Master of Cyber Forensics and Security
At the conclusion of their studies, graduates of the Master of Cyber Forensics and Security degree should be able to:
- Design and implement a comprehensive enterprise security program using both policy and technology to implement technical, operational, and managerial controls.
- Comprehensively investigate information security incidents and violation of law using computer resources in a manner such that all evidence is admissible in a court of law.
- Technically secure enterprise information assets and resources to deter, detect, and prevent the success of attacks and intrusions.
Illinois Institute of Technology has been designated as a National Center of Academic Excellence in Cyber Defense Education by the National Security Agency and the U.S. Department of Homeland Security. This designation results from meeting stringent Center of Academic Excellence criteria and mapping of information technology and management curricula to a core set of cyber defense knowledge units. Students attending Center of Academic Excellence in Cyber Defense Education institutions are eligible to apply for scholarships and grants through the Department of Defense Information Assurance Scholarship Program and the Federal Cyber Service Scholarship for Service Program. This designation reflects Illinois Institute of Technology’s commitment to producing professionals with cyber defense expertise for the nation.
|Required Core Courses||(18) 1|
|ITMS 538||Cyber Forensics||3|
|ITMS 543||Vulnerability Analysis and Control||3|
|ITMS 548||Cyber Security Technologies||3|
|ITMS 578||Cyber Security Management||3|
|Select three credit hours from the following:||3|
|Cyber Security Technologies: Projects & Advanced Methods||3|
|Select nine credit hours from the following:||9|
Any 500-level ITMS course not listed in required courses above. 2
|Legal and Ethical Issues in Information Technology||3|
|Information Technology Auditing||3|
|Introduction to Open Source Software||3|
|Special Projects in Information Technology||3|
|Special Problems in Information Technology||3|
|Select two to three credit hours from the following: 3||2-3|
|National Security Law||2|
|Computer & Network Privacy||3|
Minimum degree credits required: 30
Core course requirements may be waived upon presentation of evidence of equivalent coursework, certification, or experience. Approval of waivers will be made by the student’s adviser or the ITM associate chair.
ITMS 579 may be taken more than once.
LAW electives not listed above may be substituted as approved by the student’s adviser or the ITM associate chair.