Master's in Information Technology Online
Master of Science in Information Technology
Demand for computer and information systems managers is expected to grow as businesses expand their digital platforms.1 Colorado Technical University’s Master of Science in Information Technology program is designed to help you develop technical and strategic leadership skills to design and manage IT systems and programs.
The online Master's in Information Technology core courses provide you with an opportunity to develop a foundation in strategic management, project management, network infrastructure management, enterprise system architecture, systems security management, and enterprise data management technology.
The master's degree in information technology includes a general track and two concentrations:
For the eighth year in a row, CTU’s online Master of Science in Information Technology degree programs are ranked among the Best Online Master's in Computer Information Technology Programs by U.S. News & World Report.*
Classes start soon. See how you be able to earn your Online Master's Information Technology in as little as 18 months.2
* CTU programs are ranked among U.S. News & World Report’s 2022 Best Online Programs.
Relevant Institutional/Programmatic Accreditation
CTU is institutionally accredited by the Higher Learning Commission www.hlcommission.org
- December 06, 2022
- January 17, 2023
- February 21, 2023
- Colorado Springs
- Denver South
Estimate Tuition and Grad Date
Total tuition for this degree program will vary depending on your educational needs, existing experience, and other factors.Estimate your costs, potential savings and graduation date
The Master of Science in Information Technology (MSIT) program is designed to provide students with a strong computing and essential managerial background as well as systematic, analytical, critical-thinking, and problem-solving skills that enable them to contribute as a knowledgeable professional to a variety of information technology related technical roles, including but not limited to Computer and Information Systems Managers, Computer Systems Analysts, Information Security Analysts, and Computer Network Architects.
The MSIT degree includes core curriculum designed to provide the relevant and advanced instruction in a set of information technology (IT) subjects such as the computer technologies and their applications for strategic management, project management, network infrastructure management, enterprise system architecture, security, and data management. In addition, the MSIT program has a General track and three concentrations: Network Management, Security Management and Project Management. Each concentration provides a set of courses which are designed to equip students with additional domain knowledge such as principles, processes and methodologies, as well as best practices on how to apply relevant information technologies in the concentration subjects.
This program does not lead to additional licensure or certification. As such, CTU has made no determination regarding prerequisites for licensure or certification in any state or jurisdiction.
College of Computer Science, Engineering and Technology Mission Statement
Through innovative industry-current curricula and technology-enabled student-centered teaching, the College of Computer Science, Engineering and Technology empowers students to become motivated, creative, ethical, and skillful professionals who can resolve challenges in Computer Science, Computer/Electrical Engineering, and Information Technology in order to meet the needs of the digital economy.
Course Title Course Description Credit Hours CS651
This course introduces the overall foundations required for the understanding of, and further study in, information systems security. It reviews the history of security and computer systems security in particular to develop a set of models to guide the approach to realizing computer systems security. An overview of current security technologies is presented. A research project and formal paper are required.
Computer Systems Security Foundations 4 CS663
As enterprise systems become even more complex with the introduction of new technologies rapidly increasing, having a well thought out architecture tying to the four domains of enterprise architecture is even more crucial to the survival of an enterprise. The four domains encompass the business operating model, information architecture, application software, and the overall technology infrastructure. The Enterprise Systems Architecture course explores current approaches to an enterprise level design of systems architectures within these four domains. Emphasis is placed on high-level design issues and opportunities for long-term systems planning.
Enterprise Systems Architecture 4 IT621
This course introduces the fundamental Enterprise Data Management concepts of enterprise content management (ECM) and data governance. ECM techniques for building, managing, and maintaining an organization’s information infrastructure is studied. Data governance topics include development of policies and procedures to ensure the availability, usability, integrity, and security of data resources and the implementation and management of those policies.
Enterprise Data Management 4 IT640
Networks are vitally important to today's organizations. Networking technologies continuously change and network professionals must integrate those changes without disrupting existing network traffic. Students will examine current networking architectures and explore networking applications, and protocols to assess their impact on a business organization. The course covers the basic concepts of data communications and design. This includes discussions on network operating systems as well as transmission media, communications hardware, network topologies, switching methods and network analysis. Students will research emerging technologies such as wireless networking, multi-media networking, virtual private networks, cloud computing and IPSec security.
