Photos of university / #johnshopkinsu
What is Cybersecurity?
From power grids to wireless networks and the World Wide Web, cyberspace is all around us and permeates our daily lives. Keeping that space safe and secure – both against natural disasters and hackers – is an increasing concern. A world leader in teaching and research, the Johns Hopkins University’s Whiting School of Engineering provides students with the technical foundation and knowledge you will need to meet our nation’s growing demand for highly skilled information security professionals.
Why Hopkins?
Full-time graduate students can take advantage of the Master of Science in Security Informatics (MSSI) program, offered through the Johns Hopkins Information Security Institute (JHUISI). JHUISI is the university’s focal point for research and education in information security, assurance, and privacy, and is instrumental in homeland security efforts across Hopkins, including emergency health preparedness, bio-terrorism, and national defense.
Upon admission to the Master of Science in Security Informatics, a student is assigned a graduate advisor from the Information Security Institute who must approve the courses to be applied to the M.S.S.I. degree.
The Master of Science in Security Informatics program has a course requirement of a minimum of 10 courses, plus a capstone project including a report and presentation. Students must choose one of two tracks – Technology & Research Track or Policy & Management Track.
All courses supporting the M.S.S.I. are categorized as one of four areas of Technology, Policy, Health, and Management. Each course is further classified into Core, Elective or Foundational category.
The Technology & Research Track program of study must satisfy the following course distribution requirements:
- Five Technology courses: at least four Core Technology courses including at least one Core Technology course in Cryptography.
- Three Core Policy/Management/Health courses: at least one Core Policy course and one Core Management course.
- Two additional courses from Core or Elective Technology categories; or when deemed appropriate relative to a student’s background, interests, and goals AND with the prior approval of the faculty advisor and the institute, from other course areas.
The Policy & Management Track program of study must satisfy the following course distribution requirements:
- Three Technology courses: at least two Core Technology courses including at least one Core Technology course in Cryptography.
- Five Core/Foundational Policy/Health/Management courses: at least one course from each of Core Policy/Management/Health categories and at least one Foundational Management course.
- Two additional courses from Core/Elective Technology or Core/Foundational Policy/Management/Health categories; or when deemed appropriate relative to a student’s background, interests, and goals AND with the prior approval of the faculty advisor and the institute, from other course areas.
Project Requirement
The students register for EN.650.736/EN.650.737/EN.650.738 for the capstone project. These courses are not counted toward the 10-course requirement.
In general, the M.S.S.I. Capstone Project will include both technology and non-technology components, and will be conducted within a team-structured environment comprised of students and faculty mentors (plus external mentors if appropriate). These projects will generally be sponsored by government/industry partners and affiliates of the Information Security Institute, and can also be related to faculty research programs supported by grants and contracts. They should relate to real-world problems and exhibit both theoretical and practical significance. The project must be documented by a report and presentation, as well as other applicable deliverables including but not limited to system prototypes, utility libraries, experimental demonstrations, conference or journal submissions, and so on. It should follow the best practice of software engineering.
Students should actively initiate the project while communicating with the potential faculty mentor for technical issues and the faculty advisor for project management. They are expected to develop a project plan at the end of the second semester. The project is expected to have a proposal approved at the start of the third semester and be finished by the end of the third semester. A presentation will be scheduled when the project concludes. The faculty mentor should approve each milestone of the project with the faculty advisor being informed. When the project is completed with all the deliverables, the faculty advisor assigns a score upon the recommendation of the faculty mentor.
Additional Course Requirements
- All courses toward the degree requirement must be 400-level or above. Other courses can be used with the approval of the Institute.
- Courses not found on the area-specific lists can be used to meet area requirements with prior approval from the student’s advisor and the Institute.
- At most two independent study courses can be counted toward the course requirements.
- No courses with grades of P may be counted with the exception of independent study courses.
- At most two courses may be transferred from other institutions. The student’s faculty advisor and the director of Information Security Institute must approve such transfer courses.
- The overall grade point average of the courses counted towards the coursework requirements must be 3.00 or higher.
- At most two courses with grade less than B- may be counted towards the course work requirements. No courses with grade less than C- may be counted.
- A grade of D or F results in probation. A second D or F is cause for being dropped from the program.
