Master of Science [M.S] (Cybersecurity Engineering)
Field of Study:
$16,471/Yr
Tuition Fees
Year | 1st Year Fees |
---|---|
Tuition Fees | $16471 (USD 16471) |
Other Expenses
Head | Avg Cost Per Year |
---|---|
Room and Board(On Campus/Off Campus) | $7499 (USD 7499) |
Miscellaneous expenses | $3614 (USD 3614) |
Previous Year Tuition Fees
Year | 1st Year Fees |
---|---|
2021 | $16836 (USD 16836) |
Important Dates
Applicant should submit all required materials at least 90 days before the first day of class of the semester in which the student wishes to begin graduate study.
- Master of Science [M.S] in Cybersecurity Engineering at the Auburn University is a 2 year, 33-credit program.
- It is an on-campus program offered on a full-time basis.
- Auburn University’s cybersecurity engineering graduate program (i.e., MS-CYBE) prepares students for analyzing, developing, investigating, protecting, and defending the cyber ecosystem of organizations.
- As such, it focuses on the engineering and technical aspects of cybersecurity.
- The degree is designed to appeal to practitioners as well as research scholars through the requirement of capstone experience.
- The Cybersecurity Engineering graduate degree can be earned entirely through on‐campus instruction, through the Engineering Online Graduate Program, or a combination of the two.
-
Distance students should note that MATH 6180, Cryptography, is offered only in an on‐campus format and cannot include it as one of their elective cybersecurity‐specific courses.
-
Students who complete the MS-CYBE degree also receive the National Centers of Academic Excellence in Cybersecurity in Cyber Defense (CAE-CD) designation.
Program Outcomes:
- Students have an understanding of fundamental concepts of cybersecurity.
- Students know prevalent cybersecurity threats, threat models (such as Man-in-the-Middle), and canonical defenses.
- Students have the ability to identify, assess, and defend against cybersecurity threats; develop defendable and resilient network and software mechanisms; and detect and investigate cybersecurity breaches.
- Students are versed in techniques for gathering and preserving digital forensic evidence relating to a cyber event.
- Students possess a knowledge of computer science (e.g. algorithms, operating systems, computer architectures, ethics, etc.), and have the ability to leverage this knowledge for a deeper contextualized understanding of cybersecurity.
- Students communicate cybersecurity issues effectively.
- Students have the ability to apply their cybersecurity capabilities in an integrated manner to address specific cybersecurity problems.
Eligibility & Entry Requirement
Academic Eligibility:
- Students must complete a 4-year bachelor's degree.
- Students with degrees in computer science, software engineering, or an equivalent technically?deep software?oriented equivalent discipline from an institution of recognized standing.
- Degrees or significant work experience in information technology, electrical engineering, or other related disciplines may also be suitable.
- Students will be evaluated on an individual basis by the department's graduate admission committee.
Indian Student Eligibility:
Indian students are eligible to apply if they meet one of the following eligibility criteria:
- Students must complete a 4-year undergraduate degree with first class in a relevant field from a recognized institution
- Or, students completed a master's degree with first-class in a relevant field from a recognized institution.
-
Students need to submit a minimum GMAT score and GRE exam scores for a better chance of admission.
Along with the minimum eligibility requirements, international students hailing from non-English speaking countries need to prove English proficiency through IELTS/TOEFL/any equivalent test to get admission to this program.
Key Resources for Your Study Abroad Journey
Course Guides
Masters (MS) in USA: Colleges, Courses, Deadlines, Eligibility & Fees
Masters In Computer Engineering In USA: Top Universities, Fees, Admissions, Scholarships, Jobs
Masters in Cyber Security in USA: A Course Guide for International Student
MS in Computer Science in USA: Universities, Fees, Deadline & Eligibility
Career and Placement after Course
Program Outcomes:
- Outcome 1: Understanding of computer science principles beyond the baccalaureate level. This is assessed by successful completion of Foundational Courses.
- Outcome 2: Acquisition of skills specific to identifying and assessing cybersecurity threats; developing suitably protective and resilient network and software mechanisms; defending against cyber attacks; and detecting, triaging, and mitigating cybersecurity breaches. This is assessed by successful completion of Cybersecurity?Specific Courses.
- Outcome 3: Acquisition of skills relevant to the workforce. This is assessed by successful completion of a Capstone Project.
Followings are the career opportunities for the students:
- Bug Bounty Specialist
- Chief Information Security Officer (CISO)
- Lead Software Security Engineer
- Cybersecurity Sales Engineer
- Cybersecurity Architect
- Cybersecurity Manager/Administrator
- Penetration Tester
- Information Security Analyst
Scholarship Grants & Financial Aids
Name | Scholarship Per Student | Level of Study | Type | |
---|---|---|---|---|
Young Women in Public Affairs Award | Scholarship per student$ 4,000/Yr$4,000 | Level Of StudyBachelor | TypeMerit-Based | |
BeArt Presets-Academic Scholarship | Scholarship per student$ 2,000/Yr$2,000 | Level Of StudyBachelor | TypeMerit-Based | |
Young Professionals Program | Scholarship per studentVariable Amount | Level Of StudyDoctorate | TypeMerit-Based | |
Prodigy Finance-GyanDhan Scholarship | Scholarship per student$ 2,500/Yr$2,500 | Level Of StudyMaster | TypeMerit-Based | |
VueVille Future Technology Scholarship | Scholarship per student$ 1,000/Yr$1,000 | Level Of StudyBachelor | TypeMerit-Based | |
Aga khan Foundation Scholarships | Scholarship per studentVariable Amount | Level Of StudyMaster | TypeMerit-Based |
Similar Colleges


University at Albany


Northern State University


Abilene Christian University
.jpeg?tr=h-143,c-force)

Ohio Northern University


University of South Carolina


University of Akron


State University of New York Polytechnic Institute


University of New Mexico


Comments