Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Prepare for

What’s Next
in Cybersecurity
Online Master of Engineering in
Cybersecurity Analytics

onlinecybersecurity.seas.gwu.edu
Cybersecurity is all about
the details. It’s those small
Protect Against
abnormalities in network traffic, the Next Generation
for example, that might signal that
an advanced persistent threat is
underway. The GW cybersecurity
of Cyberthreat
analytics program empowers
graduates with data analytics skills
within the context of cybersecurity,
The Master of Engineering in Cybersecurity Analytics
so they can protect against
program at GW provides students the opportunity to
common types of attacks while develop the technical skills needed to identify threats,
also preparing for the threats that create strategic response plans and develop proactive
don’t yet have a proven detection cybersecurity solutions.
and response strategy.”
The program not only prepares graduates for the current challenges
in the field, but also helps them prepare for addressing even greater
— John P. Sahlin, Ph.D.,
imminent cyberthreats.
Professorial Lecturer in Engineering
Master of Engineering in Cybersecurity Analytics
The online Master of Engineering in Cybersecurity Analytics offers practical experience
using cybersecurity and data analytics tools to identify and mitigate damage from an array
of cyberthreats. The curriculum comprehensively covers traditional methods for intrusion
detection and assessing information security risks as well as new approaches such as
semantic analysis of open-source intelligence (e.g., social media).

The program is designed to provide the foundational technical skills needed to excel in a
cybersecurity career, therefore it is accessible to those who are looking to enter the field.
At the same time, experienced professionals will benefit from the chance to network with
GW’s experienced faculty, share their knowledge with each other and further refine their
expertise through practical exercises.

76% of employers say they have


trouble finding cybersecurity talent.
Source: Stott and May’s 2020 Cybersecurity in Focus report

Program Learning Objectives


The cybersecurity analytics master’s degree has been designed with the following learning
objectives in mind:

• Lead organizations in cybersecurity, • Identify and defend against emergent


data analytics and forensics and advanced persistent threats

• Conduct vulnerability assessment of • Demonstrate technological proficiency


network applications and operating in secure system/hardware design and
systems cyber resilience

• Master fundamentals in upcoming • Understand the key security


issues in hardware security and components of cloud computing
address system security holistically

• Become proficient in developing


resilient and defendable networks and
emerging IT systems
Curriculum
The Master of Engineering in EMSE 6540 Information Security EMSE 6767 Applied Data Analytics
Development and management of effective Applied and practical data analytics. High-
Cybersecurity Analytics is an
security systems. Includes information, personnel level theory, with primary focus on practical
interdisciplinary program that draws and physical security. Emphasis on risk analysis application of a broad set of statistical
courses from departments across SEAS: for information protection. techniques needed to support an empirical
foundation for systems engineering and
computer science, electrical and computer
EMSE 6544 Auditing, Monitoring and engineering management. A variety of practical
engineering, engineering management Intrusion Detection for Information Security visualization and statistical analysis techniques.
and systems engineering. The purpose Managers Leveraging Minitab and Excel to examine raw
Methods for detecting problems with data to arrive at insightful conclusions.
of the M.Eng in Cybersecurity Analytics
unauthorized activity in information systems and
degree is to address technical challenges regulatory frameworks governing such activities management challenges associated with those SEAS 6014 Introduction to Software and
in the rapidly changing field of within different industry sectors are explored activities. Prerequisite: EMSE 6540 Hardware Security
in detail. Methods and standards for extraction Students will learn the fundamental principles
cybersecurity.
and preservation of legal evidence, uncovering EMSE 6547 Cyber Resilience of designing secure software and hardware
illicit activities, recovering information left on Resilience planning for cybersecurity; assessment systems and the range of attacks that seek to
In this program, students will explore hard drives and extracting files from intentionally and modeling approaches to limit system failure compromise them. The course will provide an
damaged media are also covered. toward creating a cyber-resilient organization; overview of computer architecture and present
topics related to protecting critical
recognition, resistance, recovery, reinstatement attacks targeting the hardware, operating system
infrastructure including secure systems CSCI 6016 Applied Network Defense from the perspectives of information and application layers. Students will learn how
and hardware design, cyber resilience, Apply theory and practice of computer security, technologists and engineering managers; decisions in computer architecture design can
focusing specifically on the protection aspects existing cybersecurity reliance frameworks; lead to vulnerabilities such as cache exploits or
intrusion detection and defensive
of the Internet. It reviews cryptographic tools to potential policies to sustain a healthy and robust side channels; how operating systems seek to
cybersecurity operations. provide security, such as shared key encryption security posture. provide secure isolation between applications;
(DES, 3DES, RC and more), public key how applications can be compromised through
encryption, key exchange and digital signature EMSE 6560 Open-Source Intelligence Analysis malicious attacks; and include case studies
This program is designed for students with
(Diffie-Hellmann, RSA, DSS and more). It then Analyzing social media and other publicly showing how mobile devices and the Internet of
a technical background but is accessible to reviews how these tools are utilized within the available data sources can provide a wealth of Things pose new security challenges.
those with relevant nontechnical degrees internet protocols and applications like SSL/ data that can be used to identify and evaluate
TLS, IPSEC, Kerberos and more (including threats to an organization’s information assets. SEAS 6410 Security Data Visualization
as well.
wireless). By leveraging case studies and reading The challenge of using social media and other The main goal of this course is to help students
seminal research papers, students will learn public sources is filtering the useful information learn, understand and practice the visualization

