Degree Overview
- Delivery Format: on-campus
- Required Credits: 36
Program Details
The objective of the MS CSP – Cyber Defense option is to create leaders with strong communication and management skills in addition to the strong technical knowledge in security and privacy of computer systems, networks, and web applications. This option is designed for working professionals or students who already have acquired some professional experience.

What You Will Learn:
Cryptography and Security
- Understand the difference between the symmetric key and public key cryptography approaches.
- Select appropriate symmetric and public key cryptography protocols for a given application.
- Develop an efficient implementation of a cryptographic protocol based on a Discrete Logarithm Problem, RSA (Factoring) Problem or Elliptic Curve Discrete Logarithm Problem.
Security and Privacy in Computing
- Understand the various models to evaluate the security of computer systems.
- Interpret security guarantees and assess the level of security provided by a cryptographic protocol.
- Understand the various security goals for communication over an insecure network.
- Identify the appropriate types of cryptographic primitives that should be used to achieve each of these goals.
- Understand the advantages and limitations of using symmetric key versus public-key cryptography.
Network Protocols Security
- Identify the appropriate security primitives that should be used to achieve specific security goals for communication over insecure networks.
- Analyze the security of the main mechanisms used on the internet to secure communication between computer systems at various network layers, including physical, network, transport and application layers.
- Describe common attacks against wired and wireless network protocols using standard terminology, allowing them to communicate effectively with other security professionals.
Admissions & curriculum
Cybersecurity Salaries
Starting Salary, NJIT Average
Mid-Career Salary, National Average
The cybersecurity profession is projected to grow 36.5 percent by 2022.
Where do Cybersecurity and Privacy majors work?
- Information Security Analyst
- Technical Specialist
- Software Engineer
- Akkadian Labs
- Celgene Corp.
- Flashtalking Inc.
- Nokia (formerly Alcatel-lucent)
-
NJIT filled me with confidence and helped me to discover and assess my leadership style."Theresa Wagner -
NJIT was my dream school."Hilsson Angeles -
Getting a degree from a great school like NJIT gave me the opportunity to choose the job I wanted."Seif Issa
Contact Us
Need Help? We’re here to advise you.
Degree Overview
- Delivery Format: on-campus
- Required Credits: 30
Program Details
- Describe cybersecurity and privacy mechanisms, standards and state-of-the-art capabilities.
- Describe potential cyber attacks and the actors that might perform them, and apply cyber defense methods to prepare a system to repel attacks.
- Perform security review of applications, systems and infrastructure.
- Design and implement system, network and infrastructure-level solutions to ensure the security and privacy of communications and data against specific security threats, while understanding the trade-offs between security, usability and performance.
- Use standard security terminology to communicate effectively with other cybersecurity professionals.
- Understand the ethical and legal implications of cyber attacks.
What You Will Learn:
Cryptography and Security
-
Understand the difference between the symmetric key and public key cryptography approaches.
-
Select appropriate symmetric and public key cryptography protocols for a given application.
-
Develop an efficient implementation of a cryptographic protocol based on a Discrete Logarithm Problem, RSA (Factoring) Problem or Elliptic Curve Discrete Logarithm Problem.
Security and Privacy in Computing
-
Understand the various models to evaluate the security of computer systems.
-
Interpret security guarantees and assess the level of security provided by a cryptographic protocol.
-
Understand the various security goals for communication over an insecure network.
-
Identify the appropriate types of cryptographic primitives that should be used to achieve each of these goals.
-
Understand the advantages and limitations of using symmetric key versus public-key cryptography.
Network Protocols Security
-
Identify the appropriate security primitives that should be used to achieve specific security goals for communication over insecure networks.
-
Analyze the security of the main mechanisms used on the internet to secure communication between computer systems at various network layers, including physical, network, transport and application layers.
-
Describe common attacks against wired and wireless network protocols using standard terminology, allowing them to communicate effectively with other security professionals.
Admissions & curriculum
Cybersecurity Salaries
Starting Salary, NJIT Average
Mid-Career Salary, National Average
The cybersecurity profession is projected to grow 36.5 percent by 2022.
Where do Cybersecurity and Privacy majors work?
- Information Security Analyst
- Technical Specialist
- Software Engineer
- Akkadian Labs
- Celgene Corp.
- Flashtalking Inc.
- Nokia (formerly Alcatel-lucent)
-
NJIT filled me with confidence and helped me to discover and assess my leadership style."Theresa Wagner -
NJIT was my dream school."Hilsson Angeles -
Getting a degree from a great school like NJIT gave me the opportunity to choose the job I wanted."Seif Issa
-
Borcea, Cristian
- Professor
-
Curtmola, Reza
- Professor
-
Hamidli, Fuad
- Senior University Lecturer
-
Mani, Kumar
- Senior University Lecturer
-
Mili, Ali
- Professor
- Associate Dean for Academic Affairs
-
Neamtiu, Iulian
- Professor
-
Oria, Vincent
- Professor
-
Raza, Asad
- Senior University Lecturer
-
Rohloff, Kurt
- Affiliated Faculty
-
Sharma, Shantanu
- Assistant Professor
Contact Us
Need Help? We’re here to advise you.