Master of Science in Information Technology



    • Number of Credits
    • 36
    • Cost Per Credit
    • $ 325
    • Total Tuition*
    • $ 11,700
  • *(Before Transfer Credit)

Program Description

The explosive growth of the Internet has enabled Information Technology (IT) to become the core business driver in organizations; it gives organizations the competitive edge in developing and delivering products and services to the marketplace. Information Technology has been identified as a National Critical Infrastructure by the Department of Homeland Security and, according to the Bureau of Labor Statistics, three of the top ten fastest growing occupations are IT related. This rapid growth in IT has generated a significant demand for credentialed Information Technology, Information Technology Management, Information Assurance, Information Systems Security, and Digital Forensics Professionals to be productive difference makers in our global Ecommerce-based economy. The Master of Science in Information Technology was designed to meet the educational component of this market need for credentialed IT professionals. This degree program focuses on the theory, principles, best industry practices, methodologies, tools, and technologies associated with the Information Technology Marketplace. It uses scholarly research methods to develop analytic, problem-solving, and research skills that are required to solve real world business problems.

This degree program is market driven and prepares learners to exploit the high demand for IT professionals in various market sectors. It focuses on the development and implementation of information systems and includes topics such as database systems, object-oriented analysis and design, IS architectures, IT project management, security, and computer forensics. Students completing this IT program can apply for a broad range of IT-related positions, such as Systems Analyst, Business Systems Analyst, Enterprise Systems Analyst, Infrastructure Architect, Systems Analyst, Database Analyst, Application Development Manager, IT Project Manager, IT Security Manager, IT Security Analyst, Disaster Recovery Manager, Forensics Analyst, and E-Discovery Specialist.

Degree Specific Admission Requirements are students must meet one of the following:

  1. Bachelor's degree is in Information Technology or related field
  2. Completion of AMU or APU Undergraduate IT Certificate
  3. Completion of 6 upper level (300-400 level) undergraduate credits in IT related courses
  4. Completion of an IT related minor or concentration in student's undergraduate program.
Read More

Program Objectives

In addition to the institutional and general education level learning objectives, the Master of Science in Information Technology also seeks the following specific learning outcomes of its graduates:

  • Analyze selected research methods and tools.
  • Utilize graduate level critical thinking, reasoning, and writing to defend the logic and the conclusions in scholarly research.
  • Appraise the processes, phases, domains, and measures for effectively managing complex IT projects.
  • Examine the methodologies, tools, technologies, and practices to analyze, design, and develop object-oriented applications.
  • Design, normalize, and optimize enterprise database systems.
  • Examine the principles and challenges in incorporating emerging network architectures, technologies, and protocols into information technology systems.
  • Examine the legal, social, ethical, and technical issues related to information systems and to securing information systems.
  • Appraise the vulnerabilities of information systems with respect to security and examine the methodologies to mitigate this risk.
  • Perform in-depth research and critical analysis on thesis subject or creative project.

Master of Information Technology

Students enrolling in our Master of Science in Information Technology must provide an official transcript of their previously-completed Bachelor’s or Master’s degree and meet one of the following:

  • Associate or Bachelor's degree in Information Technology or a related field (ex: Computer Science, Information Systems, Database Development, etc.)
  • Completion of one of our Undergraduate IT Certificates
  • Completion of 6 upper-level (300-400) Undergraduate credits in IT-related courses
  • Completion of an IT-related minor of concentration in student's Undergraduate program

If the IT-specific requirements are not noted in their official Bachelor's or Master's transcript, the student must provide official copies of their university transcripts which show the appropriate coursework.

Graduate Certificate in Information Technology

Students enrolling in one of our Graduate Certificates in Information Technology (Cybercrime, Digital Forensics, IT Project Management, Information Assurance, Information Systems Security, or Object Oriented Application Development) must provide an official transcript of their previously-completed Bachelor's or Master's degree and meet one of the following:

  • Associate or Bachelor's degree in Information Technology or a related field (ex: Computer Science, Information Systems, Database Development, etc.)
  • Two years of work experience in the specific sub-field for their Certificate
  • Completion of six upper-division credits (300-400 level) in IT-related courses at the undergraduate level
  • Completion of an IT-related minor or concentration during their Bachelor's degree
  • Completion of one of our Undergraduate IT Certificates

If the IT-specific requirements are not noted in their official Bachelor’s or Master’s transcript, the student must provide official copies of their university transcripts which show the appropriate coursework. Verification of two years work experience for the Graduate Certificates in IT need to be sent to the university from the student’s current/previous employer on company letterhead.

