• Skip to Content
  • AZ Index
  • Catalogue Home
  • Johns Hopkins University Home
Johns Hopkins University
Academic Catalogue | 2024-25 Edition
Class Schedule Search
Search location
  • Catalogue Home
  • Programs
  • Courses
  • Policies & Information
  • Print Options
  • Archives
  • Amendments

Cybersecurity

Whiting School of Engineering

Catalogue Home

  • Explore our Programs
  • University-​wide Policies and Information
    • Academic Policies and Information
      • Academic Calendar
      • Academic Integrity Policies
      • Animal Care and Use Program
      • Credit Hour Policy
      • FERPA
      • PHD Specific Policies
      • Student Leave of Absence Policy
      • Student Status (Course Load)
      • Transcripts and Enrollment Verifications
    • Admission and Aid
      • Tuition, Fees, and Cost of Attendance
        • Financial Aid
    • Higher Education Act Disclosures
      • General Institutional Information
      • Health and Safety Information
      • Student Financial Assistance Information
    • Office of Institutional Equity
      • Discrimination and Harassment Policy and Procedures
      • Equal Opportunity and Title IX Notice
      • Sexual Misconduct Policy and Procedures
    • Rights, Privileges, and Responsibilities
      • Academic Grievance Policy: Students and Postdoctoral Fellows
      • New Child Accommodations for Full-​Time Graduate Students and Postdoctoral Trainees
      • Personal Relationships Policy
      • Photography and Film Rights Policy
      • Student Conduct Code
      • Student Disability Services (SDS)
      • Student Health
    • Veterans Affairs
  • Bloomberg School of Public Health
    • Academic Calendar
    • Admission
    • CEPH Requirements
    • Departments
      • Department of Biochemistry and Molecular Biology
        • Biochemistry and Molecular Biology, MHS
        • Biochemistry and Molecular Biology, ScM
        • Biochemistry and Molecular Biology, PhD
        • Non-​Degree Training
      • Department of Biostatistics
        • Biostatistics, MHS
        • Biostatistics, ScM
        • Biostatistics, PhD
      • Department of Environmental Health and Engineering
        • Environmental Health, MHS
        • Environmental Health, SCM
        • Toxicology for Human Risk Assessment, MS
        • Environmental Health, PhD
        • Non-​Degree Training
      • Department of Epidemiology
        • Epidemiology, MHS
        • Epidemiology, ScM
        • Epidemiology, PhD
        • Non-​Degree Training
      • Department of Health, Behavior and Society
        • Health Education and Health Communication, MSPH
        • Genetic Counseling, ScM
        • Health, Behavior, and Society, MHS
        • Health, Behavior and Society, PhD
        • Non-​Degree Training
      • Department of Health Policy and Management
        • Health Administration, MHA
        • Health Economics and Outcomes Research, MHS
        • Health Finance and Management, MHS
        • Health Policy, MSPH
        • Health Policy and Management, PhD
        • Health Policy and Management, DrPH (Tsinghua)
        • Non-​Degree Training
      • Department of International Health
        • Global Health Economics, MHS
        • International Health, MSPH
        • International Health, MSPH, Human Nutrition-​Dietitian
        • International Health, MA/​MSPH
        • International Health, PhD
        • Non-​Degree Training
      • Department of Mental Health
        • Mental Health, MHS
        • Mental Health, PhD
        • Non-​Degree Training
      • Department of Molecular Microbiology &​ Immunology
        • Molecular Microbiology &​ Immunology, MHS
        • Molecular Microbiology &​ Immunology, ScM
        • Molecular Microbiology &​ Immunology, PhD
        • Non-​Degree Training
      • Department of Population, Family and Reproductive Health
        • Population, Family and Reproductive Health, MHS
        • Population, Family and Reproductive Health, MHS Online
        • Population, Family and Reproductive Health, MSPH
        • Population, Family and Reproductive Health, PhD
      • Doctor of Public Health (DrPH)
      • Graduate Training Programs in Clinical Investigation
        • Graduate Training Programs in Clinical Investigation, MHS
        • Graduate Training Programs in Clinical Investigation, PhD
        • Graduate Training Programs in Clinical Investigation, ScM
      • Master of Arts in Public Health Biology
      • Master of Bioethics
      • Master of Public Health Program
        • DNP/​MPH
        • DVM/​MPH
        • JD/​MPH
        • LLM/​MPH
        • MBA/​MPH with China Europe International Business School
        • MD/​MPH
        • MPH/​MBA
        • MSW/​MPH
      • MAS-​Office
        • Master of Applied Science in Community-​Based Primary Health Care Programs in Global Health
        • Master of Applied Science in Humanitarian Health
        • Master of Applied Science in Patient Safety and Healthcare Quality
        • Master of Applied Science in Population Health Management
        • Master of Applied Science in Spatial Analysis for Public Health
      • Residency Programs
        • General Preventive Medicine Residency Program
        • Occupational and Environmental Medicine Residency
    • Certificates
      • Adolescent Health, Certificate
      • Bioethics, Certificate
      • Climate and Health, Certificate
      • Clinical Trials, Certificate
      • Community-​Based Public Health, Certificate
      • Demographic Methods, Certificate
      • Environmental and Occupational Health, Certificate
      • Epidemiology for Public Health Professionals, Certificate
      • Evaluation: International Health Programs, Certificate
      • Food Systems, the Environment &​ Public Health, Certificate
      • Gender and Health, Certificate
      • Gerontology, Certificate
      • Global Digital Health, Certificate
      • Global Health, Certificate
      • Global Health Practice, Certificate
      • Health and Human Rights, Certificate
      • Health Communication, Certificate
      • Health Disparities and Health Inequality, Certificate
      • Health Education, Certificate
      • Health Finance and Management, Certificate
      • Healthcare Epidemiology and Infection Prevention and Control, Certificate
      • Humane Sciences and Toxicology Policy, Certificate
      • Humanitarian Health, Certificate
      • Implementation Science and Research Practice, Certificate
      • Injury and Violence Prevention, Certificate
      • International Healthcare Management and Leadership, Certificate
      • Leadership for Public Health and Healthcare, Certificate
      • Lesbian, Gay, Bisexual, Transgender, and Queer (LGBTQ) Public Health, Certificate
      • Maternal and Child Health, Certificate
      • Mental Health Policy, Economics and Services, Certificate
      • Pharmacoepidemiology and Drug Safety, Certificate
      • Population and Health, Certificate
      • Population Health Management, Certificate
      • Product Stewardship for Sustainability, Certificate
      • Public Health Advocacy, Certificate
      • Public Health Economics, Certificate
      • Public Health Informatics, Certificate
      • Public Health Practice, Certificate
      • Public Health Preparedness, Certificate
      • Public Health Training Certificate for American Indian Health Professionals
      • Public Mental Health Research, Certificate
      • Quality, Patient Safety, and Outcomes Research, Certificate
      • Quantitative Methods in Public Health, Certificate
      • Rigor, Reproducibility and Responsibility in Scientific Practice, Certificate
      • Risk Sciences and Public Policy, Certificate
      • Spatial Analysis for Public Health, Certificate
      • Training Certificate in Public Health
      • Tropical Medicine, Certificate
      • Vaccine Science and Policy, Certificate
    • Policies
      • Academic
        • Academic Ethics Code
        • Compliance Line
        • Grade Appeal Policy
        • Grading System
        • Graduation Policy
        • Interdivisional Registration
        • Multi-​Term Course Policy
        • Post-​Doctoral Fellow Student Status
        • Student Grievance Policy
        • Voluntary Leave of Absence Policy
      • Research
        • Animal Research
        • Human Subjects Research
        • Worker's Compensation
  • Carey Business School
    • Admission
      • Master’s Programs
      • Certificate Programs
      • Graduate Degree Requirements
      • International Student Admission Policy
      • Verification of Credentials
      • Other Admission Policies
    • Degrees and Certificates
      • Business Administration (Flexible), MBA
      • Business Administration (Full Time), MBA
      • Business Analytics and Risk Management (Part Time), Master of Science
      • Business Analytics and Risk Management, Master of Science
      • Design Leadership, MBA/​MA Dual Degree
      • Finance (Part Time), Master of Science
      • Finance, Master of Science
      • Financial Management, Graduate Certificate
      • Financial Management, Graduate Certificate, Investments, Graduate Certificate, Applied Economics, MS
      • Health Care Management (Part Time), Master of Science
      • Health Care Management, Master of Science
      • Information Systems, Master of Science
      • Investments, Graduate Certificate
      • Leadership Development Program, Graduate Certificate
      • Marketing (Part Time), Master of Science
      • Marketing, Master of Science
      • MBA/​Applied Economics, MS Dual Degree
      • MBA/​Biotechnology, MS Dual Degree
      • MBA/​Communication, MA Dual Degree
      • MBA/​DNP Dual Degree
      • MBA/​Government, MA Dual Degree
      • MBA/​Healthcare Organizational Leadership, MSN Dual Degree
      • MBA/​JD Dual Degree
      • MBA/​MA in International Relations
      • MBA/​MD Dual Degree
      • MBA/​MPH Dual Degree
      • Real Estate and Infrastructure (Part Time), Master of Science
      • Real Estate and Infrastructure, Master of Science
      • Business, Minor
    • Policies and Resources
      • Academic Calendar
      • Academic Ethics Policy
      • Academic Progress and Standards
      • Changing Degree Program
      • Grading Policy
      • Graduation
      • Attendance Policy
      • Leave of Absence
      • Registration
      • Student Accounts
      • Transfer of Graduate Credit
      • Waiver Exams
  • Peabody Institute
    • General Information, Procedures and Regulations
      • Introduction and Nomenclature
      • Mission
      • Accreditation
      • Links
      • Honor Societies
    • Procedural Information
      • Applicability
      • Studio Assignments
      • Course Numbering
      • Large Ensemble Participation
      • Competitions
      • Recitals
      • Academic Advising
      • Inter-​Institutional Academic Arrangements
      • Study Abroad Program
      • Outside Instruction and Public Performance
    • Academic Regulations
      • Applicability
      • Academic Code of Conduct
      • Program Classification, Status, and Credit Limits
      • Sources of Credit
      • Grading System and Regulations
      • Dean's List Criteria
      • Academic Standing
      • Registration Regulations
      • Attendance and Absences
      • Interruption of Degree Work
      • Graduation Eligibility
    • Degree and Diploma Programs
      • Bachelor of Fine Arts in Dance (BFA)
      • Bachelor of Music (BM)
        • Curricula
          • Bachelor of Music in Composition
          • Bachelor of Music in Jazz Performance
          • Bachelor of Music in Music Education
            • Bachelor of Music in Music Education -​ Composition
            • Bachelor of Music in Music Education-​ Guitar
            • Bachelor of Music in Music Education -​ Jazz
            • Bachelor of Music in Music Education -​ Orchestral Instruments
            • Bachelor of Music in Music Education -​ Piano
            • Bachelor of Music in Music Education -​ Voice
          • Bachelor of Music in Music for New Media
          • Bachelor of Music in Performance
            • Bachelor of Music in Performance -​ Computer Music
            • Bachelor of Music in Performance -​ Guitar
            • Bachelor of Music in Performance -​ Harpsichord
            • Bachelor of Music in Performance -​ Historical Performance
            • Bachelor of Music in Performance -​ Orchestral Instruments
            • Bachelor of Music in Performance -​ Organ
            • Bachelor of Music in Performance -​ Piano
            • Bachelor of Music in Performance -​ Voice
          • Bachelor of Music in Recording Arts &​ Sciences
            • Bachelor of Music in Recording Arts &​ Sciences -​ Composition
            • Bachelor of Music in Recording Arts &​ Sciences -​ Computer Music
            • Bachelor of Music in Recording Arts &​ Sciences -​ Guitar
            • Bachelor of Music in Recording Arts &​ Sciences -​ Jazz
            • Bachelor of Music in Recording Arts &​ Sciences -​ Orchestral Instruments
            • Bachelor of Music in Recording Arts &​ Sciences -​ Piano
        • Minors
          • Business of Music, Minor
          • Directed Studies, Minor
          • Historical Performance, Minor
          • Historical Performance: Voice, Minor
          • Liberal Arts, Minor
          • Music Theory, Minor
          • Musicology, Minor
        • Combined Degree Programs
          • Peabody-​Homewood Double Degree Program
        • Accelerated Graduate Degrees
          • Five-​Year BM/​MM Program
          • Five-​Year BMRA/​MA Program
            • Five-​Year BM/​MA: Music for New Media Variant
      • Master of Music (MM)
        • Master of Music in Composition
        • Master of Music in Film and Game Scoring
