Johns Hopkins University Online Master of Science in Cybersecurity

Why Johns Hopkins University?

The online Master of Science in Cybersecurity offered by Johns Hopkins University provides a distinctive opportunity for applicants wishing to expand their knowledge and skills in cybersecurity. JHU, a private research university in Baltimore, Maryland expects applicants to hold an undergraduate degree in with at least one year of coursework in calculus, one semester of discrete math or another advanced math subject, and one semester of programming. The programming coursework would preferably be in Java, but C++ background is acceptable, provided the applicant has skill in Java as well. Applicants should also have taken one term of coursework in data structures and one semester of coursework in computer organization. Depending on the applicant’s desired area of specialization, courses in networking, operating systems and/or both may be required. 

Applicants without all the necessary background may choose to enroll in the degree under provisional status and then complete prerequisite courses at JHU. Applicants may also opt out of certain prerequisites by passing an exam. 

Standardized test scores are not required, and a minimum undergraduate GPA of 3.0 is expected. 

Program Snapshot

University Name Johns Hopkins University
Location Baltimore
State Maryland
Niche.com Grade A+
Name of Degree Master of Science in Cybersecurity
School or Department Administering Program Whiting School of Engineering
Credits 30
Cost per credit $1,585.00
Tuition for Entire Program $47,550.00
Test Requirements none
Minimum GPA 3.0
Campus Visit Required? none
Typical Time to Complete 2-3 years
When Can Students Start the Program? Fall, Spring, Summer
Program Concentrations Analysis; Assured Autonomy; Networks; Systems
Synchronous Classes Some
Required Courses · Foundations of Algorithms

· Foundations of Information Assurance

· Cryptology

· at Least 3 Courses from Focus Area

Does the Program Include a Capstone? Yes
Does the Program Include a Practicum or Internship? No
Other Features that Make the Program Unique Interesting courses: Quantum Computation; Introduction to Ethical Hacking; Intelligent Vehicles: Cybersecurity for Connected and Autonomous Vehicles; Required Capstone or Independent Study which can take the form of research with a faculty member; excellent computing facilities; technologically advanced virtual classrooms; participate in innovative research; build professional networks
Program Objectives (quoted directly from the program) Increase your marketability by learning cutting-edge industry trends, knowledge, and skills through coursework designed by industry experts. Apply skills and knowledge when assessing a corporation’s security risks and formulating technical recommendations in the areas of both hardware and software. Demonstrate proficiency in the four major areas of cryptology: encryption, hash functions, signature schemes, and authentication.
Program Description Consisting of 30 required credits, this program emphasizes engineering topics Students choose between four concentrations. In order to consolidate their learning in the program, all students complete a capstone experience. Following a traditional course schedule, the program is designed for students wishing to work and study at the same time.

 What will I Learn?

The cybersecurity program at Johns Hopkins offers four areas of specialization: Analysis, Assured Autonomy, Networks, and Systems. In all four areas, the emphasis is on building cutting-edge professional skills through classes and projects devised by experts from industry.  Industry trends, knowledge and skills are built through learning how to evaluate security risks and devise solutions for both hardware and software.  Graduates are prepared with high-level skills in encryption, hash functions, signature schemes, and authentication.

The following courses are required: Foundations of Algorithms,  Foundations of Information Assurance, and Cryptology. Students must then take at least three courses from their focus area.  Students must complete a required capstone experience which can take the form of a research project under the supervision of a faculty member.

Compared to many other peer programs, the JHU degree allows students to take more electives, and the courses available cover a range of interesting topics. These include Quantum Computation, Introduction to Ethical Hacking, and  Intelligent Vehicles: Cybersecurity for Connected and Autonomous Vehicles. 

Students at Johns Hopkins benefit from the university’s excellent computing facilities and technologically advanced virtual classrooms. They gain the opportunity to participate in innovative research and build professional networks through affiliation with a university in the national capital region.

How much will the program cost?

Students finish their degree within 2-3 years and pay $1,585.00 per credit for a total of 30 credits, or $47,550.00 in total.

How does the program fit into my life?

Some courses are synchronous, meaning that students attend “live” class sessions online each week at a scheduled time. Some courses are asynchronous, meaning that students complete coursework on their own schedule each week. Course activities can include pre-recorded video materials, online discussion, and lab exercises. Most students complete the program within 2-3 years. Students can enter the program in Fall, Spring, or Summer semesters. 

Summary

This higher cost cybersecurity degree offered through a prestigious university emphasizes engineering topics. Following a traditional course schedule, the curriculum offers a choice of four concentrations. In order to consolidate their learning in the program, all students complete a capstone experience. 

Applicants to Johns Hopkins are likely to be attracted by the program’s academic rigor, which is accompanied by stringent prerequisite expectations. Students at JHU have access to a wider range and number of elective courses than in many similar degree programs. Applicants with an interest in research or further study in the area of cybersecurity should give the program a serious look.