Summary
George Mason University has numerous departments, research centers, and labs focused on cybersecurity in addition to its AI2 Nexus initiative and partnerships with state and federal agencies such as the Commonwealth Cyber Initiative (CCI) and the All-In-Gov Council.
Key departments in the College of Engineering and Computing include the:
- Cybersecurity Engineering Department (CYSE)
- Information Science & Technology Department (IST)
- Data Analytics Engineering Department (DAEN)
- Computer Science Department (CS)
- Electrical & Computer Engineering (ECE)
Key Research Centers, Labs, & Institutes include:
- Center for Secure Information Systems (CSIS)
- Center of Excellence in Command, Control, Communications, Computing, Cyber and Intelligence (C5I)
- Institute of Digital InnovAtion (IDIA)
- NSI Cyber and Technology Center (CTC)
- Sun Security Laboratory (SunLab)
- Center for Assurance Research and Engineering (CARE)
- Center for Cybersecurity Analytics and Automation (CCAA)
- Center for Trusted, Accelerated, and Secure Computing and Communication (C-TASC)
- Wireless Cyber Center (WirelessCyber@Mason)
- Center for Assurance Research and Engineering (CARE)
INTO Study – 31/03/2023 (03:30)
Meet Professor Kun Sun, Director of the Science Security Lab, Associate Director of the Center for Secure Information Systems, and professor of Information Science and Technology at George Mason University. George Mason’s unique cyber security program has four different majors that allow students to take their education in any path they want.
OnAir Post: George Mason Cybersecurity
News
– December 9, 2025
On December 8th, 2025, Dr. Alexandre De Barros Barreto’s CYSE 587 class presented their shark tank seminar presentations! Each team presented for twenty minutes before a panel of sharks began to ask their questions.
It was an innovative and engaging night, full of discussion, collaboration, and problem solving. Thank you to all of the amazing sharks who came out, and to all of the presenters for their solutions to real world problems!
Please look at the overview post to view each team’s presentation and videos.
BOV Minutes from Dec. 4, 2025 meeting, – December 4, 2025
ITEM NUMBER:
PhD in Cybersecurity Degree Program Proposal
PURPOSE OF ITEM:
The PhD in Cybersecurity degree program proposal is under consideration by the State Council of Higher Education for Virginia (SCHEV) for initiation in Fall 2026. The degree program was originally entitled, “PhD in Cyber Security Engineering.” Board action is required to approve the revised name of the degree program.
APPROPRIATE COMMITTEE:
Academic Affairs Committee
BRIEF NARRATIVE:
On September 26, 2024, the Board of Visitors approved George Mason University’s proposal for a PhD degree program in Cyber Security Engineering. The proposal was submitted to SCHEV in August of 2025. Feedback from SCHEV staff included discussion of a name change to the proposal that would eliminate unnecessary confusion between the terms “cybersecurity” and “cyber security engineering.” Faculty determined that a name change would benefit the degree program. The revised name, “PhD in Cybersecurity,” must be approved by the Board of Visitors before consideration of the degree program can resume at SCHEV.
The proposed degree program is built upon the existing bachelor’s and master’s degree programs in Cyber Security Engineering offered by the Department of Cyber Security Engineering in the College of Engineering and Computing and will create a pathway for doctoral level research and training for students in these degree programs.
The proposed program will train students to solve the next generation of engineering and research problems, educate the future workforce, and lead government agencies and industries in the domain of cybersecurity. The proposed degree program responds to the escalating challenges of an increasingly interconnected and digitized world. The proposed degree program will prepare students for the growing faculty and researcher positions in academia, industry, and government on cyber security education and research. Establishing a PhD program in cybersecurity will address the shortage of experts, foster a robust research community in Virginia, and contribute to the evolution of cutting-edge technologies and methodologies in cybersecurity.
REVENUE IMPLICATIONS:
The program at launch will be revenue neutral. The required core courses will be offered by existing faculty, and the program does not require new laboratory or other facilities. It is anticipated that the program to be revenue enhancing as it reaches maturity.
STAFF RECOMMENDATION:
Staff recommends Board approval.