        • Master of Music: Performance
          • Master of Music, Performance -​ Choral Conducting Specialization
          • Master of Music, Performance -​ Computer Music specialization
          • Master of Music, Performance -​ Guitar specialization
          • Master of Music, Performance -​ Harpsichord specialization
          • Master of Music, Performance -​ Historical Performance Instruments specialization
          • Master of Music, Performance -​ Historical Performance Voice specialization
          • Master of Music, Performance -​ Jazz specialization
          • Master of Music, Performance -​ Orchestral Conducting specialization
          • Master of Music, Performance -​ Orchestral Instruments specialization
          • Master of Music, Performance -​ Organ specialization
          • Master of Music, Performance -​ Piano specialization
          • Master of Music, Performance -​ Wind Conducting specialization
          • Master of Music, Performance -​ Voice specialization
        • Master of Music: Academic Majors
          • Performance, Master of Music -​ Pedagogy emphasis
          • Music Education, Master of Music
          • Musicology, Master of Music
          • Music Theory Pedagogy, Master of Music
        • Master of Music: Low Residency
      • Master of Arts (MA)
        • Audio Sciences: Acoustics, Master of Arts
          • Five-​Year BM/​MA Program Requirements: Acoustics
        • Audio Sciences: Recording Arts and Sciences, Master of Arts
          • Five-​Year BM/​MA Program Requirements: Recording Arts
      • Doctor of Musical Arts (DMA)
        • Composition, Doctor of Musical Arts
        • Performance, Doctor of Musical Arts -​ Guitar specialization
        • Performance, Doctor of Musical Arts -​ Historical Performance Instruments specialization
        • Performance, Doctor of Musical Arts -​ Orchestral Conducting specialization
        • Performance, Doctor of Musical Arts -​ Orchestral Instruments specialization
        • Performance, Doctor of Musical Arts -​ Organ specialization
        • Performance, Doctor of Musical Arts -​ Piano specialization
        • Performance, Doctor of Musical Arts -​ Voice specialization
        • Performance, Doctor of Musical Arts -​ Wind Conducting specialization
      • Performer’s Certificate (PC)
        • Guitar, Performer's Certificate
        • Orchestral Instruments, Performer's Certificate
        • Organ, Performer's Certificate
        • Piano, Performer's Certificate
        • Voice, Performer's Certificate
      • Graduate Performance Diploma (GPD)
      • Artist’s Diploma (AD)
    • Extension Study
      • Music Education Certification -​ Instrumental
      • Music Education Certification -​ Vocal
  • Nitze School of Advanced International Studies
    • Degrees and Certificates
      • International Studies, Doctor of Philosophy
      • International Affairs, Doctor of
      • European Public Policy, Master of Arts
      • Global Policy, Master of Arts
      • Global Risk, Master of Arts (On-​site)
      • Global Risk, Master of Arts (Online)
      • International Affairs, Master of Arts
      • International Economics and Finance, Master of Arts
      • International Relations, Master of Arts
      • International Studies, Master of Arts
      • International Public Policy, Master of
      • Strategy, Cybersecurity, and Intelligence, Master of Arts
      • Sustainable Energy, Master of Arts (Online)
      • Chinese and American Studies, Hopkins-​Nanjing Center Certificate
      • Dual Degrees and Exchange Programs
      • Graduate Certificates
      • International Studies, Diploma
    • Policies and Resources
      • Academic Integrity
      • Academic Policies and Resources
      • Student Life
    • School Leadership and Key Contacts
  • School of Education
    • Academic and Student Policies
      • Academic and Student Conduct Policies
      • Academic Standards
      • Grading System and Academic Records
      • Grievances and Complaints
    • Admission
    • Graduation
    • Programs
      • Doctoral Programs
        • Education (Online), EdD
        • Education, PhD
      • Master's Programs
        • Counseling, Master of Science
        • Education, Master of Science
          • Education, Master of Science – Digital Age Learning and Educational Technology (Online)
          • Education, Master of Science -​ Educational Studies
          • Education, Master of Science -​ Gifted Education
          • Education, Master of Science -​ School Administration and Supervision
        • Education Policy, Master of Science
        • Health Professions (Online), Master of Education
        • Special Education, Master of Science
        • Teaching Professionals, Master of Education
      • Post Master's Certificates
        • Applied Behavior Analysis, Post–Master’s Certificate
        • Clinical Mental Health Counseling, Post–Master’s Certificate
        • Evidence-​Based Teaching in the Health Professions, Post–Master’s Certificate
      • Certificate of Advanced Graduate Study
        • Counseling, Certificate of Advanced Graduate Study
      • Graduate Certificates
        • Education of Students with Autism and Other Pervasive Developmental Disorders, Graduate Certificate
        • Educational Leadership for Independent Schools, Graduate Certificate
        • Gifted Education, Graduate Certificate
        • Leadership in Technology Integration (Online), Graduate Certificate
        • Mathematics/​STEM Instructional Leader (PreK-​6) (Online), Graduate Certificates
        • Mind, Brain and Teaching (Online), Graduate Certificate
        • School Administration and Supervision, Graduate Certificate
        • Urban Education, Graduate Certificate
    • Centers &​ Institutes
    • Scholarships
    • State Authorization of Distance Education (NC-​SARA)
  • School of Medicine
    • General Information
      • Conduct in Teacher/​Learner Relationships (Student Mistreatment Policy)
      • Lectureships and Visiting Professorships
      • Loan Funds
      • Medical Student Advising
      • Named Professorships
      • Office of Medical Student Affairs
      • Scholarships
      • Student Research Scholarships and Awards
      • Tuition
      • Tuition and Other Fees
      • Young Investigators’ Day
    • Policies
    • Graduate Programs
      • Anatomy Education, MS
      • Applied Health Sciences Informatics, MS
      • Biochemistry, Cellular and Molecular Biology, PhD
      • Biological Chemistry, PhD
      • Biomedical Engineering, PhD
      • Biophysics and Biophysical Chemistry, PhD/​Molecular Biophysics, PhD
      • Cellular and Molecular Medicine, PhD
      • Cellular and Molecular Physiology, PhD
      • Clinical Anaplastology, MS
      • Clinical Informatics, Post-​Baccalaureate Certificate
      • Cross-​Disciplinary Program in Biomedical Sciences, PhD
      • Functional Anatomy and Evolution, PhD
      • Health Sciences Informatics, PhD
      • Health Sciences Informatics–Research, MS
      • History of Medicine, MA (On-​site)
      • History of Medicine, MA (Online)
      • History of Medicine, PhD
      • History of Medicine, Post-​Baccalaureate Certificate (Online)
      • Human Genetics and Genomics, PhD
      • Immunology, PhD
      • Medical and Biological Illustration, MA
      • Medical Physics, MS
      • Neuroscience, PhD
      • Pathobiology, PhD
      • Pharmacology, PhD
    • Medical Program
      • Doctor of Medicine, MD
      • MD-​PhD, Combined Degree
      • Subject Areas
        • Anesthesiology and Critical Care Medicine
        • Biological Chemistry
        • Biomedical Engineering
        • Biophysics and Biophysical Chemistry
        • Cell Biology
        • Department of Genetic Medicine
        • Dermatology
        • Emergency Medicine
        • Epidemiology
        • Functional Anatomy and Evolution
        • Gynecology and Obstetrics
        • Health Sciences Informatics
        • History of Medicine
        • Medicine
        • Molecular and Comparative Pathobiology
        • Molecular Biology and Genetics
        • Multi-​Department Courses
        • Neurology
        • Neuroscience
        • Oncology
        • Ophthalmology
        • Pathology
        • Pediatrics
        • Pharmacology and Molecular Sciences
        • Physical Medicine and Rehabilitation
        • Physiology
        • Psychiatry and Behavioral Sciences
        • Public Health
        • Radiation Oncology and Molecular Radiation Sciences
        • Radiology and Radiological Science
        • Section of Surgical Sciences
    • Postdoctoral Fellows
  • School of Nursing
    • Admission
    • Advising
    • Certificates
      • Healthcare Organizational Leadership, Post-​Master’s Certificate
      • Nursing Education, Post-​Master's Certificate
      • Pediatric Acute Care Nurse Practitioner, Post-​Master's Certificate
      • Psychiatric Mental Health Nurse Practitioner, Post-​Master's Certificate
    • Doctoral Degrees
      • Doctor of Nursing Practice, Advanced Practice Track
        • Adult-​Gerontological Acute Care Nurse Practitioner, DNP Advanced Practice Track
        • Adult-​Gerontological Critical Care Clinical Nurse Specialist, DNP Advanced Practice Track
        • Adult-​Gerontological Health Clinical Nurse Specialist, DNP Advanced Practice Track
        • Adult-​Gerontological Primary Care Nurse Practitioner, DNP Advanced Practice Track
        • Family Primary Care Nurse Practitioner, DNP Advanced Practice Track
        • Nurse Anesthesia, DNP Advanced Practice Track
        • Pediatric Critical Care Clinical Nurse Specialist, DNP Advanced Practice Track
        • Pediatric Dual Primary/​Acute Care Nurse Practitioner, DNP Advanced Practice Track
        • Pediatric Primary Care Nurse Practitioner, DNP Advanced Practice Track
        • Psychiatric Mental Health Nurse Practitioner, DNP Advanced Practice Track
      • Doctor of Nursing Practice: Executive Track
      • Nursing, Doctor of Philosophy
      • Doctor of Nursing Practice (DNP): Advanced Practice Track/​Doctor of Philosophy in Nursing (PhD) Dual Degree
    • Dual Degrees
      • DNP Executive/​MBA Dual Degree
      • DNP Executive/​MPH Dual Degree
      • Healthcare Organizational Leadership, MSN/​MBA, Dual Degree
    • Financial Aid
    • Master's Degrees
      • Entry into Nursing, Master of Science in Nursing
      • Healthcare Organizational Leadership Track, Master of Science in Nursing
    • Online Prerequisites for Health Professions
    • Policies
      • Academic Integrity Policy
      • Academic Standards for Progression
      • Administrative Leave
      • Absence and Attendance Policy
      • Canvas and SON IT Help
      • Clinical Placements
      • Clinical Warnings
      • Complaint/​Grievance Policy
      • Compliance
      • Course Policies
      • Criminal Conduct/​Background Check Policies
      • Drug Testing Policy
      • Email Policy
      • Examination Policy
      • Grading Policy
      • Health Insurance for Students
      • Incomplete Coursework
      • Independent Study Policy
      • Leave of Absence
      • Letters of Recommendation
      • NCLEX
      • Non-​Degree-​Seeking Students
      • Notification of Missed Clinical Time
      • Pet Guidelines
      • Printing and Copying
      • Professional Attire Policy
      • Professional Ethics Policy
      • Registration Policies and Procedures
      • Religious Observance Attendance Policy
      • Social Media Guidelines
      • Student Code of Conduct
      • Technical Standards for Admission and Graduation
      • Transcripts and Enrollment Verifications
      • Transfer of Graduate Credit
      • Withdrawal Policy
    • Student Accounts
    • Tuition and Fees
  • Whiting School of Engineering
    • Full-​time, On-​campus Undergraduate and Graduate Programs (Homewood)
      • Zanvyl Krieger School of Arts and Sciences &​ Whiting School of Engineering Full-​Time, On-​Campus Undergraduate and Graduate Policies
      • Departments, Program Requirements, and Courses
        • Applied Mathematics and Statistics
          • Applied Mathematics and Statistics, Bachelor of Arts
          • Applied Mathematics and Statistics, Bachelor of Science
          • Applied Mathematics and Statistics, Master of Science in Engineering
          • Applied Mathematics and Statistics, Minor
          • Applied Mathematics and Statistics, PhD
          • Data Science, Master's Degree
          • Financial Mathematics, Master of Science in Engineering
        • Biomedical Engineering
          • Bioengineering Innovation and Design, Master of Science in Engineering
          • Biomedical Engineering, Bachelor of Arts
          • Biomedical Engineering, Bachelor of Science
          • Biomedical Engineering, Master of Science in Engineering
          • Biomedical Engineering, PhD through the School of Medicine
        • Center for Leadership Education
          • Accounting and Financial Management, Minor
          • Engineering Management, Master of Science
          • Global Innovation and Leadership Through Engineering, Master of Science
          • Leadership Studies, Minor
          • Marketing and Communications, Minor
          • Professional Communication Program
          • Professional Development Program
          • W.P. Carey Entrepreneurship and Management, Minor
        • Chemical and Biomolecular Engineering
          • Chemical and Biomolecular Engineering, Bachelor of Science
          • Chemical and Biomolecular Engineering, Master of Science in Engineering
          • Chemical and Biomolecular Engineering, PhD
        • Civil &​ Systems Engineering
          • Civil Engineering, Bachelor of Science