Admissions Process for Graduate IT Students

  1. Apply for admission
  2. Complete the online orientation
  3. Contact the institution where you earned your undergraduate degree and have an official copy of your undergraduate transcript sent to us at:

    American Public University System
    Attn: Document Services
    10110 Battleview Parkway, Suite 114
    Manassas, VA 20109

  4. An Admissions Representative will be assigned to work with you and will contact you via email or phone to assist you with the enrollment process. Your Admissions Representative will also be reviewing documents verifying your previous education or work experience and will notify you when you have been admitted and can register for classes.

*Preadmission courses completed at the Undergraduate level must be graded C or better; B or better at the Graduate level.

Have Questions?
Our admissions staff is available Monday - Thursday from 8:00 a.m. - 7:00 p.m. and Friday from 9:00 a.m. - 4:00 p.m. ET to answer your questions and provide assistance with the admissions process. You can reach us by phone at 877-777-9081, e-mail us at, or connect with us via Live Chat.

Digital Forensics Total Credits - 36 Hours
Core Requirements
18 Hours
Management Information Systems
3 hours

This course addresses information systems, to include their nature and role as key management resources. This course covers the information systems infrastructure, to include databases, knowledge management systems, enterprise information portals, telecommunications, the Internet, and wireless technology. It examines the topics of e-commerce, information systems in the global economy, managing global systems, securing information systems, and ethical and social issues in information systems.

Enterprise Database Systems
3 hours

This course examines the principles, practices, and methodologies of enterprise database systems from conceptual design to implementation; this includes architectures, models, design, management, implementation, and security. Included is a total life-cycle database design and implementation project that entails conceptual design, data modeling, normalization, optimization, and implementation. This course appraises object-relational and relational databases, examines Entity-Relationship (ER), Extended Entity-Relationship (EER), and Unified Modeling Language (UML) data models, and investigates relational procedures, dependencies, keys, relationships, cardinality, and referential integrity. It also evaluates query processing, performance tuning, transaction processing, concurrency, data integrity, database recovery, data security, data warehousing, data mining, and emerging technologies. Prior knowledge in a procedural database language such as PL/SQL or T/SQL using Oracle or MSSQL respectively is highly recommended.

Computer Networks and Data Systems
3 hours

This course is a study of computer networks and the evolution of modern communication systems. It examines the various layers of the basic reference models such as the five-layer IP model or the seven-layer OSI model, by scale, connection method, network architecture, or topology. This course also includes an in-depth analysis of transmission protocols, communications systems, and networks. A prior knowledge of networks and networking is recommended.

Information Security Management
3 hours

Information Security includes an evaluation of the techniques, policies and strategies to ensure that data stored in an organization's computers cannot be accessed or processed without the consent of the organization. Also included, is an analysis of Information Security & Risk Management, Access Control, Physical Security, Security Architecture & Design, Business Continuity & Disaster Recovery Planning, Telecommunications & Network Security, Application Security, Operations Security, Law, Compliance & Investigations. This course also reviews the building blocks of information systems and cryptography is provided to reinforce the scope of security management.

Research Methods in Information Systems and Technology
3 hours

REQUIRED AS FIRST PROGRAM COURSE; MAY TAKE ANOTHER COURSE WITH IT. This course focuses on the research methods, tools, instruments, and devices used in Information Sciences and Information Technology; it appraises the logic of the scientific method, research design, qualitative and quantitative analysis of data for the purpose of conducting and reporting basic research in a scholarly and academic setting. Through concentration-based case studies, it investigates current trends, legal and ethical issues, global and societal impact, policies, and applications in the fields of information technology, information security, cyberlaw, digital forensics, and media management. This course evaluates methods to collect, classify, categorize, evaluate, assess, and report research data, to formulate valid research questions, and to derive logical conclusions. The principles, practices, tools, and methodologies presented in this course are applicable throughout the program of graduate studies.

