Overhead shot of three students looking at laptop
GR

Cyber and Information Security, Master of Science (M.S.)

St. John’s 30-credit master’s degree in Cyber and Information Security accelerates your career and transforms your world view through an immersive learning experience that connects you with the brightest minds in the field and state-of-the-art learning resources.

Why Cyber and Information Security?

Cybersecurity is a field that is accelerating rapidly. As more cybersecurity attacks occur, the demand for professionals adept in preventing and protecting against these attacks rises.

With a Master of Science degree in Cyber and Information Security, you enter a thriving career field with the proper skills and theoretical knowledge to set you apart. Our expansive curriculum was designed to elevate any person with an interest in computer science, data science, or information technology.

Apply
Degree Type
MS
Area of Interest
Computing & Technology
Associated Colleges or Schools
Program Location
  • Queens Campus
  • Online
Required Credit Hours
30
Associated Centers or Institutes

Contact Us

We are here to answer your questions about the Cyber and Information Security program and admission process. 
Please contact:
Justin Goldberg
Graduate Assistant Dean
[email protected]

Program Director
Dr. Suzanna Schmeelk
 

Profile photo for Suzanna Schmeelk

Admission Requirements

To be admitted to the M.S. program, you must have a baccalaureate degree from an accredited institution or the international equivalent before enrollment. You must also provide

  • A completed application form and nonrefundable application fee.

  • A statement of professional goals and résumé (can be uploaded as a part of the application for admission).

  • Official transcripts from all undergraduate, graduate, and professional schools attended.

  • A minimum of one recommendation, obtained from professional or academic references.

  • Official TOEFL, IELTS, or Duolingo English Test scores are required for applicants whose native language is not English.

  • Students with international credits must also submit a course-by-course foreign credit evaluation with grade point average calculation from a National Association of Credential Evaluation Services member.

Base-level knowledge of programming and networking is required. This knowledge can be demonstrated with certifications, bootcamps, or online certificates, given the content is equivalent to approximately 40 hours of coursework on similar topics. St. John’s offers conditional admission where you can make up for these deficiencies by taking two prerequisite courses: CUS 620 Programming I and NET 510 Networks: Forms and Functions.

Coursework and Program Details

  • CYB 611 Foundations in Cybersecurity (3 credits)
  • CYB 615 Protection of Digital Infrastructure (Network Security) (3 credits)
  • CYB 621 Cybersecurity Laws, Regulations and Best Practices (3 credits)
  • CYB 625 Principles of Secure Scripting and Cryptography (3 credits)
 

9 credits from one of the following: Cyber Security, Data and Analytics, and IT Enterprise

Cyber Security

  • CYB 711 Intrusion Detection and analysis (3 credits)
  • CYB 715 Penetration testing and ethical hacking (3 credits)
  • DFR 711 Cyber-Forensic and Malware Analysis (3 credits)

Data and Analytics 

  • CUS 510 Database Management Systems (3 credits)
  • CUS 680 Distributed Big Data Analytics (3 credits)
  • CUS 610 Data Mining and Predictive Modeling I (3 credits)

IT Enterprise

  • IT 711 Enterprise Architecture and IT Governance (3 credits)
  • IT 715 System Analysis and Process Re-engineering (3 credits)
  • IT 721 IT Project Management and Agile Methodologies (3 credits)
  • Capstone Option: CYB 790 Master’s Capstone Project (3 credits) and one additional elective course (3 credits)
     
  • Master’s Thesis Option: a) CYB 795 Thesis I (3 credits) plus CYB 796 Thesis II (3 credits)*

*Students who do not meet prerequisites may need to take additional courses toward the 30-credit degree if they choose the thesis option.

The extensive elective disciplines are expanding and currently Includee graduate coursework in Homeland Security, Computer Science, Data Science, Information Technology, and Digital Forensics.

