MS in Information Technology, Cybersecurity
School of Business, Technology,
and Health Care Administration
The Cybersecurity master’s specialization is designed to prepare
learners to manage data and information security within organization,
industry, and legal parameters for technology stakeholders. Learners
focus on developing competencies and information security knowledge
and experience through practice and interaction. Learners apply tools,
strategies, and legal and ethical considerations to mitigate risk,
design solutions, and identify opportunities.
Twelve Required Courses
At least 48 quarter credits
Core courses:
ITEC5002 |
Information Technology and System Trends
Learners in this course examine current information technologies and
trends, emphasizing the areas of technical focus. Learners gain the
strategic underpinnings of contemporary technology and emerging
trends, as well as the communication skills and requirements of an IT
professional. This course also presents self-assessments and career
development activities designed to support lifelong learning and
workforce success.
Must be taken during the first quarter by learners who have been
admitted to the MS in Information Technology degree program.
Cannot be fulfilled by transfer or credit for prior learning.
| 4 quarter credits |
---|---|---|
ITEC5010 * |
Security and Enterprise Networks
In this course, learners develop an understanding of the core
security principles that apply throughout networked systems. Learners
examine the concepts of enterprise network design, core network
infrastructure hardware, configuration, and the architecture of
contemporary computing networks and cloud platforms. Learners also
gain an understanding of network security and threat vectors in the
context of enterprise systems, firewalls, VPNs, and network protocols.
Finally, learners explore enterprise network governance, security risk
assessment and development of internal controls, and implementation
and management for cloud computing environments.
Prerequisite(s):
Completion of or concurrent registration in ITEC5002.
| 4 quarter credits |
ITEC5020 * |
Application and Database Development
In this course, learners use their knowledge of user requirements,
user interface design, program design, programming logic, and testing
processes to develop a professional-quality application suitable for
front-end and web platforms. Learners apply methods for relational
database design, administration, and the use of structured query
language (SQL) to store, retrieve, and update information for use in applications.
Prerequisite(s): Completion of or concurrent registration in ITEC5030.
| 4 quarter credits |
ITEC5030 * |
Emerging Technologies
In this course, learners gain an understanding of new and disruptive
technologies that are poised to have a significant impact on
individuals, industry, technology, and society. Learners explore
strategies for identifying and researching emerging technologies to
determine their value-added application to the organization and
examine models that help predict technology growth and proliferation.
Prerequisite(s):
ITEC5010.
| 4 quarter credits |
PM5018 |
Project Management Foundations
In this cross-disciplinary course, learners analyze the fundamentals of project management and gain an overview of project management standards and their applicability to managing projects, with an emphasis on management methodologies and frameworks, including those defined by the Project Management Institute (PMI®). Learners have the opportunity to participate in experiential learning by bringing in a workplace project, or they may use the project provided in the course. Learners cultivate effective project management leadership skills, including project politics and ethics and collaboration. | 4 quarter credits |
Specialization courses:
IAS5015 * |
Network Security Fundamentals and Cryptography
Learners apply foundational concepts of cybersecurity and information
assurance to select appropriate information security policies,
procedures, and controls to defend enterprise information assets from
breaches of confidentiality and integrity. Learners identify specific
points of vulnerability that may be mitigated through the use of
administrative security policies and operational information security
tools. Learners also examine principles of cryptography and some of
the security controls and methods that use it.
Prerequisite(s): Completion of or concurrent registration in
IAS5010 or PM5018.
| 4 quarter credits |
---|---|---|
IAS5020 * |
Information Security Regulatory and Legal Environment
Learners apply cyber-defense and information assurance controls in
context of the rules and guidelines that influence them and with an
understanding of the security standards, responsibilities, rules,
regulations, and issues that impact a particular organization.
Learners identify laws and policies related to cyber-defense and how
they relate to the storage and transmission of data. Learners also
study basic concepts of audit, evidence collection, and chain of
custody rules.
Prerequisite(s): Completion of or concurrent registration in IAS5015.
| 4 quarter credits |
IAS5025 * |
Operating System Defense
Learners in this course explore the fundamental security issues related to operating system (OS) defense. Learners also employ best practices to harden operating systems and associated software applications using various tools as a part of a layered defense-in-depth strategy. Prerequisite(s): Completion of or concurrent registration in IAS5020. | 4 quarter credits |
IAS5030 * |
Identifying and Managing Risk
Learners identify common information security risk
analysis methodologies, their characteristics, pros and cons, and
applications. Learners examine the sources of risk, including external
malicious attackers, intentional and accidental attacks by internal
users, and threats from environmental and structural sources. Learners
also identify vulnerabilities in hardware, software, locations, and
procedures that provide an opening to attackers and create risk to
organizations. Learners demonstrate risk assessment techniques through
hands-on application of software vulnerability testing tools.
Prerequisite(s): IAS5025.
| 4 quarter credits |
IAS5220 |
Network Security Controls and Testing
Learners study cryptographic algorithms, protocols, and how they
protect information in various states. Learners apply methodology to
detect, analyze, and mitigate vulnerabilities and threats within a
network environment, and examine the latest network technologies and
security issues involved in network communications. Finally, learners
identify and demonstrate ways of exploiting vulnerabilities to gain
access to a system through penetration testing and network forensics
techniques. | 4 quarter credits |
Taken during the learner’s final quarters:
ITEC5900 * |
Applied Information Technology Project 1
In this first of a two-course sequence, learners further enhance
their professional collaboration and communication skills to identify
and select a project that addresses an IT problem or opportunity in an
organizational or societal context. Learners apply IT evaluation
frameworks and the RFP process to elicit and evaluate requirements and
possible technology solutions. Learners also explore IT consulting
skills to address technical, product, and related economic factors
valuable for in-house and external consulting engagements.
For MS in Information Technology learners only. Prerequisite(s):
Completion of or concurrent registration in IAS5030 or ITEC5040 or
ITEC5060 or PM5335. Cannot be fulfilled by transfer or credit for
prior learning.
| 4 quarter credits |
---|---|---|
ITEC5905 * |
Applied Information Technology Project 2
In this second of a two-course sequence, learner teams implement
their project plan to address an IT problem or opportunity in an
organizational or societal context. Teams finalize project
requirements and complete tasks associated with the project, including
regular status reporting, production of intermediate deliverables,
on-going communication with key stakeholders, and developing an
optimal IT solution that meets the requirements and solution context.
Learners also complete a written report and conduct a final
presentation that describes the solution and its implementation. Upon
project conclusion, learners review and update their personal,
technical, and soft skills development plan created at the beginning
of the program.
For MS in Information Technology learners only. Prerequisite(s):
ITEC5900 and completion of or concurrent registration in ANLT5100
or IAS5220 or ISTM5112 or PM5336. Cannot be fulfilled by transfer
or credit for prior learning.
| 4 quarter credits |
Total
At least 48 quarter credits
* Denotes courses that have prerequisite(s). Refer to the descriptions for further details.
Learners who do not complete all program requirements within quarter credit/program point minimums will be required to accrue such additional quarter credits/program points as are associated with any additional or repeat coursework necessary for successful completion of program requirements.
Multiple Specializations available
(must be within the same degree program)