Security Awareness Programs & Computer-Based Training

Georgia Tech Announces New Online MS in Information Security

Program Targets Working Pros in Private, Public Sectors A new online Master of Science in Information Security degree program has been developed by Georgia Tech to address the growing demand for qualified information security professionals both within the government and the private sector. The program is available in a distance learning format and is targeted primarily for working professionals both within USA and overseas. The degree program will commence in fall of 2010 and will generally take a working professional 24-36 months to complete.

"This program will help students gain a deeper understanding of the cyber threats we face and provide them with the skills and knowledge to create new technologies to solve these emerging security challenges," says Mustaque Ahamad, Professor in the College of Computing School of Computer Science and Director of the Georgia Tech Information Security Center. "This is a fairly rigorous and interesting program that aims at developing experts in information security by integrating the concepts and learning of technology and policy together."

The demand for this program has come largely from industry partners, including companies such as Microsoft, IBM, Intel and Cisco that are extremely interested in having their employees trained in information assurance best practices. Approximately 30 candidates per year are expected to be admitted to the distance program. The selection process requires students to have a strong computer science background, holding excellent academic records and credentials besides recommendation letters and GRE scores.

The new program offers the same course rigor and academic discipline that is found in the traditional on-campus curriculum. Each student is required to complete seven core courses and three additional courses in a self-selected technical or policy specialization.

Core areas of study include Information Security, Applied Cryptography, Network Security, Secure Computer Systems, and Strategies and Policies.

The technical specialization examines the dimensions of providing security for information processing systems, including secure operating systems and applications, network security, cryptography, and security protocols.

The policy concentration focuses on the many non-technical possibilities of information processing and security, including domestic and international policy processes, organizational routines and innovation, risk perception, industry-government relations, and the constitutional framework for governmental actions. An applied research project inspired by real world problem also must be completed.

The tuition cost for both in-state and out-of-state students per semester approximately are $6,140. Georgia Tech is accredited by the National Security Agency (NSA) and the Department of Homeland Security as a Center of Academic Excellence in Information Assurance Education.


About the Author

Upasana Gupta

Upasana Gupta

Contributing Editor, CareersInfoSecurity

Upasana Gupta oversees CareersInfoSecurity and shepherds career and leadership coverage for all Information Security Media Group's media properties. She regularly writes on career topics and speaks to senior executives on a wide-range of subjects, including security leadership, privacy, risk management, application security and fraud. She also helps produce podcasts and is instrumental in the global expansion of ISMG websites by recruiting international information security and risk experts to contribute content, including blogs. Upasana previously served as a resource manager focusing on hiring, recruiting and human resources at Icons Inc., an IT security advisory firm affiliated with ISMG. She holds an MBA in human resources from Maharishi University of Management, Fairfield, Iowa.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.