Homeland Security

  • HLS 102 Intelligence for Homeland Security: Organizational & Policy Challenges
  • HLS 103 Critical Infrastructure: Vulnerability Analysis and Protection
  • HLS 108 (becoming HLS 505) Enterprise Risk Management
  • HLS 301 Police and Homeland Security Leadership
  • HLS 302 U.S. Constitution and Homeland Protection
  • HLS 303 Issues in Global Security
  • HLS 305 Seminar in Global Terrorism
  • HLS 306 Policy Formation and Analysis.
  • HLS 307 Leadership Issues in Critical Incident Management
  • HLS 312 Court Administration and Leadership
  • Other HLS Electives offered per Program Director approval

Computer Science and Data Science

  • CUS 510 Database System Design and Data Warehousing
  • CUS 610 Data mining and Predictive Modeling
  • CUS 680 Distributed Big Data Analytics
  • CUS 752 Machine Learning
  • CUS 620 Introduction to Programming for Analytics
  • (Prerequisite option) NET 510 Networks: Forms & Functions

Digital Forensics, Cybersecurity, and Information Technology

  • CYB 798 Cyber Security Internship
  • CYB 711 Intrusion Detection and Analysis
  • CYB 715 Penetration Testing and Ethical Hacking
  • DFR 711 Cyber-Forensic and Malware Analysis
  • IT 711 Enterprise Architecture and IT Governance
  • IT 715 System Analysis and Process Re-engineering
  • IT 721 IT Project Management and Agile Methodologies
Required PC Specs for Asynchronous Students
CPU: Intel or AMD CPU (2011 or later) - 64-bit x86/AMD64 CPU with a minimum of 4 cores. (CPUs with at least 6 to 12 cores are recommended). Newer Apple computers with Apple Silicon (e.g., M1, M2, M3, or Mx CPUs) are NOT supported and NOT compatible with the required software needed for this program.
System Memory: 16GB RAM (32GB or 64GB preferred).
System Storage: 512GB free space on internal SSD HD (1TB or greater preferred). External SSDs will NOT be supported.
Virtualization: Enabled in EUFI or BIOS (usually called VT-x or Intel Virtualization Technology for Intel-based CPUs; for AMD CPUs, it is often labeled as AMD-V or SVM (Secure Virtual Machine)).
Host Machine Operating Systems:
Windows 10 or 11
Windows Server 2012, 2016, or 2019
Ubuntu, Red Hat, Debian, Fedora, CentOS, Mint, or openSUSE Linux
MacOS 12, 13, or 14 - ONLY with a supported Intel-based CPU.
Admin Access: Full Admin access and control of the PC. Do NOT attempt to use a school/company/work-owned computer that is used in any Production or Development environment!
Licensed Software:
VMware Workstation Pro 17 or newer. Alternate hypervisors, such as Oracle Virtual Box or MS Hyper-V will NOT be supported.
VMware Fusion Pro 13 or newer - ONLY with a supported macOS AND Intel-based CPU.
Unsupported CPUs:
Intel Atom processors based on the 2011 “Bonnell” micro-architecture (e.g., Atom Z670/Z650; Atom N570)
Systems using Intel Atom processors based on the 2012 “Saltwell” micro-architecture (e.g., Atom S1200, Atom D2700/D2500, Atom N2800/N2600).
Systems using AMD processors based on the “Llano” and “Bobcat” micro-architectures (e.g., code-named “Hondo”, “Ontario”, “Zacate”, “Llano”).
Supported CPUs:
Intel processors based on the 2010 “Westmere” micro-architecture (e.g., Xeon 5600, Xeon 3600, Core i7-970, Core i7-980, Core i7-990).

Study at One of the Top Cyber Security Programs in the Nation

#8

Top Cyber Security Colleges

St. John’s was recently ranked #8 by Spiceworks as one of the top cyber security colleges in the United States outranking many other well-known schools.

Program Educational Objectives

Graduates of the M.S. Cyber and Information Security program should, within a few years of graduation: 

  • Build sound Cyber Security processes, research skills, and tools into and across the digital acquisition lifecycle.
  • Practice Cyber Security professionally and with specific team technical leadership and stakeholder interdisciplinary communications skills while considering ethical and societal responsibilities.
  • Attain technical roles or advanced graduate research in securing complex system.

