Security Informatics

Study mode:On campus Study type:Full-time Languages: English
Local:$ 68.7 k / Year(s) Foreign:$ 68.7 k / Year(s) Deadline: Sep 15, 2024
12 place StudyQA ranking:1850 Duration:

Photos of university / #johnshopkinsu

What is Cybersecurity?

From power grids to wireless networks and the World Wide Web, cyberspace is all around us and permeates our daily lives. Keeping that space safe and secure – both against natural disasters and hackers – is an increasing concern. A world leader in teaching and research, the Johns Hopkins University’s Whiting School of Engineering provides students with the technical foundation and knowledge you will need to meet our nation’s growing demand for highly skilled information security professionals.

Why Hopkins?

Full-time graduate students can take advantage of the Master of Science in Security Informatics (MSSI) program, offered through the Johns Hopkins Information Security Institute (JHUISI). JHUISI is the university’s focal point for research and education in information security, assurance, and privacy, and is instrumental in homeland security efforts across Hopkins, including emergency health preparedness, bio-terrorism, and national defense.

Upon admission to the Master of Science in Security Informatics, a student is assigned a graduate advisor from the Information Security Institute who must approve the courses to be applied to the M.S.S.I. degree.

The Master of Science in Security Informatics program has a course requirement of a minimum of 10 courses, plus a capstone project including a report and presentation. Students must choose one of two tracks – Technology & Research Track or Policy & Management Track.

All courses supporting the M.S.S.I. are categorized as one of four areas of Technology, Policy, Health, and Management. Each course is further classified into Core, Elective or Foundational category.

The Technology & Research Track program of study must satisfy the following course distribution requirements:

  • Five Technology courses: at least four Core Technology courses including at least one Core Technology course in Cryptography.
  • Three Core Policy/Management/Health courses: at least one Core Policy course and one Core Management course.
  • Two additional courses from Core or Elective Technology categories; or when deemed appropriate relative to a student’s background, interests, and goals AND with the prior approval of the faculty advisor and the institute, from other course areas.

 

The Policy & Management Track program of study must satisfy the following course distribution requirements:

  • Three Technology courses: at least two Core Technology courses including at least one Core Technology course in Cryptography.
  • Five Core/Foundational Policy/Health/Management courses: at least one course from each of Core Policy/Management/Health categories and at least one Foundational Management course.
  • Two additional courses from Core/Elective Technology or Core/Foundational Policy/Management/Health categories; or when deemed appropriate relative to a student’s background, interests, and goals AND with the prior approval of the faculty advisor and the institute, from other course areas.

Project Requirement

The students register for EN.650.736/EN.650.737/EN.650.738 for the capstone project. These courses are not counted toward the 10-course requirement.

In general, the M.S.S.I. Capstone Project will include both technology and non-technology components, and will be conducted within a team-structured environment comprised of students and faculty mentors (plus external mentors if appropriate). These projects will generally be sponsored by government/industry partners and affiliates of the Information Security Institute, and can also be related to faculty research programs supported by grants and contracts. They should relate to real-world problems and exhibit both theoretical and practical significance. The project must be documented by a report and presentation, as well as other applicable deliverables including but not limited to system prototypes, utility libraries, experimental demonstrations, conference or journal submissions, and so on. It should follow the best practice of software engineering.

Students should actively initiate the project while communicating with the potential faculty mentor for technical issues and the faculty advisor for project management. They are expected to develop a project plan at the end of the second semester. The project is expected to have a proposal approved at the start of the third semester and be finished by the end of the third semester. A presentation will be scheduled when the project concludes. The faculty mentor should approve each milestone of the project with the faculty advisor being informed. When the project is completed with all the deliverables, the faculty advisor assigns a score upon the recommendation of the faculty mentor.

Additional Course Requirements

  • All courses toward the degree requirement must be 400-level or above. Other courses can be used with the approval of the Institute.
  • Courses not found on the area-specific lists can be used to meet area requirements with prior approval from the student’s advisor and the Institute.
  • At most two independent study courses can be counted toward the course requirements.
  • No courses with grades of P may be counted with the exception of independent study courses.
  • At most two courses may be transferred from other institutions. The student’s faculty advisor and the director of Information Security Institute must approve such transfer courses.
  • The overall grade point average of the courses counted towards the coursework requirements must be 3.00 or higher.
  • At most two courses with grade less than B- may be counted towards the course work requirements. No courses with grade less than C- may be counted.
  • A grade of D or F results in probation. A second D or F is cause for being dropped from the program.

