Overhead shot of three students looking at laptop

Cyber and Information Security, Master of Science

Computer Science, Mathematics and Science


Given the pervasive nature of cyber threats this master’s program gives students an edge in the job market and the world around them.

It appeals to students who want to become cybersecurity specialists as well as data scientists already in the field who need to upgrade their skills. It is designed to accommodate both students with undergraduate degrees in IT and Computer Science as well as career changers. 

The program offers a learning path flexibility with:

  • Hybrid courses
  • The ability for career changers or those with no undergraduate computer science background to use electives to acquire the required credits in programming and networking science.

Apply Request Info


To be admitted to the M.S. in Cyber and Information Security program all applicants must hold a Bachelor’s degree with a minimum GPA of 3.0 from an accredited university.

  • Resume/ Curricula Vitae.
  • Two letters of recommendation.
  • A personal statement explaining the student’s career objectives, interests, and academic and professional background that are relevant to the degree program.
  • A base knowledge of programming and networking is required.  This knowledge can be demonstrated via transfer courses, undergraduate studies, work experience or industry certifications.  Deficiencies can be made up by taking undergraduate, graduate or other comparable courses; conditional admission may be extended to these candidates.

Program Directors or Chair will make final evaluation of all student applications.

Department Contact


CORE COURSES: 12 credits

12 credits in:

  • CYB 611 - Foundations in Cybersecurity (3 credits)
  • CYB 615 - Protection of Digital Infrastructure (Network Security) (3 credits)
  • CYB 621 - Cybersecurity Laws, Regulations and Best Practices
  • CYB 625 - Principles of Secure Scripting and Cryptography (3 credits)

SPECIALIZATION: (9 credits from one of the following tracks)


  • CYB 711 - Intrusion Detection and analysis ( 3 credits)
  • CYB 715 - Penetration testing and ethical hacking ( 3 credits)
  • DFR 711 - Cyber-Forensic and Malware Analysis( 3 credits)


  • CUS 510 - Database System Design and Data Warehousing ( 3 credits)
  • CUS 680 - Distributed Big Data Analytics ( 3 credits)
  • CUS 610 - Data mining and Predictive modeling ( 3 credits)


  • IT 711 - Enterprise Architecture and IT Governance ( 3 credits)
  • IT 715 - System Analysis and Process Re-engineering ( 3 credits)
  • IT 721- IT Project Management and Agile Methodologies ( 3 credits)

All students will choose a Thesis or Capstone Option (6 credits)

Master’s Thesis Option: a)  CYB 795 Thesis I (3 credits) plus CYB 796 Thesis II (3 credits)*

Capstone Option:  CYB 790 Master’s Capstone Project( 3 credits) and one additional elective course (3 credits)

*Students who do not meet pre-requisites may need to take additional courses towards the 30 credit degree if they choose the thesis option.

Potential Elective courses that have not already been applied elsewhere in program credit requirements:

  • CYB 711 Intrusion Detection and Analysis
  • CYB 715 Penetration Testing and Ethical Hacking
  • DFR 711 Cyber-Forensic and Malware Analysis
  • CUS 510 Database System Design and Data Warehousing
  • CUS 610 Data mining and Predictive Modeling
  • CUS 680 Distributed Big Data Analytics
  • CUS 752 Machine Learning
  • IT 711 Enterprise Architecture and IT Governance
  • IT 715 System Analysis and Process Re-engineering
  • IT 721 IT Project Management and Agile Methodologies
  • CYB 798 Cyber Security Internship 
  • HLS 102 Intelligence for Homeland Security: Organizational & Policy Challenges 
  • HLS 103 Critical Infrastructure: Vulnerability Analysis and Protection 
  • HLS 108 (becoming HLS 505) Enterprise Risk Management 
  • HLS 301 Police and Homeland Security Leadership 
  • HLS 302 U.S. Constitution and Homeland Protection 
  • HLS 303 Issues in Global Security 
  • HLS 305 Seminar in Global Terrorism 
  • HLS 306 Policy Formation and Analysis. 
  • HLS 307 Leadership Issues in Critical Incident Management 
  • HLS 312 Court Administration and Leadership
  • (Prerequisite option) CUS 620 Programming I
  • (Prerequisite option) NET 510 Networks: Forms & Functions

Additional Information

State-of-the-art learning resources: St. John’s has a newly constructed Cybersecurity lab and classrooms. There are additional financial resources available through a donor’s endowment to support students and faculty research and student engagement.

