Internet-based attacks are all too commonplace today; they accomplish varied objectives, such as disrupting computer information networks; gaining unauthorized access to systems; realizing economic incentives by accessing credit card information; and making political statements. These attacks are launched by individuals, organizations, and states.
Politically-motivated attacks (cyber warfare) are used to disrupt, access, or conduct espionage. Cyber threats, cyber-attacks, cyber terrorism, and cyber warfare can have an adverse effect on public confidence, stock markets, economic/service sectors, and other national critical infrastructures. For example, one of these attacks may have the capacity to cripple our electric grid causing large-scale economic losses and public pandemonium. Our ability to prevent, detect, and eliminate such threats is critical to our national security.
The first half of the program provides a foundational treatment of network security, information assurance, cybercrime, and digital forensics. The second half of this program focuses on the issues, policies, practices, and perspectives of various sectors, critical infrastructures, agencies and disciplines, such as, national security, intelligence, criminal justice, and emergency management. The capstone course is a multi-disciplinary group project where individual participants represent different sectors, agencies, and disciplines.
In addition to the institutional and general education level learning objectives, this program seeks the following specific learning outcomes for its graduates:
- Analyze the national cyber threat landscape and cybersecurity challenges from both external entities and domestic sources.
- Examine the legal, social, regulatory, ethical, and technical issues related to securing information systems and national critical infrastructures.
- Compare and contrast the interdisciplinary policies, practices, perspectives and products required to address the cyber threats to our information systems and critical infrastructures.
- Appraise the methodologies for performing vulnerability assessment, risk mitigation, auditing, and certification of information systems and critical infrastructures.
- Categorize the cybersecurity related roles, responsibilities, and policies for managers of critical infrastructures, national security, corporate security, criminal justice, and intelligence/counter intelligence.
TOP Scholarships
Scholarship name | Award amount | Eligibility |
---|---|---|
- | - | - |
- | - | - |
- | - | - |
Key Resources for Your Study Abroad Journey
Course Guides
MA in USA: Fees 2023, Top Colleges, Placements & Salaries
Masters (MS) in USA: Colleges, Courses, Deadlines, Eligibility & Fees
Scholarship Grants & Financial Aids
Name | Scholarship Per Student | Level of Study | Type | |
---|---|---|---|---|
Fulbright-Nehru Masters Fellowships | Scholarship per studentVariable Amount | Level Of StudyDoctorate | TypeMerit-Based | |
1st Formations Business Scholarship | Scholarship per student₹ 68,528/Yr$800 | Level Of StudyBachelor | TypeMerit-Based | |
The Kay-Grant Group Scholarship | Scholarship per student₹ 85,660/Yr$1,000 | Level Of StudyBachelor | TypeMerit-Based | |
FINCAD Women in Finance Scholarship | Scholarship per student₹ 17.1 L/Yr$20,000 | Level Of StudyMaster | TypeMerit-Based | |
FormSwift Scholarship Program | Scholarship per student₹ 85,660/Yr$1,000 | Level Of StudyBachelor | TypeCompany-Sponsored | |
BrokerFish International student scholarship | Scholarship per student₹ 85,660/Yr$1,000 | Level Of StudyBachelor | TypeMerit-Based |
Similar Colleges


University at Albany


Northern State University


Abilene Christian University
.jpeg?h=143&mode=stretch)

Ohio Northern University


University of South Carolina


University of Akron


State University of New York Polytechnic Institute


University of New Mexico


Comments