Student Outcomes (Program-Level Learning Outcomes)

Graduates of the program will have the ability to:

  • Analyze a complex problem and apply principles of computing and other relevant disciplines to elaborate solutions to it.
  • Design, implement, and evaluate a computing-based solution to meet a given set of requirements in the context of the program’s discipline.
  • Communicate effectively in a variety of professional contexts.
  • Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • Function effectively as a member and leader of a team engaged in activities appropriate to the program’s discipline.
Joel Ndimkora  ’22MS

 

“This program challenges your analytical mind and provides you with the right toolset to be successful in today’s cyber career field and provides leverage for advancement in IT management.”  

-Joel Ndimkora ’22MS

Degree Requirements

When attending full-time, you may be able to earn your M.S. in as little as one year. Our program also offers flexibility to attend part-time and earn your degree in approximately two years as you continue working.

The Cyber and Information Security program aims to prepare you with the required qualifications to become Information Security Analysts, Information Technology Security Architects, and Data Security Analysts.

Our program offers a learning path flexibility with

  • Hybrid courses with teaching both online and in-person.
  • The ability for career changers or those with no undergraduate computer science background to use electives to acquire the required credits in programming and networking science.
  • Capstone or thesis option. You can choose between a capstone project and one additional elective or a 6 credit thesis.

The M.S. degree program requires you to complete 30 credits according to the following degree requirements. You must complete:

  • core courses (12 credits)
  • specialization (9 credits)
  • elective course (3 credits)
  • option of either capstone with additional elective (6 credits) or thesis (6 credits)
Grace LaMalva

The Cyber and Information Security M.S. Program helped me flourish from a young, and eager student to a confident, and daring professional.
-Grace LaMalva, '22MS (Read Grace's full story on page 28 in St. John's Magazine


What sets St. John’s Cyber and Information Security program apart

NSA Designation

As of Feb 15, 2024 the M.S. program in Cyber and Information Security at  St. John’s University is validated by the Department of Homeland Security (DHS) and the National Security Agency (NSA) as a Program of Study (PoS) in Cybersecurity through academic year 2029.

Life at St. John’s

St. John’s University offers a number of unique opportunities. Based in Queens, NY, you have access to a diverse student body and faculty with a wealth of experience. St. John’s also offers state-of-the-art learning resources, including our newly constructed cybersecurity lab.

Our program supports the core Vincentian values of compassion and service in providing you with technical skills that can be used to combat poverty, disease, crime, as well as provide solutions in health care.

Marc Zirillo

 

“The M.S. Cyber and Information Security degree program has helped me develop the analytical skills needed for advancement in my career.” -Marc Zirillo ’22MS

Scholarships

With support from the Clare Boothe Luce Fund, St. John's University has established the Clare Boothe Luce Fellowship to benefit recipients at the beginning of their graduate studies, when funds for independent research are rarely available. The objective of this program is to encourage women to prepare for careers in teaching and research in science and technological fields in which they have historically been underrepresented.  Learn more about the Clare Boothe Luce Graduate Fellowship.

Graphic of laptop with icons of a lock

Cyber Security Center of Academic Excellence

This University-wide center has been created with the vision to provide current and future St. John’s students with cybersecurity program guidance and general information, as well as to promote collaboration and interaction with other students, faculty, and programs within St. John’s University and the cybersecurity community as a whole.

Students in the homeland security lab

Sanford Family Cyber Lab

The Cyber Security Lab provides you with the opportunity to learn, apply, and practice cyber security. You work with software and employ techniques for intrusion detection, vulnerability mitigation, network perimeter defense, incident response, network forensics investigation, and malware analysis. The lab is used for both digital and hands-on forensic analysis and uses 2D and 3D cameras and visualizers to capture the hands-on activities and rebroadcast them “live” across the classroom and online.

Three students working on computers in SJU Cyber Security Lab

Information Security vs Cyber Security

In the digital world we live in today, the terms “information security” and “cybersecurity” are often used interchangeably. However, despite their similarities, the two concepts have a few key differences that are important to understand.

U.S. Senator Kirsten Gillibrand Talks Cyber Security at St. John’s University

U.S. Senator Kirsten Gillibrand Talks Cyber Security at St. John’s University

St. John’s University welcomed U.S. Senator Kirsten Gillibrand for a tour of the innovative Sanford Family Cyber Security Lab at the Queens, NY, Campus and a wide-ranging discussion of cybersecurity issues and career opportunities for students.

