The Cybersecurity program at Johns Hopkins Engineering for Professionals will provide you with the advanced skills you need to protect and defend information systems from attack.

Program Pages Content

Degrees & Pathways

Focus Areas/Tracks


Students in the Cybersecurity program at Johns Hopkins Engineering for Professionals become proficient in ensuring the confidentiality, availability and integrity of data, in preserving and restoring systems, and in developing risk management skills. State-of-the-art computing facilities and tools are accessible either on-site or online. Combined with knowledge from instructors who are working to fight cybersecurity threats on the front lines, the continually evolving curriculum prepares students for lasting careers in this critical field.

Upon completing the degree program, students will:

  1. Demonstrate proficiency in assessing enterprise security risk and formulating technical recommendations in the areas of both hardware and software.
  2. Demonstrate proficiency in four major areas of cryptology: Encryption, Hash Functions, Signature Schemes, and Authentication.


Master's Degree

Admission Requirements

  • You must meet the general admission requirements that pertain to all master's degree candidates.
  • Your prior education must include (1) one year of calculus; (2) one mathematics course beyond calculus (e.g., discrete mathematics, linear algebra, or differential equations); (3) a programming course using Java or C++; (4) a course in data structures; and (5) a course in computer organization. (Undergraduate courses are offered to satisfy the computer science and mathematics beyond calculus requirements.)
  • For applicants pursuing one of the three tracks, there are additional requirements: Applicants should have had a course in networking prior to taking courses in the Networks track, a course in operating systems prior to taking courses in the Systems track, and a course in both before taking courses in the Analysis track. If necessary, 605.412 Operating Systems and 605.471 Principles of Data Communications Networks can be taken and applied toward the master’s degree in Cybersecurity.
  • Undergraduate courses are offered to satisfy the computer science and mathematics beyond calculus requirements.
  • When reviewing an application, the candidate's academic and professional background will be considered.
  • If you are an international student, you may have additional admission requirements.

Degree Requirements

  • Ten courses must be completed within five years.
  • Students are required to choose a track to follow.
  • The curriculum consists of three foundation courses and five courses from the Cybersecurity ( program, or from a list of selected courses from the Computer Science ( program, or Cybersecurity/Security Informatics ( and Applied Mathematics and Statistics ( Departments in the full-time program.
  • At least three courses must be from the same track.
  • At least two must be at the 700-level or higher.
  • Up to two electives may be selected.
  • Transfer courses will be considered electives. Transfer courses must meet all general Johns Hopkins Engineering requirements for transfer, must be directly applicable to Cybersecurity, and will be considered on a case-by-case basis.
  • Only one grade of C can count toward the master's degree.
  • All course selections are subject to advisor approval.

Post-Master's Certificate

Admission Requirements

Certificate Requirements

  • Six courses must be completed within three years.
  • Five of the six courses must be Cybersecurity ( courses, and at least two of these courses must be at the 700-level.
  • Students are allowed to take one elective, subject to advisor approval.
  • Tracks are not available for students pursing certificates.
  • All course selections are subject to advisor approval.


Please refer to the course schedule published each term for exact dates, times, locations, fees, and instructors.


The 400-level foundation courses must be taken before other graduate courses, while the 700-level foundation course may be completed anytime after that during the course of the Cybersecurity degree.

One or more foundation courses can be waived by the student's advisor if a student has received an A or B in equivalent courses. In this case, the student may replace the waived foundation courses with the same number of other graduate courses and may take these courses after all remaining foundation course requirements have been satisfied.


The tracks offered represent related groups of courses that are relevant for students with interests in the selected areas. Students are required to choose a track or concentration to follow and to take at least three courses from the selected track. The tracks are presented as an aid to students in planning their course schedules and are only applicable to students seeking a master's degree. They do not appear as official designations on a student's transcript or diploma.


Please visit the Cybersecurity Advising Corner for more information.

Program News

High Rankings for JHU Online Engineering Programs
January 10, 2018

The online programs at the Johns Hopkins University Whiting School of Engineering are ranked highly according to the latest report from U.S. News & World Report released January 9, 2018.

Top Instructors Receive 2017 Faculty Awards
April 18, 2017

During the 2017 spring faculty meeting held at the Johns Hopkins University Applied Physics Laboratory, Johns Hopkins Engineering honored ten outstanding online and part-time instructors for their dedication in the classroom this past year.

U.S. News & World Report Ranks JHU's Online Engineering Programs Among Nation's Best
January 12, 2017

In the latest rankings from U.S. News & World Report, released January 10, 2017, the Johns Hopkins University Whiting School of Engineering maintained its spot in the top twenty-five schools in the country in the categories of Best Online Graduate Engineering Programs and Best Online Graduate Computer...

Gainful Employment Disclosures