I. Basic Program Information
Institution (official name) Degree Program Designation Degree Program Name
CIP code
Anticipated Initiation Date Governing Board Approval Date (actual or anticipated)
George Mason University Doctor of Philosophy Cybersecurity
Fall 2026
Anticipated December 4, 2025
STATE COUNCIL OF HIGHER EDUCATION FOR VIRGINIA
Program Announcement Form
II. Curriculum Requirements. Address the following using appropriate bolded category headings:
- Core Coursework and total credit hours (include course descriptor/designator, name, and credit hour value). Indicate new courses with an asterisk.
- Sub Areas (e.g., concentrations, emphasis area, tracks) and total credit hours. Include brief description of focus/purpose of sub area and required courses.
- Additional requirements (e.g., internship, practicum, research, electives, thesis, dissertation) and total credit hours
- Total credit hours for the curriculum/degree program.
Core Courses: 18 credits
CYSE 700: Research Methodology and Pedagogy in Cybersecurity (3 credits) CYSE 710: Advanced Networks and Cybersecurity (3 credits)*
CYSE 757: Cyber Law (3 credits)*
CYSE 780: Advanced Hardware and Cyber-Physical Systems Security (3 credits)* CYSE 788: Advanced Systems Engineering for Cybersecurity (3 credits)*
CYSE 789: Advanced Artificial Intelligence Methods for Cybersecurity (3 credits)*
Restricted Electives: 30 credits
Students select 6 credits from the following courses.
CYSE 760: Human Factors in Cyber Security (3 credits)* CYSE 770: Fundamentals of Operating Systems (3 credits)* ECE 646: Applied Cryptography (3 credits)
Students select 24 credits from a list of courses.
CS 530: Mathematical Foundations of Computer Science (3 credits)
CS 583: Analysis of Algorithms (3 credits)
CYSE 640: Wireless Network Security (3 credits)
CYSE 650: Topics in Cyber Security Engineering (3 credits)
CYSE 698: Independent Study and Research (3 credits)
CYSE 750: Advanced Topics in Cyber Security Engineering (3 credits) CYSE 765: Quantum Information Processing and Security (3 credits)* CYSE 785: Advanced Unmanned Aerial Systems Security (3 credits) ISA 764: Security Experimentation (3 credits)
ISA 862: Models for Computer Security (3 credits)
ISA 863: Advanced Topics in Computer Security (3 credits)
OR 719: Graphical Models for Inference and Decision Making (3 credits)
Program Announcement Form Page 1
Research Requirement: 12 credits
CYSE 998: Doctoral Dissertation Proposal (3-12 credits)*
Dissertation Requirement: 12 credits
CYSE 999: Doctoral Dissertation (1-12 credits)*
Total: 72 credit hours
III. Description of Educational Outcomes. Use bullets to list outcomes. (max. 250 words)
Students will learn to
• Apply foundational knowledge of cybersecurity to engineering applications.
• Analyze cyber-physical systems, networks, software, and hardware for vulnerabilities
to various attack scenarios.
• Integrate security fundamentals in building secure and resilient cyber infrastructure,
including large-scale cyber-physical systems and networks.
• Apply quantitative and qualitative methods to cybersecurity.
• Construct approaches for predicting, detecting, and responding to cyber threats
utilizing artificial intelligence.
• Evaluate the principles of cyber law and how they impact cybersecurity occurrences. • Design curriculum and pedagogical experiences for training the next generation of
cyber security engineers.
• Lead innovative research that contributes to the cyber security engineering knowledge
base.
IV. Description of Workplace Competencies/Skills. Use bullets to list outcomes. (max. 250 words)
V. Duplication. Provide information for each existing degree program at a Virginia public institution at the same degree level. Use SCHEV’s degree/certificate inventory and institutions’ websites.
Institution Program degree designation, name, and Degrees granted (most
CIP code recent 5-yr average)
*ODU is currently developing a stand-alone PhD degree program in Cybersecurity.
Graduate will be able to
- Conduct fundamental research to push the frontiers of cybersecurity defense andmitigation techniques.