Program Research, Events, and Seminars

St. John’s University leads the way in innovation in this field by staying ahead of the emerging trends and incorporating these trends into our curriculum. Our faculty and students are involved in some of the most cutting-edge research and featured in prominent publications worldwide.

Explore upcoming events and seminars featuring top industry professionals and networking opportunities for students. 

Coming Fall 2024: TechDuals! Participate in a debate that will allow you to build a community, increase your skill sets, and network with industry professionals! More details to come soon!

Academic Year: 2023 - 2024

Wednesday, April 24th, 2024
U.S. Senator Kirsten Gillibrand Talks Cyber Security at St. John’s University
Click here to read the article!

Monday, April 8th, 2024
Am I AI? 
Click here to view our flyer!

Saturday, March 16th, 2024
AI Hackathon Event
Click here to view our flyer!

Cybersecurity in a Global Context
Study Cybersecurity in Rome Italy, during the Spring 2024 semester!
Click here to learn more!

Monday, November 13th, 2023
Generative AI and Cybersecurity
Click here to view our flyer!

Monday, September 11th, 2023
CyRM: Mastering the Management of Cybersecurity Risk
Click here to view our flyer!

 

  • United States and Territories 3rd-Party COVID-19 mHealth Contact Tracing: What are  Security and Privacy Risks. International Journal of Internet of Things and Cyber-Assurance” - International Journal of Information Technology, Control and Automation 2023 | Dr. Suzanna  Schmeelk, Shannon Roth, Christopher Shaw, Mughees Tariq, Julia Rooney, Emily Lackraj, Khalil  Wood, John Kamen, Prof. Denise Dragos
  • “Personalized Outsourced Privacy-Preserving Database Updates for Crowd-Sensed Dynamic  Spectrum Access” - IEEE MELECON22 interdisciplinary international flagship conference | Dr.  Erald Troja, Dr. Nikhil Yadav, student Laura M. Truong '22 CCPS
  • “MobSF: Mobile Health Care Android Applications Through The Lens of Open Source Static  Analysis” - 2020 IEEE MIT Undergraduate Research Technology Conference (URTC) | G.  LaMalva and Dr.S. Schmeelk
  • “Machine Learning Architecture for Signature-Based IoT Intrusion Detection in Smart Energy  Grids” - IEEE MELECON22 interdisciplinary international flagship conference | Dr. Yadav, Dr.  Troja, and Ms. Laura Truong
  • Schmeelk S, Dogo MS, Peng Y, Patra BG. Classifying Cyber-Risky Clinical Notes by Employing Natural Language Processing. Proc Annu Hawaii Int Conf Syst Sci. 2022;2022:4140-4146. doi: 10.24251/hicss.2022.505. Epub 2022 Jan 4. PMID: 35528964; PMCID: PMC9076271.
  • “Python Cryptographic Secure Scripting Concerns: A Study of Three Vulnerabilities” - Advances  in Information and Communication. FICC 2023 | LaMalva, G., Dr. Schmeelk, S., Dinesh, D.
  • “Ambient Intelligence Security Checks: Identifying Integrity Vulnerabilities in Industry  Scripts” - Intelligent Systems and Applications. IntelliSys 2022 | Dr.  Schmeelk, Shannon Roth, Julia Rooney, Mughees Tariq, Khalil Wood, John Kamen, Prof. Denise DragosSchmeelk, S. et al
  • “Locating the Perpetrator: Industry Perspectives of Cellebrite Education and Roles of GIS Data  in Cybersecurity and Digital Forensics” - Intelligent Computing. Lecture Notes in Networks and  Systems, 2021  | Prof. Dragos and Dr. Schmeelk
  • “Defending android applications availability” - IEEE 28th Annual Software Technology  Conference (2017) | Dr.S. S. Schmeelk and Dr. A.A. Aho
  • “Android Malware Static Analysis Techniques” - Proceedings of the 10th Annual Cyber and  Information Security Research Conference (CISR '15) | Dr. S. Schmeelk and Dr. A. Aho

Academic Year: 2022-23  

Saturday, May 27th to Sunday, May 28th, 2023
TechTogether NY
Click here to view our flyer!