          • Civil Engineering, Master of Science in Engineering (MSE)
          • Civil Engineering, Minor
          • Civil and Systems Engineering, PhD
          • Systems Engineering, Bachelor of Science
          • Systems Engineering, Master of Science
          • Systems Engineering, Minor
        • Computational Medicine
          • Computational Medicine, Minor
        • Computer Science
          • Computer Science, Bachelor of Arts
          • Computer Science, Bachelor of Science
          • Computer Science, Master of Science in Engineering
          • Computer Science, Minor
          • Computer Science, PhD
        • Doctor of Engineering
          • Engineering, Doctor of Engineering
        • Electrical and Computer Engineering
          • Computer Engineering, Bachelor of Science
          • Electrical and Computer Engineering, Master of Science in Engineering
          • Electrical and Computer Engineering, PhD
          • Electrical Engineering, Bachelor of Science
          • Energy, Minor
        • Environmental Health and Engineering
          • Engineering for Sustainable Development, Minor
          • Environmental Engineering, Bachelor of Science
          • Environmental Engineering, Minor
          • Environmental Sciences, Minor
          • Geography and Environmental Engineering, Master of Arts
          • Geography and Environmental Engineering, Master of Science
          • Geography and Environmental Engineering, Master of Science in Engineering
          • Geography and Environmental Engineering, PhD
          • Occupational and Environmental Hygiene, Master of Science
        • General Engineering
          • General Engineering, Bachelor of Arts
        • Information Security Institute
          • Security Informatics, Master of Science
          • Security Informatics, Master of Science/​Applied Mathematics and Statistics, Master of Science in Engineering Dual Master's Program
          • Security Informatics, Master of Science/​Computer Science, Master of Science in Engineering Dual Master's Program
        • Materials Science and Engineering
          • Materials Science and Engineering, Bachelor of Science
          • Materials Science and Engineering, Master of Science in Engineering
          • Materials Science and Engineering, PhD
        • Mechanical Engineering
          • Engineering Mechanics, Bachelor of Science
          • Mechanical Engineering, Bachelor of Science
          • Mechanical Engineering, Master of Science in Engineering
          • Mechanical Engineering, PhD
        • NanoBioTechnology
        • Robotics and Computational Sensing
          • Computer Integrated Surgery, Minor
          • Robotics, Master of Science in Engineering
          • Robotics, Minor
      • Multi-​School Programs of Study
        • Business, Minor
        • Peabody-​Homewood Double Degree Program
        • Space Science and Engineering
    • Part-​Time, Online Graduate Programs (Engineering for Professionals)
      • Academic Policies
        • Academic Calendar
        • Academic Regulations
        • Registration Policies
        • Tuition and Fees
      • Admission Requirements
      • Applied and Computational Mathematics
        • Applied and Computational Mathematics, Graduate Certificate
        • Applied and Computational Mathematics, Master of Science
        • Applied and Computational Mathematics, Post-​Master’s Certificate
      • Applied Biomedical Engineering
        • Applied Biomedical Engineering, Graduate Certificate
        • Applied Biomedical Engineering, Master of Science
        • Applied Biomedical Engineering, Post-​Master’s Certificate
      • Applied Physics
        • Applied Physics, Master of Science
        • Applied Physics, Post-​Master’s Certificate
      • Artificial Intelligence
        • Artificial Intelligence, Graduate Certificate
        • Artificial Intelligence, Master of Science
      • Chemical and Biomolecular Engineering
        • Chemical and Biomolecular Engineering, Master of Chemical and Biomolecular Engineering
      • Civil Engineering
        • Civil Engineering, Graduate Certificate
        • Civil Engineering, Master of Civil Engineering
      • Computer Science
        • Computer Science, Graduate Certificate
        • Computer Science, Master of Science
        • Computer Science, Post-​Master’s Certificate
      • Cybersecurity
        • Cybersecurity, Graduate Certificate
        • Cybersecurity, Master of Science
        • Cybersecurity, Post-​Master’s Certificate
      • Data Science
        • Data Science, Graduate Certificate
        • Data Science, Master of Science
        • Data Science, Post-​Master’s Certificate
      • Electrical and Computer Engineering
        • Electrical and Computer Engineering, Graduate Certificate
        • Electrical and Computer Engineering, Master of Science
        • Electrical and Computer Engineering, Post-​Master’s Certificate
      • Engineering Management
        • Engineering Management, Graduate Certificate
        • Engineering Management, Master of Engineering Management
      • Environmental Engineering, Science, Management, and Sustainability Programs
        • Climate Change, Energy, and Environmental Sustainability, Graduate Certificate
        • Climate, Energy, and Environmental Sustainability, Master of Science
        • Environmental Engineering
          • Environmental Engineering, Graduate Certificate
          • Environmental Engineering, Master of Environmental Engineering
          • Environmental Engineering, Post-​Master’s Certificate
        • Environmental Engineering and Science
          • Environmental Engineering and Science, Graduate Certificate
          • Environmental Engineering and Science, Master of Science
          • Environmental Engineering and Science, Post-​Master’s Certificate
        • Environmental Planning and Management
          • Environmental Planning and Management, Graduate Certificate
          • Environmental Planning and Management, Master of Science
          • Environmental Planning and Management, Post-​Master’s Certificate
      • Financial Mathematics
        • Financial Mathematics, Master of Science
        • Financial Risk Management, Graduate Certificate
        • Quantitative Portfolio Management, Graduate Certificate
        • Securitization, Graduate Certificate
      • Healthcare Systems Engineering
        • Healthcare Systems Engineering, Master of Science
      • Industrial and Operations Engineering
        • Industrial and Operations Engineering, Master of Science
      • Information Systems Engineering
        • Information Systems Engineering, Graduate Certificate
        • Information Systems Engineering, Master of Science
        • Information Systems Engineering, Post-​Master’s Certificate
      • Materials Science and Engineering
        • Materials Science and Engineering, Master of Science
      • Mechanical Engineering
        • Mechanical Engineering, Master of Science
        • Mechanical Engineering, Post-​Master’s Certificate
      • Occupational and Environmental Hygiene
        • Occupational and Environmental Hygiene, Master of Science
      • Robotics and Autonomous Systems
        • Robotics and Autonomous Systems, Master of Science
      • Space Systems Engineering
        • Space Systems Engineering, Master of Science
        • Space Systems Engineering, Post-​Master's Certificate
      • Systems Engineering
        • Systems Engineering, Graduate Certificate
        • Systems Engineering, Master of Science
        • Systems Engineering, Master of Science in Engineering (ABET-​accredited)
        • Systems Engineering, Post-​Master’s Certificate
  • Zanvyl Krieger School of Arts and Sciences
    • Full-​time, On-​campus Undergraduate and Graduate Programs (Homewood)
      • Zanvyl Krieger School of Arts and Sciences &​ Whiting School of Engineering Full-​Time, On-​Campus Undergraduate and Graduate Policies
      • Departments, Program Requirements, and Courses
        • Anthropology
          • Anthropology, Bachelor of Arts
          • Anthropology, Minor
          • Anthropology, PhD
        • Archaeology
          • Archaeology, Bachelor of Arts
          • Archaeology, Minor
        • Behavioral Biology Program
          • Behavioral Biology, Bachelor of Arts
        • Bioethics
          • Bioethics, Minor
        • Biology
          • Biology, Bachelor of Arts
          • Biology, Bachelor of Arts/​Master of Science
          • Biology, PhD
          • Molecular &​ Cellular Biology, Bachelor of Science/​Master of Science
          • Molecular and Cellular Biology, Bachelor of Science
        • Biophysics
          • Biophysics, Bachelor of Arts
          • Biophysics, Fifth-​Year Master’s Degree
          • Biophysics, PhD -​ Jenkins Biophysics Program
          • Biophysics, PhD -​ Program in Molecular Biophysics
        • Center for Africana Studies
          • Africana Studies, Bachelor of Arts
          • Africana Studies, Minor
        • Center for Economy and Society
          • Moral and Political Economy, Bachelor of Arts
        • Center for Language Education
        • Chemical Biology
          • Chemical Biology, PhD
        • Chemistry
          • Chemistry, Bachelor of Science
          • Chemistry, PhD
        • Classics
          • Classics, Bachelor of Arts
          • Classics, Bachelor of Arts/​Master of Arts
          • Classics, Minor
          • Classics, PhD
        • Cognitive Science
          • Cognitive Science, Bachelor of Arts
          • Cognitive Science, Master of Arts
          • Cognitive Science, PhD
          • Linguistics, Minor
        • Comparative Thought and Literature
          • Humanistic Studies, PhD
        • Earth and Planetary Sciences
          • Earth and Planetary Sciences, PhD
          • Earth and Planetary Sciences, Bachelor of Arts
          • Earth and Planetary Sciences, Minor
          • Energy, Minor
          • Environmental Science, Bachelor of Science
          • Environmental Studies, Bachelor of Arts
          • Environmental Studies, Minor
        • East Asian Studies
          • East Asian Studies, Bachelor of Arts
          • East Asian Studies, Minor
        • Economics
          • Economics, Bachelor of Arts
          • Economics, Minor
          • Economics, PhD
          • Financial Economics, Minor
        • English
          • English, Bachelor of Arts
          • English, Minor
          • English, PhD
        • Film and Media Studies
          • Film and Media Studies, Bachelor of Arts
          • Film and Media Studies, Minor
        • History
          • History, Bachelor of Arts
          • History, Bachelor of Arts/​Master of Arts Four-​Year Program
          • History, Minor
          • History, PhD
        • History of Art
          • History of Art, Bachelor of Arts
          • History of Art, Minor
          • History of Art, PhD
          • History of Art, Bachelor of Arts/​Master of Arts
        • History of Science and Technology
          • History of Science and Technology, PhD
          • History of Science, Medicine and Technology, Minor
          • History of Science, Medicine, and Technology, Bachelor of Arts
        • Interdisciplinary Studies
          • Interdisciplinary Studies, Bachelor of Arts
        • International Studies
          • International Studies, Bachelor of Arts
          • International Studies B.A./​M.A. Program with Sciences Po
          • International Studies B.A./​M.A. Program with the Paul H. Nitze School of Advanced International Studies (SAIS)
        • Islamic Studies
          • Islamic Studies, Minor
        • Jewish Studies
          • Jewish Languages and Literatures, PhD
          • Jewish Studies, Minor
        • Latin American, Caribbean, and Latinx Studies (LACLxS)
          • Latin American, Caribbean, and Latinx Studies, Bachelor of Arts
          • Latin American, Caribbean, and Latinx Studies, Minor
        • Mathematics
          • Mathematics, Bachelor of Arts
          • Mathematics, Minor
          • Mathematics, Bachelor of Arts/​Master of Arts
          • Mathematics, PhD
        • Medicine, Science, and the Humanities
          • Medicine, Science, and the Humanities, Bachelor of Arts
        • Military Science
        • Modern Languages and Literatures
          • Film and Media Studies, Graduate Certificate
          • French, Bachelor of Arts
          • French, Minor
          • French, PhD
          • German Bachelor of Arts/​Master of Arts
          • German, Bachelor of Arts
          • German, Minor
          • German, PhD
          • Italian, Bachelor of Arts
          • Italian, Minor
          • Italian, PhD
          • Romance Languages, Bachelor of Arts
          • Spanish, Bachelor of Arts
          • Spanish for the Professions, Minor
          • Spanish Language and Hispanic Cultures, Minor
          • Spanish, PhD
        • Museums and Society
          • Museums and Society, Minor
        • Music
          • Music, Minor
        • Natural Sciences Area Major
          • Natural Sciences Area, Bachelor of Arts
        • Near Eastern Studies
          • Near Eastern Studies, Bachelor of Arts
          • Near Eastern Studies, Minor
          • Near Eastern Studies, PhD
        • Neuroscience
          • Neuroscience, Bachelor of Science
          • Neuroscience, Bachelor of Science/​Master of Science
        • Philosophy
          • Philosophy, Bachelor of Arts
          • Philosophy, Bachelor of Arts/​Master of Arts
          • Philosophy, Minor
          • Philosophy, PhD
        • Physics and Astronomy
          • Astronomy and Astrophysics, PhD
          • Physics, Bachelor of Arts
          • Physics, Bachelor of Science