JHUISI Courses
EN.650.401 | Introduction to Information Security | 3 |
EN.650.414 | Rights in Digital Age | 3.00 |
EN.650.424 | Network Security | 3.00 |
EN.650.431 | Ethical Hacking | 3.00 |
EN.650.432 | ||
EN.650.433 | Embedded Computer Systems | 3.00 |
EN.650.445 | Practical Cryptographic Systems | 3.00 |
EN.650.457 | Computer Forensics | 3.00 |
EN.650.458 | Introduction to Cryptography | 3.00 |
EN.650.460 | Software Vulnerability Analysis | 3.00 |
EN.650.461 | Cloud Computing Security | 3.00 |
EN.650.471 | Cryptography & Coding | 4.00 |
EN.650.621 | Critical Infrastructure Protection | 3.00 |
EN.650.633 | ||
EN.650.640 | Moral & Legal Foundations of Privacy | 3.00 |
EN.650.654 | Computer Intrusion Detection | 3.00 |
EN.650.655 | Implementing Effective Information Security Projects | 3.00 |
EN.650.657 | Advanced Computer Forensics | 3.00 |
EN.650.661 | Human Factors in Information Security | 3.00 |
EN.650.736 | Information Security Projects | 1.00 |
EN.650.737 | Information Security Projects | 1.00 |
EN.650.738 | Information Security Projects | 1.00 - 4.00 |
All courses supporting the M.S.S.I. are categorized as one of four areas of Technology, Policy, Health, and Management. Each course is further classified into Core, Elective or Foundational category.
- For seven-week course modules, e.g., several courses offered through the Whiting School of Engineering Center for Leadership Education (CLE), two of them count as one course of 3 credit hours.
- Two quarter-based courses, e.g., several courses of course numbers starting with ME from the School of Medicine Division of Health Sciences Informatics, are equivalent of one WSE course of 3 credit hours.
Core Technology Courses
EN.600.442 | Modern Cryptography | 3.00 |
EN.600.443 | Security & Privacy in Computing | 3.00 |
EN.600.642 | Advanced Topics in Cryptography | 3.00 |
EN.600.643 | Advanced Topics in Computer Security | 3.00 |
EN.650.401 | Introduction to Information Security | 3 |
EN.650.424 | Network Security | 3.00 |
EN.650.431 | Ethical Hacking | 3.00 |
EN.650.445 | Practical Cryptographic Systems | 3.00 |
EN.650.457 | Computer Forensics | 3.00 |
EN.650.458 | Introduction to Cryptography | 3.00 |
EN.650.460 | Software Vulnerability Analysis | 3.00 |
EN.650.461 | Cloud Computing Security | 3 |
EN.650.471 | Cryptography & Coding | 4.00 |
EN.650.654 | Computer Intrusion Detection | 3.00 |
EN.650.657 | Advanced Computer Forensics | 3.00 |
EN.650.661 | Human Factors in Information Security | 3.00 |
Elective Technology Courses
EN.600.450 | Network Embedded Systems & Sensor Networks | 3 |
EN.600.463 | Algorithms I | 3 |
EN.600.471 | Theory of Computation | 3.00 |
EN.650.433 | Embedded Computer Systems | 3.00 |
EN.650.621 | Critical Infrastructure Protection | 3.00 |
EN.650.840 | Information Security Independent Study | 3.00 |
Core Policy Courses
EN.650.414 | Rights in Digital Age | 3.00 |
EN.650.640 | Moral & Legal Foundations of Privacy | 3.00 |
EN.660.311 | Law and the Internet | 3 |
Core Health Courses
AS.280.340 | Fundamentals of Health Policy & Management | 3.00 |
School of Medicine courses ME.600.900, ME.600.901, ME.600.903, and ME.600.906 may be taken to fulfill core health course requirements. |
Core Management Courses
EN.650.653 | Financial Issues in Managing a Secure Operation | 3.00 |
EN.650.655 | Implementing Effective Information Security Projects | 3.00 |
Foundational Management Courses
EN.663.644 | Writing Articles and Technical Reports | 1.50 |
EN.663.645 | Improving Presentation Skills for Scientists and Engineers | 1.50 |
EN.663.660 | Managing People and Resolving Conflicts | 1.50 |
EN.663.670 | Project Management | 1.50 |
EN.663.671 | Leading Change | 1.50 |
EN.663.673 | Leading Teams in Virtual, International and Local Settings | 1.50 |
EN.663.674 | Fundamentals of Management | 1.50 |
Elective Policy/Health/Management Courses
The following are sample courses offered by the Bloomberg School of Public Health, the Carey Business School, and the Krieger School of Arts and Sciences.* | ||
PH.300.651 | Introduction to U.S. Healthcare System Policy | |
AS.406.665 | Art and Practice of Intelligence |
- Letters of Recommendation (2),
- GRE,
- TOEF/IELTS,
- Statement of Purpose,
- Transcripts
Want to improve your English level for admission?
Prepare for the program requirements with English Online by the British Council.
- ✔️ Flexible study schedule
- ✔️ Experienced teachers
- ✔️ Certificate upon completion
📘 Recommended for students with an IELTS level of 6.0 or below.