Successful Career Paths
Our Cyber Security and Networks program prepares you for these careers with a combination of practical skills and cutting-edge knowledge, leading you to success as an Information Security Analyst, Digital Forensic Examiner, Network Engineer, or System Administrator — to name just a few of your possible career titles.
No Programming or IT Background? No Problem.
There are two versions to the program. One version is for those who already hold a bachelor’s degree in computer science or a closely related field, while the other is for those with no prior education in these areas. Those coming to the program without this education simply complete a set of four additional bridge courses on the topics of programming and computer systems. These will help you transition from your previous background to a level of readiness that enables you to successfully pursue the rest of the degree program.
Choose Your Electives — Choose Your Career Path
Thanks to an ever-evolving set of electives, you can focus on the area that most attracts you. These are the areas that currently show high demand in the field of cyber systems:
- Cyber forensics — recovering evidence to support a criminal investigation
- Cybersecurity — protecting a computing infrastructure in the face of continual security threats
- Wireless networking — investigating the properties of the next generation of wireless infrastructures
- Enterprise networking — designing, installing, configuring, and maintaining an enterprise infrastructure
A Serious Project Prepares You for the Real World of Cyber Systems
You will complete a substantial project that will demonstrate your level of expertise and professionalism so that you can hit the ground running when you land that coveted position in your chosen area. There are three ways to satisfy the project requirement: a thesis for which research would be done; taking a course in which a significant project occurs; or taking a separate course specifically dedicated to a project.
Upcoming Graduate School Events
There are a variety of opportunities for you to learn more about our master’s degree programs, what it is like to be a student here, and the scholarships, assistantships and financial aid that we offer. Whether you want to meet us on campus or online, we have something for you.
Want to set up a personal visit? We're happy to help.
A survey of cryptographic concepts and algorithms and their application to data security. Techniques studied include private key cryptosystems, public key cryptosystems, and hash functions. Commonly used algorithms will also be studied, including DES, 3DES, IDEA, RSA, Diffie-Hellman, MD5, SHA, and DSS. Other algroithms examined will be those used to provide confidentiality, message authentication, key exchange, and digital signatures in applications such as client-server authentication, email security, and web security.
The theoretical and practical foundations necessary for the investigation of small scale digital devices (SSDDs). SSDDs include mobile phones, smartphones, tablets and BlackBerry, and any device that could potentially fit in your pocket, and their respective operating systems such as Android and iOS. Topics include: bagging and tagging SSDDs, logical and physical acquisition of SSDDs, analysis of SSDDs, authentication of SSDD evidence, evidence reconstruction, the various operating systems on SSDDs, SSDD ontology, and application artifacts found on SSDDs.
Fundamentals of administration of a machine running versions of Microsoft Windows and its integration in a heterogeneous network. Topics include file system layouts and backups, user and group management using Active Directory, network services such as DNS, DHCP, file sharing, printing, email including Exchange server, ftp and web services using IIS, databases, and general security issues including protection through security suites and intrusion detection systems. Integration with Unix systems using Samba, Services For Unix and virtual machines. Students will set up a network of machines using these principles.
Concepts and details of writing small programs in Python for the Unix and Window-Server operating systems. Security issues in shell scripts, batch file programming, Python scripts, and C programming. Students will write scripts to control network system resources.
The University of New Haven offers a wide variety of in-depth courses that create a transformational educational experience for our students. To view the complete list of courses you'll take while pursuing a Masters of Science in Cyber Systems, check out the Academic Catalog:
Learn from professors who are dedicated to your success.
Our faculty are leaders and innovators in their fields, bringing both deep professional experience and academic rigor to the classroom.
An advanced degree from the University of New Haven will help you take your career to the next level. Each program offers convenient scheduling, personalized attention, and state-of-the-art facilities.
The University of New Haven Graduate School is an excellent value with reasonable tuition. Of course, you will still have bills to pay and the Financial Aid office can help.