          • Physics, Bachelor of Science/​Master of Science
          • Physics, Minor
          • Physics, PhD
        • Political Science
          • Political Science, Bachelor of Arts
          • Political Science, PhD
        • Psychological and Brain Sciences
          • Psychology, Bachelor of Arts
          • Psychology, Minor
          • Psychology, PhD
        • Public Health Studies
          • Public Health Studies, Bachelor of Arts
        • SNF Agora Institute
          • Civic Life, Minor
        • Sociology
          • Sociology, Bachelor of Arts
          • Sociology, PhD
          • Sociology, PhD/​Applied Mathematics and Statistics, MSE Joint Program
        • Space Science and Engineering
          • Space Science and Engineering, Minor
        • Study of Women, Gender, and Sexuality
          • Women, Gender, and Sexuality, Minor
        • Theatre Arts and Studies
          • Theatre Arts and Studies, Minor
        • Visual Arts
          • Visual Arts, Minor
        • Writing Seminars
          • Writing Seminars Minor
          • Writing Seminars, Bachelor of Arts
          • Writing Seminars, Master of Fine Arts
      • Multi-​School Programs of Study
    • Graduate and Professional Programs (Advanced Academic Programs)
      • About Krieger School of Arts and Sciences
      • Administration and Faculty
      • Admission
      • Alumni
      • Current Students
        • Academic Regulations for Online Courses
        • Academic Structure
        • Grades /​ Performance /​ Conduct
        • Graduation Requirements
        • Registration
        • Tuition and Fees
      • Programs
        • Applied Economics, Master of Science
          • Applied Economics, MS/​ Investment Certificate
          • Applied Economics, MS/​Financial Management Certificate
        • Applied Economics, MS/​MBA Dual Degree
        • Center for Data Analytics, Policy, and Government
          • Data Analytics and Policy, Master of Science
            • Data Analytics and Policy, MS/​Intelligence, Certificate
          • Data Analytics and Policy, Certificate
          • Geospatial Intelligence, Master of Science
          • Global Security Studies, Master of Arts
            • Global Security Studies, MA/​Intelligence, Certificate
          • Government, MA/​MBA
          • Government, Master of Arts
            • Government, MA/​Intelligence, Certificate
          • Intelligence Analysis, Master of Science
          • Intelligence, Certificate
          • Non-​Profit Management, Master of Arts
          • Non-​Profit Management, Certificate
          • Public Management, Master of Arts
            • Public Management, MA/​Data Analytics and Policy, Certificate
            • Public Management, MA/​Intelligence, Certificate
            • Public Management, MA/​Non-​Profit Management, Certificate
        • Center for Biotechnology Education
          • Bioinformatics, Master of Science
          • Biotechnology, Master of Science
          • Biotechnology, MS/​MBA
          • Biotechnology Education, Certificate
          • Biotechnology Enterprise, Certificate
          • Food Safety Regulation, Master of Science
          • Individualized Genomics and Health, Master of Science
          • Master of Biotechnology Enterprise and Entrepreneurship
          • Regenerative and Stem Cell Technologies, Master of Science
          • Regulatory Science, Master of Science
          • Sequence Analysis and Genomics, Post-​Master's Certificate
        • Communication, Master of Arts
          • Communication, Master of Arts/​MBA
          • Communication, Master of Arts/​Non-​Profit Management, Certificate
        • Cultural Heritage Management, Master of Arts
          • Cultural Heritage Management, MA/​Digital Curation, Certificate
          • Cultural Heritage Management, MA/​Non-​Profit Management, Certificate
        • Digital Curation, Certificate
        • Energy Policy and Climate, Master of Science
        • Environmental Sciences and Policy, Master of Science
          • Environmental Sciences and Policy, MS/​Geographic Information Systems, Certificate
        • Film and Media, Master of Arts
        • Financial Economics, Master of Science
        • Geographic Information Systems, Master of Science
          • Geographic Information Systems, Certificate
        • Master of Liberal Arts
        • Museum Studies, Master of Arts
          • Museum Studies, MA/​Digital Curation, Certificate
          • Museum Studies, MA/​Non-​Profit Management, Certificate
        • Organizational Leadership, Master of Science
        • Quantitative Methods in Applied Economics, Post-​Master’s Certificate
        • Research Administration, Master of Science
        • Science Writing, Master of Arts
          • Science Writing, Certificate
        • Teaching Writing, Master of Arts
          • Teaching Writing, Certificate
        • Writing, Master of Arts
  • Zanvyl Krieger School of Arts and Sciences &​ Whiting School of Engineering Full-​Time, On-​Campus Undergraduate and Graduate Policies
    • Graduate Policies
      • Academic Policies
      • Admissions and Finances
      • Graduate-​Specific Policies
      • Student Life
        • International Graduate Students
    • Undergraduate Policies
      • Academic Policies
        • Requirements for a Bachelor's Degree
        • Student Status
        • Registration Policies
        • Grading Policies
        • Academic Standing Policies
        • External Credit Policies
        • Study Abroad Policies
        • Graduation Policies
      • Student Life Policies
  • Course Descriptions
    • AS.001 (AS First Year Seminars)
    • AS.004 (AS University Writing Program)
    • AS.010 (History of Art)
    • AS.020 (Biology)
    • AS.030 (Chemistry)
    • AS.040 (Classics)
    • AS.050 (Cognitive Science)
    • AS.060 (English)
    • AS.061 (Film and Media Studies)
    • AS.070 (Anthropology)
    • AS.080 (Neuroscience)
    • AS.100 (History)
    • AS.110 (Mathematics)
    • AS.130-​134 (Near Eastern Studies)
    • AS.136 (Archaeology)
    • AS.140 (History of Science, Medicine, and Technology)
    • AS.145 (Medicine, Science and the Humanities)
    • AS.150 (Philosophy)
    • AS.171-​173 (Physics &​ Astronomy)
    • AS.180 (Economics)
    • AS.190-​191 (Political Science)
    • AS.192 (International Studies)
    • AS.194 (Islamic Studies)
    • AS.196 (Agora Institute)
    • AS.197 (Economy and Society)
    • AS.200 (Psychological &​ Brain Sciences)
    • AS.210-​217 (Modern Languages &​ Literatures)
    • AS.220 (Writing Seminars)
    • AS.225 (Theatre Arts &​ Studies)
    • AS.230 (Sociology)
    • AS.250 (Biophysics)
    • AS.270-​271 (Earth &​ Planetary Sciences)
    • AS.280 (Public Health Studies)
    • AS.290 (Behavioral Biology)
    • AS.300 (Comparative Thought and Literature)
    • AS.310 (East Asian Studies)
    • AS.360 (Interdepartmental)
    • AS.361 (Latin American, Caribbean, and Latinx Studies)
    • AS.362 (Center for Africana Studies)
    • AS.363 (Study of Women, Gender, &​ Sexuality)
    • AS.370/​373/​375/​377-​381 (Center for Language Education)
    • AS.371 (Art)
    • AS.374 (Military Science)
    • AS.376 (Music)
    • AS.389 (Program in Museums and Society)
    • AS.410 ( Biotechnology)
    • AS.420 ( Environmental Sciences)
    • AS.425 ( Energy Policy and Climate)
    • AS.430 ( Geographic Information Systems)
    • AS.440 ( Applied Economics)
    • AS.450 ( Liberal Arts)
    • AS.455 ( Film and Media)
    • AS.460 ( Museum Studies)
    • AS.465 ( Cultural Heritage Management)
    • AS.470 ( Government)
    • AS.472 ( Geospatial Intelligence)
    • AS.475 ( Research Administration)
    • AS.480 ( Communication)
    • AS.485 ( Organizational Leadership)
    • AS.490 ( Writing)
    • AS.491 ( Science Writing)
    • AS.492 ( Teaching Writing)
    • AS.492 (Non-​Departmental)
    • AS.999 (AAP)
    • BU.001 (Graduate Business)
    • BU.001 (MBA)
    • BU.120 (Management)
    • BU.132 (Real Estate)
    • BU.210 (Finance)
    • BU.300 (Information Systems)
    • BU.410 (Marketing)
    • BU.510 (Quantitative Methods)
    • BU.550 (Business of Health)
    • BU.610 (Operations Management)
    • ED (Education)
    • EN.500 (General Engineering)
    • EN.501 (EN First Year Seminars)
    • EN.510 (Materials Science &​ Engineering)
    • EN.515 (Materials Science and Engineering)
    • EN.520 (Electrical &​ Computer Engineering)
    • EN.525 (Electrical and Computer Engineering)
    • EN.530 (Mechanical Engineering)
    • EN.535 (Mechanical Engineering)
    • EN.540 (Chemical &​ Biomolecular Engineering)
    • EN.545 (Chemical and Biomolecular Engineering)
    • EN.553 (Applied Mathematics &​ Statistics)
    • EN.555 (Financial Mathematics)
    • EN.560 (Civil and Systems Engineering)
    • EN.565 (Civil Engineering)
    • EN.570 (Environmental Health and Engineering)
    • EN.575 (Environmental Engineering and Science)
    • EN.575 (Environmental Engineering)
    • EN.575 (Environmental Planning and Management)
    • EN.580 (Biomedical Engineering)
    • EN.585 (Applied Biomedical Engineering)
    • EN.595 (Engineering Management)
    • EN.601 (Computer Science)
    • EN.605 (Computer Science)
    • EN.615 (Applied Physics)
    • EN.620 (Robotics)
    • EN.625 (Applied and Computational Mathematics)
    • EN.635 (Information Systems Engineering)
    • EN.645 (Systems Engineering)
    • EN.650 (Information Security Institute)
    • EN.655 (Healthcare Systems Engineering)
    • EN.660-​663 (Center for Leadership Education)
    • EN.665 (Robotics and Autonomous Systems)
    • EN.670 (Institute for NanoBio Technology)
    • EN.675 (Space Systems Engineering)
    • EN.685 (Data Science)
    • EN.695 (Cybersecurity)
    • EN.700 (Doctor of Engineering)
    • EN.705 (Artificial Intelligence)
    • ME.100 (Biophsyics and Biophysical Chemistry)
    • ME.110 (Cell Biology)
    • ME.120 (Art as Applied to Medicine)
    • ME.130 (Functional Anatomy and Evolution)
    • ME.140 (Gynecology and Obstetrics)
    • ME.150 (The History of Medicine)
    • ME.200 (Neurology)
    • ME.210 (Biomedical Engineering)
    • ME.220 (Dermatology)
    • ME.250 (Medicine)
    • ME.250 (Health Sciences Informatics)
    • ME.260 (Molecular Biology and Genetics)
    • ME.280 (Ophthalmology)
    • ME.290 (Otolaryngology-​Head and Neck Surgery)
    • ME.300 (Pathology)
    • ME.320 (Pediatrics)
    • ME.330 (Pharmacology and Molecular Sciences)
    • ME.340 (Biological Chemistry)
    • ME.360 (Physiology)
    • ME.370 (Psychiatry and Behavioral Sciences)
    • ME.380 (Surgery)
    • ME.381 (Plastic and Reconstructive Surgery)
    • ME.390 (Neurological Surgery)
    • ME.400 (Orthopedic Surgery)
    • ME.420 (Radiology and Radiological Science)
    • ME.440 (Neuroscience)
    • ME.520 (Emergency Medicine)
    • ME.510 (Oncology Center)
    • ME.560 (Urology)
    • ME.570 (Anesthesiology and Critical Care Medicine)
    • ME.580 (Biomedical Engineering)
    • ME.600 (Health Sciences Informatics)
    • ME.680 (Molecular and Comparative Pathobiology)
    • ME.700 (Immunology)
    • ME.710 (Human Genetics)
    • ME.711 (Berman Bioethics Institute)
    • ME.716 (Physical Medicine and Rehabilitation)
    • ME.717 (Radiation Oncology and Molecular Radiation Sciences)
    • ME.800 (Interdepartmental)
    • NR (Nursing)
    • PH.120 (Biochemistry and Molecular Biology)
    • PH.140 (Biostatistics)
    • PH.220 (International Health)
    • PH.260 (Molecular Microbiology and Immunology)
    • PH.300 (Health Policy and Management)
    • PH.330 (Mental Health)
    • PH.340 (Epidemiology)
    • PH.380 (Population Family and Reproductive Health)
    • PH.390 (Clinical Investigation)
    • PH.410 (Health Behavior and Society)
    • PH.550 (Extradepartmental Studies)
    • PH.600 (MAS-​Office)
    • PH.700 (Berman Institute)
    • PY.010 (Studio Lessons)
    • PY.113 (Recitals)
    • PY.123 (General Studies)
    • PY.123 (Professional Studies)
    • PY.250 (Humanities -​ Language)
    • PY.260 (Humanities -​ Liberal Arts)
    • PY.310 (Composition)
    • PY.320 (New Media)
    • PY.330 (Conducting)
    • PY.350 (Computer Music)
    • PY.380 (Historical Performance)
    • PY.410 (Brass)
    • PY.415 (Percussion)
    • PY.420 (Harp)
    • PY.425 (Strings)
    • PY.430 (Woodwinds)
    • PY.450 (Ensemble Arts)
    • PY.450 (Piano/​Keyboard)
    • PY.460 (Organ)
    • PY.470 (Guitar)
    • PY.510 (Music Education)
    • PY.520 (Pedagogy)
    • PY.530 (Voice)
    • PY.540 (Opera)
    • PY.550 (Recording Arts and Sciences)
    • PY.570 (Jazz)
    • PY.610 (Musicology)
    • PY.710 (Music Theory)
    • PY.715 (Music Theory -​ ET/​SS)
    • PY.715 (Music Theory -​ Keyboard Studies)
    • PY.800 (Dance)
    • PY.910 (Ensembles -​ Large)
    • PY.950 (Ensembles -​ Small/​Chamber)
    • SA.100 (Core Courses)
    • SA.310 (International Economics)
    • SA.500 (Development, Climate and Sustainability)
    • SA.501 (Technology and Innovation)
    • SA.502 (Security, Strategy and Statecraft)
    • SA.503 (Governance, Politics and Society)
    • SA.510 (International Economics and Finance)
    • SA.550 (Africa)
    • SA.551 (The Americas)
    • SA.552 (Asia)
    • SA.553 (China)
    • SA.554 (Europe and Eurasia)
    • SA.555 (The Middle East)
    • SA.556 (The United States)
    • SA.620 (Global Policy)
    • SA.630/​635 (Global Risk)
    • SA.670 (Strategy, Cybersecurity and Intelligence)
    • SA.685 (Sustainable Energy -​ Online)
  • Course Search
    • /​course-​search/​api/​
  • Catalogue Contents
  • Catalogue Archives
  • Amendments
  • Home›
  • Whiting School of Engineering›
  • Part-Time, Online Graduate Programs (Engineering for Professionals)›
  • Cybersecurity
  • Overview
  • Programs
  • Courses

