Online Master of Engineering in Cybersecurity Analytics - Design Option 1
In the early months of 2018, GitHub, a central hub for code and programming resources, was hit by an unprecedented DDoS attack, setting a new record for the magnitude of such cyber assaults. However, this record was short-lived, as another, even more powerful DDoS attack occurred the following week in March. This upward trend in the scale of cyber threats continued, with Amazon Web Services reporting an even larger DDoS attack in February 2020, surpassing previous incidents.
The challenges facing cybersecurity experts are not only growing in scale but also in intricacy. The past ten years have seen a surge in the prevalence of advanced persistent threats (APTs). These are sophisticated cyber attacks that unfold over extended periods, often aiming to extract sensitive information over many months or years. APTs are particularly insidious, employing a combination of techniques including hacking, malware, social engineering, and others to penetrate and persist in targeted networks. In 2019, these types of threats became increasingly common, with discoveries of APTs aimed at government entities, individual consumers, and various businesses.
Addressing these complex and evolving cyber threats, the STEM-based online Master of Engineering in Cybersecurity Analytics program is designed to equip graduates with cutting-edge skills and knowledge. The curriculum aims to enable graduates to tackle current cybersecurity challenges effectively and also to anticipate and defend against new types of attacks that have not yet been encountered, ensuring they are at the forefront of the field in protecting against such critical incidents.
Program Description
The Master's program in cybersecurity analytics provides hands-on training in employing cybersecurity and analytical tools to detect and counteract a wide range of cyber threats. The curriculum thoroughly encompasses established techniques for detecting intrusions and evaluating information security risks, while also exploring modern methods like the semantic analysis of open-source intelligence, including platforms like social media.
Some of the key areas covered in the curriculum include:
- Cyber forensics
- Network defense
- Cloud computing security
- Auditing and intrusion detection
- Applied cyber data analytics
- Hardware and software security
- Security data visualization
The Cybersecurity Analytics Master's program builds essential skills for cybersecurity careers, welcoming both newcomers and seasoned professionals. Experts benefit from networking and skill refinement through practice, while beginners receive tailored guidance from GW faculty.
Open to diverse academic backgrounds, applicants without a STEM degree should highlight their cybersecurity interest and technical aptitude in their application to demonstrate their readiness for the field.
Curriculum
The GW Cybersecurity Analytics Master's program delivers a robust curriculum that not only introduces the basics of information security but also delves into the hands-on application of cybersecurity strategies and tools. Students gain expertise in areas like intrusion detection, cyber forensics, network defense, cloud security, management practices, and applied security analytics.
Beyond the extensive curriculum, students benefit from the real-world expertise of faculty members who bring decades of experience from various cybersecurity roles across government, nonprofit, and private sectors, providing students with insights into the industry's practical aspects.
The program's online structure provides the flexibility of both live (synchronous) and recorded (asynchronous) class sessions, accommodating students' diverse schedules and personal commitments. While live participation is encouraged for the most engaging experience, lectures are recorded, granting the ability to revisit the material as needed.
- Learn More About the Courses
-
CSCI 6016 Applied Network Defense: Apply theory and practice of computer security, focusing specifically on the protection aspects of the Internet. It reviews cryptographic tools to provide security, such as shared key encryption (DES, 3DES, RC and more), public key encryption, key exchange and digital signature (Diffie-Hellmann, RSA, DSS and more). It then reviews how these tools are utilized within the internet protocols and applications like SSL/TLS, IPSEC, Kerberos and more (including wireless). By leveraging case studies and reading seminal research papers, students will learn about network attacks and vulnerabilities as well as current defenses. Topics covered include cryptography, confidentiality and authentication protocols, botnets, firewalls, intrusion detection systems and communication privacy and anonymity. This course also covers offensive and defensive information warfare operations, simulation of various attacks on and defenses of computer systems, laws related to information warfare and history and literature related to information warfare attacks. (3 credit hours)
ECE 6132 Secure Cloud Computing: Security and privacy issues in cloud computing systems. Confidentiality, integrity and availability of data and computations. Examination of cloud computing models, threat models, outsourcing and security issues. Practical applications of secure cloud computing.(3 credit hours)
EMSE 6540 Management of Information and Systems Security: Development and management of effective security systems. Includes information, personnel and physical security. Emphasis on risk analysis for information protection. (3 credit hours)
EMSE 6543 Managing the Protection of Information Assets and Systems: Advanced topics in protection of information assets and systems, including authentication, asset control, security models and kernels, physical security, personnel security, operational security, administrative security, security configuration management, and resource control. Prerequisite: EMSE 6540. (3 credit hours)
EMSE 6544 Auditing, Monitoring and Intrusion Detection for Information Security Managers: Methods for detecting problems with unauthorized activity in information systems and management challenges associated with those activities. Prerequisite: EMSE 6540. (3 credit hours)
