What are the entrance requirements for the MS in Cybersecurity?
Please visit the program overview for detailed information on admission requirements.
Is the GRE test required for admission?
My previous degrees were not in computer science. Can I still apply?
Yes. You can apply to the Cybersecurity program if your background is not in computer science. An advisor will review your background and if you are eligible, you can be admitted conditionally. Conditionally admitted students will need to take a few computer science prerequisite courses.
What courses are required to complete the MS in Cybersecurity program?
How long will it take me to complete the Cybersecurity Master's degree?
To complete the cybersecurity program, you will need to finish 30 credits (10 courses). If you attend as a full-time student and take 3 courses per semester, you will complete the program within 2 years. If you attend as a part-time student and take 1 or 2 courses per semester, you will complete the program within 2-3 years.As stipulated in the university catalog, master students have 5 years to complete their degree requirements. Please visit the School of Engineering Bulletin for more details.
Is the program's curriculum flexible? Can I choose some courses outside the computer science department?
You can select elective courses that may be outside of the computer science department. However, you should talk with your advisor before enrolling in them to make sure you are on track to complete your required courses.
How many credits do I need to take to qualify as a full-time student?
Full-time: you have to take 9 credits (3 courses) per semester to qualify as a full-time student. Part-time: you can take 1 or 2 courses per semester to qualify as a part-time student.
I took certification courses in CISSP, CISA, CISM, CCNA, SCSA, SCNA, are they transferable?
No. Credit for certification courses in CISSP, CISA, CISM, CCNA, SCSA, SCNA are not transferable to this program.
Can I get NSA certificates upon completing the Cybersecurity, MS program?
NYU Tandon School of Engineering is one of nine graduate schools in the country to have the designation of National Centers of Academic Excellence (CAE) in Cyber Operations. The CAE-Cyber Operations program is intended to be a deeply technical, inter-disciplinary, higher education program firmly grounded in the computer science (CS), computer engineering (CE), and/or electrical engineering (EE) disciplines, with extensive opportunities for hands-on applications via labs/exercises. National Centers of Academic Excellence - Cyber Operations Students who wish to receive an acknowledgement that they have completed the NSA Cyber Operation Program must successfully complete the following courses:
3 Credits Penetration Testing and Vulnerability Analysis CS-GY 6573
This advanced course in computer and network security focuses on penetration testing and vulnerability analysis. It introduces methodologies, techniques and tools to analyze and identify vulnerabilities in stand-alone and networked applications.
Prerequisites: Graduate standing and CS-GY 6823
3 Credits Application Security CS-GY 9163
This course addresses the design and implementation of secure applications. Concentration is on writing software programs that make it difficult for intruders to exploit security holes. The course emphasizes writing secure distributed programs in Java. The security ramifications of class, field and method visibility are emphasized.
Prerequisite: Gradute standing
3 Credits Introduction to Operating Systems CS-GY 6233
This course introduces basic issues in operating systems. Topics: Threads, processes, concurrency, memory management, I/O Control and case studies.
Prerequisite: Graduate standing.
3 Credits Computer Networking CS-GY 6843
This course takes a top-down approach to computer networking. After an overview of computer networks and the Internet, the course covers the application layer, transport layer, network layer and link layers. Topics at the application layer include client-server architectures, P2P architectures, DNS and HTTP and Web applications. Topics at the transport layer include multiplexing, connectionless transport and UDP, principles or reliable data transfer, connection-oriented transport and TCP and TCP congestion control. Topics at the network layer include forwarding, router architecture, the IP protocol and routing protocols including OSPF and BGP. Topics at the link layer include multiple-access protocols, ALOHA, CSMA/CD, Ethernet, CSMA/CA, wireless 802.11 networks and linklayer switches. The course includes simple quantitative delay and throughput modeling, socket programming and network application development and Ethereal labs.
Prerequisite: Graduate standing and CS-UY 2134.
3 Credits Special Top: Telecom Network EL-GY 9383
The course covers selected topics of current interest in telecommunications and networking. (See departmental mailing for detailed description of each particular offering.)