JHUISI Courses

EN.650.401 Introduction to Information Security 3
EN.650.414 Rights in Digital Age 3.00
EN.650.424 Network Security 3.00
EN.650.431 Ethical Hacking 3.00
EN.650.432    
EN.650.433 Embedded Computer Systems 3.00
EN.650.445 Practical Cryptographic Systems 3.00
EN.650.457 Computer Forensics 3.00
EN.650.458 Introduction to Cryptography 3.00
EN.650.460 Software Vulnerability Analysis 3.00
EN.650.461 Cloud Computing Security 3.00
EN.650.471 Cryptography & Coding 4.00
EN.650.621 Critical Infrastructure Protection 3.00
EN.650.633    
EN.650.640 Moral & Legal Foundations of Privacy 3.00
EN.650.654 Computer Intrusion Detection 3.00
EN.650.655 Implementing Effective Information Security Projects 3.00
EN.650.657 Advanced Computer Forensics 3.00
EN.650.661 Human Factors in Information Security 3.00
EN.650.736 Information Security Projects 1.00
EN.650.737 Information Security Projects 1.00
EN.650.738 Information Security Projects 1.00 - 4.00

 

All courses supporting the M.S.S.I. are categorized as one of four areas of Technology, Policy, Health, and Management. Each course is further classified into Core, Elective or Foundational category.

  • For seven-week course modules, e.g., several courses offered through the Whiting School of Engineering Center for Leadership Education (CLE), two of them count as one course of 3 credit hours.
  • Two quarter-based courses, e.g., several courses of course numbers starting with ME from the School of Medicine Division of Health Sciences Informatics, are equivalent of one WSE course of 3 credit hours.

Core Technology Courses

EN.600.442 Modern Cryptography 3.00
EN.600.443 Security & Privacy in Computing 3.00
EN.600.642 Advanced Topics in Cryptography 3.00
EN.600.643 Advanced Topics in Computer Security 3.00
EN.650.401 Introduction to Information Security 3
EN.650.424 Network Security 3.00
EN.650.431 Ethical Hacking 3.00
EN.650.445 Practical Cryptographic Systems 3.00
EN.650.457 Computer Forensics 3.00
EN.650.458 Introduction to Cryptography 3.00
EN.650.460 Software Vulnerability Analysis 3.00
EN.650.461 Cloud Computing Security 3
EN.650.471 Cryptography & Coding 4.00
EN.650.654 Computer Intrusion Detection 3.00
EN.650.657 Advanced Computer Forensics 3.00
EN.650.661 Human Factors in Information Security 3.00

Elective Technology Courses

EN.600.450 Network Embedded Systems & Sensor Networks 3
EN.600.463 Algorithms I 3
EN.600.471 Theory of Computation 3.00
EN.650.433 Embedded Computer Systems 3.00
EN.650.621 Critical Infrastructure Protection 3.00
EN.650.840 Information Security Independent Study 3.00

Core Policy Courses

EN.650.414 Rights in Digital Age 3.00
EN.650.640 Moral & Legal Foundations of Privacy 3.00
EN.660.311 Law and the Internet 3

Core Health Courses

AS.280.340 Fundamentals of Health Policy & Management 3.00
School of Medicine courses ME.600.900, ME.600.901, ME.600.903, and ME.600.906 may be taken to fulfill core health course requirements.  

Core Management Courses

EN.650.653 Financial Issues in Managing a Secure Operation 3.00
EN.650.655 Implementing Effective Information Security Projects 3.00

Foundational Management Courses

EN.663.644 Writing Articles and Technical Reports 1.50
EN.663.645 Improving Presentation Skills for Scientists and Engineers 1.50
EN.663.660 Managing People and Resolving Conflicts 1.50
EN.663.670 Project Management 1.50
EN.663.671 Leading Change 1.50
EN.663.673 Leading Teams in Virtual, International and Local Settings 1.50
EN.663.674 Fundamentals of Management 1.50

Elective Policy/Health/Management Courses

The following are sample courses offered by the Bloomberg School of Public Health, the Carey Business School, and the Krieger School of Arts and Sciences.*  
PH.300.651 Introduction to U.S. Healthcare System Policy  
AS.406.665 Art and Practice of Intelligence
  • Letters of Recommendation (2),
  • GRE,
  • TOEF/IELTS,
  • Statement of Purpose,
  • Transcripts
Similar programs:
Study mode:On campus Languages: English
Foreign:$ 27.9 k / Year(s)
Deadline: Feb 1, 2025 38 place StudyQA ranking: 2968
Study mode:On campus Languages: English
Local:$ 68.8 k / Year(s) Foreign:$ 68.8 k / Year(s)
Deadline: Jan 10, 2025 28 place StudyQA ranking: 6210