Cybersecurity (M.S.)

Program Overview

Cybersecurity is one of the most difficult and pressing challenges facing our nation, and industry, the government, and higher education are underprepared to address this threat.  The M.S. in Cybersecurity will provide students with the expert knowledge and technologies needed to detect, investigate, and prevent computer-related crimes, and to examine the theory, best practices, and methodologies to conduct computer forensics investigations. There is a tremendous workforce shortage projected for well-prepared cyber professionals in New Jersey and the surrounding metro areas.  Students pursuing this degree will bring to the job a powerful combination of a traditional liberal arts education with foundational knowledge and technical training needed to excel in the cybersecurity field.

Curriculum Overview

The program allows students the flexibility to design a plan of study that meets their personal and professional needs.  Classes meet face-to-face, totally online, or a combination of the two. The curriculum teaches and reinforces skills in the foundational topics of data and software security, component and connection security, system and human security, as well as organizational and societal security.  Students successfully completing this program will:

  • Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
  • Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of cybersecurity.
  • Communicate effectively in a variety of professional contexts.
  • Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • Apply security principles and practices to maintain operations in the presence of risks and threats.
  • Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.

Degree Offered:

  • Master of Science in Cybersecurity

Contact

John Bochanski, Ph.D.
Associate Professor and Chair
Science Hall 204B
609-896-5184
jbochanski@rider.edu

Program Website:  Computer Science
Associated Department: Department of Computer Science and Physics

Related programs:

 

Requirements for the M.S. in Cybersecurity

(36 credtis)

Students must hold a Bachelor's degree in a related field (e.g. Computer Science, Computer Engineering, Cybersecurity, Computer Information Systems, Data Science), and must have completed an undergraduate course in Discrete Structures or Discrete Mathematics.

Required Courses24
Beyond Code: Cybersecurity in Context
Cryptography for Cybersecurity
Managing Cyber Risks
Mobile Computing and Wireless Security
Secure Coding for Cyber Defense
Cybercrime and Digital Forensics Analysis
Software Vulnerability and Malware Analysis
Cloud Computing Security and Privacy
Elective Courses9
Select three of the following:
Usable Privacy and Security
Special Topics in Cybersecurity
Blockchains and Cryptocurrencies
Critical Infrastructure Security
Disaster Management and Preparedness
Cyber War
Cybersecurity Capstone3
Select one of the following:
CYBR 690
CYBR 691
Total Credits36

Courses and Descriptions

CYBR 500 Beyond Code: Cybersecurity in Context 3 Credits

At its core, cybersecurity is a technical, computing-based discipline. This course explores the most important non-technical elements that shape the landscape upon which cybersecurity problems emerge and are managed. Students will assume different lenses — legal, economic, political, societal, and ethical — to better understand how different forces enable and constrain security technologies and policies. Specific topics include ethical and societal issues, policy-making, business models, legal frameworks, national security considerations, and the roles of users, industry, and government which includes the military.

CYBR 510 Cryptography for Cybersecurity 3 Credits

This course focuses on both mathematical foundations and practical applications of cryptography. The course discusses asymmetric and symmetric cryptography, Kerchkoff’s Principle, chosen and known plaintext attacks, public key infrastructure, authentication protocols. The course includes a close examination of various cryptosystems including the RSA, DES, AES, Elliptic Curve, and SHA family cryptosystems. Topics include a brief history of cryptography, ciphers, digital signatures, hash functions, message authentication codes, secure e-commerce, and digital cash.

Prerequisite(s): An undergraduate course in discrete structures (CSC 140) or discrete mathematics.

CYBR 520 Managing Cyber Risks 3 Credits

In the context of risk management, this course examines the motivating reasons behind cyber attacks and data breaches. Various risk management frameworks to measure organizational cybersecurity threats and vulnerabilities are presented. Further, students will model cybersecurity risks, using both qualitative and quantitative risk assessment methods. Students also will articulate the organizational consequences of the assessed risks along with mitigating strategies to reduce or eliminate the cyber risks.