Networking and Telecommunications 4 MGMT690
Students will master analytical and integrative tools to perform in-depth analyses of industries, firms, and competitors. Course material includes methods to predict competitive behavior and develop and implement strategic plans to achieve and sustain a competitive profile in the emerging global marketplace.
Strategic Management in Dynamic Environments 4 PM600
This course emphasizes the development and integration of project management in organizations. It provides an overview and introduction to the discipline of project management, coupled with an examination of the techniques that project managers use to complete their projects on schedule, within budgeted cost, and according to specified scope and quality. With materials presented by the Project Management Institute (PMI®) in its Guide to the Project Management Body of Knowledge (PMBOK® Guide), students explore the theoretical and operational framework of project management relating to the project life-cycle of project initiating, planning, executing, monitoring and controlling, and closing.
Project Management Processes in Organizations 4 Total Credit Hours: 24
Course Title Course Description Credit Hours ELE Select 4 credit hours from 600-level Business, CS or IT 4 ELE Select 16 credit hours of electives from the list below 16 IT697
The Information Technology Capstone demonstrates mastery and vital knowledge from the prior course of study completed by the student. The content, concepts, and knowledge from the applicable programs are critically applied by completing an in-depth project utilizing project management techniques and focusing on a major technical problem or major issue that impacts the student’s own organization or in a desired area of study. The course requires the student to perform a comprehensive analysis and study in a selected area of interest. The student will prepare a formal technical report of the detailed research and application of prior course
Information Technology Capstone 4 Total Credit Hours: 24
Course Title Course Description Credit Hours CS631
This course covers the theory and techniques that one employs to determine the cause of and sequence of events leading up to a security breach in computer systems. This includes the identification of clues and their locations on the offended system, in the associated local network, and into the Internet itself. Techniques to prevent or mitigate such breaches are explored.
Digital Forensics 4 CS632
This course covers aspects of security that apply to creation, deployment, and maintenance of applications and data bases, including the practical and regulatory concerns of information assurance. Included also are the security concerns in this domain as pertains to cloud computing and virtualization. The system vulnerabilities of poor programming practice are examined and suggestions for mitigation developed.
Data and Applications Security 4 CS652
Operating Systems Security provides an in-depth analysis of the security components at the operating system level. The focus is on the development of a security policy and the basic elements that provide identification and authentication, access control and security auditing. In addition to general concepts, both the UNIX/Linux and Windows operating systems are studied. Students participate in hands-on lab assignments to reinforce the material as well as to gain familiarity with a number of available operating system security products and tools (both freeware and commercially available).
Operating Systems Security 4 CS653
Students are provided with a brief overview of the basic elements of networking concepts, topologies, protocols and threats necessary to understand network security issues and make security relevant decisions. An in-depth analysis of the Open Systems Interconnection (OSI) model and layered network security mechanisms needed to provide Confidentiality, Integrity, Availability, Authorization, Authentication and Non-repudiation within a network environment is included. This course includes a thorough treatment of cryptography and cryptographic services. An implementation plan and formal paper are required.
Network Security 4 CS654
This course covers a variety of issues relating to the management of information systems security. The topics covered include development of policies, standards and procedures, risk analysis methodologies, contingency planning and disaster recovery. Additional topics covered include legal and ethical issues, incident reporting, security auditing, computer crime, and security awareness and training. Implementation issues, potential conflicts and tradeoffs are also discussed. A project is required.
Security Management 4 CS660
This course explores current database systems and provides a foundation for future study. Techniques for the design and implementation of relational databases are presented and applied using SQL and a DBMS. Other data models such as the object-oriented and object-relational models are examined and compared to the relational model. Database systems using data warehouses and data marts, distributed databases, and web-based databases are discussed.
Database Systems 4 CS683
This course provides an in-depth study of data warehouses and data marts. Specific techniques for conceptual, logical, and physical design of data warehouses are presented. Other topics include extraction-transformation-load (ETL) techniques, online analytical processing (OLAP), data warehouse applications, and the relationship between data warehouses and traditional database. Completion of a significant project is required.
