Master's in Information Technology - Security Management Online
Master of Science in Information Technology - Security Management
Employment for information security analysts is projected to grow 31% from 2019 to 2029, much faster than average of all occupations, according to the Bureau of Labor Statistics.1 Explore how to set up secure infrastructure for an enterprise, and manage cloud and mobile computing in Colorado Technical University’s Master of Science in Information Technology with a Security Management concentration.
The core courses are designed to help you develop the professional skills to consistently align IT strategies with the enterprise’s goals, as well as a strong foundation in the relevant IT technologies and services. In the concentration courses explore how to set up a secure infrastructure, and manage cloud and mobile computing. You also have the opportunity to participate in hands-on lab assignments to reinforce course material as well as to develop familiarity with a number of available operating system security products, including Windows and UNIX/Linux.
For the ninth consecutive year, CTU’s online Master of Science in Information Technology degree programs are ranked among the Best Online Master's in Computer Information Technology Programs by U.S. News & World Report.*
Manage your education with your smartphone or tablet anytime, anywhere with CTU Mobile. Classes start soon. See how you be able to earn your Master’s in as little as 18 months.2
* CTU programs are ranked among U.S. News & World Report’s 2023 Best Online Programs.
Relevant Institutional/Programmatic Accreditation
CTU is institutionally accredited by the Higher Learning Commission www.hlcommission.org
- April 04, 2023
- May 09, 2023
- June 13, 2023
- Colorado Springs
Estimate Tuition and Grad Date
Total tuition for this degree program will vary depending on your educational needs, existing experience, and other factors.Estimate your costs, potential savings and graduation date
The Master of Science in Information Technology (MSIT) program is designed to provide students with a strong computing and essential managerial background as well as systematic, analytical, critical-thinking, and problem-solving skills that enable them to contribute as a knowledgeable professional to a variety of information technology related technical roles, including but not limited to Computer and Information Systems Managers, Computer Systems Analysts, Information Security Analysts, and Computer Network Architects.
The MSIT degree includes core curriculum designed to provide the relevant and advanced instruction in a set of information technology (IT) subjects such as the computer technologies and their applications for strategic management, project management, network infrastructure management, enterprise system architecture, security, and data management. In addition, the MSIT program has a General track and two concentrations: Network Management and Security Management. Each concentration provides a set of courses which are designed to equip students with additional domain knowledge such as principles, processes and methodologies, as well as best practices on how to apply relevant information technologies in the concentration subjects.
This program does not lead to additional licensure or certification. As such, CTU has made no determination regarding prerequisites for licensure or certification in any state or jurisdiction.
College of Computer Science, Engineering and Technology Mission Statement
Through innovative industry-current curricula and technology-enabled student-centered teaching, the College of Computer Science, Engineering and Technology empowers students to become motivated, creative, ethical, and skillful professionals who can resolve challenges in Computer Science, Computer/Electrical Engineering, and Information Technology in order to meet the needs of the digital economy.
Course Title Course Description Credit Hours CS651
This course introduces the overall foundations required for the understanding of, and further study in, information systems security. It reviews the history of security and computer systems security in particular to develop a set of models to guide the approach to realizing computer systems security. An overview of current security technologies is presented. A research project and formal paper are required.
Computer Systems Security Foundations 4 CS663
As enterprise systems become even more complex with the introduction of new technologies rapidly increasing, having a well thought out architecture tying to the four domains of enterprise architecture is even more crucial to the survival of an enterprise. The four domains encompass the business operating model, information architecture, application software, and the overall technology infrastructure. The Enterprise Systems Architecture course explores current approaches to an enterprise level design of systems architectures within these four domains. Emphasis is placed on high-level design issues and opportunities for long-term systems planning.
Enterprise Systems Architecture 4 IT621
This course introduces the fundamental Enterprise Data Management concepts of enterprise content management (ECM) and data governance. ECM techniques for building, managing, and maintaining an organization’s information infrastructure is studied. Data governance topics include development of policies and procedures to ensure the availability, usability, integrity, and security of data resources and the implementation and management of those policies.
Enterprise Data Management 4 IT640
Networks are vitally important to today's organizations. Networking technologies continuously change and network professionals must integrate those changes without disrupting existing network traffic. Students will examine current networking architectures and explore networking applications, and protocols to assess their impact on a business organization. The course covers the basic concepts of data communications and design. This includes discussions on network operating systems as well as transmission media, communications hardware, network topologies, switching methods and network analysis. Students will research emerging technologies such as wireless networking, multi-media networking, virtual private networks, cloud computing and IPSec security.
Networking and Telecommunications 4 MGMT690
Students will master analytical and integrative tools to perform in-depth analyses of industries, firms, and competitors. Course material includes methods to predict competitive behavior and develop and implement strategic plans to achieve and sustain a competitive profile in the emerging global marketplace.