EMSE 6560 Open-Source Intelligence Analysis: Analyzing social media and other publicly available data sources can provide a wealth of data that can be used to identify and evaluate threats to an organization’s information assets. The challenge of using social media and other public sources is filtering the useful information from the noise. Students will use data analytics tools and develop decision support frameworks to identify threats, evaluate capability of actors to exploit vulnerabilities and evaluate the risk of damage those actors can do to an organization. While each individual data source may not provide actionable intelligence, compiling data across multiple sources can reveal critical indications of intent and capability of potential threats. This course provides an overview of publicly available data sources and strategies for mining and aggregating data across multiple sources to build a comprehensive profile of threat sources and develop an action plan to defend against these threats. (3 credit hours)
EMSE 6767 Applied Data Analytics: Applied and practical data analytics. High-level theory, with primary focus on practical application of a broad set of statistical techniques needed to support an empirical foundation for systems engineering and engineering management. A variety of practical visualization and statistical analysis techniques. Leveraging Minitab and Excel to examine raw data to arrive at insightful conclusions. (3 credit hours)
EMSE 6769 Applied Machine Learning for Engineers: Theory and practice of machine learning, leveraging open source frameworks to explore the ideas, algorithms, and techniques. Restricted to graduate students. (3 credit hours)
SEAS 6410 Security Data Visualization: The main goal of this course is to help students learn, understand and practice the visualization aspect of security data, which includes the study of data analytics and scaling up information security, security metrics and security monitoring techniques focusing on industry applications. It also covers the fundamentals of security data visualization and exploratory data analysis and provides guidelines on information security data visualization and insights with data dashboards. Furthermore, it introduces valuable tools to empower students to create an effective visual image of security data and prepare security data for using the latest techniques in Information Technology (IT) data analytics fields and extracting features from security data sets. Prerequisite: EMSE 6767. (3 credit hours)
SEAS 6800 ST Python Applications in Cybersecurity Analytics: Introduction to programming with Python; Developing python scripts to automate data cleaning; Introduction to machine learning with Python including text mining and time series analysis
- Classroom Phase Schedule
-
Students enroll in four 9-week sessions as well as an optional 5th summer session.
Students may begin their studies during any of the sessions.Session Dates Spring 1 January – March Spring 2 March – May Fall 1 August – October Fall 2 October – December There is an optional five-week accelerated session each Summer from May – June.
Below are the start and end dates for the next academic year.
Session Dates Spring 1 2024 week of 1/8/24 – week of 3/4/24 Spring 2 2024 week of 3/11/24 – week of 5/6/24 Summer 2024 week of 5/20/24 – week of 6/17/24 Fall 1 2024 week of 8/12/24 – week of 10/7/24 Fall 2 2024 week of 10/14/24 – week of 12/9/24 Spring 1 2025 week of 1/9/2025 – week of 3/6/2025
The course order is determined by advisors based on student progress toward completion of the curriculum. Course details will be provided to students via email approximately one month prior to the start of classes. - Tuition
-
Tuition is $1,195 per credit hour for the 2024-2025 year and is billed at the beginning of each semester for the courses registered during that semester. A non-refundable tuition deposit of $495, which is applied to tuition and due the first semester, is required when the applicant accepts admission. Our online graduate degree programs in engineering require no additional fees. We provide eBooks and software at no additional cost.
Admissions Process
- Review the Admissions Requirements
-
Ideal candidates for the programs will meet the following requirements:
- Hold a bachelor’s degree in engineering, a physical science, mathematics, computer science, business administration, economics, finance, information technology, or a related discipline from an accredited institution.
- Minimum grade point average of B- (2.7 on a 4.0 scale) or higher.
- Applicants with less than a 2.7 GPA may also apply and may be accepted conditionally based on a holistic review of application materials.
- Grade of C or better in one course in college-level calculus and one course in college-level statistics — applicants who do not meet this requirement in full but are otherwise qualified may be conditionally admitted and required to take an additional 3-credit hour course, EMSE 4197 — Special Topics: Quantitative Methods in Engineering Management, during the first year of graduate study.
Note: GW considers a candidate’s entire background when reaching an admissions decision. Applicants who do not meet all the requirements may still be eligible for admission and their records will be evaluated on a case-by-case basis.
- Apply for Admission and Submit Supporting Documents
-
Complete application packets include:
Apply for Admission
There is no application fee for any online engineering programs.- Resume or C.V.: Upload your up-to-date resume or C.V.
- Statement of Purpose: In an essay of 250 words or less, describe your academic objectives, research interests, and career plans; and discuss your related qualifications including collegiate, professional, and community activities, and any other substantial accomplishments not already mentioned.
If you’re applying from outside the U.S., please see international student admissions information and additional requirements.- Letters of Recommendation: Three letters of recommendation are required for admission. At least two of these letters must come from a professional reference. Please provide the individual developing the recommendation with a link to the letter of recommendation form. A letter of recommendation is only considered official when it is sent directly from the individual providing the recommendation through RightSignature. Submissions directly from applicants will not be accepted.
- GRE Scores: GRE scores are not required but if available, should be submitted to enhance your application.
- Remain Engaged in the Admissions Process
-
You will receive emails from us updating you as your application goes through the admissions process.
Upcoming Information Sessions