The part-time Cybersecurity program balances theory with practice, providing students with the highly technical knowledge and skills needed to protect and defend information systems from attack. Students choose from focus area that explore cyber attacks from within a system, protect information assets, and identify anomalies and unexpected patterns.

Program Committee

Lanier Watkins, Program Chair
Principal Professional Staff
JHU Applied Physics Laboratory

Robert S. Grossman, Vice Program Chair Emeritus
Principal Professional Staff (retired)
JHU Applied Physics Laboratory

Anthony N. Johnson, Program Manager
Senior Professional Staff
JHU Applied Physics Laboratory

Eleanor Boyle Chlan
Senior Professional Staff (retired)
JHU Applied Physics Laboratory

Theodore Colbert, III
Executive Vice President, The Boeing Company
President and Chief Executive Officer, Boeing Global Services

Anton Dahbura
Co-Director, Institute for Assured Autonomy
Johns Hopkins University

Mary Galvin
Alumni
JHU Engineering for Professionals

John Hurley
Professor, Cyberspace Strategies and Data Analytics
National Defense University

Tom Longstaff
CTO, Software Engineering Institute
Carnegie Mellon University

William Robinson
Interim Vice Provost for Strategic Initiatives
Vanderbilt University

Ralph Semmel
Director
JHU Applied Physics Laboratory

J. Miller Whisnant
Principal Professional Staff
JHU Applied Physics Laboratory

Programs

  • Cybersecurity, Graduate Certificate
  • Cybersecurity, Master of Science
  • Cybersecurity, Post-Master’s Certificate

Courses

EN.695.601.  Foundations of Information Assurance.  3 Credits.  

This course surveys the broad fields of enterprise security and privacy, concentrating on the nature of enterprise security requirements by identifying threats to enterprise information technology (IT) systems, access control and open systems, and system and product evaluation criteria. Risk management and policy considerations are examined with respect to the technical nature of enterprise security as represented by government guidance and regulations to support information confidentiality, integrity and availability. The course develops the student’s ability to assess enterprise security risk and to formulate technical recommendations in the areas of hardware and software. Aspects of security-related topics to be discussed include network security, cryptography, IT technology issues, and database security. The course addresses evolving Internet, Intranet, and Extranet security issues that affect enterprise security. Additional topics include access control (hardware and software), communications security, and the proper use of system software (operating system and utilities). The course addresses the social and legal problems of individual privacy in an information processing environment, as well as the computer “crime” potential of such systems. The class examines several data encryption algorithms. Course Note(s): This course can be taken before or after EN.605.621 Foundations of Algorithms. It must be taken before other courses in the degree.

EN.695.611.  Embedded Computer Systems-Vulnerabilities, Intrusions, and Protection Mechanisms.  3 Credits.  

While most of the world is preoccupied with high-profile network-based computer intrusions, this online course examines the potential for computer crime and the protection mechanisms employed in conjunction with the embedded computers that can be found within non-networked products (e.g., vending machines, automotive onboard computers, etc.). This course provides a basic understanding of embedded computer systems: differences with respect to network-based computers, programmability, exploitation methods, and current intrusion protection techniques, along with material relating to computer hacking and vulnerability assessment. The course materials consist of a set of eight study modules and five casestudy experiments (to be completed at a rate of one per week) and are augmented by online discussion forums moderated by the instructor. This course also includes online discussion forums that support greater depth of understanding of the materials presented within the study modules.

Prerequisite(s): EN.605.202 Data Structures; EN.695.601 Foundations of Information Assurance, a basic understanding and working knowledge of computer systems, and access to Intel-based PC hosting a Microsoft Windows environment.

EN.695.612.  Operating Systems Security.  3 Credits.  

Have you ever wondered how hardware and software faults could affect the security and privacy of a computing environment? Modern general-purpose operating systems have become the lifeline for business and personal use.Throughout the course, students will examine and analyze the modern security mechanisms (e.g. MACs, ASLR, SMEP/SMAP, CFI, PAC, TPMs, and more) and learn the strengths and weaknesses of each approach, ensuring a solid defense against APTs and rootkits. Examining both software and hardware implementations, students will compare how effective these security components are amongst the major OS vendors. As virtualization has become ubiquitous in computing, students will also utilize KVM to build customized virtual machine solutions. Finally, students will examine how these mechanisms compare and are applied to modern mobile operating systems environments.Prerequisite(s): Familiarity with operating system concepts.

EN.695.613.  Securing Industrial Control Systems.  3 Credits.  