The program supports the core Vincentian values of compassion and service in providing students with technical skills that can be used to combat poverty, disease, crime, as well as provide solutions in healthcare. It will utilize new instructional labs in St. Augustine Hall to provide maximum support for students’ academic success.  

Career Outcomes

The 30-credit M.S. degree program in Cyber and Information Security aims to prepare students with the required qualifications to become:

  • Information Security Analysts
  • IT Security Architects
  • Data Security Analysts

Cybersecurity Events and Seminars

2023 Events

Professor Fernando Almeida talks about
Producing Secure Software  in Large-Scale Agile Environments

Date: Tuesday, February 14th, 2023

Time: 1:00 PM - 2:00 PM EST


The globalization of the economy has forced organizations to face several challenges in the broader business fields to achieve the agility and efficiency needed to remain competitive and adapt quickly to market changes. This situation has led software companies to adopt agile methodologies in the software development process in order to reduce development costs and respond more efficiently to the high market dynamics and constantly changing requirements.

Agile methodologies, however have been specially formulated to work well in small teams. The scalability of agile methodologies is a challenge and assumes even greater difficulties when producing secure software. This talk aims to explore this phenomenon by looking at different approaches for building secure software in large-scale agile environments, considering its incorporation in frameworks such as LeSS, SAFe, or Spotify, but also its integration in hybrid frameworks that can address the rigidity criticisms typically associated with these high-complexity frameworks. 

Click here to register!


Past Events

Dane Brown talks about
Who Tracks the Trackers?

Monday, April 11th, 2022 @ 4:30 PM

Click here to view our flyer!

Apple’s "Find My" protocol allows lost devices, such as Airtags, to relay their location to their owners via a network of over a billion active Apple devices. This presents a powerful capability for owners of these devices, but may also be a tool for malicious actors to cheaply and effectively track unknowing targets. Apple has introduced a feature known as “item safety alerts” to prevent Airtags from being used this way. We demonstrate that it is possible to create a custom device, with similar features to an Airtag in terms of cost, size and battery life, which can participate in Apple’s "Find My" network and be tracked via it, while not triggering any item safety alerts. This implies that Apple’s protection mechanism is insufficient. We suggest natural mitigations for two of our malicious tracker techniques but note that the third would require substantially altering the "Find My" protocol to defend against.

Dane Brown is an Assistant Professor in the Cyber Science Department at the United States Naval Academy. He holds a B.S in Electrical Engineering (USNA '05) and an M.S. in Computer Engineering (NPS '06). He completed a Ph.D. in Computer Engineering (Virginia Tech '19) with a focus on analyzing the security of firmware in ARM environments.

TJ O'Connor Talks AboutA Case Against the Smart Things
Tuesday, November 9th, 2021 @ 8:00 pm

Click here to view our flyer!

A myriad of security challenges has accompanied the rapid proliferation of internet-of-things (IoT) smart-home devices. While smart-home security cameras, locks, digital speakers, and thermostats offer the promise of security, their naïve implementations often introduce vulnerability into our digitally connected lives. We argue that the consumer demand for inexpensive IoT has led to a supply of grossly insecure devices. In this talk, we explore our lab’s research identifying various design and implementation flaws that we discovered. Further, we attempt to explain the root causes of these issues and discuss future work to offer greater transparency and control of IoT devices. 