- Train and educate undergraduate and graduate students and the population in computersecurity fundamentals.
- Analyze cyber security problems in critical infrastructure and design effective solutions.
Old Dominion University* | Doctor of Engineering (DEng)/Doctor of Philosophy (PhD) in Engineering, concentration in Cybersecurity, CIP code: 140101 | 31 (unable to aggregate by concentration) |
Program Announcement Form Page 2
VI. Labor Market Information. Fill in the tables below with relevant information from the Bureau of Labor Statistics (BLS) and Virginia Employment Commission (VEC). Insert correct years (2023 and 2033) to reflect the most recent 10-year projections. Add rows as necessary.
Labor Market Information: Bureau of Labor Statistics, 2022 -2032 (10-Yr)
Occupation Base Year Projected Total % Change Typical Entry Employment Employment and #s Level Education
Computer science teachers, postsecondary | 42000 | 44300 | 5.3 | Doctoral or professional degree |
Engineering teachers, postsecondary | 45500 | 49700 | 9.3 | Doctoral or professional degree |
Computer and Information Research Scientists | 36500 | 44800 | 22.7 | Master’s Degree |
Labor Market Information: Virginia Employment Commission, 2020 -2030 (10-Yr)
Occupation | Base Year Employment | Projected Employment | Total % Change and #s | Annual Change # | Education |
Computer Science Teachers, Postsecondary | 1523 | 1595 | 4.73 | 7 | N/A |
Engineering Teachers, Postsecondary | 1249 | 1357 | 8.65 | 11 | N/A |
Computer and Information Systems Managers | 14659 | 16636 | 13.48 | 198 | Bachelor’s degree |
Program Announcement Form Page 3
VII. Projected Resource Needs
Cost and Funding Sources to Initiate and Operate the Program
Program Initiation Year 2026 – 2027 | Program Full Enrollment Year 2030-2031 |
Informational Category
- 1 Projected Enrollment (Headcount)
- 2 Projected Enrollment (FTE)
8 22 6 16
Projected Revenue Total from Tuition and E&G Fees Due to the Proposed Program
3
VIII. Virginia Needs. Briefly indicate state needs for the degree program. (max. 250 words)
$228,072 $622,152
State Needs. This proposed program will further the State’s effort in developing a sustainable Cybersecurity industry in the Commonwealth. Although there are bachelor’s and master’s degree programs available in cybersecurity, there is no existing doctoral-level Cyber Security Engineering degree program in Virginia. This is a unique but timely program that will address the gap in producing academic doctoral-level academic and researchers in cybersecurity.
Employer Needs. The program will prepare students for international, national, and local employment in academia, government, contractors, think tanks, and non-government organizations. The program will provide rigorous academic training in cybersecurity required by the employers. Given the location of George Mason, the program has the potential to contribute to the Government needs in cybersecurity researchers. In addition, the program will address the growing need of academics in cybersecurity for academic roles, i.e., faculties and research scientists, opening throughout the country.
Student Needs. The success of the BS and MS in Cyber Security Engineering at George Mason underlines student participation and interest in higher education in cybersecurity. As noted from the BLS data there is significant growth is expected in cybersecurity related jobs, such as 31.5% growth in Information Security analysts over the next ten years. To rigorously train the workforce and continued innovation in cyber, students will need doctoral-level education and research experience. This program will address this unmet student demand.
When George Mason University cyber security engineering student Noah Hinger interned at Surefire Cyber in summer 2023, his managers were so impressed with his work that they invited him back. Thanks to his previous experience, the Honors College student was able to take on more responsibility this summer at the computer security company and contribute to more projects.
“The experience from my first summer here let me understand what was happening and contribute across the company,” said Hinger, who is a sophomore in the College of Engineering and Computing. “Surefire Cyber has an amazing internship program. They’re investing in us by having professional development meetings and providing us with the opportunity to talk to experts from different fields.” said Hinger.
“I think it’s helped me a lot to be able to practice my independence and accountability,” said Hinger, who also competes in George Mason’s Chess and Competitive Cyber Clubs. “I’ve had the chance to do projects on my own without necessarily needing to report to someone, and I’ve also learned so much from all the smart people at Surefire Cyber.”
