Developing the future of education and research in cybersecurity and privacy.
The School of Cybersecurity and Privacy (SCP) is the Georgia Institute of Technology’s newest academic unit, as of fall 2020, and in many ways its most ambitious to date. We will meet the needs of new and current students and develop new programs even as we build on existing strengths. Georgia Tech’s commitment to cybersecurity predates the term, extending back more than 20 years to the Sam Nunn Forum which drew attention to the vulnerabilities of emerging computerized financial systems. In the intervening years, cybersecurity and privacy disciplines have become more important than ever to prepare and equip future professionals to help keep safe our personal and national interests.
Chair’s Message | What Amazon whispered in my ear
Nov. 19, 2021
Dear Cybersecurity and Privacy community,
Some words of encouragement to SCP students as we are nearing the end of the semester:
Hang in there. Rest is coming soon:
For some of you the end of the Fall 2021 semester means graduation, time to think about life after graduation.
As some of you know, we hosted the Amazon Information Security Team this week. They gave us some great feedback after reviewing some of your resumes. The main point they wanted me to share with you was that the skills you are learning in the classroom are highly sought after at Amazon and in the field of cybersecurity and privacy in general. The problem, however, was some of those skills were not prominently displayed in the resumes they reviewed, or they were not there at all. So, I will tell you what Amazon whispered in my ear this week and about a couple of good ideas when it comes to submitting job applications.
Georgia Tech’s Online Master of Science in Cybersecurity (OMS Cybersecurity) is the only interdisciplinary degree in cybersecurity from a U.S. News & World Report Top 10-ranked public university that you can earn online.
Cybersecurity is no longer just a computer programmer’s problem. It touches multiple disciplines, careers and nearly all aspects of society – from public policy to energy management to product design.
The Computer Science PhD program is divided up into a series of milestones which every student progresses through on the way to the degree. A component in information security is offered.
Technical interest areas include computer systems and software, digital signal processing, electrical energy, systems and controls, and more.
ONLINE MASTER’S IN CYBERSECURITY AT 2
- 80% of student enrollment is U.S.-based
- Top 5 states for enrollment are Georgia, California, Virginia, Florida, and Texas
- 84% of students are employed
- Top sectors for employed students are technology, finance, and defense, each with ~10% or ▲
- 1 out of every 4 new students in 2020 in the policy track identify as female
- Enrollment of women increased in all three degree tracks in 2020
- Black and Hispanic groups each make up at least 10 percent of enrollment
Faculty and Researcher Community
Georgia Tech cybersecurity and privacy research is represented worldwide at prominent venues and showcases some of the latest breakthroughs in the fields. Our community of experts bring a wide range of experience to collaborate across disciplines and tackle complex challenges in today’s technology environment.
As a transfer student, the threaded curriculum was what attracted computer engineering major Andrew Gonzalez to Georgia Tech.
“I found out about the threads before applying. I knew that I wanted to focus on cybersecurity and distributed systems. Georgia Tech was the only program that gave me such a customized approach to the fields I’m interested in pursuing.”
Institute’s top placement in the 2020 National Security Agency’s Codebreaker Challenge added to Georgia’s number of ranked teams, eight of which placed in the top 100 for the competition
School of Computer Science
“The NSA Codebreaker Challenge is a competitive venue to assure that what we are offering at Georgia Tech is practical, influential, and builds the right skills in our students.”
Xuefeng “William” Wang
OMS Cyber program
The full-time software engineer from Boston solved all but one of the tasks, the last few of which were released in early 2021 while he was starting a new course in his graduate program.
Ph.D. in CS program
Wang said the codebreaker challenge did something invaluable – putting students in a cybersecurity role where the stakes were high.
Becky Borrebach has a unique opportunity to be a role model for women, especially those interested in STEM, when she officially finishes the Online Master of Science in Cybersecurity degree program at Georgia Tech in May.
The 1993 movie Jurassic Park inspired Grace Fejokwu, a security analyst with experience in the financial and telecommunications sectors, to see the possibilities for her future when watching the 12-year-old Lex, played by Ariana Richards, on the big screen restoring a security network.
In Their Own Words
Students share how Georgia Tech is preparing them for new jobs and career growth.
The courses are teaching me security procedures and protocols to apply to my daily job in order to solve complex cybersecurity problems such as phishing attacks, exploits and cyberthreats.
The flexible core class in Human-Computer Interaction has given me a new perspective on how the end user views and accepts security controls and mechanisms.
OMS Cybersecurity provides the right curriculum, guidance, environment, and opportunities to learn and practice foundations of cybersecurity in depth. Students are motivated to think, analyze and come up with answers on their own.
Classes cater to all levels with different program tracks such as policy or information security. It gives you the flexibility to be as technical as you want by offering electives that give you a fully rounded experience.
Just recently my company was being hit with network-crippling DDOS attacks. We were studying these attacks in class at the same time. I was able to communicate what exactly was going on to upper management and recommend appropriate actions.
The program not only allows me to learn how to perform attacks like buffer overflows and SQL injections, but also how to implement countermeasures.