国际学生入学条件
the applicant enrolls initially as a nonmatriculating student and completes 9 graduate credits in CSIA with a minimum cumulative grade point ratio (CGPR) of 3.00 and no grade below C
the applicant is a graduate of FDU's computer science, electrical engineering, information technology or closely related programs with an undergraduate CGPR of 3.00
the applicant is a graduate of such programs from other institutions with an undergraduate CGPR of 3.50
the applicant has completed a master's degree from a regionally accredited college or university in the United States. (This GRE waiver policy is only applicable to applicants who graduated from a regionally accredited college or university in the United States.)
Three letters of recommendation.
IELTS - 6
TOEFLIBT - 70
展开 IDP—雅思考试联合主办方
雅思考试总分
6.0
了解更多
雅思考试指南
- 雅思总分:6
- 托福网考总分:70
- 托福笔试总分:160
- 其他语言考试:Pearson's PTE-A 53 and Duolingo 100
CRICOS代码:
申请截止日期: 请与IDP顾问联系以获取详细信息。
课程简介
Hardly a day goes by without some news on cyberattacks. As the number of cyberattacks keeps increasing every day, clearly more cybersecurity professionals will be needed to plan, implement, upgrade, maintain, and monitor security measures to protect the information infrastructure, computer networks and systems, and digital data of business organizations and local, state and federal agencies. Offered on FDU's Metropolitan Campus in Teaneck, NJ with a convenient evening class schedule, the program teaches the fundamentals of operating systems, computer networks, cybersecurity, applied cryptography, penetration testing and vulnerability analysis. With the foundational courses as stepping blocks, students move on to take advanced courses in one of the two key areas of CSIA: network security administration and secure software development, satisfying the requirements of CAE-CDE knowledge units of those focus areas as recognized by NSA and DHS. In particular, they will learn to establish information security protocols, build firewalls and defend against security intrusions, use encryption and protect information, regulate access to data, establish virus protection systems, implement business continuity and disaster recovery plans, conduct penetration tests and analyze system vulnerabilities, develop secure software, and help resolve information technology (IT) issues related to security.
展开