What made you choose Surefire Cyber for your internships?
Surefire Cyber is a digital forensics and incident response company. When an organization gets hacked, they call Surefire Cyber to conduct an investigation and restore systems so that everything’s OK. As a technology intern, I am helping develop the code that our forensic analysts use to figure out what’s happened and retrieve all the essential data. Surefire Cyber is really exceptional at using a lot of automation tools so that the forensic analysts can focus more on the big picture and the data they’re working with.
What does a typical day interning at Surefire Cyber look like for you?
I work under two groups: software development and information operations, or DevOps, and security engineering. For DevOps, I help to manage company infrastructure and work on a lot of coding assignments.
Traditionally, there are software developers, and there are operations, which maintain it. DevOps is kind of a hybrid role, which means it entails coding, setting up servers, and being responsible for maintaining the infrastructure.
How would you say George Mason has helped prepare you for this role?
I definitely think more critically when problem-solving this time around, and I think that’s in part due to George Mason, especially the Honors College research and literature classes that I’ve taken. I’m learning about a lot of new technologies in real time, so I have to be able to research and read about them and then apply that knowledge to my work. The courses have definitely helped me when it comes absorbing the information I’m reading about and then transferring it to my assignments at Surefire Cyber.
Another thing about the Honors College is that I get to meet different people from different disciplines, and that’s really helped me at Surefire Cyber when connecting and networking with colleagues. I think that’s been really rewarding and something that George Mason’s helped prepare me for.
I’ve also gotten a lot of experience in my systems engineering and digital systems engineering classes, and getting to see what goes into a lot of security minded decisions is very similar to what I’m doing in this internship.
What’s your favorite thing about interning at Surefire Cyber?
My favorite thing about the company is that it’s always driving innovation and new discoveries within cybersecurity and digital forensics. They’re always pushing for the best and trying to help people. That’s the whole point of digital forensics is to be there for and helping them out on the worst day of their life.
A team of faculty and students from George Mason University recently discovered a vulnerability in a widely used anonymization tool. They presented their findings last week in Taiwan at the Association for Computing Machinery Conference on Computer and Communications Security (ACM CCS), one of the world’s most prestigious computer security conferences, with a very low paper acceptance rate.
The project was supported by a Commonwealth Cyber Initiative (CCI) grant from the program, “Securing Interactions between Humans and Machines,” and as a requirement of the grant, the project crossed different parts of the university. The College of Engineering and Computing collaborated with Mason and Partners (MAP) Clinics, which provided the data.
Fatima Majid, a George Mason University senior majoring in cyber security engineering, was not just the only one-person team in the top 10 award winners at a recent National Defense Industrial Association (NDIA) cyber competition, she was the only student team. Majid placed ninth out of 51 teams, most of them comprising industry experts.
“I went in, and they were all professional teams, like from Lockheed Martin. I thought, ‘I want to go home,’” said Majid with a laugh, describing her initial cold feet. “But I told myself I could do it. It helped that it was hosted at George Mason, and I had professors there giving me support.”
Her project focused on how the Department of Defense (DoD) can protect critical U.S. infrastructure against low-cost drone attacks at scale, informed by Ukraine’s “Operation Spiderweb,” which used 117 drones to attack Russian air bases in June 2025.

Majid spent the summer in Richmond during a public policy internship. Photo provided
Majid’s lightbulb moment came with a flash as bright as a Virginia speed camera catching a lead-footed driver. Considering the significant network of traffic cameras in the commonwealth, she conceived SkyEyes. This applies an artificial intelligence (AI) model to the live feed of the Virginia 511 camera network, which provides real-time traffic information to citizens and transportation officials. SkyEyes demonstrated how a low-cost, AI-enabled surveillance layer could differentiate threats from non-threats, employing geofencing logic to define safe versus threat zones around sensitive sites.
