Program Details

Program Outline

Program Outline

The Master of Science in Information Technology degree with a specialization in Information Assurance and Security is designed for students looking to become leaders in the fields of digital security, information collection and preservation, and security system creation.

This one-year master’s program is designed to help students get the in-depth, industry-current business knowledge they want—compressing their studies into a shorter timeframe, but still providing the knowledge and credentials they're looking for to get ahead professionally.

In this specialized curriculum, you can learn the skills needed to protect an organization’s information assets. The important areas covered include threats and vulnerabilities, cryptography, authentication and access control, security models, network security, trusted computer systems, distributed-systems security, World Wide Web security, applications security, information-systems audit, and security management and policies.

We can help you learn how to:

  • Identify the physical and logical threats and vulnerabilities present in new and an existing information system infrastructure
  • Identify relevant security technologies and techniques needed to secure an information infrastructure.
  • Implement technical and administrative control measures to protect information assets and comply with regulatory standards
  • Conduct an analysis of an existing and new information systems infrastructure
  • Conduct information systems audit

Download program detail PDF



Degree Requirements

Program Core
ITCO610Principles of Information Systems6
ITCO620Object-Oriented Applications6
ITCO630Database System Design and Implementation6
ITCO650Enterprise Networks6
Total Credit Hours:24

Specialization Options

Information Assurance and Security
ITAS661Principles of Information Security6
ITAS663Applied Cryptography and Network Security6
ITAS665Legal Issues in Information Security and Incident Response6
ITAS669IT Auditing and Security Risk Management6

Total Credit Hours: 0

Classes Overview

Classes Overview

In this industry-focused curriculum, you’ll have an opportunity to learn how to use secure protocols over networked systems using cryptography. You can also explore current issues in network security and apply security concepts. Courses focus on technical topics as well as privacy and policy issues.

At AIU, you can take more courses you can take more courses devoted to your field of interest, on average, than at other similar schools. For a Master of Science in Information Technology with a specialization in Information Assurance and Security, your classes can include:

Principles of Information Systems

In this course students examine management skills as they relate to the information technology industry, taking into account the relationship between networking, databases, and programming.

Principles of Information Security

This course covers information security technologies as applied to operating systems, database management systems, and computer networks. The three major goals of information security, confidentiality, integrity and availability, are introduced. Threats, vulnerability, exposure, risks, identity management, incidents response, the state machine model and disaster recovery are also covered.

Applied Cryptography and Network Security

In this course, students learn to apply secure protocols over networked systems using cryptography. Symmetric and asymmetric encryption is covered. Other topics that are also covered include one way function, hash, cryptography arithmetic, public key infrastructure, Digital Signature Algorithm and Internet security issues.

Legal Issues in Information Security and Incident Response

In this course, students explore current issues in network security and apply security concepts. The class focuses on technical topics as well as privacy and policy issues. Computer crimes, evidence presentation, chain of custody and introduction to the United States criminal justice system are also covered.

IT Auditing and Security Risk Management

The course covers information systems control, application audit, security threats, security risk types, computer attacks, countermeasures, and risk management. Risk assessment methodologies, certification, accreditation, information systems auditing and metrics for measuring an organization's information security program are also covered in this course.

Object-Oriented Applications

During this course students analyze and apply the fundamentals of object-oriented application development.

Database System Design and Implementation

In this course students will focus on the design and implementation of a relational database management system, including concepts such as data extraction and data manipulation.

Enterprise Networks

In this course students examine computer networking concepts, which enable them to translate business objectives into a physical network design. Students will be expected to collect and analyze appropriate information to make context-appropriate, network-related, business decisions.

Tuition and Fees

Tuition and Fees

Don't let tuition worries stop you from pursuing a degree. AIU offers a variety of grants, scholarships, financial aid as well as straightforward pricing with no hidden costs to help make college more affordable for our students.

Tuition and Fees Schedule

Find more information on Tuition and Financial Aid for AIU Campuses and Military.

What is financial aid?

Financial aid is the name used for federal, state and private resources that may help pay for college costs.  Typically financial aid consists of grants, scholarships, loans and student employment.  At American InterContinental University, we strive to take as much stress out of the financial aid process as possible for our students.

How do I apply for financial aid?

The Free Application for Federal Student Aid, more commonly known as the FAFSA, is the single application needed to apply for all sources of federal aid. The FAFSA can be completed online at

Tuition and Financial Aid Resources

For more information on tuition and financial aid and how you can save money on tuition, click the links below:

Career Paths

Career Paths

What could you do with a degree in Information Assurance and Security?

To combat the loss of sensitive data and to ensure customer protection, companies are investing more in information security than ever before.

Earning a master’s in Information Assurance and Security can demonstrate that you have a passion for the subject, knowledge of both the academic theory and current practices, and experience in the field. And the investment could prove advantageous: according to the U.S. Bureau of Labor Statistics, people who have a master's degree earn 18% more per week than those with a bachelor's degree.1

Specialties in Information Security

It can be helpful to think about information security as an industry where roles are, in a sense, divided into three categories:

  • Creating security, such as security software development or cryptology
  • Maintaining security, like security administration
  • Testing security, such as breach testing

Roles in Information Security

The MSIT in Information Assurance and Security can prepare students for more advanced roles in:

  • Information security analysis
  • Information security analysis
  • Security engineering
  • Security architecture
  • Source code auditing
  • Security consulting

Industries That Use Information Security

According to the Bureau of Labor Statistics, more than half of the jobs in information security are clustered in these five industries:

  • Computer-systems design and related services
  • Information
  • Management of companies and enterprises
  • Depository credit intermediation
  • Management, scientific, and technical consulting services2

With 18% growth projected through 2024—much faster than average, per the BLS3—information security could be a worthwhile career to pursue for anyone interested in an IT master’s degree.


2Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, 2016-17 Edition, Information Security Analysts, on the Internet at (visited July 29, 2016)

Related Degrees

Related Degrees

Master of Science in Information Technology (MSIT) Degree: Specialization in IT Project Management

Project-management careers are becoming increasingly specialized and technical. A master’s degree in IT project management combines advanced project-management techniques with the IT knowledge you need to lead projects and manage teams in an information-technology environment.

Master of Business Administration (MBA) Degree: Specialization in Technology Management

Today’s fast-paced, ever-changing business environment requires leaders to have a firm grasp of technology. With an MBA degree with a specialization in Technology Management from AIU, you can learn to analyze, develop and deploy business solutions in even the most technology-driven environments.

Request Information

By clicking the button below you agree to be contacted by AIU about education services (including through automated and/or pre-recorded means, e.g. dialing and text messaging) via telephone, mobile device (including SMS and MMS), and/or email, even if your telephone number or email address is on a corporate, state or the National Do Not Call Registry, and you agree to our Terms of Use and Privacy Policy. You understand that your consent is not required as a condition to purchase a good or service.

Gainful Employment and Other Student Disclosures

Below you can find placement rates and other information tailored to your chosen campus and program. Certain disclosures are published on this website to assist students in understanding the facts about their programs.

Program Disclosure Information for:
-- Select Campus above --

Employment Rates:

Select a campus for rate information.

- Graduation Rate

Select a campus for rate information.

Classes Start