Prerequisite: Specified when offered.
3 Credits Design and Analysis of Algorithms I CS-GY 6033
This course reviews basic data structures and mathematical tools. Topics: Data structures, priority queues, binary search trees, balanced search trees. Btrees. Algorithm design and analysis techniques illustrated in searching and sorting: heapsort, quicksort, sorting in linear time, medians and order statistics. Design and analysis techniques: dynamic programming, greedy algorithms. Graph algorithms: elementary graph algorithms (breadth first search, depth first search, topological sort, connected components, strongly connected components), minimum spanning tree, shortest path. String algorithms. Geometric algorithms. Linear programming. Brief introduction to NP completeness.
Prerequisites: Graduate Standing, CS-GY 5403 and CS-GY 6003.
3 Credits Information Systems Security Engineering and Management CS-GY 6803
This course presents a system and management view of information security: what it is, what drives the requirements for information security, how to integrate it into the systems-design process and life-cycle security management of information systems. A second goal is to cover basic federal policies on government information security and methodologies. Topics include information-security risk management, security policies, security in the systems-engineering process, laws related to information security and management of operational systems.
Prerequisite: Graduate standing and CS-UY 392 or equivalent: *Online version available.
3 Credits Network Security CS-GY 6823
This course begins by covering attacks and threats in computer networks, including network mapping, port scanning, sniffing, DoS, DDoS, reflection attacks, attacks on DNS and leveraging P2P deployments for attacks. The course continues with cryptography topics most relevant to secure networking protocols. Topics covered are block ciphers, stream ciphers, public key cryptography, RSA, Diffie Hellman, certification authorities, digital signatures and message integrity. After surveying basic cryptographic techniques, the course examines several secure networking protocols, including PGP, SSL, IPsec and wireless security protocols. The course examines operational security, including firewalls and intrusion-detection systems. Students read recent research papers on network security and participate in an important lab component that includes packet sniffing, network mapping, firewalls, SSL and IPsec.
Prerequisite: Graduate standing and EL-GY 5363:* Online version available.
3 Credits Information, Security and Privacy CS-GY 6813
This course introduces Information Systems Security and covers cryptography, capability and access control mechanisms, authentication models, security models, operating systems security, malicious code, security-policy formation and enforcement, vulnerability analysis, evaluating secure systems.
Prerequisite: Competency in Application Development in UNIX and Windows Environments, Graduate status. *Online version available.
3 Credits Applied Cryptography CS-GY 6903
This course examines Modern Cryptography from a both theoretical and applied perspective, with emphasis on “provable security” and “application case studies”. The course looks particularly at cryptographic primitives that are building blocks of various cryptographic applications. The course studies notions of security for a given cryptographic primitive, its various constructions and respective security analysis based on the security notion. The cryptographic primitives covered include pseudorandom functions, symmetric encryption (block ciphers), hash functions and random oracles, message authentication codes, asymmetric encryption, digital signatures and authenticated key exchange. The course covers how to build provably secure cryptographic protocols (e.g., secure message transmission, identification schemes, secure function evaluation, etc.), and various number-theoretic assumptions upon which cryptography is based. Also covered: implementation issues (e.g., key lengths, key management, standards, etc.) and, as application case studies, a number of real-life scenarios currently using solutions from modern cryptography.
Prerequisite: Graduate standing.
I have been admitted to the Computer Science, MS program at the school of Engineering. Can I transfer into the Cybersecurity, MS program?
Pending approval from the department, you may be able to transfer into the Cybersecurity, MS program. See Request to Change Major form here for more details.
I already have a master's degree in computer science and I am interested in Cybersecurity, MS program. Can I substitute classes I took for my computer science degree for the cybersecurity degree?
Sorry, but we do not allow substitutions from other programs. Pending approval from your academic advisor, you may qualify to take a more advanced course or elective in its place.
Can I complete the entire MS degree online?
Yes, you can complete the degree fully online. Almost all electives are offered online now.
Are there any upcoming information sessions or seminars I can attend?