“I understand how drones work because of what I’ve done at George Mason’s MIX lab—and since I know how to build it, I also know how to jam it. I trained the AI model on a data set provided from a contest sponsor, and that data set had drone imaging and drone prototyping,” she said. “The camera feeds can find objects flying, but what if it’s an Amazon drone, for example? Then I added geofencing and threat analysis to observe the behavior of the drone—if it’s a drone at 2 a.m., for example, maybe that’s sketchy. So, the model gets smarter.”
Majid said that to access the cameras, all she had to do was make a phone call to the right person and explain her project. She cited time spent this summer at the Virginia Academy of Science, Engineering, and Medicine in the Undergraduate Policy Program (VASEM UPP) in Richmond as giving her confidence and exposure to how government works.
K. L. Akerlof, an associate professor in the Department of Environmental Science and Policy at George Mason, said, “The VASEM UPP is a unique opportunity for undergraduates to learn about opportunities in science policy at the state level. The immersive experience of spending a week in Richmond visiting the General Assembly and state agencies, while getting a crash course in how research evidence relates to public policy, can open new doors and career pathways.”
Majid said the strong showing gave her tremendous exposure to influential professional contacts. She fielded several questions about her simulation and future professional plans from a man she only later realized was Retired Brigadier General and NDIA Executive Vice President Guy Walsh.
“Because he showed interest, after he walked away, a crowd of people gathered around to ask me questions. It was very validating.”
She also had a long conversation about her project with Harley Stout, acting chief digital and AI officer at the Joint Chiefs of Staff.
Majid is still pleasantly shocked by her top-10 finish. She is working with Mohamed Gebril, an associate professor in Cyber Security Engineering, on expanding the research. She is confident that such a cost-efficient solution for critical infrastructure protection against drone attacks will attract more funding opportunities.
She credited the supportive culture at Mason—and her family—for keeping her grounded and encouraging her throughout, saying their support made the accomplishment even more meaningful.
When George Mason University cyber security engineering major Connor Wadlin learned about ransomware attacks on organizations, such as the one on the Health Service Executive in Ireland, in his CYSE 445 System Security and Resilience class, it confirmed his commitment to dedicating his educational and professional career to protecting and preserving human lives.
“There’s nothing more important than protecting and defending others. As an engineer, I’m driven to get important work done by thinking about complex problems and finding suitable solutions,” said Wadlin, who is from Leesburg, Virginia.
Since winter 2024, the Honors College student has been interning at the Commonwealth Cyber Initiative(CCI) Northern Virginia Node, George Mason’s branch of the statewide network dedicated of excellence in cybersecurity research. CCI’s mission includes workforce development through training the next generation of cybersecurity experts.

“It’s a super exciting job because I get to work with AprilTags, which are on objects that the drone’s camera then sees and scans. Instead of sharing data, the tags utilize location information for navigation, tracking objects, or pathing purposes,” he said.
Wadlin is also simulating drone flight with the Microsoft tool Air Sim, a project he presented at the CCI Symposium in April. “I created a model with a 98% accuracy, really high F1 score—higher than what we could find on the market—detecting collisions so the drones would be able to respond to anomalous factors such as objects that get too close, environmental variables, cyber-attacks, and more,” he explained.
Wadlin learned about many of the tools he’s currently using for CCI in his classes with College of Engineering and Computing professors, such as his mentor Mohamed Gebril, an associate professor in the Department of Cyber Security Engineering.
“George Mason supports people where they are to get them where they want to be,” Wadlin said.
The skills Wadlin has acquired during his time at George Mason and in his work with CCI have enable him to help other students in their studies.
“Connor is a very skilled student and has been able to develop different programs, as well as 12 labs for sophomore- and freshman-level students at George Mason. He even assists the students during our workshops,” said Gebril.
Wadlin is participating in George Mason’s Bachelor’s to Accelerated Master’s Program and will to pursuing a master’s degree also in cyber security. Gebril said he’s looking forward to having Wadlin in his classes again as a graduate student.
“It will be a smooth transition from the undergraduate to the graduate level because the curriculum aligns well with the CCI mission, which is to equip our students with the tools to conduct research activity and develop cutting–edge technology,” said Gebril.
Wadlin’s team is also working to develop a first–of–its–kind cyber drone race that incorporates cybersecurity challenges and artificial intelligence for undergraduate students.
