MS in Cybersecurity & Trusted Systems

MS in Cybersecurity & Trusted Systems (Purdue Degree)

We make Cybersecurity work.

From ransomware to phishing schemes cybersecurity threats are the greatest challenge to information technology in the digital age. Channel your curiosity and passion for technology to become a cybersecurity professional. This MS program will prepare you to enter the workforce in the rapidly advancing field of cybersecurity, to enable you to address the security challenges and risks that industries encounters daily. Cybersecurity is a multidisciplinary area: it is a combination of information technology, computing, and engineering. This program will provide a solid, comprehensive background in the related topics of cybersecurity engineering and their applications.

 

Purdue Cybersecurity program from Indianapolis

You are learning from a recognized cybersecurity education provider. The MS in Cybersecurity and Trusted Systems program is part of the National Security Agency (NSA) National Center of Academic Excellence in Information Assurance Education and in Information Assurance Research (CAE/IAE and CAE/R). You will be part of a Purdue graduate program, which consistently ranks in the top cybersecurity programs among universities. Students become a student member of the Purdue CERIAS center and will have the opportunity to work as research assistants in NSF-funded research and education projects.

The location of this MS program offers many opportunities. Indianapolis area has seen the growth of Cybersecurity and Information Assurance related companies in recent years. In addition to the existing big healthcare-related companies such as Lilly and Anthem, there have been more technological oriented companies expanding in the central Indiana region (e.g., Genesys, Salesforce, Infosys etc.) and a variety of startups as well. All of these companies will need to hire workers with knowledge intensive cybersecurity skill sets. Moreover, concerns of security are no longer limited to IT related companies; the need to monitor and adhere to good cybersecurity principles is pervasive not just in IT, but engineering, health, automotive, manufacturing, etc. sectors.

Why MS in Cybersecurity?

  1. A Degree in Cybersecurity Equals Job Security.
  2. Cybersecurity Professionals Earn High Salaries
  3. Cybersecurity Career Options Growing Faster Than Other Sectors
  4. Cybersecurity Skills: You'll Learn the Basics Plus Leadership, Management and More.

Your career in Cybersecurity

Before you graduate, youll work with our Career Services Office to learn how to search for jobs, assemble a portfolio of your work, pursue internship opportunities, and connect with employers.

Learn more about Career Services

The MS in Cybersecurity and Trusted Systems degree prepares students for Cybersecurity careers. Students complete courses on a wide spectrum of skills, ranging from Malware analysis and reversing to Intrusion detection, from Risk analysis and mitigation to Thinking like a black hat, and from Security data analytics to Cloud and AI security. This Cybersecurity Engineering and Technology knowledge and experience will provide graduate many career opportunities. This Cybersecurity skillset is in demand and well remunerated in Central Indiana and elsewhere in the United States.

Here is the Indeed.com top 10 list, by cybersecurity job title and salary:

$128,128 - Application Security Engineer

$127,855 - Director of Information Security

$126,628 - Senior Security Consultant

$126,365 - Cloud Engineer

$117,633 - Software Architect

$114,431 - Pentester

$108,465 - Risk Manager

$103,690 - Chief Information Officer

$101,808 - Security Engineer

$99,930 - Information Manager 

Sample Plan of Study

We provide three sample curriculums below, a number of electives are listed for each semester, but these are meant to be options from which the students can select.

Sample Pan of Study 1:

Semester 1

 

·         CIT 55510 Network Security

·         CIT 52800 Information Security Risk Assessment

·         CIT 52600 Applied Data Analytics

 

Semester 2

 

·         CIT 53200 Wireless Security & Technology

·         CSCI 52600 Information Security

Semester 3

·         CIT 51600 Database Security

·         CIT 55000 Organizational Impact on IT

·         CIT 58110 Cybersecurity Directed Project     

Semester 4

·         CIT 56200 Mobile and Network Forensics

·         CIT 61800 Advanced Topics in Database

 

Sample Plan of Study 2:

Semester 1

 

·         CSCI 55500 Cryptography

·         CSCI 54100 Database Systems

·         CIT 52600 Applied Data Analytics

 

Semester 2

 

·         CSCI 52600 Information Security

·         CSCI 57300 Data Mining

Semester 3

·         CSCI 58000 Algorithm Design, Analysis, and Implementation

·         CSCI 53600 Data Communication and Computer Networks

Semester 4

·         CIT 55510 Network Security

·         CSCI 62600 Advanced Information Assurance

·         CSCI 59010 Cybersecurity Directed Project   

 Sample Plan of Study 3:

Semester 1

 

·         ECE 54700 Intro Communication Networks

·         ECE 56401 Computer Security

·         CIT 55510 Network Security

 

Semester 2

 

·         ECE 62700 Intro. to Cryptography and Secure Communication

·         ECE 59500 Machine Learning and Statistical Signal Processing

Semester 3

·         ECE 54400 Digital Communications

·         CIT 53200 Wireless Security & Technology

Semester 4

·         ECE 63901 Error Correction Coding and Secret Sharing

·         CSCI 62600 Advanced Information Assurance

·         ECE 59500 Communication Security/Electronic Warfare             

Cybersecurity Faculty

Faculty

Title

Expertise

Feng Li

Associate Professor & Chair of Computer Information & Graphic Technology

Cybersecurity in mobile computing, wireless security, social network and cloud security.

Connie Justice

Associate Professor of CIT

Risk assessment, vulnerability and penetration testing, digital forensics, network security

Brian King

Associate Professor & Chair of ECE

Computer and network security, wireless security, cryptography, algorithms, and applied mathmatics

Xiao Luo

Assistant Professor of CIT

Data mining and data-driven cybersecurity, security and privacy protection in health IT

Xukai Zou

Associate Professor of CIS

Communication networks and security, applied cryptography, security and reliability for grid computing

Xiaonan Guo

Assistant Professor of CIT

Cybersecurity and privacy, cyber-physical system, mobile computing and wireless networks

Zhengming Ding

Assistant Professor of CIT

Data mining and data-driven cybersecurity, security and privacy protection in Deep Learning

Renran Tian

Assistant Professor of CIT

Security and privacy in autonomous driving, cybersecurity in control systems.

April Savoy

Assistant Professor of CIT

Security and privacy protection in health IT

Huanmei Wu

Associate Professor & Chair of BioInformatics

Database security, information privacy, database management  bioinformatics, medical imaging

Zina Ben Miled

Associate Professor of ECE

Prevention, Detection and Response; Data Mining and Machine Learning

Scott Orr

Lead Security Engineer and Lecturer of CIS

Computer and network security

Interested in Applying for Graduate Admission?

Learn more about the application process!