This course resides where Information Technology (IT) meets Operational Technology (OT) and introduces the practice of cybersecurity related to Industrial Control Systems (ICSs), their components, and the Purdue Model for ICS network organization. Industrial or OT environments were originally designed to be operated on and tended to with onsite (physical) configuration and support. As the industry evolves and requests for additional connectivity and remote functionality increase, these systems have become more connected and more vulnerable to both physical and remote threats. Students will be introduced to a variety of topics including process variable telemetry (sensors, actuators, controllers), control loops, DCS/SCADA/PLCs, HMIs, data historians, safety systems, and so on. ICSs are meant to provide stability during steady-state operations and respond appropriately to non-steady-state conditions - imagine if employees couldn’t trust the data they see, or the autonomous control was overridden or defeated. Through lectures, real-world cyber-attack case studies, hands-on exercises, and independent research opportunities students will be given the resources to identify and understand ICS vulnerabilities, and best secure ICS environments.

EN.695.614.  Security Engineering.  3 Credits.  

This course covers cybersecurity systems engineering principles of design. Students will learn the foundational and timeless principles of cybersecurity design and engineering. They will learn why theories of security come from theories of insecurity, the important role of failure and reliability in security, the fundamentals of cybersecurity risk assessment, the building blocks of cybersecurity, intrusion detection design, and advanced topics like cybersecurity situational understanding and command and control. The course develops the student’s ability to understand the nature and source of risk to a system, prioritize those risks, and then develop a security architecture that addresses those risks in a holistic manner, effectively employing the building blocks of cybersecurity systems— prevention, detection, reaction, and attack-tolerance. The student will learn to think like a cyber-attacker so that they can better design and operate cybersecurity systems. Students will attain the skill of systematically approaching cybersecurity from the top down and the bottom up and have confidence that their system designs will be effective at addressing the full spectrum of the cyber-attack space. The course also addresses how the cybersecurity attack and defense landscape will evolve so that the student is not simply ready to address today’s problems, but can quickly adapt and prepare for tomorrow’s. The course is relevant at any stage in a student’s curriculum: whether at the beginning to enable the student to understand the big picture before diving into the details, at the end as a capstone, or in the middle to integrate the skills learned to date.

Prerequisite(s): EN.695.601 Foundations of Information Assurance.

EN.695.615.  Cyber Physical Systems Security.  3 Credits.  

The age of Cyber-Physical Systems (CPS) has officially begun. Not long ago, these systems were separated into distinct domains, cyber and physical. Today, the rigid dichotomy between domains no longer exists. Cars have programmable interfaces, Unmanned Aerial Vehicles (UAVs) roam the skies, and critical infrastructure and medical devices are now fully reliant on computer control. With the increased use of CPS and the parallel rise in cyber-attack capabilities, it is imperative that new methods for securing these systems be developed. This course will investigate key concepts behind CPS including: control systems, protocol analysis, behavioral modeling, and Intrusion Detection System (IDS) development. The course will be comprised of theory, computation, and projects to better enhance student learning and engagement . The course will begin with the mathematics of continuous and digital control systems and then shift the focus to the complex world of CPS, where both a general overview for the different domains (Industrial Control, Transportation, Medical Devices, etc.) and more detailed case studies will be provided . Students will complete a number of projects, both exploiting security vulnerabilities and developing security solutions for UAVs and industrial controllers. Several advanced topics will be introduced including behavioral analysis and resilient CPS.Course Notes: There are no prerequisite courses; however, students will encounter many concepts and technologies in a short period of time. Student should have a basic understanding of python programming, networking, matrices, and Windows and Linux operating systems.

EN.695.616.  Securing Industrial Control Systems.  3 Credits.  

This course resides where Information Technology (IT) meets Operational Technology (OT) and introduces the practice of cybersecurity related to Industrial Control Systems (ICSs), their components, and the Purdue Model for ICS network organization. Industrial or OT environments were originally designed to be operated on and tended to with onsite (physical) configuration and support. As the industry evolves and requests for additional connectivity and remote functionality increase, these systems have become more connected and more vulnerable to both physical and remote threats. Students will be introduced to a variety of topics including process variable telemetry (sensors, actuators, controllers), control loops, DCS/SCADA/PLCs, HMIs, data historians, safety systems, and so on. ICSs are meant to provide stability during steady-state operations and respond appropriately to non-steady-state conditions - imagine if employees couldn’t trust the data they see, or the autonomous control was overridden or defeated. Through lectures, real-world cyber-attack case studies, hands-on exercises, and independent research opportunities students will be given the resources to identify and understand ICS vulnerabilities, and best secure ICS environments.

EN.695.617.  Zero Trust Principles and Practice.  3 Credits.  

As cyber threats become increasingly advanced, traditional security measures are no longer sufficient to maintain an organization’s security posture. As cyber threats continue to evolve, it is critical to adopt robust security measures. This course will explore the concept, principles, benefits, and challenges of implementing Zero Trust in today's digital environment to help protect an organization. Students will be oriented to core principals of Zero Trust, explore practical use cases and success stories demonstrating the implementation of Zero Trust principles across diverse industries. Throughout the session students will discover best practices for deploying Zero Trust security frameworks to safeguard critical assets and gain an understanding of how organizations can effectively scale and adapt Zero Trust strategies to meet their specific security needs.

EN.695.621.  Public Key Infrastructure and Managing E-Security.  3 Credits.  

This course describes public key technology and related security management issues in the context of the Secure Cyberspace Grand Challenge of the National Academy of Engineering. Course materials explain Public Key Infrastructure (PKI) components and how the various components support e-business and strong security services. The course includes the basics of public key technology; the role of digital certificates; a case study that emphasizes the content and importance of certificate policy and certification practices; identification challenges and the current status of the National Strategy for Trusted Identities in Cyberspace; and essential aspects of the key management lifecycle processes that incorporate the most recent research papers of the National Institute of Standards and Technology. Students will examine PKI capabilities and digital signatures in the context of the business environment, including applicable laws and regulations. The course also presents the essential elements for PKI implementation, including planning, the state of standards, and interoperability challenges. The course also provides an opportunity for students to tailor the course to meet specific cybersecurity interests with regard to PKI and participate in discussions with their peers on contemporary cybersecurity topics.

EN.695.622.  Web Security.  3 Credits.  

Information technology security is a broad field. This course focuses on the foundational technologies that build the Web-based Internet (Web) as we know it today. The goal of this course is to guide the learner to adopt a professional security mindset by applying the techniques of threat modeling, risk assessment, and apply the foundational security principles from the two "triad" models: "confidentiality, integrity, and availability" (CIA) and "authentication, authorization, and accounting" (AAA). The self-motivated learner will investigate vulnerabilities, threats, and mitigations with the objective of protecting the data, applications, frameworks, and the supporting complex technology stacks. Security at this level cannot be achieved by technology alone, the course will provide an opportunity to exercise a smart combination of methodologies and techniques that can build confidence and rapport to champion web security within their IT community. Applicable cryptology, digital certificates, and Public Key Infrastructure will be reviewed. Each module will involve hands-on labs that implement local virtual machines, containers, cloud computing environments, and an operative blockchain enabling the learner to probe more deeply into the cybersecurity challenge of each technology solution. The assignments will involve programming and system configuration thus a novice-level exposure of Python, PHP, JavaScript, Linux Commands, basic Internet architecture and common protocols is recommended. Prerequisite(s): EN.605.202 Data Structures

EN.695.623.  Information Security and Privacy.  3 Credits.  

As the world becomes more connected and reliant on digital communications, best security practices are required to maintain the privacy of individual and enterprise systems. This course will focus mainly on network perimeter protection, host-level protection, authentication technologies, intellectual property protection, formal analysis techniques, intrusion detection and other current advanced topics. Emphasis in this course is on understanding how security issues impact real-world systems, while maintaining an appreciation for grounding the work in fundamental science. The course will consist of group exercises and interactive discussions. There will be programming assignments and a course project. Students will also be expected to read assigned research papers and lead a presentation and discussion on at least one research paper.

EN.695.624.  Introduction to Internet of Things Security and Privacy.  3 Credits.  

The course covers security and privacy topics on the Internet of Things (IoT) and aims to provide the students with a comprehensive, practical approach to analyze weaknesses and learn security and privacy best practices that apply to highly heterogeneous IoT devices and networks. The course introduces widely used IoT platforms (e.g., SmartThings, AWS IoT, openHAB, Windows IoT) and compares them based on technical criteria such as network topology used, programming languages, communication protocols, and security/privacy considerations. The students will have an opportunity to understand and analyze common cybersecurity and privacy threats impacting IoT technologies, and reviews key security concepts, communication/network protocols, and cryptographic algorithms used to countermeasure those threats. Additionally, the course proposes a comprehensive security methodology to protect the IoT at different levels of the IoT architectural stack (e.g., hardware, software, application, and system). The methodology reviews novel security and privacy solutions proposed in the literature and evaluates their effectiveness and practicality.

Prerequisite(s): EN.695.644 Digital Forensics Technologies and Techniques or equivalent course with some knowledge of Network Security.

EN.695.631.  AI for Cybersecurity.  3 Credits.  

The Cybersecurity of the nation’s critical infrastructure is the premier national security issue of our time. Artificial Intelligence (AI) is positioned to help with this problem by serving as a force multiplier for cybersecurity professionals. This course seeks to introduce successful AI approaches to securing enterprise networks through hands-on assignments. This course specifically focuses on the use of machine learning to enhance security in-depth approaches such as spam filtering, phishing detection, network/host intrusion detection, malware/botnet detection, and secure authentication.

EN.695.634.  Intelligent Vehicles: Cybersecurity for Connected and Autonomous Vehicles.  3 Credits.  

New technologies within the automotive industry are fusing the physical, digital, and biological worlds to create intelligent vehicles that are designed to enhance occupants’ experiences and improve driver safety and efficiency and improve pedestrian safety. The success of these commercial and industrial efforts rest in the principles of assured autonomy. These intelligent technologies exist in a connected ecosystem that includes the Transportation, Energy, and Communication sectors. Examples of the interconnectivity capabilities include: Autonomous Vehicle - transducer, interface, and supporting capabilities; Electric Vehicles - grid connected vehicle charging infrastructure; and Vehicle-to-Vehicle and Vehicle-to-Everything Communication Technologies. This course helps students understand the significance of assured autonomy safety and functional correctness of intelligent vehicles throughout the technology’s lifecycle. This course follows a seminar format where students are expected to lead class discussions and write a final report as part of a course project. The course project will teach experimental design and the scientific method. The outcome of the project will be a proposal that, if executed, could result in a workshop-quality publication. Execution of the proposed experiment is encouraged but not required for the class. Proposals will be graded by both the instructor and by classmates. This course is oriented around helping students learn how to make a compelling research contribution to the area of intelligent vehicles and assured autonomy.Students will also learn to critique scientific papers in this research area by reading articles from the literature and analyzing at least one paper in order to lead a class discussion.Prerequisites: This course is suitable for graduate students with little prior experience in the area.

EN.695.637.  Introduction to Assured AI and Autonomy.  3 Credits.  