Data Warehouse 4 IT622
This course explores business intelligence systems and methods to enhance an enterprise’s business value and capabilities. Data processed properly, leads to information. Information clustered, segmented, mined and analyzed leads to business intelligence, which is critical to business success. Students are given the opportunity to determine how they can exploit business intelligence to improve the competitive advantage of an enterprise, incorporate performance management, evaluate future market trends, and enhance customer service.
Business Intelligence Systems & Methods 4 IT642
This course presents the principles and practices of network administration. Students will evaluate and recommend specific IT infrastructure processes and current best practices in areas such as network configuration, user management, backup management, high-reliability configuration, and system security. Network issues such as UNIX interoperability, addressing, and routing are examined.
Network Administration 4 IT643
This course develops the skills needed to design and plan the implementation and maintenance of a diverse network environment that meets the needs of an organization’s enterprise architecture. Students will evaluate various framework models currently used by businesses and government agencies and apply those models to the development of a network architecture that considers an organization’s needs related to their business processes and their technical requirements for data, information, communication, software applications and security.
Enterprise Network Architecture 4 IT644
Effective strategy and policy development are the keys to unlocking the value of technology for a business. Students will learn to evaluate various strategies and apply them to the business needs of an organization through the development and effective communication of IT policies. The principles of IT governance, goal alignment, risk management, policy development, process establishment and continuous improvement are applied to construct an effective information technology service that improves performance and competitiveness within the organization.
IT Governance and Risk Management 4 IT645
The Virtual Systems course examines current technologies that provide virtualization in the areas of network management, server management, data management and cloud computing. Students will analyze the current network infrastructure, set goals, define implementation plans and calculate Return on Investment (ROI) for server and desktop consolidation, data replication, backup and archiving, voice over IP (VOIP) and cloud computing. Students will also analyze the efficient use of virtualization technologies to provide a greener footprint for power usage, space requirements and manpower.
Virtual Systems 4
Total Credit Hours: 48
Compare Related Areas of Study
Compare up to three additional degrees
Ways to Save
MSIT Foundation Requirements
The Master of Science in Information Technology (MSIT) is built upon the expectation that students will enter the program with a solid information technology background. Therefore, the MSIT program requires students to have prior foundational knowledge in all core information technology disciplines to be successful.
Students entering into the MSIT program without a bachelor’s degree in computer science, computer engineering, information technology, cybersecurity, or information systems will be required to successfully complete two MSIT foundation courses (IT502 and IT504) covering the following discipline areas of information technology: networking; network security; virtualization; cloud computing; information system architecture; and database systems.
If a student can show evidence of satisfying the foundation course objectives through coursework from an accredited institution, the foundation requirement can be waived.
The foundation courses are also available to students with an undergraduate information technology degree who wish to refresh their knowledge in these subject areas.
The MSIT foundation course IT502 must be completed and passed prior to beginning courses in the MSIT program. Students will need to complete and pass IT504 prior to the end of the first quarter.
Students must be able to exhibit proficiency by successfully completing the foundation course with a minimum 70% passing score. If after 5 attempts (applies to each course separately) students do not pass the foundation course, students are encouraged to work with the Student Success department if they have questions regarding these foundation courses, timeframes for completion, or for alternative programs of study as needed.
Students who do not meet the MSIT foundation requirements will be withdrawn, canceled or transferred from the MSIT program.
Where do I go from here?
Choosing to continue your education with is a big decision and we're here to help. Choose one of the options below to get started.
Start the conversation
Submit your details and speak to an admissions advisor within the next day:Request Information
Chat or call an Admissions Advisor today.1-855-230-0555
Cost of this degree may be reduced based on one or more of the following:
Program details are provided lower on the page.
Classes start December 6, 2022!
1 Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Computer and Information Systems Managers,
at https://www.bls.gov/ooh/management/computer-and-information-systems-managers.htm (visited February 04, 2021).
2 As a Master’s degree program, this program is designed as an 18- month program; however; many factors will impact your time to completion, including course loads, proficiency and/or transfer credits and breaks.