Skip Navigation

Master of Science in Information Technology




Program Description

The explosive growth of the Internet has enabled Information Technology (IT) to become the core business driver in organizations; it gives organizations the competitive edge in developing and delivering products and services to the marketplace. Information Technology has been identified as a National Critical Infrastructure by the Department of Homeland Security and, according to the Bureau of Labor Statistics, three of the top ten fastest growing occupations are IT related. This rapid growth in IT has generated a significant demand for credentialed Information Technology, Information Technology Management, Information Assurance, Information Systems Security, and Digital Forensics Professionals to be productive difference makers in our global Ecommerce-based economy. The Master of Science in Information Technology was designed to meet the educational component of this market need for credentialed IT professionals. This degree program focuses on the theory, principles, best industry practices, methodologies, tools, and technologies associated with the Information Technology Marketplace. It uses scholarly research methods to develop analytic, problem-solving, and research skills that are required to solve real world business problems.

This degree program is market driven and prepares learners to exploit the high demand for IT professionals in various market sectors. It focuses on the development and implementation of information systems and includes topics such as database systems, object-oriented analysis and design, IS architectures, IT project management, security, and computer forensics. Students completing this IT program can apply for a broad range of IT-related positions, such as Systems Analyst, Business Systems Analyst, Enterprise Systems Analyst, Infrastructure Architect, Systems Analyst, Database Analyst, Application Development Manager, IT Project Manager, IT Security Manager, IT Security Analyst, Disaster Recovery Manager, Forensics Analyst, and E-Discovery Specialist.

Degree Specific Admission Requirements are students must meet one of the following:

  1. Bachelor's degree is in Information Technology or related field
  2. Completion of AMU or APU Undergraduate IT Certificate
  3. Completion of 6 upper level (300-400 level) undergraduate credits in IT related courses
  4. Completion of an IT related minor or concentration in student's undergraduate program.
Read More

Program Objectives

In addition to the institutional and general education level learning objectives, the Master of Science in Information Technology also seeks the following specific learning outcomes of its graduates:

  • Analyze selected research methods and tools.
  • Utilize graduate level critical thinking, reasoning, and writing to defend the logic and the conclusions in scholarly research.
  • Appraise the processes, phases, domains, and measures for effectively managing complex IT projects.
  • Examine the methodologies, tools, technologies, and practices to analyze, design, and develop object-oriented applications.
  • Design, normalize, and optimize enterprise database systems.
  • Examine the principles and challenges in incorporating emerging network architectures, technologies, and protocols into information technology systems.
  • Examine the legal, social, ethical, and technical issues related to information systems and to securing information systems.
  • Appraise the vulnerabilities of information systems with respect to security and examine the methodologies to mitigate this risk.
  • Perform in-depth research and critical analysis on thesis subject or creative project.

Master of Information Technology

To enroll in our Master of Science in Information Technology, you must provide an official transcript of your previously-completed bachelor’s or master’s degree and meet one of the following:

  • Associate or bachelor's degree in information technology or a related field (ex: computer science, information systems, database development, etc.)
  • Two years of work experience in the specific sub-field for this degree
  • Completion of one of our undergraduate IT certificates
  • Completion of 6 upper-level (300-400) undergraduate credits in IT-related courses
  • Completion of an IT-related minor or concentration during your undergraduate program
  • Certification from CompTIA A+ (2010 – Present) or a combination of the following (must have two) CompTIA Network +, CompTIA Project +, CompTIA Security+ (all 2010-Present)
  • A valid and current Project Management Professional certification from the Project Management Institute
  • Completion of CISSP certification (valid up until the expiration date)

If the IT-specific requirements are not noted in the official bachelor's or master's transcript, you must provide official copies of your undergraduate transcripts that show the appropriate coursework.

Send your official transcripts to:


American Public University System
Attn: Document Services
10110 Battleview Parkway, Suite 114
Manassas, VA 20109


An admissions representative will be assigned to work with you and will contact you via email or phone to assist you with the enrollment process. Your admissions representative will also be reviewing documents verifying your previous education or work experience and will notify you when you have been admitted and can register for classes.