In order to drive a future where artificial intelligence (AI) enabled autonomous systems are trustworthy contributors to society, these capabilities must be designed and verified for safe and reliable operation and they must be secure and resilient to adversarial attacks. Further, these AI enabled autonomous systems must be predictable, explainable and fair while seamlessly integrated into complex ecosystems alongside humans and technology where the dynamics of human-machine teaming are considered in the design of the intelligent system to enable assured decision-making. In this course, students are first introduced to the field of AI, covering fundamental concepts, theory, and solution techniques for intelligent agents to perceive, reason, plan, learn, infer, decide and act over time within an environment often under conditions of uncertainty. Subsequently, students will be introduced to the assurance of AI enabled autonomous systems, including the areas of AI and autonomy security, resilience, robustness, fairness, bias, explainability, safety, reliability and ethics. This course concludes by introducing the concept of human-machine teaming. Students develop a contextual understanding of the fundamental concepts, theory, problem domains, applications, methods, tools, and modeling approaches for assuring AI enabled autonomous systems. Students will implement the latest state-of-the-art algorithms, as well as discuss emerging research findings in AI assurance.

EN.695.641.  Cryptology.  3 Credits.  

This course provides an introduction to the principles and practice of contemporary cryptography. It begins with a brief survey of classical cryptographic techniques that influenced the modern development of the subject. The course then focuses on more contemporary work: symmetric block ciphers and the Advanced Encryption Standard, public key cryptosystems, digital signatures, authentication protocols, and cryptographic hash functions. The course also provides an overview of quantum resistant cryptography and, as time permits, other recent developments such as homomorphic encryption. Complexity theory and computational number theory provide the foundation for much of the contemporary work in cryptology; pertinent ideas from complexity and number theory are introduced, as needed, throughout the course.

EN.695.642.  Intrusion Detection.  3 Credits.  

This course explores the use of network and host-based intrusion detection and prevention systems (IDS/IPS) as part of an organization's overall cybersecurity posture and threat informed decision strategy. A variety of approaches, models, analyzes, technologies, frameworks and algorithms along with the practical concerns of deploying IDS/IPS in an enterprise/legacy IT heterogenous and homogenous environment will be discussed, along with Operational Technology (OT), as-a-service infrastructure, and Internet of Things (IoT’s) enclaves. Topics include the products, architectures, configurations and components of IDS/IPS, host and network-based IDS/IPS, network analysis, technologies, Machine Learning, Linux Firewall IPTables, Uncomplicated Firewalls (UFW), Network Packet Analysis, Cyber Incident Response, IDS/IPS in context, graph theory and Tor Networking. The use of ROC (receiver operating characteristic/curves) to discuss false positives, false negatives, precision recall graphs, and missed detection trade - offs as well as discussions of current research topics will provide a comprehensive understanding of when and how IDS/IPS can complement host and network security. A variety of IDS tools will be used to collect and analyze potential attacks to include; OSSEC, Tripwire, Snort, Suricata, Neo4j, Zeek (new name Bro), Nmap, Keras, Wireshark, delayhost utility, and Rapid Miner. The course will use virtual machines in labs and assignments to provide hands-on experience with IDS including using test data to quantitatively compare different IDS/IPS’s.

Prerequisite(s): EN.695.641 Cryptology

EN.695.643.  Introduction to Ethical Hacking.  3 Credits.  

This course exposes students to the world of ethical computer hacking by discussing foundational concepts, frameworks, and theoretical knowledge that will provide a richer understanding of how and why vulnerable hosts/systems are attacked to motivate and better apply defensive tactics, techniques, and solutions. The class looks at fundamental hacking approaches through practical exposure via hands-on assignments, discussions, and two quizzes. For lab assignments, students are expected to use a computer that will remain air-gapped/off all networks while they complete the deliverable. The course goal is to learn fundamental principles of reconnaissance, scanning, escalation, pivoting, and exploitation that can be leveraged to defend computing infrastructures, networks, and systems. Students will primarily use virtual machines in labs. Course topics include; Ideology/Motives, Penetration Testing, Cryptography and PKI, Web Exploitation, Mobile Devices, Scanning & Reconnaissance, Network Exploitation, Information Gathering & Social Engineering, Wi-Fi Exploitation, Rootkits, OS Security, Buffer Overflows, Race Conditions, and Post Exploitation (escalate/pivot).

Prerequisite(s): EN.695.601 Foundations of Information Assurance and one of EN.635.611 Principles of Network Engineering or EN.605.671 Principles of Data Communications Networks. Course Note(s): Homework assignments will include programming.

EN.695.644.  Computer Forensics.  3 Credits.  

This course introduces the student to the field of applied Computer Forensics as practiced by corporate security and law enforcement personnel. The emphasis is on "dead-box" (powered-off) data extraction and analysis with open-source tools. Topics covered include legal and regulatory issues, forensic imaging and data acquisition from a "dead" system, computer file systems (FAT/NTFS) and data recovery, Windows Registry and configuration records, Windows log analysis and operating system artifacts, memory dump analysis (RAM), software artifacts, computer network forensics, introductory mobile device forensics, case reporting and documentation, end-to-end computer forensic examinations, peer review, and testifying in court.

EN.695.645.  Mobile Device Forensics.  3 Credits.  

This course introduces the student to the field of applied Mobile Device Forensics as practiced by corporate security and law enforcement personnel. The emphasis is on "live" (powered-on) data extraction and analysis of Linux-based Android mobile devices/cell phones with open-source tools. Topics covered include data extraction from a "live" system; cell phone file systems (EXT/YAFFS) and data recovery; cell phone configuration records; Android/Linux log analysis and operating system artifacts; memory dump analysis (NAND); Android Operating System application artifacts to include SMS/MMS messaging apps, contacts list, calendar, Gmail, browser bookmarks/searches, call logs, picture/video, and GPS/maps; installed application artifacts such as Facebook, Twitter, and TikTok; cell phone network forensics; Subscriber Identity Module (SIM) card analysis; and Secure Digital (SD) card analysis.

EN.695.646.  Engineering Runtime Malware Detection.  3 Credits.  

This course focuses on fundamental runtime behaviors often attributed to malware executing on a system. The student will be given high level explanations of each of these behaviors and their importance to the malware lifecycle. The students will be exposed to currently support Windows kernel technologies such as minifilters and callback routines. Students will learn how to collect and analyze execution data in real time from the Windows Kernel. The course will also allow students to build their own malware analysis engine for a Windows 10 operating system. The focus of the analysis engine is to detect malware early in its execution based on identification of suspicious behaviors including those discussed in class. The students will be graded on homework and a group semester project to build and test a malware detection analysis engine using log files of malware and benign process executions provided by the instructor. Students will setup a Windows 10 virtual machine with the kernel data collectors for use in their homework. The project will be presented to the class towards the end of the semester. Programming knowledge in a language is required for the homework and semester project. Previous knowledge of Windows system internals, malware is helpful but not required. Students will not be given any malware binaries by the instructor at any time during this course.

EN.695.647.  Cyber Threat Hunting and Intelligence.  3 Credits.  

Cyber security has traditionally taken a reactive approach. To defend against a threat, we needed to know what the threat was and how it manifests. However, the threat landscape can shift quickly. Advanced Persistent Threats stay under the radar for a long time, so we don't learn about the threat and how to find it. Ransomware quickly moves from initial access to impact, so we can't afford to take a reactive approach. This course teaches a proactive approach to cyber security by incorporating cyber threat intelligence and threat hunting. Students will use tools and techniques to derive technical intelligence about threat actors. They will identify strategies for collection to inform operational and strategic requirements. In addition, they will develop hunting hypotheses using threat intelligence as cues, convert those hypotheses to analytics, and validate the hypotheses to determine whether a threat actor has successfully breached the network. This is a technical course where students will apply these concepts in hands-on environments. Students should be familiar with attacker methodologies, intrusion detection concepts, and network traffic analysis.

EN.695.648.  Cyber Strategy and Leadership.  3 Credits.  

This course is designed to help create the next generation of executive leaders in cyber security who can build and run effective information security programs. The target audience for this course is someone with 5+ years of previous Cyber Security-related work experience. This course will teach students how to rise above the Individual Contributor level by learning technical, leadership, strategic, and political skills in cyber security. To enable such activities the class focuses on teaching the various knowledge, skills, and abilities that a Chief Information Security Officer needs to demonstrate. Students will be well-prepared to step into a CISO role, allowing them to create, update and maintain successful cybersecurity programs in any organization.

EN.695.711.  Java Security.  3 Credits.  

This course examines security topics in the context of the Java language with emphasis on security services such as confidentiality, integrity, authentication, access control, and nonrepudiation. Specific topics include mobile code, mechanisms for building “sandboxes” (e.g., class loaders, namespaces, bytecode verification, access controllers, protection domains, policy files), symmetric and asymmetric data encryption, hashing, digital certificates, signature and MAC generation/verification, code signing, key management, SSL, and object-level protection. Various supporting APIs are also considered, including the Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE). Security APIs for XML and web services, such as XML Signature and XML Encryption, Security Assertions Markup Language (SAML), and Extensible Access Control Markup Language (XACML), are also surveyed. The course includes multiple programming assignments and a project.

Prerequisite(s): EN.605.681 Principles of Enterprise Web Development or equivalent. Basic knowledge of XML. EN.695.601 Foundations of Information Assurance or EN.695.622 Web Security would be helpful but is not required.

EN.695.712.  Authentication Technologies.  3 Credits.  

Authentication plays a strong role in cybersecurity, and is a critical layer underpinning the “CIA triad.” This course will explore current technologies, issues, and policies surrounding practical authentication. Grouped by something you know, something you have, and something you are, topics will include passwords, certificates and public key infrastructures, graphical authentication, smart cards, biometrics, trusted computing, location authentication, identity federation, and a range of other topics determined by class interest. Each topic will be examined from the perspective of technical strengths, weaknesses, mitigations, and human factors, and will include discussions of authentication policies, trends, and privacy perspectives. Related background is developed as needed, allowing students to gain a rich understanding of authentication techniques and the requirements for using them in a secure environment including systems, networks, and the Internet. Students will prepare and present a research project that reflects an understanding of key issues in authentication. Recommended: EN.695.621 Public Key Infrastructure and Managing E-Security.

Prerequisite(s): EN.605.202 Data Structures; EN.695.601 Foundations of Information Assurance. EN.695.621 Public Key Infrastructure and Managing E-Security is recommended.

EN.695.715.  Assured Autonomy.  3 Credits.  

Autonomic systems leverage the growing advances in control, computer vision, and machine learning coupled with technological advances in sensing, computation, and communication. While this emerging highly connected, autonomous world is full of promise, it also introduces safety and security risks that are not present in legacy systems. This course focuses on the complexities inherent in autonomous systems and the multifaceted and multilayered approaches necessary to assure their secure and safe operation. As these systems become more pervasive, guaranteeing their safe operation even during unforeseen and unpredictable events becomes imperative. There are currently no real solutions to provide these runtime guarantees necessitating cutting-edge research to provide state awareness, intelligence, control, safety, security, effective human-machine interaction, robust communication, and reliable computation and operation to these systems. This online course in a seminar-style format leads the students to participate in learning activities, record summary presentation of a selection of papers, write a peer-reviewed publication-quality paper, and record a workshop presentation for virtual panel review.

EN.695.721.  Network Security.  3 Credits.  

This course covers concepts and issues pertaining to network security and network security architecture and evolving virtualization and related cloud computing security architecture. Topics include mini cases to develop a network security context. For example, we will assess the NIST (National Institute of Standards and Technology) unified information security framework. This framework is supported by information security standards and guidance, such as a risk management framework (RMF) and continuous monitoring (CM) process. Applied cryptography and information security—encryption algorithms, hash algorithms, message integrity checks, digital signatures, security assessment and authentication, authorization and accounting (AAA), security association, and security key management (generation, distribution, and renewal)—are discussed with consideration given to emerging cryptographic trends, such as SD-WAN (Software-Defined Wide Area Networks). This course presents network and network security architecture viewpoints for selected security issues, including various security mechanisms, different layers of wired/wireless security protocols, different types of security attacks and threats and their countermeasures or mitigation, Next Generation Network (NGN) security architecture that supports the merging of wired and wireless communications, and Internet Protocol version 6 implementation and transition. The course concludes with more comprehensive cases that consider network security aspects of virtualization and cloud computing architecture.

