Smart Budgeting, Spending & MetricsLaw, Investigation, Ethics & PrivacyStrategic Planning & LeadershipOrganizational Management & Negotiation Strategies Risk Management & Business Continuity PlanningPhysical Security Information SecurityKey Technologies & Emerging TrendsNortheastern University’s Converged CurriculumThe curriculum for the master’s of science in information assurance at Northeastern University combines technical classes and criminology classes. All students take core classes. Students also take prerequisite technical and criminology courses to fill in areas where their background knowledge might be lacking. * Introduction to information assurance* Information system forensics * Ethics, privacy and digital rights * Applied cryptography * Computer systems and networks * Security risk management and assessment * Capstone project: An industry-related team project combining the backgrounds of both student groupsTechnical electives* Wireless networks* Database management* Cryptography and computer security* Software design and security* Computer security software toolsCriminological electives* Forensic computer investigation* White-collar crime* Terrorism and international crime Related content news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem. By Susan Bradley Dec 06, 2023 6 mins Patch Management Software Threat and Vulnerability Management Windows Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe