines of computer science, computer engineering, information science, or information technology. Professional knowledge or experience equivalent to the following four courses is required.

  • Equivalent to Applied Statistics (MATH1205)
    Course designed for students in fields that emphasize quantitative methods. It includes calculus based preliminary probability material followed by introduction to the basic statistical methods such as estimation, hypothesis testing, correlation and regression analysis. Illustrations are taken from a variety of fields. The course provides practical experience with statistical software.
  • Equivalent to Computer Science I (CISC1600)
  • CISC1600 covers introductory computer programming skills, problem solving, and algorithm development.
  • Equivalent to Discrete Structures (CISC1400)
    CISC1400 covers introductory in discrete structures such as logic, set, sequence, recursion, relation, functions, graph, permutation and combination, and probability theory.

A list of courses is as follows.

  1. Foundational Courses (required four courses) 12 Credits
    CISC5650 Cybersecurity Essentials
    CISC5750 Information Security and Ethics
    CISC5850 The Social Network
    CISC5900 Information Fusion
  2. Specialization Courses (choose four courses) 12 Credits
    CISC5700 Data Mining
    CISC6600 Secure Cybernetworks
    CISC6630 Wireless Security
    CISC6650 Forensic Computing
    CISC6680 Intrusion Detection and Network Forensics
    CISC6800 Malware Analytics and Software Security
    CISC6920 Incident Response and Risk Management
    CISC6940 Cybersecurity for Critical Infrastructure
  3. Capstone Course 3 Credits
    CISC6850 Leadership and Management in Cyber Security
  4. CISC8050 Projects and Interships 3 Credits
    Students currently working in the field will do a project while those who are not will have an internship.

Course Descriptions

CISC5850 The Social Network
This course is an introduction to social networks, which entail the structure, the function, and various applications. Topics include the Internet, information networks and the World-Wide Web, information retrieval and search engine optimization, social media analysis, crowd sourcing, social activity and voting, graph theory and social networks, network dynamics, text mining, natural language processing, and concept search. Emphasis will be on the social network itself.

CISC5900 Information Fusion
A study of the structure and function of information fusion. Efficient and effective combination of data or information from a variety of diverse sources, sensors, features, and decisions. Applications and case studies of information fusion and decision making to a plethora of disciplines including science and engineering, cybersecurity and digital networks, medicine and health, social choices and human cognition, business and finance, and management and innovation.

CISC6600 Secure Cybernetwork
This graduate course covers the essentials of designing and building a secure local area network, incorporating all elements of the seven layers of the ISO-OSI Model. Students will learn the capabilities, limitations, and vulnerabilities of a cybernetwork. Students will gain hands-on experience by implementing a secure network environment that is yes robust in preventing various adversary actions including, among others, extreme hacking and virus propagation.

CISC6650 Forensic Computing
Computing and digital technology has greatly transformed society and the way we live. Today, our world is filled with an array of complex multiprocessing and interconnected machines that we have all become accustomed to. This course studies technologies and practices for investigating the use, misuse and the adversarial potential of computing systemsand digital devices. It will provide unparalleled insight into the digital forensics and legal world, emphasized with practicallaboratory projects.

CISC6680 Intrusion Detection and Network Forensics
This course provides students both theoretical knowledge and hands-on techniques in identifying intrusion detection and network traffic analysis. The students will learn how to identify different attacks through different traceback techniques and grasp network analysis methods and tools to conduct information retrieve from a network forensic standing point. This course covers topics in network forensics, intrusion detection and response, malware forensics, case studies, and related topics in cyber law and ethics. This class assumes the students have basic knowledge in network, and linux/unix operating systems. The students are expected to complete several programming oriented team projects and present their results.

CISC6940 Cybersecurity for Critical Infrastructure
The course introduces cybersecurity principles and methods in critical infrastructures protection from a global viewpoint. Different from other cybersecurity courses, this course focuses on computer and security methods to protect large complex infrastructure services. This course covers topics in large-scale cybersecurity system design, implementation, and related standards in critical infrastructure protection. This course assumes students have prior knowledge in cybersecurity. Students are expected to finish large team projects, write research paper, and present their results.

CISC8500 Special Projects and Internships
Students will work in teams on large projects selected from practical problems in the public or private sector. Students also gain on-job experience by working as interns in the field of computer science and information technology.

Contact Us

Fordham Cybersecurity
Program Coordinator

Henry (Xiaoxu) Han, Ph.D.
xhan9@fordham.edu

Lincoln Center
Glen Redpath
212-636-7333
redpath@fordham.edu

FAQs
Download our Flyer



Site  | Directories
Submit Search Request