MS, Information Technology in Information Assurance

Concentration Overview

Return to the Heavin School of Arts, Sciences, and Technology Homepage

The Master of Science (MS) degree in Information Technology,  Information Assurance concentration is designed to prepare students with the knowledge and skills needed to address the operational issues, policies and procedures, threat and response mechanisms, risk analysis, system recovery, and information security frameworks that can be deployed to secure corporate assets. The program focuses on preparing students to be able to protect an organization’s data assets and manage all aspects of information assurance and security across an organization’s systems.

Credit Distribution

I. Core Courses (15-18* Credits)

MSI-5010Foundations of Information Technology*

3

MSI-5020Telecommunications and Networking

3

MSI-5030Object-Oriented Application Development

3

MSI-5040Information Systems Analysis, Modeling, and Design

3

MSI-5050Principles of Database Design

3

APS-5100Project Management for Technology

3

II. Concentration (15 Credits)

IAS-5510Foundations of Information Assurance

3

IAS-5520Vulnerabilities, Threats, and Attacks

3

IAS-5530Countermeasures Design and Implementation

3

IAS-5540Policies and Procedures Development and Implementation

3

IAS-5550Computer Forensics and Information Systems Auditing

3

III. Capstone (6 Credits)

APS-7000Master Project in Applied Science and Technology

6

Total Credit Hours: 36-39

* MSI-5010: Foundations of Information Technology is required for learners who need a refresher or who lack the prerequisite knowledge in IT as determined during the application evaluation period.

Learning Outcomes

Upon completion of the concentration in Information Assurance, graduates will be able to:

  • evaluate new and existing security systems;
  • lead the development, implementation, evaluation, and management of information security solutions;
  • utilize qualitative and quantitative methodologies to develop comprehensive risk assessments of an organization’s information assets;
  • develop comprehensive risk mitigation and system recovery plans; and
  • collaborate with organizational stakeholders to develop and implement enterprise-level information assurance policies and procedures.