Degree Overview

  • Delivery Format: on-campus
  • Required Credits: 30

Program Details

  • Describe cybersecurity and privacy mechanisms, standards and state-of-the-art capabilities.
  • Describe potential cyber attacks and the actors that might perform them, and apply cyber defense methods to prepare a system to repel attacks.
  • Perform security review of applications, systems and infrastructure.
  • Design and implement system, network and infrastructure-level solutions to ensure the security and privacy of communications and data against specific security threats, while understanding the trade-offs between security, usability and performance.
  • Use standard security terminology to communicate effectively with other cybersecurity professionals.
  • Understand the ethical and legal implications of cyber attacks.

What You Will Learn:

Cryptography and Security

  • Understand the difference between the symmetric key and public key cryptography approaches.

  • Select appropriate symmetric and public key cryptography protocols for a given application.

  • Develop an efficient implementation of a cryptographic protocol based on a Discrete Logarithm Problem, RSA (Factoring) Problem or Elliptic Curve Discrete Logarithm Problem.



Security and Privacy in Computing

  • Understand the various models to evaluate the security of computer systems.

  • Interpret security guarantees and assess the level of security provided by a cryptographic protocol.

  • Understand the various security goals for communication over an insecure network.

  • Identify the appropriate types of cryptographic primitives that should be used to achieve each of these goals.

  • Understand the advantages and limitations of using symmetric key versus public-key cryptography.



Network Protocols Security

  • Identify the appropriate security primitives that should be used to achieve specific security goals for communication over insecure networks.

  • Analyze the security of the main mechanisms used on the internet to secure communication between computer systems at various network layers, including physical, network, transport and application layers.

  • Describe common attacks against wired and wireless network protocols using standard terminology, allowing them to communicate effectively with other security professionals.

Admissions & curriculum

Explore this area of study

Cybersecurity Salaries

$70,000

Starting Salary, NJIT Average

$94,500

Mid-Career Salary, National Average

The cybersecurity profession is projected to grow 36.5 percent by 2022.

Career Prospects

Where do Cybersecurity and Privacy majors work?

Common Job Titles
  • Information Security Analyst
  • Technical Specialist
  • Software Engineer
Top Employers
  • Akkadian Labs
  • Celgene Corp.
  • Flashtalking Inc.
  • Nokia (formerly Alcatel-lucent)
What our students are saying
  • Theresa  Wagner
    NJIT filled me with confidence and helped me to discover and assess my leadership style."
    Theresa Wagner
  • Seif Issa
    Getting a degree from a great school like NJIT gave me the opportunity to choose the job I wanted."
    Seif Issa
  • Hilsson Angeles
    NJIT was my dream school."
    Hilsson Angeles