Cybersecurity

Cybersecurity has been and continues to be one of the most growth-oriented career fields in the computer science domain.

Graduates of these programs will be equipped with the theoretical and hands-on engineering expertise to solve complex cybersecurity problems affecting diverse enterprises worldwide.

Cybersecurity has been and continues to be one of the most growth-oriented career fields in the computer science domain. The total size of the cybersecurity workforce is expected to rise to 6 million globally by 2019. Graduates of this program will be equipped with the theoretical and hands-on engineering expertise to solve complex cybersecurity problems affecting diverse enterprises worldwide.

The Master's of Cybersecurity Management is a 30-unit, part-time program designed for working professionals. The curriculum provides students with the knowledge needed to protect, defend, respond and recover from cyber threats.  The program will give students the skills, knowledge and expertise to work in the rapidly growing field of cybersecurity and design, engineer, and architect cybersecurity technology and systems.
 
The Masters of Cybersecurity Engineering is a full-time program that will give students the skills, knowledge and expertise to work in the rapidly growing field of cybersecurity and design, engineer, and design cybersecurity technology and systems.
The Technology & Leadership Center offers a full range of cybersecurity training and certification that allows you to stay ahead of the latest cyber threats. Gain the skills to protect company assets, manage risk, respond to incidents and manage breaches. We offer training at any skill level from foundational to expert and everything in between.

 

 

Are outsiders influencing the issues we discuss before elections? https://engineering.wustl.edu/news/Pages/Are-outsiders-influencing-the-issues-we-discuss-before-elections.aspxAre outsiders influencing the issues we discuss before elections? <img alt="" src="/news/PublishingImages/iStock-968546200.jpg?RenditionID=2" style="BORDER:0px solid;" />
Giving users a handle on their datahttps://engineering.wustl.edu/news/Pages/Giving-users-a-handle-on-their-data.aspxGiving users a handle on their data<img alt="" src="/news/PublishingImages/Zhang-research-graphic.jpg?RenditionID=1" style="BORDER:0px solid;" />
In the media: Vulnerable to a hack: The daily risk we take to be connected in a digital worldhttps://engineering.wustl.edu/news/Pages/Vulnerable-to-a-hack-The-daily-risk-we-take-to-be-connected-in-a-digital-world.aspxIn the media: Vulnerable to a hack: The daily risk we take to be connected in a digital world<img alt="" src="/Profiles/PublishingImages/151013_joseph_scherrer_01.jpg?RenditionID=1" style="BORDER:0px solid;" />