Successful Career Paths
Our Cybersecurity and Networks program prepares you for these careers with a combination of practical skills and cutting-edge knowledge, leading you to success as an Information Security Analyst, Digital Forensic Examiner, Network Engineer, or System Administrator — to name just a few of your possible career titles.
No Programming or IT Background? No Problem.
There are two versions to the program. One version is for those who already hold a bachelor’s degree in computer science or a closely related field, while the other is for those with no prior education in these areas. Those coming to the program without this education simply complete a set of four additional bridge courses on the topics of programming and computer systems. These will help you transition from your previous background to a level of readiness that enables you to successfully pursue the rest of the degree program.
Choose Your Electives — Choose Your Career Path
Thanks to an ever-evolving set of electives, you can focus on the area that most attracts you. These are the areas that currently show high demand in the field of Cybersecurity and Networks:
- Cyber forensics — recovering evidence to support a criminal investigation
- Cybersecurity — protecting a computing infrastructure in the face of continual security threats
- Wireless networking — investigating the properties of the next generation of wireless infrastructures
- Enterprise networking — designing, installing, configuring, and maintaining an enterprise infrastructure
A Serious Project Prepares You for the Real World of Cybersecurity and Networks
You will complete a substantial project that will demonstrate your level of expertise and professionalism so that you can hit the ground running when you land that coveted position in your chosen area. There are three ways to satisfy the project requirement: a thesis for which research would be done; taking a course in which a significant project occurs; or taking a separate course specifically dedicated to a project.
Learn from professors who are dedicated to your success.
Our faculty are leaders and innovators in their fields, bringing both deep professional experience and academic rigor to the classroom.
Nationally Recognized Center for Career Development
All University of New Haven students have access to the many resources available through the University’s Career Development Center, which has been named one of the best in the nation by The Princeton Review.
From career assessments, networking, and job shadowing to on-campus interviews and salary negotiation, the Career Development Center provides the skills and connections to identify a meaningful career and an opportunity to pursue your passion.Learn More
A survey of cryptographic concepts and algorithms and their application to data security. Techniques studied include private key cryptosystems, public key cryptosystems, and hash functions. Commonly used algorithms will also be studied, including DES, 3DES, IDEA, RSA, Diffie-Hellman, MD5, SHA, and DSS. Other algroithms examined will be those used to provide confidentiality, message authentication, key exchange, and digital signatures in applications such as client-server authentication, email security, and web security.
The theoretical and practical foundations necessary for the investigation of small scale digital devices (SSDDs). SSDDs include mobile phones, smartphones, tablets and BlackBerry, and any device that could potentially fit in your pocket, and their respective operating systems such as Android and iOS. Topics include: bagging and tagging SSDDs, logical and physical acquisition of SSDDs, analysis of SSDDs, authentication of SSDD evidence, evidence reconstruction, the various operating systems on SSDDs, SSDD ontology, and application artifacts found on SSDDs.
Fundamentals of administration of a machine running versions of Microsoft Windows and its integration in a heterogeneous network. Topics include file system layouts and backups, user and group management using Active Directory, network services such as DNS, DHCP, file sharing, printing, email including Exchange server, ftp and web services using IIS, databases, and general security issues including protection through security suites and intrusion detection systems. Integration with Unix systems using Samba, Services For Unix and virtual machines. Students will set up a network of machines using these principles.
Concepts and details of writing small programs in Python for the Unix and Window-Server operating systems. Security issues in shell scripts, batch file programming, Python scripts, and C programming. Students will write scripts to control network system resources.
The University of New Haven offers a wide variety of in-depth courses that create a transformational educational experience for our students. To view the complete list of courses you'll take while pursuing a Masters of Science in Cybersecurity and Networks, check out the Academic Catalog:
Please note: This program recently changed its name from "Cyber Systems." The name change will be reflected in the 2018-2019 edition of the Academic Catalog.
Learn More In Person
March 19 - 23, 2018
- Discover Graduate Week 8:00 a.m.-5:00 p.m.
An advanced degree from the University of New Haven will help you take your career to the next level. Each program offers convenient scheduling, personalized attention, and state-of-the-art facilities.
The University of New Haven Graduate School is an excellent value with reasonable tuition. Of course, you will still have bills to pay and the Financial Aid office can help.