Wadlin was diagnosed with autism at 19 and sees this diagnosis as working to his advantage by allowing him to see things from different perspectives and approach problems with his own unique ideas.
“As an engineer, you have to ask yourself ‘how is this making the world a better place?’ That’s always got to be the end goal,” said Wadlin.
In the rapidly evolving field of cybersecurity, the integration of generative AI and large language models (LLMs) is a game-changer. While offering immense potential for positive applications, these tools also pose significant risks if misused. Mohamed Gebril, an associate professor at the Department of Cyber Security Engineering at George Mason University, is spearheading a project to use generative AI and LLMs to better identify the very threats they pose.
The project is a collaborative effort between George Mason and the Virginia Military Institute (VMI) funded by the Commonwealth Cyber Initiative Northern Virginia Node. Gebril, along with VMI’s Sherif Abdelhamid, is assembling a team including master’s and undergraduate students to assist with research and is preparing educational workshops to introduce high school and middle school students to the research topic. Gebril’s approach aims to equip future cybersecurity professionals with the knowledge and skills needed to tackle emerging threats.
Automating threat detection
The initiative aims to leverage the power of AI to enhance threat detection and response mechanisms, ultimately making cybersecurity operations more efficient and effective. One of the primary advantages of using AI in cybersecurity is its ability to automate processes that were traditionally manual and time-consuming. Harnessing the beneficial aspects of generative AI for threat-hunting operations involves detecting malicious activities and monitoring data logs in real-time.

“AI has been very helpful in automating this process instead of doing it manually,” Gebril explained. “It can generate the alerts, automate the notifications, and make the instant response.” By automating these tasks, organizations can respond to threats more quickly and efficiently, reducing the potential damage caused by cyberattacks.
Preparing for prompt-injection attacks
A significant challenge in the realm of AI-driven cybersecurity is the threat of prompt-injection attacks, which involve malicious actors using AI prompts to generate harmful outputs, such as malware, said Gebril. His core objective is to create mechanisms for detecting malicious intent, particularly in prompts that are subtle and indirect.
“What we’re hoping to get out of this project is to be able to develop a novel method, a novel mechanism, to detect such malicious intent that is meant to be used or developed by indirect prompt injection attacks,” Gebril said. This involves using advanced AI techniques, such as fuzzy reasoning and deep learning, to analyze and interpret data in real-time.
By leveraging the power of AI, Gebril and his team are working to create more robust and effective threat detection systems, ultimately contributing to a safer digital landscape.
George Mason University Cybersecurity Engineering associate professor Mohamed Gebril led a team of students to the first-ever BattleDrone competition, an exercise coordinated through the Commonwealth Cyber Initiative.
In April, Mohamed Gebril, an associate professor in George Mason University’s Cyber Security Engineering Department, took a team of students into “battle.” The team traveled to Blacksburg, Virginia, for a BattleDrones Competition that was hosted by the Commonwealth Cyber Initiative (CCI) at Virginia Tech’s Drone Park.
Gebril emphasized that the inaugural battle was not really a competition but a learning experience. CCI began working on this competition in 2020, but the pandemic halted its progress. This was the first time the event was held.
“It was not a competition per se. All the teams worked together to get this project off the ground,” said Gebril, who teaches in Mason’s College of Engineering and Computing. “CCI-VT ran into some issues with some of the computer vision tools, but overall it was a great learning experience.”
The main objective of the competition, according to Gebril, was to have student teams assemble their own drones with materials provided by CCI-VT research group, as well as promote interest in these kinds of activities among younger students.
For the competition, Gebril pulled together a team of Mason cyber security engineering majors interested in hands-on opportunities, which included senior Kylie Amison, senior Corrado Apostolakis, senior Brandon Henry, junior Casey Cho, sophomore Zaid Osta, and Mahmoud Zaghloul, an area high school student.
By all accounts, it was a successful trip.
“The team did really well,” Gebril said. “They were able to assemble the drone successfully. We are also working on continuing this project by adding cybersecurity features to enhance this learning experience.”
Will they compete again?
