Fordham University            The Jesuit University of New York

Back to Degrees and Programs

MS Cybersecurity

Masters Degree
in Cybersecurity


The rapid expansion of cyberspace has also exposed its weaknesses, leaving it vulnerable to external intrusion

Fordham School of Professional and Continuing Studies will train you to be a cybersecurity specialist, positioning you as an expert who can bridge the gap between technological innovations and concurrent developments in cyberthreats.

  • 10-course, 30-credit master’s program, completed in 12 months
  • Designed for working professionals: Meet for one weekend a month, and take the rest of your courses online!
  • Offered at our easy-to-reach Lincoln Center campus in midtown Manhattan

Students in the program will:

  • receive a technology-based education using methods in computing and informational science, engineering, and social science;
  • learn from experienced professors and high-level professionals in the field, who will focus on theory as well as practice;
  • engage in in finding solutions to emerging global cyberthreats;
  • learn to turn data into actionable knowledge
  • become familiar with the field’s legal, ethical, and policy issues.

Cybersecurity is a fast-growing field with high-paying job opportunities:

  • Software developer
  • Systems engineer
  • Computer network architect
  • Intelligence analyst
  • Positions at the Department of Homeland Security, in areas such as cyber risk and strategic analysis, digital forensics, and intelligence

Courses and Degree Requirements
The Master of Science in Cybersecurity requires a total of ten courses of three credits each for a total of 30 credit hours.

Prerequisites for entry:
B.A. or B.S. in the disciplines of computer science, computer engineering, information science, or information technology. Professional knowledge or experience equivalent to the following four courses is required.

  • Equivalent to Applied Statistics (MATH1205)
    Course designed for students in fields that emphasize quantitative methods. It includes calculus based preliminary probability material followed by introduction to the basic statistical methods such as estimation, hypothesis testing, correlation and regression analysis. Illustrations are taken from a variety of fields. The course provides practical experience with statistical software.
  • Equivalent to Computer Science I (CISC1600)
  • CISC1600 covers introductory computer programming skills, problem solving, and algorithm development.
  • Equivalent to Information and Data Management (CISC2500)
    CISC2500 covers theory and techniques in data acquisition, data modeling, information retrieval, data visualization, GIS, web informatics and social networks.
  • Equivalent to Discrete Structures (CISC1400)
    CISC1400 covers introductory in discrete structures such as logic, set, sequence, recursion, relation, functions, graph, permutation and combination, and probability theory.

A list of courses is as follows.

  1. Foundational Courses (required four courses) 12 Credits
    CISC5650 Cybersecurity Essentials
    CISC5750 Information Security and Ethics(was 6900)
    CISC5850 The Social Network
    CISC5900 Information Fusion
  2. Specialization Courses (choose four courses) 12 Credits
    CISC5700 Data Mining
    CISC5850 The Social Network
    CISC6600 Secure Cybernetworks
    CISC6630 Wireless Security
    CISC6650 Forensic Computing
    CISC6680 Intrusion Detection and Network Forensics
    CISC6800 Malware Analytics and Software Security
    CISC6920 Incident Response and Risk Management
    CISC6940 Cybersecurity for Critical Infrastructure
  3. CISC8050 Projects and Interships 3 Credits
    Students currently working in the field will do a project while those who are not will have an internship.

Course Descriptions

CISC5650 Cybersecurity Essentials
This course provides a holistic perspective on the structure of the cyberspace ecosystem, the interoperability of the physical and social networks, and methods and techniques in building a functional cyberspace that is secure and sustainable. Topics include global networking and communication, data mining and information fusion, secure cybernetwork and intrusion detection, forensic computing and investigation, incident response and risk management, security and privacy, and policy and assurance issues. The course also features expert lectures and case-based projects on cybersecurity in several areas including healthcare, finance, media, government, defense, and critical infrastructure.

CISC5750 Information (Computer) Security and Ethics
The goal of this course is to give a comprehensive introduction to information security and its applications in addition to related ethics. It covers topics in cryptography, access control, network and operating system securities, software security, database security, cyberlaw and ethics. The students are assumed to have basic knowledge in programming and discrete structures.

CISC5850 The Social Network
This course is an introduction to social networks, which entail the structure, the function, and various applications. Topics include the Internet, information networks and the World-Wide Web, information retrieval and search engine optimization, social media analysis, crowd sourcing, social activity and voting, graph theory and social networks, network dynamics, text mining, natural language processing, and concept search. Emphasis will be on the social network itself.

