The Master of Science in Information Technology focuses on the development and implementation of information systems and includes topics such as database systems, object-oriented analysis and design, IS architectures, IT project management, security, and computer forensics. In this graduate program, you will study the theory, principles, best practices, tools, and technologies associated with the IT marketplace. You’ll also be taught the analytic, problem-solving, and research skills required to solve real world business problems. This master’s degree is applicable to many career opportunities including: systems analyst; infrastructure architect; database analyst; application development manager; project manager; IT security analyst; disaster recovery manager; and forensics specialist.

This program has specific admission requirements.

Degree Program Objectives

In addition to the institutional and general education level learning objectives, the Master of Science in Information Technology also seeks the following specific learning outcomes of its graduates:

  • Analyze selected research methods and tools.
  • Utilize graduate level critical thinking, reasoning, and writing to defend the logic and the conclusions in scholarly research.
  • Appraise the processes, phases, domains, and measures for effectively managing complex IT projects.
  • Examine the methodologies, tools, technologies, and practices to analyze, design, and develop object-oriented applications.
  • Design, normalize, and optimize enterprise database systems.
  • Examine the principles and challenges in incorporating emerging network architectures, technologies, and protocols into information technology systems.
  • Examine the legal, social, ethical, and technical issues related to information systems and to securing information systems.
  • Appraise the vulnerabilities of information systems with respect to security and examine the methodologies to mitigate this risk.
  • Perform in-depth research and critical analysis on thesis subject or creative project.

Degree at a Glance

Core Requirements18
Select one of the following concentrations:15
Elective Requirements0
Final Program Requirements3
Total Semester Hours36

Degree Program Requirements

Core Requirements (18 semester hours)

INFO531Management Information Systems 13
ITCC500Research Methods in Information Systems and Technology3
INFO620Enterprise Database Systems3
ISSC640Computer Networks and Data Systems3
ISSC680Information Security Management3
ITMG624Information Technology Project Management3
Total Semester Hours18

Required as the first course in this program.

Students must choose a concentration for this degree program and may select from the Concentration in Enterprise Software Development, Concentration in Digital Forensics, Concentration in Information Assurance and Security, or Concentration in IT Project Management.

Concentration in Enterprise Software Development (15 semester hours)

The lifeblood of an organization is Information Technology; it is a key business driver. This concentration examines the principles, practices, and methodologies of object-oriented analysis and design (OOAD), object-oriented programming (OOP), and object-oriented application delivery. It also assesses enterprise software development methodologies and appraises the principles of multidimensional databases for data warehousing and business intelligence.


Upon successful completion of this concentration, the student will be able to:

  • Appraise the principles and practices of object-oriented analysis and design (OOAD).
  • Examine the methodologies for developing enterprise applications.
  • Inspect the steps, techniques, and procedures to design develop object-oriented applications.
  • Profile and analyze the various data ware housing models.

Concentration Requirements (15 semester hours) 

ENTD600Object Oriented Analysis and Design (OOAD)3
ENTD610Object Oriented Applications: Design and Development3
ENTD620Object Oriented Applications: Integration, Quality Assurance, and Deployment3
ENTD640Enterprise Software Development Methodologies3
INFO640Data Warehousing and Decision Support Systems3
Total Semester Hours15

Concentration in Digital Forensics (15 semester hours)

The societal impact of cybercrime has become commonplace; it is broadcast on the evening news and is a favorite playing field for television shows and moviemakers. Technology is a boon to society, but, in malicious hands, it becomes a valuable instrument in a dark and sinister underworld; and, unfortunately, cyber legislation and forensics have been lagging way behind when it comes to cybercrime. The process of forensics investigation can destroy the very evidence it is seeking to assimilate. The window of opportunity for collecting evidence can be a few seconds or minutes depending on the sophistication of the perpetrator. This concentration pertains to the study of various forensics models to identify, preserve, collect, examine, analyze, prepare, and present evidence for prosecuting cybercrime.


Upon successful completion of this concentration, the student will be able to:

  • Evaluate data security, integrity, exposure from multifunctional devices, tracking techniques, and forensics models for analysis and examine the inherent challenges in the processes for seizing electronic evidence.
  • Evaluate the principles, practices, and inherent challenges of the e-discovery process and assess the tools, techniques, and procedures to legally seize and forensically evaluate digital crime scenes.
  • Analyze concealment and cloaking techniques and technologies such as cryptography, steganography, and data hiding and investigate corresponding legislation and mitigation techniques.
  • Assess and mitigate potential exposures and the risks of the chain of custody and examine the methodologies to mitigate the potentially narrow window of opportunity for collecting digital evidence. Investigate models to examine the financial and societal impact of technology-related crime.
  • Appraise the legal and regulatory compliance requirements in investigating and prosecuting technology-related crimes.

