How to Apply
Learn about the admissions process and requirements to apply.
Learn to safeguard business operations using cutting-edge technologies and innovative security processes. As part of the Rutgers Stackable Business Innovation Program (rSBI), the Cyber Security Concentration is stackable with the following master's programs: Master of Information Technology and Analytics, MBA
Recent years have witnessed widespread use of computers and their interconnecting networks. This demands additional computer security and privacy measures to protect the information and relevant systems. This concentration prepares the students to meet the new challenges in the world of increasing threats to computer security and privacy by providing them with an understanding of the various threats and countermeasures. Students will be trained in the principles underlying security and privacy and will also learn the fundamentals security and privacy models, mechanisms, and state-of-the-art technologies like blockchains.
You can take the course listed below as individual classes or as stackable courses towards the completion of a concentration.
This course prepares the students to meet the new challenges in the world of increasing threats to computer security by providing them with an understanding of the various threats and countermeasures. Specifically, students will learn the theoretical advancements in information security, state-of-the-art techniques, standards and best practices. Topics covered in this course include security policies, models and mechanisms for secrecy, integrity and availability; operating system models and mechanisms for mandatory and discretionary controls; and data models, concepts and mechanisms for database security. Basic cryptology and its applications; Security in computer networks and distributed systems; Identity threat; Control and prevention of viruses and other rogue programs.
This course provides students a basic understanding of Blockchain—the underlying technology on which Bitcoin, Etherum, and the Libra cryptocurrencies are based. Blockchain has found numerous applications in banking, health-care, supply chain, auditing systems, and even in the music industry and other creative disciplines. This class introduces the foundational knowledge from Cryptography and Distributed Computing necessary to understand in detail how Blockchain is formed and operates, and presents a selection from the most successful applications of Blockchain technologies. Importantly, during this class, the students will have the chance of working on a real distributed Blockchain systems developed in Python. By dissecting actual state-of-the-art code, analyzing and modifying it, students will obtain working knowledge of subjects that address the most subtle details of Blockchain technologies.
Given the ubiquity of data collection and analysis nowadays, the challenge is to enable the legitimate use of collected data without violating privacy. From the organizational perspective, enabling safe and secure use of owned data can lead to great value added and return on investment. This course enables students to analyze the legal and social aspects of privacy and explores potential tools, techniques and technologies that can enhance privacy. The course introduces students to the core issues surrounding privacy, security, data storage and analysis and the technologies that have been developed to address those issues.
The concentration and courses are offered by the Management Science & Information Systems Department
Sample Relevant Careers: Information Security and Risk Analyst, Security and Risk Assurance Director, Compliance Analyst, Information Technology Consultant, Chief Information Security Officer, Enterprise Architect