CISC5900 Information Fusion
A study of the structure and function of information fusion. Efficient and effective combination of data or information from a variety of diverse sources, sensors, features, and decisions. Applications and case studies of information fusion and decision making to a plethora of disciplines including science and engineering, cybersecurity and digital networks, medicine and health, social choices and human cognition, business and finance, and management and innovation.

CISC6600 Secure Cybernetwork
This graduate course covers the essentials of designing and building a secure local area network, incorporating all elements of the seven layers of the ISO-OSI Model. Students will learn the capabilities, limitations, and vulnerabilities of a cybernetwork. Students will gain hands-on experience by implementing a secure network environment that is yes robust in preventing various adversary actions including, among others, extreme hacking and virus propagation.

CISC6630 Wireless Security
The goal of this course is to provide students a theoretical foundation and robust technical details in wireless security. It covers topics in wireless network basics, principles of wireless network attacks, wireless intrusion detection systems, deploying wireless networks, defense for securing wireless networks, malwares in wireless networks, Rogue wireless network detection, cloud-based wireless solutions, and related techniques. The students are assumed to have basic knowledge in information security and networks and required to do team projects and present their results in class.

CISC6650 Forensic Computing
Computing and digital technology has greatly transformed society and the way we live. Today, our world is filled with an array of complex multiprocessing and interconnected machines that we’ve all become accustomed to. This course studies technologies and practices for investigating the use, misuse and the adversarial potential of computing systems and digital devices. It will provide unparalleled insight into the digital forensics and legal world, emphasized with practical laboratory projects.

CISC6680 Intrusion Detection and Network Forensics
This course provides students both theoretical knowledge and hands-on techniques in identifying intrusion detection and network traffic analysis. The students will learn how to identify different attacks through different traceback techniques and grasp network analysis methods and tools to conduct information retrieve from a network forensic standing point. This course covers topics in network forensics, intrusion detection and response, malware forensics, case studies, and related topics in cyber law and ethics. This class assumes the students have basic knowledge in network, and linux/unix operating systems. The students are expected to complete several programming oriented team projects and present their results.

CISC6800 Malware Analytics and Software Security
This course is the introduction to the fields of the malware analytics and software security at the early graduate level. It covers one of the most important aspects of the cyber security - the software perspective of the issue. It approaches the issue from mainly two ends, namely analyzing malicious software, which is intended to compromise the security requirements, and the software development strategies and tactics to prevent vulnerability in the face of attacks. This course will have enough technical details in exemplary scenarios for the students to dissect real world problems, but the main purpose is to establish enough theoretical and background knowledge so that they know where to start an endeavor and how to make an effective investigation or design for new software security problems.

CISC6850 Leadership and Management in Cybersecurity
In the interconnected world of combined cyber-physical-natural cyberspace, big data can be an asset but also a liability for individuals and organizations. This course covers a variety of issues (including technological, economical, business, legal and ethical) to manage cyber-risk for individual citizens, government organizations, and business enterprises. Students will meet and work with global leaders in cybersecurity on projects related to best practices derived from experiences in the field.

CISC6920 Incident Response and Risk Management
The goal of this course is to provide students knowledge and hands-on forensic techniques in incident detection, analysis, response, and risk management. The course covers topics in incident handling procedures, forensic evidence collection techniques, forensic report writing, investigations in trademark and copyright infringement, corporate espionage, and related topics in cyber law and ethics. The students are assumed to have basic knowledge in Forensic computing. Students are expected to finish team projects, write research paper and present their results.

CISC6940 Cyber Security for Critical Infrastructure
The course introduces cyber security principles and methods in critical infrastructures protection from a global viewpoint. Different from other cyber security courses, this course focuses on computer and security methods to protect large complex infrastructure services. This course covers topics in large-scale cyber security system design, implementation, and related standards in critical infrastructure protection. This course assumes students have prior knowledge in cyber security. Students are expected to finish large team projects, write research paper, and present their results.

CISC8500 Special Projects and Internships
Students will work in teams on large projects selected from practical problems in the public or private sector. Students also gain on-job experience by working as interns in the field of computer science and information technology.

Contact Us

Program Coordinator
Henry (Xiaoxu) Han, Ph.D.

Lincoln Center
Glen Redpath



Site  | Directories
Submit Search Request