Cyber Hub

Welcome to the Cyber Hub! This hub is your go-to for all things cybersecurity at John Jay. Whether you're looking to dive into a career in cybersecurity or just want to learn more, we've got you covered.
testimg
Cyber hub

CUNY and John Jay College Cybersecurity Policies and Best practice guide.

Begin your cybersecurity awareness by reviewing the college's cyber safety and cyber-security guidance

John Jay College is committed to providing a robust academic foundation and practical experience to prepare you for a successful career in cybersecurity. Whether you're just starting out or looking to advance your knowledge, there's a path for you here.

The Cyber Hub brings together all cyber related curriculum at John Jay to support your learning pathways. The point of contact for the Cyber Hub is Prof. Shweta Jain and the alternative contact persons are Ms. Jennifer Holst and Dr. Meryem Abouali

BS in Computer Science and Information Security 

NSA validated Program of Study

The  curriculum of the Computer Science and Information Security major is validated as a Cyber Defense and Information Assurance Program of Study by the Program Management Office of National Centers of Academic Excellence in Cybersecurity. The college is in the process of applying to become a Center of Academic Excellence in Cyber Defense.  The main goal of the National Centers of Academic Excellence in Cybersecurity program is to manage a collaborative cybersecurity educational program with U.S higher educational institutions that:

  • Establishes standards for cybersecurity curriculum and academic excellence
  • Includes competency development among students and faculty
  • Values community outreach and leadership in professional development
  • Integrates cybersecurity practice within the institution across academic disciplines
  • Actively engages in solutions to challenges facing cybersecurity education

 

Aftab Ahmad

aahmad@jjay.cuny.edu

Douglas Salane

dsalane@jjay.cuny.edu

Fatma Najar

fnajar@jjay.cuny.edu

Hunter Johnson

hujohnson@jjay.cuny.edu

Jennifer Holst

jholst@jjay.cuny.edu

Jin Woo Kim

jwkim@jjay.cuny.edu

Kumar Ramansenthil

kramansenthil@jjay.cuny.edu

Maksi Kutrolli

mkutrolli@jjay.cuny.edu

Matluba Khodjaeva

mkhodjaeva@jjay.cuny.edu

Meryem Abouali

mabouali@jjay.cuny.edu

Muath Obaidat

mobaidat@jjay.cuny.edu

Ping Ji

pji@jjay.cuny.edu

Shweta Jain

sjain@jjay.cuny.edu

Vivek Sharma

mabouali@jjay.cuny.edu
  • ICJ 760 Information Technology and Cybercrime

    The borderless nature of cybercrime, along with its anonymity and speed provides unique opportunities for criminality. The exponential growth of cybercrime is enabled by the fast adaptions of cybercr…

  • SEC 760 Information Technology and Cybercrime

    The borderless nature of cybercrime, along with its anonymity and speed provides unique opportunities for criminality. The exponential growth of cybercrime is enabled by the fast adaptions of cybercr…

  • CRJ 727 Cybercriminology

    An exploration of the links between computers, deviance and social control. This will include analysis of the technological, social and geo-political context from which cybercrime and informat…

  • FCM 761 Cyber Risk Assessment and Management

    Explores cybersecurity and information assurance from the perspective of risk management to develop strategies to mitigate and manage risks. Focuses on assessment strategies for effective mitigation m…

  • FCM 727 Cybercriminology

    An exploration of the links between computers, deviance and social control. This will include an analysis of the technological, social and geo-political context from which cybercrime and information …

  • FCM 773 Information Privacy, Governance, and Cybersecurity

    This course prepares students to better navigate the complex world of compliance and regulation in areas of cybersecurity governance and data privacy. The course addresses historical development of co…

  • CRJ 753 Investigating Cybercrime

    Study of the legal, ethical and organizational issues, as well as investigative techniques associated with forensic computing cases. The various organizational models used in computer crime investiga…

  •  

 

​​​​​

  • ACC 265 Digital Forensics for the Fraud Examiner

    3 hours  This course provides an overview of processes and techniques used by digital forensic examiners. Best practices for securing, obtaining, and analyzing digital evidence pertaining to frau…

  • SEC 107 Introduction to Cybercrime: Theories and Applications

    3 hours This course delves into the complex world of cybercrime by exploring different types of cybercrime; the nature and extent of cybercrime; cybervictimization; criminological theories; the reason…

  • SEC 213 Cyberlaw and Cyberliberties

    3 hours This course examines the laws that regulate cyberspace and criminalize cybercrime. This course also considers the jurisdiction issues that arise in cybercrime cases. Special attention is paid …

  • SEC 313 Cybervice

    3 hours This course explores the cybercrimes that are collectively known as cybervices; namely, cyberprostitution, the sale of drugs online, and Internet gambling. Particularly, students will examine …

  • SEC 307 Cyberpredators

    3 hours This course explores the cybercrimes committed by online predators; namely, Internet trolling, swatting, cyberbullying, cyberharassment, cyberstalking, sextortion, revenge porn, sexting, and c…

  • SEC 317 Cyberfraud and Identity Theft

    3 hours This course explores different types of cyberfraud: debit card, credit card, and securities fraud, and online scams.  It further investigates the ways in which individuals steal personal …

  • SEC 217 Cybercrime Investigations

    3 hours This course provides a comprehensive analysis of national and international public and private cybercrime investigations, looking in particular at: the manner in which these investigations are…

  • PHI 216 Ethics and Information Technology

    3 hours  This course will provide an introduction to the primary philosophical frameworks for reasoning about global problems of applied ethics in information, communication, and computer technol…

  • SEC 342 Energy Industry Security

    3 hours  The primary purpose of this course is to explore energy and infrastructure security. The synergy between homeland defense and energy security will be fully examined. The course will revi…

  • SEC 348 Security and Safety for Financial Institutions

    3 hours  This course introduces the theory of providing security for financial institutions. Financial institution security refers to the various security measures for the purpose of protecting l…

The Cyber Hub has a 5 member industry advisory board and seeks more members to expand our expertise. 

 

Edward Amoroso

Huxley Barbee

John McFarland

Jose Tejada

Kevin Kennedy