Required Courses about network attacks and vulnerabilities as


well as current defenses. Topics covered include
from the noise. Students will use data analytics
tools and develop decision support frameworks
aspect of security data, which includes the study
of data analytics and scaling up information
CSCI 6015 Cyber Forensics cryptography, confidentiality and authentication to identify threats, evaluate capability of actors security, security metrics and security monitoring
Covers basic and advanced concepts in the protocols, botnets, firewalls, intrusion detection to exploit vulnerabilities and evaluate the risk of techniques focusing on industry applications.
field of cyber forensics, which is concerned with systems, and communication privacy and damage those actors can do to an organization. It also covers the fundamentals of security data
acquiring, preserving and analyzing digitally anonymity. This course also covers offensive While each individual data source may not visualization and exploratory data analysis and
stored information while ensuring that this and defensive information warfare operations, provide actionable intelligence, compiling provides guidelines on information security data
information is admissible as evidence in a court simulation of various attacks on and defenses of data across multiple sources can reveal critical visualization and insights with data dashboards.
of law. Principles and techniques for cyber computer systems, laws related to information indications of intent and capability of potential Furthermore, it introduces valuable tools
forensics investigations are explored using warfare, and history and literature related to threats. This course provides an overview of to empower students to create an effective
industry-standard forensic tools, techniques information warfare attacks. publicly available data sources and strategies visual image of security data and prepare
and procedures in the digital forensic process. Prerequisite: SEAS 6014 for mining and aggregating data across multiple security data for using the latest techniques in
Also covers the societal and legal impact of sources to build a comprehensive profile of Information Technology (IT) data analytics fields
computer activities including computer crime, ECE 6132 Secure Cloud Computing threat sources and develop an action plan to and extracting features from security data sets.
intellectual property theft, privacy issues and Security and privacy issues in cloud computing defend against these threats. Prerequisite: EMSE 6767
legal ramifications. Covers special rules of systems. Confidentiality, integrity and availability
evidence that apply to cybercrime investigations of data and computations. Examination of cloud
including chain of custody, search and seizure, computing models, threat models, outsourcing
forensic imaging. In addition to the incident- and security issues. Practical applications of
handling process, relevant state, federal and/or secure cloud computing.
Admissions
The Master of Engineering in Cybersecurity Analytics is designed to be accessible to Application Materials
both technical and non-technical professionals. Once enrolled, an advisor will create a
plan of study that best suits students’ needs and gives them the opportunity to hone To accelerate our review of your application, order your official transcripts and prepare
their skills and maximizes their ability to succeed in the program. all other materials for submission simultaneously with your application. All supplemental
materials must be received by the admissions office prior to the application deadline,
As a result, it is open to professionals without a technical undergraduate degree; otherwise the file will be rejected as incomplete.
however, applicants without a STEM undergraduate background should showcase
their interest in cybersecurity and aptitude for technical subject matter through their Complete application packets include:
other application materials. • Completed Application: There is no application fee for this program. When
completing the application form, you will also need to upload your resume and
statement of purpose.
Admissions Requirements • An Up-to-Date Resume or CV: This can be submitted to onlinecybersec@gwu.edu.
• Statement of Purpose: In 250 words or less, state your purpose in undertaking
• Bachelor’s degree from an accredited institution in one of the following fields: graduate study at the George Washington University. Describe your academic
engineering, computer science, physical sciences, mathematics, economics, objectives, research interests and career plans; present your related qualifications
business administration or another relevant non-technical discipline. including collegiate, professional and community activities and any other
substantial accomplishments not previously mentioned.
• Minimum GPA of B- (2.7 on a 4.0 scale) or higher. Applicants with less than a 2.7
GPA are welcome to apply and may be accepted conditionally based on a holistic • Official Transcripts: Official transcripts are required from all institutions attended to
review of application materials. complete the application packet. More information on transcript requirements can be
found on the transcript policy page.
• Work experience in an IT field for those who do not hold a degree in a
technical discipline • Letters of Recommendation: Three letters of recommendation are required for
admission. At least two of these letters must come from a professional reference.
• Prerequisites: at least one course in college-level calculus and one course in Please download the letter of recommendation form, fill out the top portion and email
college-level statistics. Applicants who do not meet this requirement will take the form to the individual providing the recommendation. A letter of recommendation
EMSE 4197. is only considered official when it is sent from the individual providing the
recommendation and delivered directly to an admissions counselor via email at
GW considers a candidate’s entire background and all submitted materials when
onlinecybersec@gwu.edu or via fax at (888) 245-5409. Submissions directly from
reaching an admissions decision. Applicants who do not meet these requirements
applicants will not be accepted.
may still be eligible for admission and their records will be evaluated on a case-by-
case basis. Please contact an admissions counselor for more information. • GRE Scores: GRE scores are recommended.
About GW
GW was founded in 1821 through an Act of Congress. Since then, it has become GW’s heritage of innovation and excellence has earned us many accolades,
the largest university in the D.C. metropolitan area, deeply interwoven with the including:
culture and industries of the city. GW offers its students access to opportunities
• U.S. News & World Report
in many different fields with the unquestionable confidence of graduating from a
• #14 Best Online Master’s in Engineering Programs
respected, reputable institution of higher learning.
• #13 Best Online Master’s in Engineering Programs for Veterans
• #17 Best Online Master’s in Engineering Management Programs
The School of Engineering
• The Princeton Review
and Applied Sciences • A ‘Best Northeast’ College in “2020 Best Colleges: Region by Region”
The School of Engineering and Applied Sciences (SEAS) at the George • Colleges That Create Futures
Washington University has been bringing together great minds in industry • Green Colleges
and government since the 1800s. Throughout time, it has evolved to help
professionals meet the technological challenges of the day. • Forbes
• #44 in Research Universities
onlinecybersecurity.seas.gwu.edu
(877) 246-4824

You might also like