Cyber Systems, M.S.

Put yourself at the intersection of informational technology and computer science. The hands-on exploration of information technology. The foundational theory of computer science. Cross the two and you’ll be at the exact spot where some of the most dynamic and challenging careers are to be found today.

Successful Career Paths

Our Cyber Security and Networks program prepares you for these careers with a combination of practical skills and cutting-edge knowledge, leading you to success as an Information Security Analyst, Digital Forensic Examiner, Network Engineer, or System Administrator — to name just a few of your possible career titles.

No Programming or IT Background? No Problem.

There are two versions to the program. One version is for those who already hold a bachelor’s degree in computer science or a closely related field, while the other is for those with no prior education in these areas. Those coming to the program without this education simply complete a set of four additional bridge courses on the topics of programming and computer systems. These will help you transition from your previous background to a level of readiness that enables you to successfully pursue the rest of the degree program.

Choose Your Electives — Choose Your Career Path

Thanks to an ever-evolving set of electives, you can focus on the area that most attracts you. These are the areas that currently show high demand in the field of cyber systems:

  • Cyber forensics — recovering evidence to support a criminal investigation
  • Cybersecurity — protecting a computing infrastructure in the face of continual security threats
  • Wireless networking — investigating the properties of the next generation of wireless infrastructures
  • Enterprise networking — designing, installing, configuring, and maintaining an enterprise infrastructure
A Serious Project Prepares You for the Real World of Cyber Systems

You will complete a substantial project that will demonstrate your level of expertise and professionalism so that you can hit the ground running when you land that coveted position in your chosen area. There are three ways to satisfy the project requirement: a thesis for which research would be done; taking a course in which a significant project occurs; or taking a separate course specifically dedicated to a project.

See More See Less

Events

Saturday, October 21, 2017

November 27 - December 1, 2017

What You'll Study

  • Cryptography and Data Security

    A survey of cryptographic concepts and algorithms and their application to data security. Techniques studied include private key cryptosystems, public key cryptosystems, and hash functions. Commonly used algorithms will also be studied, including DES, 3DES, IDEA, RSA, Diffie-Hellman, MD5, SHA, and DSS. Other algroithms examined will be those used to provide confidentiality, message authentication, key exchange, and digital signatures in applications such as client-server authentication, email security, and web security.

  • Small-Scale Digital Forensic Science

    The theoretical and practical foundations necessary for the investigation of small scale digital devices (SSDDs). SSDDs include mobile phones, smartphones, tablets and BlackBerry, and any device that could potentially fit in your pocket, and their respective operating systems such as Android and iOS. Topics include: bagging and tagging SSDDs, logical and physical acquisition of SSDDs, analysis of SSDDs, authentication of SSDD evidence, evidence reconstruction, the various operating systems on SSDDs, SSDD ontology, and application artifacts found on SSDDs.

  • Enterprise Network Administration/Windows

    Fundamentals of administration of a machine running versions of Microsoft Windows and its integration in a heterogeneous network. Topics include file system layouts and backups, user and group management using Active Directory, network services such as DNS, DHCP, file sharing, printing, email including Exchange server, ftp and web services using IIS, databases, and general security issues including protection through security suites and intrusion detection systems. Integration with Unix systems using Samba, Services For Unix and virtual machines. Students will set up a network of machines using these principles.

  • Script Programming for Network Administration

    Concepts and details of writing small programs in Python for the Unix and Window-Server operating systems. Security issues in shell scripts, batch file programming, Python scripts, and C programming. Students will write scripts to control network system resources.

  • Full List of Courses for Cyber Systems, M.S.

    The University of New Haven offers a wide variety of in-depth courses that create a transformational educational experience for our students. To view the complete list of courses you'll take while pursuing a Masters of Science in Cyber Systems, check out the Academic Catalog:

    Cyber Systems, M.S.

Learn from professors who are dedicated to your success.

Our faculty are leaders and innovators in their fields, bringing both deep professional experience and academic rigor to the classroom.

Next Steps

  • Admission Requirements

    An advanced degree from the University of New Haven will help you take your career to the next level. Each program offers convenient scheduling, personalized attention, and state-of-the-art facilities.

    Graduate Admissions

  • Financial Aid Opportunities

    The University of New Haven Graduate School is an excellent value with reasonable tuition. Of course, you will still have bills to pay and the Financial Aid office can help.

    Learn More