Monday, April  24, 2023 
Cybersecurity in a Global Context 
Click here to view our flyer! 

Friday, April 14, 2023 
IPv6 and Its Impact on Cybersecurity, Emerging Technologies, and the Future of Internet 
Speaker: Charles Sun
Click here to view our flyer! 

Tuesday, February, 14, 2023 
Producing Secure Software in Large Scale Agile Environments 
Speaker: Professor Fernando Almeida
Click here to view our flyer! 

Academic Year: 2021-22 

Monday, November 14th, 2022
Tactical Advantages for Healthcare Cybersecurity
Speaker: Brian Tschinkel, VP/CISO Weill Cornell Medical College
Click here to view our flyer!

Thursday, September 29, 2022
Building a CyberSecure Workplace: What are We Doing Wrong 
Speaker: Joel D. Offenberg 
Click here to view our flyer! 

Monday, April 11, 2022 
Who Tracks the Trackers? 
Speaker: Dr. Dane Brown
Click here to view our flyer! 

Tuesday, November 9, 2021  
A Case Against the Smart Things 
Speaker: TJ O'Connor 
Click here to view our flyer! 

Monday, October 18, 2021 
CSIRT and Threat Intelligence/Threat Management 
Speaker: Anish Bachu
Click here to view our flyer! 

Wednesday, September 8, 2021 
The Internet of ‘Insecured’ Things 
Speaker: Tyson Brooks
Click here to view our flyer!

Cybersecurity Industry Advisory Board

Our program advisory board includes alumni and experts in the field of cybersecurity in various positions including faculty, Chief Information Officers, Certified Information Systems Security Officer, and directors for top organizations including , Mandelbaum Salsburg, New Jersey courts, the Open Worldwide Application Security Project, the Protiviti Computer Security Incident Response Team, Reed Elsevier, the Respond Software Industry, Trellix, and Vectra AI.

Meet Our Faculty

Profile photo for Denise M. Dragos
  • Associate Professor

Department

Computer Science, Mathematics and Science

Cyber Security Job Postings for St. John's University Students

Systems Administrator II - Substation at ALLETE Inc

Employer: ALLETE Inc Expires: 10/21/2024 External applicants must apply online via www.allete.com/careers. Systems Administrator II - SubstationID: 5338Company: ALLETE, Inc.Location: Duluth, MNApplication Close Date: 10/21/2024Link: https://phg.tbe.taleo.net/phg04/ats/careers/requisition.jsp?org=ALLETE&cws=43&rid=5338Located in Duluth, Minnesota, ALLETE is the parent company of Minnesota Pow

NobleReach Computing & Cybersecurity Scholar at NobleReach Foundation

Employer: NobleReach Foundation Expires: 12/04/2024 The NobleReach Scholars program transforms ambitious, mission-driven individuals into future leaders in Tech, Science, and Entrepreneurship. This program is both a pathway into public service as well as a platform to solve the most pressing challenges of our time.NobleReach Scholars embark on a one- or two-year journey.

Automation Engineering Graduate Program 2025 at GSK

Employer: GSK Expires: 11/01/2024 Job descriptionSite Name: USA - Maryland - RockvillePosted Date: Sep 18 2024 Join the GSK Automation Graduate Program – US, 2025: Help us get ahead of disease together  Education required: Bachelor’s or Master's degree in Automation Engineering, Mechanical Engineering, Mechatronics Engineering, Electrical/Electronic Engineering, Manufacturing Engineering, Ro

Facts and Questions

Office of Graduate Admission

Michelle Bae headshot

Michelle Bae
Graduate Admission Representative
[email protected]

 

 

Karen Mangan headshot

Karen Mangan
Graduate Admission Representative
[email protected]

 

 

Sasha Velez headshot

Sasha Velez
Graduate Admission Counselor
[email protected]
718-990-2025

Interested in Computing & Technology , but not sure if Cyber and Information Security, Master of Science (M.S.) is right for you?