Skip to content Skip to navigation

Click here for the Virtual 2020 Guide and important updates about our virtual Fall 2020 semester.

Admissions Requirements

Admissions Requirements

0
0

APPLICATION Requirements

Completed Application:  Found Online 
($55 fee; waived for CHC graduates and Information Session attendees)

Official sealed transcripts of all previous college and university study (Applicants must have graduated, or anticipate graduating, from an accredited institution with a four-year bachelor's degree; waived for applicants whose most recent college is CHC.)

Two letters of recommendation from academic or professional sources. Recent graduates are expected to submit at least one academic recommendation; professional sources should be in supervisory roles, references from family or friends will not be accepted.

Resume or Curriculum Vitae (CV) describing all education, professional, work, and volunteer experience, and appropriate information regarding knowledge, skills, and abilities that will support your success in the program and profession.

Professional Goals Essay - The Goals Essay should be between 500-750 words (2-3 pages double-spaced) describing your academic and professional goals, your motivation to attend graduate school, and how you hope to contribute to your program and profession upon earning a Master’s degree.

In your essay you should address the following issues:

  • Discuss how your current technical skills will serve as a foundation for learning cybersecurity methods and techniques in your program and profession.
  • What areas of cybersecurity practice interest you?  What industry, agency, or organization would you want to pursue your areas of interest?

Please proofread, as the essay will be evaluated for both content and grammar as a part of the admissions process.

PROGRAM Interview

After all requirements are received, qualified applicants will be contacted by email to schedule a program interview with the Graduate Program Coordinator, Pamela King, to arrange a Skype or online interview.

Evaluation of Criteria

Upon submission of all criteria, the applicant's file is reviewed by the Admissions Committee and, if applicable, the Director of Global Education. The applicant will be notified of the decision regarding their application.  Decisions are based on the strength of required criteria; correlation of applicant goals with program goals; ability to contribute to a collaborative learning environment as demonstrated throughout the admissions process.  This includes appropriate and professional verbal and written correspondence.

Application Deadlines

Chestnut Hill College has a rolling admissions policy for graduate applicants and will review documents as they are received.  In order to allow time for the admissions review prior to registration, the committee recommends that a completed application is on file by the following dates:

  • Spring Term - November 1
  • Fall Term - July 1

MS Cybersecurity Program Prerequisites

Waiving Computer Science Courses

Students who completed similar courses, completed relevant certifications, or have relevant work experience may, if approved by the Program Director, waive out of CSEC 501 and/or CSEC 502.  If these courses are waived students do not need to take additional courses in their place.  Students who have CSEC 501 and/or CSEC 502 waived will progress directly to CSEC 601 and begin their cybersecurity courses and will complete their degrees with 33 credits if one course is waived, or 30 credits if both courses are waived.

Prerequisite knowledge in basic computer hardware and components, applied operating systems, and data communication/networking are required before students begin their cybersecurity courses (CSEC 601 and beyond). Knowledge of programming or scripting language(s) is recommended, but not required.  Prerequisites can be met in a variety of ways. 

  1. Undergraduate courses taken at Chestnut Hill College:
  • CMTC 190: Introduction to Computer Hardware and Peripherals
  • CMTC 230: Introduction to Data Communications
  • CMTC 260: Applied Operating Systems
  • CMSC 190: Introduction to Python Programming (Recommended)
  1. Equivalent courses taken at other colleges or universities.
  2. Applicable work experience - A proficiency with technology from a work environment may include but is not limited to:
  • Maintain office computer local area networks, wired and Wi-Fi.
  • Install and troubleshoot operating systems and software.
  • Install and maintain desktop and laptops computers.
  • Install and maintain peripheral devices, such as printers.
  • Performing work on databases, web sites, or software development.
  • Configure and integrate mobile devices to business environment.
  • Networking to cloud provider services, platforms, and applications.
  • Managing and configuring IoT or “smart” devices (sensors, cameras, etc.)
  • Network Administrator, Information Technology Specialist, IT Support/Helpdesk, Information Systems Analyst, are examples of job titles where these skills would be used.
  1. Professional Certifications:

Data Communication/Networking

CompTIA Network+

CISCO’s CCNA

CISCO’s CCENT

 

Computer Hardware/Operating Systems

CompTIA’s A+

Microsoft MCITP

Microsoft’s MCSA

CompTIA’s ITF

CompTIA's Linux+

Applicants seeking course waivers should inform Graduate Admissions during the application process. Applicants should submit appropriate documentation (transcripts, certifications, resumes, and letters from supervisors detailing your work experience) to support their request for course waivers when they apply for admission to the program. 

For questions about prerequisites please contact the Graduate Admissions Office.

APPLY NOW

Contact Information

215-248-7170
GradAdmissions@chc.edu 

globe

Cybersecurity Conference

Our college also hosts the Annual Cyber Security and Forensics Conference at our SugarLoaf Campus. This renowned conference is co-sponsored by the Chestnut Hill College HTCIA Student Chapter and the High Technology Crime Investigation Association.

Our conference centers on investigations, apprehensions and methodologies associated with the newest breed of high tech criminals.

The conference is also a gathering place for members from the Philadelphia Women and Cyber Security group. Women make up only %11 of the cybersecurity workforce and with such low representation, the Philadelphia Women Cyber Security group advocates for and assists women as they navigate through the cybersecurity industry.