Master of Science in Information Technology (MSIT) Degree with a Specialization in
Information Assurance and Security

Today’s business needs strong leaders in the IT security realm. A master’s degree in information assurance and security can help you deepen your knowledge of information assurance and security and gain the managerial skills you need to lead departments, teams and IT security projects.

Next Online Start Date:

December 27, 2017

Total Credits:

0

Offered:

Online

Program Details

The Master of Science in Information Technology degree with a specialization in Information Assurance and Security is designed for students looking to become leaders in the fields of digital security, information collection and preservation, and security system creation.

This one-year master’s program is designed to help students get the in-depth, industry-current business knowledge they want—compressing their studies into a shorter timeframe, but still providing the knowledge and credentials they're looking for to get ahead professionally.

In this specialized curriculum, you can learn the skills needed to protect an organization’s information assets. The important areas covered include threats and vulnerabilities, cryptography, authentication and access control, security models, network security, trusted computer systems, distributed-systems security, World Wide Web security, applications security, information-systems audit, and security management and policies.

We can help you learn how to:

  • Identify the physical and logical threats and vulnerabilities present in new and an existing information system infrastructure
  • Identify relevant security technologies and techniques needed to secure an information infrastructure.
  • Implement technical and administrative control measures to protect information assets and comply with regulatory standards
  • Conduct an analysis of an existing and new information systems infrastructure
  • Conduct information systems audit

Download program detail PDF

Courses

Degree Requirements

Program Core
ITCO610 Principles of Information Systems 6
ITCO620 Object-Oriented Applications 6
ITCO630 Database System Design and Implementation 6
ITCO650 Enterprise Networks 6
Total Credit Hours: 24
Information Assurance and Security
ITAS661 Principles of Information Security 6
ITAS663 Applied Cryptography and Network Security 6
ITAS665 Legal Issues in Information Security and Incident Response 6
ITAS669 IT Auditing and Security Risk Management 6

Total Credit Hours:

In this industry-focused curriculum, you’ll have an opportunity to learn how to use secure protocols over networked systems using cryptography. You can also explore current issues in network security and apply security concepts. Courses focus on technical topics as well as privacy and policy issues.

For a Master of Science in Information Technology with a specialization in Information Assurance and Security, your classes may include:

Principles of Information Systems

In this course students examine management skills as they relate to the information technology industry, taking into account the relationship between networking, databases, and programming.

Principles of Information Security

This course covers information security technologies as applied to operating systems, database management systems, and computer networks. The three major goals of information security, confidentiality, integrity and availability, are introduced. Threats, vulnerability, exposure, risks, identity management, incidents response, the state machine model and disaster recovery are also covered.

Applied Cryptography and Network Security

In this course, students learn to apply secure protocols over networked systems using cryptography. Symmetric and asymmetric encryption is covered. Other topics that are also covered include one way function, hash, cryptography arithmetic, public key infrastructure, Digital Signature Algorithm and Internet security issues.

Legal Issues in Information Security and Incident Response

In this course, students explore current issues in network security and apply security concepts. The class focuses on technical topics as well as privacy and policy issues. Computer crimes, evidence presentation, chain of custody and introduction to the United States criminal justice system are also covered.

IT Auditing and Security Risk Management

The course covers information systems control, application audit, security threats, security risk types, computer attacks, countermeasures, and risk management. Risk assessment methodologies, certification, accreditation, information systems auditing and metrics for measuring an organization's information security program are also covered in this course.

Object-Oriented Applications

During this course students analyze and apply the fundamentals of object-oriented application development.

Database System Design and Implementation

In this course students will focus on the design and implementation of a relational database management system, including concepts such as data extraction and data manipulation.

Enterprise Networks

In this course students examine computer networking concepts, which enable them to translate business objectives into a physical network design. Students will be expected to collect and analyze appropriate information to make context-appropriate, network-related, business decisions.

Total tuition for this degree program may vary depending on your educational needs, existing experience, and other factors.

Estimate your costs, potential savings and graduation date.

Program Outline

The Master of Science in Information Technology degree with a specialization in Information Assurance and Security is designed for students looking to become leaders in the fields of digital security, information collection and preservation, and security system creation.

This one-year master’s program is designed to help students get the in-depth, industry-current business knowledge they want—compressing their studies into a shorter timeframe, but still providing the knowledge and credentials they're looking for to get ahead professionally.

In this specialized curriculum, you can learn the skills needed to protect an organization’s information assets. The important areas covered include threats and vulnerabilities, cryptography, authentication and access control, security models, network security, trusted computer systems, distributed-systems security, World Wide Web security, applications security, information-systems audit, and security management and policies.