Strategic Management in Dynamic Environments 4 PM600
This course emphasizes the development and integration of project management in organizations. It provides an overview and introduction to the discipline of project management, coupled with an examination of the techniques that project managers use to complete their projects on schedule, within budgeted cost, and according to specified scope and quality. With materials presented by the Project Management Institute (PMI®) in its Guide to the Project Management Body of Knowledge (PMBOK® Guide), students explore the theoretical and operational framework of project management relating to the project life-cycle of project initiating, planning, executing, monitoring and controlling, and closing.
Project Management Processes in Organizations 4 Total Credit Hours: 24
Course Title Course Description Credit Hours CS632
This course covers aspects of security that apply to creation, deployment, and maintenance of applications and data bases, including the practical and regulatory concerns of information assurance. Included also are the security concerns in this domain as pertains to cloud computing and virtualization. The system vulnerabilities of poor programming practice are examined and suggestions for mitigation developed.
Data and Applications Security 4 CS652
Operating Systems Security provides an in-depth analysis of the security components at the operating system level. The focus is on the development of a security policy and the basic elements that provide identification and authentication, access control and security auditing. In addition to general concepts, both the UNIX/Linux and Windows operating systems are studied. Students participate in hands-on lab assignments to reinforce the material as well as to gain familiarity with a number of available operating system security products and tools (both freeware and commercially available).
Operating Systems Security 4 CS653
Students are provided with a brief overview of the basic elements of networking concepts, topologies, protocols and threats necessary to understand network security issues and make security relevant decisions. An in-depth analysis of the Open Systems Interconnection (OSI) model and layered network security mechanisms needed to provide Confidentiality, Integrity, Availability, Authorization, Authentication and Non-repudiation within a network environment is included. This course includes a thorough treatment of cryptography and cryptographic services. An implementation plan and formal paper are required.
Network Security 4 CS654
This course covers a variety of issues relating to the management of information systems security. The topics covered include development of policies, standards and procedures, risk analysis methodologies, contingency planning and disaster recovery. Additional topics covered include legal and ethical issues, incident reporting, security auditing, computer crime, and security awareness and training. Implementation issues, potential conflicts and tradeoffs are also discussed. A project is required.
Security Management 4 IT635This course introduces students to the audit services in accordance with IT audit standards. This course develops the skills needed to evaluate risk-based IT audit strategies; develop specific audits plan, report the finding, and develop status reports in order to assist the enterprise with protecting and controlling information systems. Information Systems Auditing 4 IT697
The Information Technology Capstone demonstrates mastery and vital knowledge from the prior course of study completed by the student. The content, concepts, and knowledge from the applicable programs are critically applied by completing an in-depth project utilizing project management techniques and focusing on a major technical problem or major issue that impacts the student’s own organization or in a desired area of study. The course requires the student to perform a comprehensive analysis and study in a selected area of interest. The student will prepare a formal technical report of the detailed research and application of prior course
Information Technology Capstone 4 Total Credit Hours: 24
Total Credit Hours: 48
Compare Related Areas of Study
Compare up to three additional degrees
Ways to Save
MSIT Foundation Requirements
The Master of Science in Information Technology (MSIT) is built upon the expectation that students will enter the program with a solid information technology background. Therefore, the MSIT program requires students to have prior foundational knowledge in all core information technology disciplines to be successful.
Students entering into the MSIT program without a bachelor’s degree in computer science, computer engineering, information technology, cybersecurity, or information systems will be required to successfully complete two MSIT foundation courses (IT502 and IT504) covering the following discipline areas of information technology: networking; network security; virtualization; cloud computing; information system architecture; and database systems.
If a student can show evidence of satisfying the foundation course objectives through coursework from an accredited institution, the foundation requirement can be waived.
The foundation courses are also available to students with an undergraduate information technology degree who wish to refresh their knowledge in these subject areas.
The MSIT foundation course IT502 must be completed and passed prior to beginning courses in the MSIT program. Students will need to complete and pass IT504 prior to the end of the first quarter.
Students must be able to exhibit proficiency by successfully completing the foundation course with a minimum 70% passing score. If after 5 attempts (applies to each course separately) students do not pass the foundation course, students are encouraged to work with the Student Success department if they have questions regarding these foundation courses, timeframes for completion, or for alternative programs of study as needed.
Students who do not meet the MSIT foundation requirements will be withdrawn, canceled or transferred from the MSIT program.
Program details are provided lower on the page.
Classes start April 4, 2023 *
*Start dates may vary by program and location.
1 Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Information Security Analysts,
at https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm (visited January 20, 2021).
2 As a Master’s degree program, this program is designed as an 18- month program; however; many factors will impact your time to completion, including course loads, proficiency and/or transfer credits and breaks.