Information Technology Project Management
3 hours

This course explores successful project management for information technology projects. The System Development Life Cycle (SDLC) models are defined including the waterfall, spiral, incremental release, and prototyping models. Students will differentiate between these models and apply corresponding project management methods to identify critical checkpoints and reviews. Risk management, as applied to technology projects, is examined. Key project indicators are discussed, and students will explore defining measurement criteria for determining critical success factors on a project. The course defines the application of knowledge, skills, tools, and techniques to project activities and includes a tutorial for Microsoft Project. Emphasis is placed on the three dimensions of the information technology project constraints: scope, time, and cost. Students are recommended to have access to Microsoft Project. Course software requirements with the appropriate versions are listed under the course materials site.

Concentration Requirements
15 Hours
Computer Forensics
3 hours

This course examines information concealment techniques, technologies, hardware, software, and relevant legislation for cyber forensics to reveal and track legal and illegal activity. The course examines the process for investigation and introduces the tools and procedures required to legally seize and forensically evaluate a suspect machine. Also covered are the rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities, and revealing concealed information using cyber forensics.

Advanced Cybercrime Analysis
3 hours

The global reach of the Internet, the low cost of online activity, and the relative anonymity of users has led to an increase in computer related crimes. This course focuses on cybercrime investigation and prevention; it appraises the legal issues related to on-line criminal conduct, the collection of electronic evidence, and the onslaught of new technology. This course also analyzes the phases, processes, and challenges of cybercrime investigations, and it examines technical, legal, and social issues relating to the search and seizure of digital evidence and computer forensics. Students will encounter the challenges of the latency between technology and the law.

Cyber Ethics: Privacy and Intellectual Property
3 hours

This course is an advanced study of information ethics, cyber privacy, and intellectual property. It examines the ethical, economic, and societal issues that face today’s information-entrenched society; this includes intellectual property rights, privacy, accessibility and censorship. The explosive growth of information technology, the increased competition in the global marketplace, and the surge in the use of information to protect society from terrorism has led to the unintended erosion of fundamental rights and values. This course appraises the current state of information ethics, the dangers and opportunities presented by information technology, and the potential solutions to the inherent risks in today’s information-bound society.

Advanced Digital Forensics
3 hours

This course is an advanced study of the models of investigative methods for finding evidence in a wide scope of disparate digital devices such as computers, networks, mobile phones, PDAs, MP3 players, and any device or appliance that carries an electronic circuit board which could potentially store data or information. It also examines the science, the evidence, and the law related to digital forensics, the validation of findings, and determination of acceptable and irrefutable evidence in a court of law. It also evaluates various digital forensics models for data identification, preservation, collection, examination, analysis, preparation, and presentation. Prerequisite: ISSC621 or equivalent. Prerequisite: ISSC621

Pre Reqs: Computer Forensics(ISSC621)

Advanced eDiscovery
3 hours

This course is an advanced study of the principles and methodologies of the e-discovery process and the increasing importance of digital evidence in litigation. Topics include contemporary investigative methods, legal issues, cost containment, collecting and prioritizing data sets, preservation of digital evidence, document review, metadata and spoliation considerations, comparative assessments, and forensic investigations Prerequisite: ISSC621

Pre Reqs: Computer Forensics(ISSC621)

Final Program Requirement
3 Hours
Information Technology: Capstone
3 hours

Capstone course of studies completed toward the graduate degree in Information Technology. This course will only be offered in 16 week sessions. The student will complete a research thesis or creative project that demonstrates mastery and application of advanced research and analytic skills related to the learning outcomes of this degree program. The student must submit a research proposal, preferably two months prior to enrolling in the course, and obtain approval from the Director of Graduate Information Technology Programs. Capstone courses are NOT included in the university retake policy. All grades for any capstone attempts will appear on transcript and will be calculated in GPA

Graduate Electives
0 Hours
Electives are typically courses available at your degree level that are not currently required as a part of your degree program/academic plan. Please visit the catalog to view a complete listing of courses.

Program Completion Rates, Median Debt and More

View more details regarding our graduation rates, the median debt of students who completed the program, and other important information.


American Public University System, American Public University, and American Military University are not affiliated with American University or the U.S. Military. American Public University System (APUS) is accredited by the Higher Learning Commission (HLC) and a member of the North Central Association. © 2013 American Public University System | 111 W. Congress Street, Charles Town, WV 25414 | Toll Free: 1-877-755-2787 | Privacy Policy | Terms