We can help you learn how to:

  • Identify the physical and logical threats and vulnerabilities present in new and an existing information system infrastructure
  • Identify relevant security technologies and techniques needed to secure an information infrastructure.
  • Implement technical and administrative control measures to protect information assets and comply with regulatory standards
  • Conduct an analysis of an existing and new information systems infrastructure
  • Conduct information systems audit

Download program detail PDF

Courses

Degree Requirements

Program Core
ITCO610 Principles of Information Systems 6
ITCO620 Object-Oriented Applications 6
ITCO630 Database System Design and Implementation 6
ITCO650 Enterprise Networks 6
Total Credit Hours: 24
Information Assurance and Security
ITAS661 Principles of Information Security 6
ITAS663 Applied Cryptography and Network Security 6
ITAS665 Legal Issues in Information Security and Incident Response 6
ITAS669 IT Auditing and Security Risk Management 6

Total Credit Hours:

Classes Overview

In this industry-focused curriculum, you’ll have an opportunity to learn how to use secure protocols over networked systems using cryptography. You can also explore current issues in network security and apply security concepts. Courses focus on technical topics as well as privacy and policy issues.

For a Master of Science in Information Technology with a specialization in Information Assurance and Security, your classes may include:

Principles of Information Systems

In this course students examine management skills as they relate to the information technology industry, taking into account the relationship between networking, databases, and programming.

Principles of Information Security

This course covers information security technologies as applied to operating systems, database management systems, and computer networks. The three major goals of information security, confidentiality, integrity and availability, are introduced. Threats, vulnerability, exposure, risks, identity management, incidents response, the state machine model and disaster recovery are also covered.

Applied Cryptography and Network Security

In this course, students learn to apply secure protocols over networked systems using cryptography. Symmetric and asymmetric encryption is covered. Other topics that are also covered include one way function, hash, cryptography arithmetic, public key infrastructure, Digital Signature Algorithm and Internet security issues.

Legal Issues in Information Security and Incident Response

In this course, students explore current issues in network security and apply security concepts. The class focuses on technical topics as well as privacy and policy issues. Computer crimes, evidence presentation, chain of custody and introduction to the United States criminal justice system are also covered.

IT Auditing and Security Risk Management

The course covers information systems control, application audit, security threats, security risk types, computer attacks, countermeasures, and risk management. Risk assessment methodologies, certification, accreditation, information systems auditing and metrics for measuring an organization's information security program are also covered in this course.

Object-Oriented Applications

During this course students analyze and apply the fundamentals of object-oriented application development.

Database System Design and Implementation

In this course students will focus on the design and implementation of a relational database management system, including concepts such as data extraction and data manipulation.

Enterprise Networks

In this course students examine computer networking concepts, which enable them to translate business objectives into a physical network design. Students will be expected to collect and analyze appropriate information to make context-appropriate, network-related, business decisions.

Tuition and Fees

Total tuition for this degree program may vary depending on your educational needs, existing experience, and other factors.

Estimate your costs, potential savings and graduation date.

Take the next step. Classes Start December 27, 2017

Request Information

* Please correct the following errors:

By clicking the button below you agree to be contacted by AIU about education services (including through automated and/or pre-recorded means, e.g. dialing and text messaging) via telephone, mobile device (including SMS and MMS), and/or email, even if your telephone number or email address is on a corporate, state or the National Do Not Call Registry, and you agree to our Terms of Use and Privacy Policy. You understand that your consent is not required as a condition to purchase a good or service.

Gainful Employment and Other Student Disclosures

Below you can find placement rates and other information tailored to your chosen campus and program. Certain disclosures are published on this website to assist students in understanding the facts about their programs.

Program Disclosure Information for:
-- Select Campus Above --

Program Disclosure Information for:
AIU Online - Master of Science in Information Technology

Gainful Employment Disclosure Button

Program Disclosure Information for:
AIU Atlanta - Master of Science in Information Technology

Gainful Employment Disclosure Button

Employment Rates:

Select a campus for rate information.


Graduation Rate

Select a campus for rate information.

AIU Online - Graduation Rate

The percentage of first-time, full-time undergraduate students who started between
7/1/2010 and 10/15/2010 who completed within 150% of the normal time period:

26%
Learn more

AIU Atlanta - Graduation Rate

The percentage of first-time, full-time undergraduate students who started between
7/1/2010 and 10/15/2010 who completed within 150% of the normal time period:

21%
Learn more

Classes Start December 27, 2017

Questions?

Fill out this brief form and an admissions
advisor will contact you within the next day.

By clicking the button below you agree to be contacted by AIU about education services (including through automated and/or pre-recorded means, e.g. dialing and text messaging) via telephone, mobile device (including SMS and MMS), and/or email, even if your telephone number or email address is on a corporate, state or the National Do Not Call Registry, and you agree to our Terms of Use and Privacy Policy. You understand that your consent is not required as a condition to purchase a good or service.

Accrediation Image