Your browser does not support JavaScript! or JavaScript is currently disabled.
Skip to main section

MS in Information Technology, Cybersecurity

School of Business, Technology, and Health Care Administration

The Cybersecurity master’s specialization is designed to prepare learners to manage data and information security within organization, industry, and legal parameters for technology stakeholders. Learners focus on developing competencies and information security knowledge and experience through practice and interaction. Learners apply tools, strategies, and legal and ethical considerations to mitigate risk, design solutions, and identify opportunities.

Show course with description

 

 

Twelve Required Courses

 

 

At least 48 quarter credits

Core courses:

ITEC5002
Information Technology and System Trends

Learners in this course examine current information technologies and trends, emphasizing the areas of technical focus. Learners gain the strategic underpinnings of contemporary technology and emerging trends, as well as the communication skills and requirements of an IT professional. This course also presents self-assessments and career development activities designed to support lifelong learning and workforce success. Must be taken during the first quarter by learners who have been admitted to the MS in Information Technology degree program. Cannot be fulfilled by transfer or credit for prior learning.

4 quarter credits
ITEC5010 *
Security and Enterprise Networks

In this course, learners develop an understanding of the core security principles that apply throughout networked systems. Learners examine the concepts of enterprise network design, core network infrastructure hardware, configuration, and the architecture of contemporary computing networks and cloud platforms. Learners also gain an understanding of network security and threat vectors in the context of enterprise systems, firewalls, VPNs, and network protocols. Finally, learners explore enterprise network governance, security risk assessment and development of internal controls, and implementation and management for cloud computing environments.  Prerequisite(s): Completion of or concurrent registration in ITEC5002.

4 quarter credits
ITEC5020 *
Application and Database Development

In this course, learners use their knowledge of user requirements, user interface design, program design, programming logic, and testing processes to develop a professional-quality application suitable for front-end and web platforms. Learners apply methods for relational database design, administration, and the use of structured query language (SQL) to store, retrieve, and update information for use in applications.  Prerequisite(s): Completion of or concurrent registration in ITEC5030.

4 quarter credits
ITEC5030 *
Emerging Technologies

In this course, learners gain an understanding of new and disruptive technologies that are poised to have a significant impact on individuals, industry, technology, and society. Learners explore strategies for identifying and researching emerging technologies to determine their value-added application to the organization and examine models that help predict technology growth and proliferation.  Prerequisite(s): ITEC5010.

4 quarter credits
PM5018
Project Management Foundations

In this cross-disciplinary course, learners analyze the fundamentals of project management and gain an overview of project management standards and their applicability to managing projects, with an emphasis on management methodologies and frameworks, including those defined by the Project Management Institute (PMI®). Learners have the opportunity to participate in experiential learning by bringing in a workplace project, or they may use the project provided in the course. Learners cultivate effective project management leadership skills, including project politics and ethics and collaboration.

4 quarter credits

Specialization courses:

IAS5015 *
Network Security Fundamentals and Cryptography

Learners apply foundational concepts of cybersecurity and information assurance to select appropriate information security policies, procedures, and controls to defend enterprise information assets from breaches of confidentiality and integrity. Learners identify specific points of vulnerability that may be mitigated through the use of administrative security policies and operational information security tools. Learners also examine principles of cryptography and some of the security controls and methods that use it. Prerequisite(s): Completion of or concurrent registration in IAS5010 or PM5018.

4 quarter credits
IAS5020 *
Information Security Regulatory and Legal Environment

Learners apply cyber-defense and information assurance controls in context of the rules and guidelines that influence them and with an understanding of the security standards, responsibilities, rules, regulations, and issues that impact a particular organization. Learners identify laws and policies related to cyber-defense and how they relate to the storage and transmission of data. Learners also study basic concepts of audit, evidence collection, and chain of custody rules.  Prerequisite(s): Completion of or concurrent registration in IAS5015.

4 quarter credits
IAS5025 *
Operating System Defense

Learners in this course explore the fundamental security issues related to operating system (OS) defense. Learners also employ best practices to harden operating systems and associated software applications using various tools as a part of a layered defense-in-depth strategy. Prerequisite(s): Completion of or concurrent registration in IAS5020.

4 quarter credits
IAS5030 *
Identifying and Managing Risk

Learners identify common information security risk analysis methodologies, their characteristics, pros and cons, and applications. Learners examine the sources of risk, including external malicious attackers, intentional and accidental attacks by internal users, and threats from environmental and structural sources. Learners also identify vulnerabilities in hardware, software, locations, and procedures that provide an opening to attackers and create risk to organizations. Learners demonstrate risk assessment techniques through hands-on application of software vulnerability testing tools.  Prerequisite(s): IAS5025.

4 quarter credits
IAS5220
Network Security Controls and Testing

Learners study cryptographic algorithms, protocols, and how they protect information in various states. Learners apply methodology to detect, analyze, and mitigate vulnerabilities and threats within a network environment, and examine the latest network technologies and security issues involved in network communications. Finally, learners identify and demonstrate ways of exploiting vulnerabilities to gain access to a system through penetration testing and network forensics techniques.

4 quarter credits

Taken during the learner’s final quarters:

ITEC5900 *
Applied Information Technology Project 1

In this first of a two-course sequence, learners further enhance their professional collaboration and communication skills to identify and select a project that addresses an IT problem or opportunity in an organizational or societal context. Learners apply IT evaluation frameworks and the RFP process to elicit and evaluate requirements and possible technology solutions. Learners also explore IT consulting skills to address technical, product, and related economic factors valuable for in-house and external consulting engagements. For MS in Information Technology learners only. Prerequisite(s): Completion of or concurrent registration in IAS5030 or ITEC5040 or ITEC5060 or PM5335. Cannot be fulfilled by transfer or credit for prior learning.

4 quarter credits
ITEC5905 *
Applied Information Technology Project 2

In this second of a two-course sequence, learner teams implement their project plan to address an IT problem or opportunity in an organizational or societal context. Teams finalize project requirements and complete tasks associated with the project, including regular status reporting, production of intermediate deliverables, on-going communication with key stakeholders, and developing an optimal IT solution that meets the requirements and solution context. Learners also complete a written report and conduct a final presentation that describes the solution and its implementation. Upon project conclusion, learners review and update their personal, technical, and soft skills development plan created at the beginning of the program. For MS in Information Technology learners only. Prerequisite(s): ITEC5900 and completion of or concurrent registration in ANLT5100 or IAS5220 or ISTM5112 or PM5336. Cannot be fulfilled by transfer or credit for prior learning.

4 quarter credits

 

 

Total

 

 

At least 48 quarter credits

* Denotes courses that have prerequisite(s). Refer to the descriptions for further details.

Learners who do not complete all program requirements within quarter credit/program point minimums will be required to accrue such additional quarter credits/program points as are associated with any additional or repeat coursework necessary for successful completion of program requirements.

 

 

 

Multiple Specializations available   (must be within the same degree program)