Concentration Requirements (15 semester hours) 

ISSC621Computer Forensics3
ISSC630Advanced Cybercrime Analysis3
ISSC631Cyber Ethics: Privacy and Intellectual Property3
ISSC650Advanced Digital Forensics (Prerequisite: ISSC621 - Computer Forensics)3
ISSC651Advanced eDiscovery (Prerequisite: ISSC621 - Computer Forensics)3
Total Semester Hours15

Concentration in Information Assurance and Security (15 semester hours)

The primary challenge for ecommerce is assuring the security and integrity of information systems. We are bombarded daily by news of viruses, worms, malware, breaches, infiltrations, denial-of-service attacks, and the like. The ability of an organization to secure and assure its information technology assets is essential to conducting global commerce and to establishing a robust economy; this is a particular challenge given the rapidly changing face and assets of the virtual intruder. The ability to compromise an origination’s information assets is a direct threat to their competitive advantage; and the ability to protect the information assets of an organization is essential to maintaining clientele, trust, revenue streams, credibility, and the survival of the organization. This concentration focuses on securing the information technology assets of an organization. Areas include network security, telecommunications security, computer forensics, legal and ethical issues, cybercrime, computer forensics, information assurance, security risk mitigation, information systems audit and certification, intrusion detection, and incident handling.


Upon successful completion of this concentration, the student will be able to:

  • Profile the emerging security threats and trends, and analyze the information systems vulnerabilities that they exploit.
  • Assess the methods and techniques for recognizing and profiling attack patterns.
  • Categorize and analyze the different types of cryptography, encryption keys, malicious software, and types of attacks.
  • Analyze the methodologies for investigating computer-related crime and for incident handling.
  • Appraise the legal and regulatory compliance requirements related to Information Assurance and Information Systems Security and assess the social, ethical, economic, and technical impact of information systems security.
  • Analyze the challenges encountered in establishing information systems security, information assurance, and business continuity.
  • Examine the models and methodologies for performing security vulnerability assessment and risk mitigation; also analyze the principles and practices for appraising and certifying systems security.

Concentration Requirements (15 semester hours)

ISSC641Telecommunications and Network Security3
ISSC642Intrusion Detection and Incident Handling3
ISSC660Information Assurance3
ISSC661Information Assurance: Assessment and Evaluation (Prerequisite: ISSC660 - Information Assurance)3
ISSC662Information Assurance: Capability Maturity and Appraisals (Prerequisite: ISSC660 - Information Assurance)3
Total Semester Hours15

Concentration in IT Project Management (15 semester hours)

The world of Information Technology is replete with projects that were abandoned because of runaway scope and cost. On the other hand, the trend in the world economy is shrinking budgets and shorter deadline, all this while projects are getting more complex. This concentration focuses on meeting industry needs for IT Managers that can manage cost, time, scope, quality, risk, and people to ensure that projects come in on time and under budget. It also addresses strategic planning and business systems analysis.


Upon successful completion of this concentration, the student will be able to:

  • Appraise the principles and practices for organizing, allocating, and managing project resources.
  • Analyze the project management framework, including the stakeholders, domains, phases, processes, integration, and lifecycle.
  • Examine the potential complexities and pitfalls in initiating and closing projects; and assess methods to mitigate this risk.
  • Appraise the unique challenges in managing the scope, time, and cost of Information Technology projects.
  • Examine various project cost models; also analyze the principles of earned value management (EVM).
  • Assess the principles, strategies, challenges, and measures for managing quality and risk on IT projects.
  • Analyze the phases, procedures, deliverables, and best practices for business systems analysis.

Concentration Requirements (15 semester hours)

ITMG625IT Project Management: Integration, Scope and Time (Prerequisite: ITMG624 - Information Technology Project Management)3
ITMG626IT Project Management: Cost and Communications (Prerequisite: ITMG624 - Information Technology Project Management)3
ITMG627IT Project Management: HR and Procurement (Prerequisite: ITMG624 - Information Technology Project Management)3
ITMG628IT Project Management: Quality and Risk (Prerequisite: ITMG624 - Information Technology Project Management)3
ITMG630Project Management for e-Business3
Total Semester Hours15

Elective Requirements (0 semester hours)

Final Program Requirements (3 semester hours)

Select 1 course from the following:3
Creative Project Capstone 1
Information Technology Capstone 1
Total Semester Hours3

Taken once all other requirements have been met.