Security Analyst
Summary
The objective of the MS CSP – Cyber Defense option is to create leaders with strong communication and management skills in addition to the strong technical knowledge in security and privacy of computer systems, networks, and web applications. This option is designed for working professionals or students who already have acquired some professional experience.

Cryptography and Security
- Understand the difference between the symmetric key and public key cryptography approaches.
- Select appropriate symmetric and public key cryptography protocols for a given application.
- Develop an efficient implementation of a cryptographic protocol based on a Discrete Logarithm Problem, RSA (Factoring) Problem or Elliptic Curve Discrete Logarithm Problem.
Security and Privacy in Computing
- Understand the various models to evaluate the security of computer systems.
- Interpret security guarantees and assess the level of security provided by a cryptographic protocol.
- Understand the various security goals for communication over an insecure network.
- Identify the appropriate types of cryptographic primitives that should be used to achieve each of these goals.
- Understand the advantages and limitations of using symmetric key versus public-key cryptography.
Network Protocols Security
- Identify the appropriate security primitives that should be used to achieve specific security goals for communication over insecure networks.
- Analyze the security of the main mechanisms used on the internet to secure communication between computer systems at various network layers, including physical, network, transport and application layers.
- Describe common attacks against wired and wireless network protocols using standard terminology, allowing them to communicate effectively with other security professionals.
|
36
|
Required Credits |
View the Curriculum
Course listing and prerequisitesCore Faculty
Advisement
Where do Cybersecurity and Privacy majors work?
Common Job Titles
- IT Auditor
- Cybersecurity Architect/Consultant
- Cybercrime Investigator
- Information Security Manager
- Cybersecurity Engineer
Top Employers
- Bank of America
- Cisco
- Prudential Financial
- ADP
Take the next step in your journey.
Get information on program requirements, tuition, financial assistance and more.
Request InfoWhere do majors work?
Common Job Titles
Top Employers
Meet some students
The Honors College has had a tremendous impact on my college experience.
Robert Gidia
Class of 2017
NJIT provided me with a well-rounded education in game development.
Robert Gioia
Class of 2017
After graduation, I am headed to Merck & Co. for a 2 ½ year rotational program in IT.
Jake Ponulak
Class of 2019
Want more? Visit us at an on-campus event.
Learn MoreRelated Majors
Explore all the degrees you can earn at NJIT
Explore NowSummary
A graduating student is:
-
Prepared to work as a computing professional utilizing the knowledge acquired in the undergraduate program in Information Technology at NJIT.
-
Prepared to be both professionally and socially engaged in the computing profession.
-
Prepared for life-long learning and continuing professional development and training in Information Technology.
A graduating student will have the ability to:
-
Apply knowledge of computing and mathematics appropriate to the discipline.
-
Analyze a problem, and identify and define the computing requirements appropriate to its solution.
-
Design, implement and evaluate a computer-based system, process, component or program to meet desired needs.
-
Function effectively on teams to accomplish a common goal.
-
Communicate effectively with a range of audiences.
-
Analyze the local and global impact of computing on individuals, organizations and society.
-
Recognize the need for and an ability to engage in continuing professional development.
-
Use current techniques, skills and tools necessary for computing practice.
-
Use and apply current technical concepts and practices in the core information technologies.
-
Identify and analyze user needs and take them into account in the selection, creation, evaluation and administration of computer-based systems.
-
Integrate IT-based solutions into the user environment.
-
Understand best practices and standards and their application.
-
Assist in the creation of an effective project plan.
|
129
|
Required Credits |
Business & Information Systems
Computer Science