State-of-the-art computing facilities and tools are accessible either on-site or online. Combined with knowledge from instructors who are working to fight cybersecurity threats on the front lines, the continually evolving curriculum prepares students for lasting careers in this critical field. Upon completing the degree program, students will: Demonstrate proficiency in assessing enterprise security risk and formulating technical recommendations in the areas of both hardware and software. Demonstrate proficiency in four major areas of cryptology: Encryption, Hash Functions, Signature Schemes, and Authentication.
Johns Hopkins University, United States
State-of-the-art computing facilities and tools are accessible either on-site or online. Combined with knowledge from instructors who are working to fight cybersecurity threats on the front lines, the continually evolving curriculum prepares students for lasting careers in this critical field. Upon completing the degree program, students will: Demonstrate proficiency in assessing enterprise security risk and formulating technical recommendations in the areas of both hardware and software. Demonstrate proficiency in four major areas of cryptology: Encryption, Hash Functions, Signature Schemes, and Authentication.
Johns Hopkins University, United States