CYBR 530 Mobile Computing and Wireless Security 3 Credits

This course examines the cybersecurity of mobile computing and wireless networking, especially the vulnerabilities, threats, and mitigation techniques. Topics include: mobile malware, wireless communications infrastructure vulnerabilities and associated mitigation techniques, mobile platform vulnerabilities and associated mitigation techniques, mobile app vulnerabilities and associated mitigation techniques, mobile device vulnerabilities and associated mitigation techniques, and organizational policies for mobile computing and wireless networking.

Prerequisite(s): CYBR 510.

CYBR 540 Secure Coding for Cyber Defense 3 Credits

This combined course of lecture and hands-on labs follows the philosophy and principles of secure and robust programming, using the Java language. The eight design principles that govern secure and robust coding will be emphasized with follow-on coding labs to apply these design methods to real-world problems. Design choices, good or bad, drive implementation in coding, so designing software security from the beginning will be practiced. Common software vulnerabilities and static analysis of code will be examined, as well as informal, formal, and ad hoc coding methods will be differentiated. Prior experience with the Java programming language is highly recommended.

CYBR 550 Cybercrime and Digital Forensics Analysis 3 Credits

Digital forensics is a hybrid science that offers a systematic approach for conducting comprehensive investigations to solve cybercrimes. In this course, students will learn the principles and techniques of digital forensics investigations to ensure court admissibility of electronic evidence, including the legal and ethical implications. Students also will also gain hands-on experience with performing proper forensic investigations with different file systems (e.g., Unix/Linux, Mac, Windows, Android) and writing appropriate forensics analysis reports.

CYBR 560 Usable Privacy and Security 3 Credits

There is growing recognition that technology alone cannot provide all of the solutions to security and privacy problems. Human factors play an important role, and it is important for security and privacy experts to have an understanding of how people might interact with the systems they develop. This course explores a variety of usability and user interface pitfalls related to privacy and security and provides experiences in designing studies aimed at helping to evaluate usability issues in security and privacy systems.

Prerequisite(s): CYBR 500.

CYBR 570 Special Topics in Cybersecurity 3 Credits

This course is used as a general placeholder for one time offerings and new courses that have not been assigned a permanent designation. The course will cover advanced and emerging topics of current interest in cybersecurity. This course code may be taken more than once as long as the topic offered is different each time.

Prerequisite(s): Permission of instructor.

CYBR 600 Software Vulnerability and Malware Analysis 3 Credits

This combined course of lecture and hands-on labs covers both the art and science of discovering software vulnerabilities and malware. Beginning with the foundational techniques used to analyze both source and binary code, this course will examine current threats and evaluate the actions needed to prevent attackers from taking advantage of both known and unknown vulnerabilities. The course will cover passive and active reverse engineering techniques in order to discover and categorize software vulnerabilities and malware, create workarounds to better secure the system, and demonstrate security solutions that provide protection from an adversary attempting to exploit the vulnerabilities. Techniques covered include the use of static analysis, dynamic reverse engineering tools, and fault injection to better understand and improve the security of software. Prior exposure to Intel assembly is helpful, though not required.

Prerequisite(s): CYBR 540.

CYBR 610 Cloud Computing Security and Privacy 3 Credits

This course focuses on the security and privacy issues in Cloud Computing. While the Cloud Computing paradigm gains in popularity, there are many unresolved cybersecurity issues related to confidentiality, integrity, and availability of data and computations involving the Cloud. This course examines Cloud Computing models and the associated risks, threats and vulnerabilities; focuses on sound architectural design for secure and private computing; and explores practical applications of cloud computing and the Internet of Things (IoT).

Prerequisite(s): CYBR 530.

CYBR 620 Blockchains and Cryptocurrencies 3 Credits

This combined Lecture-Lab course covers the mathematical, computational, and economic foundations of Blockchain technology, and exposes students to the societal and legal implications of a decentralized monetary system based on consensus. Students learn what cryptocurrencies are, why it is possible to make money using cryptocurrencies such as bitcoins, and why it is so volatile. Through hands-on practice with the bitcoin and Ethereum-based software platforms, students will program secure decentralized applications (Dapps), develop an understanding of cryptographic principles, and reexamine critical economic questions.

Prerequisite(s): CYBR 510.