Dr. TJ O’Connor is the cybersecurity program chair at Florida Tech and former US Army Paratrooper. He leads a practice-based curriculum for cybersecurity and serves as the Lab Director for the IoT Security & Privacy Lab. 

His research investigates information security education, the vulnerability of internet-of-things devices, wireless protocols, and software-defined networking. 

Dr. O’Connor served 20 years as an Army Officer, retiring in 2019 at the rank of Lieutenant Colonel. His service included an academic appointment to the Electrical Engineering and Computer Science Department at the US Military Academy and four assignments supporting the Special Forces from the tactical level in Afghanistan and culminated as the Chief Information Officer for the 1st Special Forces Command Headquarters.

Dr. O’Connor is active in cyber security competitions and is the current coach for the FITSec Cybersecurity Team and the US Cyber Games Team. In his free time, he enjoys Brazilian jiu jitsu, jet-skiing, and playing capture-the-flag games. 

To learn more about TJ O'Connor, please visit his website at www.tjoconnor.org.

Anish Bachu Talks AboutCSIRT and Threat Intelligence/Threat Management Monday, October 18th, 2021 1:50 - 3:50 pm

Click here to view our flyer!

A National Computer/Cyber Security Incident Response Team (CSIRT) is the focal point for incident management in their country and provides services and support for preventing, detecting, handling, and responding to cyber security incidents. This session will explore the technical operations of a national CSIRT taking deep dives into the areas of Threat Intelligence and Unified Threat Management. 

Anish Bachu is an experienced cyber security professional attached to the Trinidad and Tobago Cyber Security Incident Response Team (TT-CSIRT) under the Ministry of National Security, Government of the Republic of Trinidad and Tobago. His duties cover many areas that include incident response, threat intelligence, security assessments of government systems and national cybersecurity and data protection policy. Anish graduated from St. John’s University with his BSc in Cyber Security Systems in 2018 and his Masters of Business Administration in 2019. He is also a member of the Cyber Security Industry Program Advisory Board. Anish was a cofounder of SJUCYBER in 2016 and served as club president from 2017 to 2018.

The Presidential Management Fellowship Presents Learning About Becoming a Presidential Management Fellow Focusing in Cybersecurity Tuesday, September 21, 2021
7:00 pm - 8:00 pm

Click here to view our flyer!

The Presidential Management Fellows (PMF) Program is administered by the U.S. Office of Personnel Management (OPM). Each year, candidates apply to the program in efforts to be selected as Finalists. Finalists are then eligible for appointment as Presidential Management Fellows (Fellows; PMFs).

To become a PMF, you must participate in an rigorous, multi-hurdle process. It takes patience and endurance, but also gives you a chance to demonstrate your leadership ability and potential. As a PMF, you will have earned your place in the program, and the opportunity to grow professionally, serve your country, and make a difference!

Tyson Brooks talks about    The Internet of ‘Insecured’ Things Wednesday, September 8th, 2021 @ 6:00 p.m. 

Click here to view our flyer!

The Internet of Things (IoT) has created a large network of billions of smart 'Things' communicating with each other. In the IoT, smart things are expected to become active participants in business, military, information, and social processes. The IoT has enabled the ability for smart devices to interact and communicate by exchanging data and information sensed about the environment and by reacting autonomously to the real/physical events with or without direct human intervention; however, there are also security implications for using this new technology. This talk will discuss the ‘Internet of Insecured Things’ through the anatomy of IoT environments and the various security implications within the IoT.

Dr. Tyson Brooks, works for the U.S. Department of Defense (DoD) and is an adjunct professor in the iSchool at Syracuse University. Dr. Brooks has over 25 years of professional experience in the engineering design, architecture, and information security of complex information systems in the U.S. and overseas. Dr. Brooks' expertise and research includes work in the areas of offensive security, penetration testing, information security engineering, and cyber-security.


"To learn more about our other Programs of Study, please visit our Cyber Security Center of Academic Excellence page."