Master of Science in Information Technology - Security Management
Employment for information security analysts is projected to grow 28% from 2016 to 2026, much faster than average of all occupations, according to the Bureau of Labor Statistics.1 Explore how to set up secure infrastructure for an enterprise, and manage cloud and mobile computing in Colorado Technical University’s Master of Science in Information Technology with a Security Management concentration.
The core courses are designed to help you develop the professional skills to consistently align IT strategies with the enterprise’s goals, as well as a strong foundation in the relevant IT technologies and services. In the concentration courses explore how to set up a secure infrastructure, and manage cloud and mobile computing. You also have the opportunity to participate in hands-on lab assignments to reinforce course material as well as to develop familiarity with a number of available operating system security products, including Windows and UNIX/Linux.
For the fifth year in a row, CTU’s online Master of Science in Information Technology degree programs are ranked among the Best Online Graduate Computer Information Technology Programs by U.S. News and World Report.*
Manage your education with your smartphone or tablet anytime, anywhere with CTU Mobile. Classes begin every 8 weeks. See how you be able to earn your Master’s in as little as 18 months.2
* Several CTU programs are ranked among U.S. News & World Report’s 2019 best online programs list.
Relevant Institutional/Programmatic Accreditation
CTU is institutionally accredited by the Higher Learning Commission www.hlcommission.org
- July 02, 2019
- August 13, 2019
- October 01, 2019
- Colorado Springs
- Aurora (Denver Area)
Course Title Course Description Credit Hours CS651 Computer Systems Security Foundations 4 CS663 Enterprise Systems Architecture 4 IT621 Enterprise Data Management 4 IT640 Networking and Telecommunications 4 MGMT690 Strategic Management in Dynamic Environments 4 PM600 Project Management Processes in Organizations 4 Total Credit Hours: 24
Course Title Course Description Credit Hours CS632 Data and Applications Security 4 CS652 Operating Systems Security 4 CS653 Network Security 4 CS654 Security Management 4 IT635 Information Systems Auditing 4 IT697 Information Technology Capstone 4 Total Credit Hours: 24
Total Credit Hours: 48MSIT Foundation Requirements
The Master of Science in Information Technology (MSIT) is built upon the expectation that students will enter the program with a solid information technology background. Therefore, the MSIT program requires students to have prior foundational knowledge in all core information technology disciplines to be successful.
Students entering into the MSIT program without a bachelor’s degree in computer science, computer engineering, information technology, cybersecurity, or information systems will be required to successfully complete two MSIT foundation courses (IT502 and IT504) covering the following discipline areas of information technology: networking; network security; virtualization; cloud computing; information system architecture; and database systems.
If a student can show evidence of satisfying the foundation course objectives through coursework from an accredited institution, the foundation requirement can be waived.
The foundation courses are also available to students with an undergraduate information technology degree who wish to refresh their knowledge in these subject areas.
The MSIT foundation course IT502 must be completed and passed prior to beginning courses in the MSIT program. Students will need to complete and pass IT504 prior to the end of the first quarter.
Students must be able to exhibit proficiency by successfully completing the foundation course with a minimum 70% passing score. If after 5 attempts (applies to each course separately) students do not pass the foundation course, students are encouraged to work with the Student Success department if they have questions regarding these foundation courses, timeframes for completion, or for alternative programs of study as needed.
Students who do not meet the MSIT foundation requirements will be withdrawn, canceled or transferred from the MSIT program.
National Security Agency and Department of Homeland Security
The Department of Homeland Security and the National Security Agency have recognized Colorado Technical University as a National Center of Academic Excellence in Information Assurance and Cyber Defense (CAE IA/CD). The CTU cyber security curriculum was certified thereby to map to the DHS/NSA cybersecurity knowledge units. This recognition and certification is valid through 2021.
This CAE IA/CD designation is applicable to this degree program.
Estimate Tuition and Grad Date
Total tuition for this degree program will vary depending on your educational needs, existing experience, and other factors.Estimate your costs, potential savings and graduation date
Ways to Save
Cost of this degree may be reduced based on one or more of the following:
Where do I go from here?
Choosing to continue your education is a big decision and we're here to help. Choose one of the options below to get started.
Submit your details and speak to an admissions advisor within the next day:
Submit a no-fee online application. An advisor will get in touch after your application is received to schedule an interview (required before enrolling):
Program details are provided after the form.
Classes start July 2, 2019!
Gainful Employment and Other Student Disclosures
Below you can find placement rates and other information tailored to your chosen campus and program. Certain disclosures are published on this website to assist students in understanding the facts about their programs.
-- Select Campus Above --
Online Programs - Master of Science in Information Technology
Colorado Springs - Master of Science in Information Technology
Aurora (Denver Area) - Master of Science in Information Technology
1. Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, 2016-17 Edition, Information Security Analysts, https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm, visited March 26, 2018
2. As a Master’s degree program, this program is designed as an 18- month program; however; many factors will impact your time to completion, including course loads, proficiency and/or transfer credits and breaks.