“Yes, indeed,” he said. “Our students love this project and how it applies concepts learned in classrooms toward this hands-on activity.”
CCI is a network of Virginia industry, higher education, and economic development partners dedicated to cybersecurity research, innovation, and workforce development. Mason leads the Northern Virginia Node of the network.
About
Web Links
- CYSE
- IST
- CS
- ECE
- DAEN
- IDIA
- C5I
- CTC
- CARE
- CCAA
- WCC
- AI2 Nexus
- Commonwealth Cyber Initiative (CCI)
- C-TASC
- All-In-Gov Council
Departments
Cybersecurity Engineering Department (CYSE) (CYSE)
Cybersecurity Engineering Department (CYSE) breaks down silos. Our cybersecurity education and research feature multiple fields of study that extend beyond technological requirements. Study includes a broad array of programs in multiple departments
An urgent need exists for a workforce with advanced technical skills in everything related to security and communications. the CEC’s computing, IT, and engineering programs, with their emphasis on cybersecurity, prepare students to create and maintain crucial information systems that will protect our nation from cyber threats with innovative knowledge and effective tools.
Information Sciences and Technology (IST)
The Information Sciences and Technology (IST) department at George Mason is a vibrant community of coders, designers, cybersecurity specialists, AI/ML experts, and HCI researchers. Together we tackle real-world challenges-from smart technologies and transportation systems to cybersecurity and public safety solutions.
Our Vision
To lead excellence and innovation in research, teaching, and service in addressing societal problems using information sciences and technology.
IST promotes and maintains a departmental research culture by providing the facilities, means, and incentives for outstanding research. IST provides excellent education with leading-edge courses, by leveraging innovative instructional methods and emphasizing the enhanced student experience. IST provides continuous advising and mentorship to the students, faculty, and staff as well as ongoing service to the college, university, alumni, and the community.
Data Analytics Engineering (DAEN)
George Mason University’s data analytics engineering programs at Volgenau prepare students for their future careers in a growing discipline.
All of our programs are taught by our industry-leading faculty members across schools and colleges in Mason, giving our students the ability to see the numerous possibilities a data-driven degree can offer.
- Master of Science –– The MS in data analytics engineering is a multidisciplinary degree program at the Volgenau School of Engineering. It provides students with an understanding of the technologies and methodologies necessary for data-driven decision-making.
- Certificate –– The graduate certificate in data analytics engineering gives students a foundation of basic data analytics and data science principles.
- Master of Science Online –– The online MS program gives students the flexibility to earn an advanced degree and expand their knowledge in data analytics in an asynchronous format.
- Certificate Online –– The online graduate certificate in data analytics engineering gives students a foundation of basic data analytics and data science principles with the flexibility of an online asynchronous format.
Data analytics engineering is an expanding field. Therefore, all our programs instruct students on current and innovative tools and prepare them to be adaptable to the future of the field.
Research Centers
There are many Research Centers, Labs, & Institutes at GMU related to cybersecurity including:
- Center for Secure Information Systems (CSIS)
- Center of Excellence in Command, Control, Communications, Computing, Cyber and Intelligence (C5I)
- Institute of Digital InnovAtion (IDIA)
- NSI Cyber and Technology Center (CTC)
- Sun Security Laboratory (SunLab)
- Center for Assurance Research and Engineering (CARE)
- Center for Cybersecurity Analytics and Automation (CCAA)
- Center for Trusted, Accelerated, and Secure Computing and Communication (C-TASC)
- Wireless Cyber Center (WirelessCyber@Mason)
- Center for Assurance Research and Engineering (CARE)
Discuss
OnAir membership is required. The lead Moderator for the discussions is Cyber Curators. We encourage civil, honest, and safe discourse. For more information on commenting and giving feedback, see our Comment Guidelines.
- This topic has 0 replies, 1 voice, and was last updated 1 month, 2 weeks ago by .
- You must be logged in to reply to this topic.
This is an open discussion on the contents of this post.
- This topic has 0 replies, 1 voice, and was last updated 1 month, 2 weeks ago by .
- You must be logged in to reply to this topic.