Prerequisite(s): EN.605.202 Data Structures; EN.695.601 Foundations of Information Assurance and EN.605.671 Principles of Data Communications Networks or EN.635.611 Principles of Network Engineering.

EN.695.722.  Covert Channels.  3 Credits.  

This course will be a survey course for covert channels and information leakage (side channel) with hands-on investigations into building and defeating covert channels. We will begin with the long history of covert channels dating back to the 1970’s up to the present and beyond by looking at current research in this area. We will explore both storage and timing covert channels and information leakage from general purpose computers, mobile devices, and modern industrial control system devices. It is necessary to be able to write code in at least 1 language (python is preferred), be familiar with computer networking and the use of network packet sniffers.

Prerequisite(s): EN.695.642 Intrusion Detection AND intermediate knowledge of Python.

EN.695.723.  Advanced Web Security.  3 Credits.  

This course reviews the basic knowledge of the World Wide Web, and then examines advances in the central defense concepts behind Web security, such as same-origin policy, cross-origin resource sharing, and browser sandboxing. Concurrently, we will also explore the most popular Web vulnerabilities, such as cross-site scripting (XSS) and SQL injection, as well as how to attack and penetrate software with such vulnerabilities. You will learn how to detect, respond, and recover from security incidents. Newly proposed research techniques will be investigated with students demonstrating their understanding through discussions and peer evaluated exercises.

Prerequisite(s): EN.695.622 Web Security or similar previous exposure.

EN.695.737.  AI for Assured Autonomy.  3 Credits.  

This is an introductory course in Artificial Intelligence It teaches the basic concepts, principles, and fundamental approaches to Artificial Intelligence. Its main topics include AI Fundamentals, Probability and Statistics, Python Essentials, Supervised Machine Learning, Unsupervised Machine Learning, Neural Networks, Reinforcement Learning, Deep Learning, Natural Language Processing, Decision Tree/Search Algorithms and Intro to Assured Autonomous Systems. Prerequisites: The student should have taken an undergraduate level course on, or be otherwise familiar with, operating systems and networks. Prior programming experience with C, Python or Java is highly recommended. Knowledge of algebra and discrete mathematics is also recommended.

EN.695.741.  Information Assurance Analysis.  3 Credits.  

This course exposes students to the world of information assurance analysis by discussing foundational concepts and frameworks that can be used to analyze various technologies, mediums, protocols and platforms. Analysis is a fundamental part of the information assurance process and effective implementation can inform policy, forensic and incident response procedures, and cyber security practices. Students will be able to perform analysis activities by using the theoretical knowledge gained on case studies, assignments, and hands-on labs resulting in a richer understanding for information assurance. Topics include the collection, use, and presentation of data from a variety of sources (e.g., raw network traffic data, traffic summary records, and log data collected from servers and firewalls). This data is used for a variety of analytical techniques, such as collection approach evaluation, population estimation, hypothesis testing, experiment construction and evaluation, and developing evidence chains for forensic analysis. The course will also cover Internet of Things (IoT’s), Artificial Intelligence, Mobile Application Security, addressing, Border Gateway Protocols (BGP), lookups, anonymization, Industrial Control Systems (ICS), as well as analyzing DNS, HTTP, SMTP, and TCP protocols. Students will primarily use SiLK, NetFlow, Wireshark, Splunk, Node-Red IoT framework, and TCPDump tools. Students will also be introduced to various IoT and ICS protocols; WNAN, ZigBee, EMV, and SIGFOX, as well as, CIP, MODBUS, DNP3, OPC, HART, BACnet, and ICCP, respectively.

Prerequisite(s): EN.695.601 Foundations of Information Assurance. Familiarity with basic statistical analysis. EN.695.642 Intrusion Detection or EN.695.611 Embedded Computer SystemsVulnerabilities, Intrusions, and Protection Mechanisms is recommended.

EN.695.742.  Digital Forensics Technologies and Techniques.  3 Credits.  

Digital forensics focuses on the acquisition, identification, attribution, and analysis of digital evidence of an event occurring in a computer or network. This course provides a broader scientific understanding of the technologies and techniques used to perform digital forensics. In particular, various signature extraction techniques, detection, classification, and retrieval of forensically interesting patterns will be introduced. This will be complemented by studying fundamental concepts of data processing technologies like compression, watermarking, steganography, cryptography, and multiresolution analysis. Emerging standards along with issues driving the changing nature of this topic will be explored. Antiforensic techniques that are used to counter forensic analysis will also be covered. Students will be exposed to relevant theory, programming practice, case studies, and contemporary literature on the subject.

Prerequisite(s): EN.605.612 Operating Systems.

EN.695.744.  Reverse Engineering and Vulnerability Analysis.  3 Credits.  

Have you ever wondered why software vulnerabilities lead to security issues? Or how malicious actors exploit vulnerabilities? The Reverse Engineering course will help answer these questions and more! Throughout the course, students will use industry standard tools and develop customized solutions to help further binary/code analysis. Using real-world vulnerability classes, students will examine how attackers identify flaws in modern software and exploit these flaws bypassing state-of-the-art protection mechanisms found in modern operating systems. Students will also identify how to patch these issues and develop extensions of protection mechanisms to thwart attacks, raising the bar for the attacker and improving the security posture of a system. Using a combination of static analysis, dynamic analysis, fault injection and fuzzing, this course will provide students with the modern skills needed to help stop attackers!Prerequisite(s): Familiarity with computer architecture concepts.

EN.695.745.  Malware Analysis.  3 Credits.  

Attackers and attacker toolchains continue to evolve and make detection and prevention very difficult. Malware analysts are continually examining modern malware to look for commonalities and new 0-day techniques that are used to exploit a system and maintain a strong foothold. Identifying the Indicators of Compromise (IOCs) is important for helping determine the extent of an intrusion as well as helping alert others to similar attacks. Students will utilize advanced analysis techniques, user mode/kernel mode debugging and dynamic analysis to uncover how modern malware operates. Being able to bypass code obfuscation techniques, examine shellcode, identify command-and-control (C2) systems and configuration are critical components for analyzing and stopping malware. In addition, as ransomware has become ubiquitous, students will examine a real-world ransomware attack and develop a customized decryption utility to help a 'customer' recover from a ransomware attack. Throughout the course, relevant operating systems internals will be discussed. By the end of the course, students will have a better understanding of how to identify attacks and reverse engineer tools to uncover the attacker's secrets!

Prerequisite(s): EN.695.744 Reverse Engineering

EN.695.749.  Cyber Exercise.  3 Credits.  

Students will learn about the nature and purpose of cyber exercises and their role in training and assessing people, teams, technology, and procedures. During the course of the semester, students will design a cyber exercise that meets the specific needs of their organization. At the conclusion of the class, students will have a model template they can use to design, build, and execute their own exercise.

Prerequisite(s): EN.695.641 Cryptology

EN.695.791.  Information Assurance Architectures and Technologies.  3 Credits.  

This course explores concepts and issues pertaining to information assurance architectures and technologies (IAA), such as a three-level enterprise and cybersecurity architecture offered as one of the security common languages from the National Institute of Standards and Technology (NIST). Key NIST Cybersecurity Center of Excellence (NCCoE) Practice guides pertaining to IAA issues are introduced and analyzed. NIST/NCCoE security guidance and metrics for Zero Trust Architecture (ZTA), continuous diagnostics and mitigation (CDM), and artificial intelligence/machine learning (AI/ML) security guidance and metrics are applied to analysis of selected enterprise and cybersecurity programs, such the Department of Defense (DoD) Zero Trust Reference Architecture, Department of Homeland Security (DHS) Cybersecurity & Infrastructure Security Agency (CISA) Trusted Internet Connections Program (CISA TIC), Federal Aviation Administration (FAA) Air Traffic Modernization (NextGen) process, and Food and Drug Administration (FDA) (for approval of medical devices). Cloud computing security architecture issues for IAA technologies including FedRAMP (Federal Resources Analysis and Management Program) authorization are analyzed. Topics include protecting control systems from non-control systems for information technology (IT) and operational technology (OT) enterprise and cybersecurity risk management. For example, these IT/OT interface issues are critical for the NIST Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements. IAA analyses include enterprise Internet of Things (IoT) mobility issues and a virtual laboratory project based on selected Amazon Web Services (AWS) security capabilities for Zero Trust Architecture (ZTA).

Prerequisite(s): EN.605.202 Data Structures; EN.695.601 Foundations of Information Assurance or equivalent, and EN.605.671 Principles of Data Communications Networks or EN.635.611 Principles of Network Engineering.

EN.695.795.  Capstone Project in Cybersecurity.  3 Credits.  

This course permits graduate students in cybersecurity to work with other students and a faculty mentor to explore a topic in depth and apply principles and skills learned in the formal cybersecurity courses to a real world problem. Students will work in self-organized groups of two to five students on a topic selected from a published list. Since students will have selected different courses to meet degree requirements, students should consider the combined strengths of the group in constituting their team. Each team will prepare a proposal, interim reports, a final report, and an oral presentation. The goal is to produce a publication quality paper and substantial software tool. This course has no formal content; each team should meet with their faculty mentor at least once a week and is responsible for developing their own timeline and working to complete it within one semester. The total time required for this course is comparable to the combined class and study time for a formal course. Course prerequisite(s): Seven cybersecurity graduate courses including two courses numbered 695.7xx, all CyS foundation courses, and meeting the track requirement; or admission to the post-master's certificate program. Students must also have permission of a faculty mentor or academic advisor, and the program chair. Course note(s): Students may not receive graduate credit for both EN.695.795 and EN.695.802 Independent Study in Cybersecurity II. This course is only offered in the spring.

EN.695.801.  Independent Study in Cybersecurity I.  3 Credits.  

This course permits graduate students in cybersecurity to work with a faculty mentor to explore a topic in depth or conduct research in selected areas. Requirements for completion include submission of a significant paper or project. Prerequisite(s): Seven Cybersecurity graduate courses including the foundation courses, three track-focused area courses, and two courses numbered at the 700 level or admission to the post-master’s certificate program. Students must also have permission from the instructor.

Prerequisite(s): EN.695.601 AND EN.695.401 AND EN.605.421 Foundations of Algorithms

EN.695.802.  Independent Study in Cybersecurity II.  3 Credits.  

Students wishing to take a second independent study in Cybersecurity should sign up for this course. Prerequisite(s): EN.695.801 Independent Study in Cybersecurity I and permission of a faculty mentor, the student’s academic advisor, and the program chair.

Prerequisite(s): EN.695.801

Johns Hopkins University
  • Johns Hopkins University
  • Baltimore, MD
  • 410-516-8000
  • © 2019 Johns Hopkins University. All rights reserved.
  • About Us
  • Academics
  • Schools & Divisions
  • Admissions & Aid
  • Research & Faculty
  • Campus Life
Back to top

Print Options

  • Send Page to Printer

    Print this page.

  • Download Page (PDF)

    The PDF will include all information unique to this page.

  • Download PDF of the entire 2024-2025 Catalogue

    All pages in the 2024-2025 catalogue.