*Preadmission courses completed at the undergraduate level must be graded C or better; B or better at the graduate level.

Visit Career Services

Graduates with degrees in information technology have a competitive edge in this growing industry, as positions are readily available in the information technology field and consistently increasing to address new technological requirements. Vigilant information technology warriors are needed to address real and rapid security threats daily, create application software and to address customized requirements. While the information technology field has continued to grow, there have been an increasing number of entry level positions across the industry seeking workers with IT degrees, approved certifications and relevant work experience. Information technology professionals will continue to remain in demand in order to keep the U.S. competitive in our global e-commerce based economy.

Email Career Services


Useful Skills within the Information Technology Field

Reading Comprehension — Understanding written sentences and paragraphs in work-related documents.

Active Listening — Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.

Critical Thinking — Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions, or approaches to problems.

Complex Problem Solving — Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.

Monitoring — Monitoring or assessing performance of yourself, other individuals, or organizations to make improvements or take corrective action.

Writing — Communicating effectively in writing as appropriate for the needs of the audience.

Coordination — Adjusting actions in relation to others' actions.

Speaking — Talking to others to convey information effectively.

Judgment and Decision Making — Considering the relative costs and benefits of potential actions to choose the most appropriate one.

Social Perceptiveness — Being aware of others' reactions and understanding why they react as they do.


Career Options

To identify what education or training is typical for careers within the public administration field, use the O*Net hyperlinks below and click on “Job Zone.” In addition, seek out the advice of fellow students and alumni working in the industry, using our mentoring program on The Quad (for current students and alumni only) or by speaking with a career coach.

As with all majors, the education you receive serves as a foundation of knowledge that prepares you for what you may face in the professional world. The career field you chose may require additional education or experience.

Computer Network Architects
Computer Network Support Specialists
Computer Operators
Computer Programmers
Computer Systems Analysts
Computer Systems Engineers/Architects
Computer User Support Specialist
Database Administrators
Desktop Publishers

Document Management Specialists
Geospatial Information Scientists and Technologists
Information Security Analysts
Network and Computer System Administrators
Software Developers, Applications
Software Developers, Systems Software
Web Administrators
Web Developers

Getting Started: Internships

Gaining real life experience is an ideal way to start a new career. The career services website has an extensive list of internships and fellowships. Browse through the internships organized by interest or by federal program.

There are government-organized internship programs which provide students or recent graduates the opportunity to gain real-life experience. Many require students to maintain either a half-time or full-time student status. The best ways to identify potential opportunities such as these is to contact branch offices directly, to search, or to look at the agencies' career portals. Keep in mind that these positions are not always posted online, so direct contact with the agency is key.

The Pathways Program is a federal initiative that offers internship programs for current students and training and career development opportunities for recent graduates. Recent graduates must apply within two years of degree or certificate completion (except for veterans, due to their military service obligation, will have up to six years to apply).The internship program for current students replaces the former Student Career Experience Program (SCEP) and Student Temporary Employment Program (STEP).

The Presidential Management Fellows Program (PMF)
PMF is designed to attract to federal service outstanding men and women from a wide variety of academic disciplines who have a clear interest in, and commitment to, a career in the analysis and management of public policies and programs. To be eligible for nomination, an individual must be a graduate student completing or expected to complete, during the current academic year, an advanced degree from a qualifying college or university. Graduate students who have had their degree conferred in the preceding two years, from the opening of the vacancy announcement are also eligible for PMF.

The Workforce Recruitment Program (WRP)
WRP is coordinated by the Office of Disability Employment Policy and the U.S. Department of Defense, and aims to provide summer work experience, and in some cases full-time employment, to college students with disabilities. The program develops partnerships with other federal agencies, each of whom makes a commitment to provide summer jobs and a staff recruiter. Each year, recruiters interview about 1,500 students with disabilities at college and university campuses across the nation and develop a database listing the qualifications of each student.

Getting Hired: Government Agencies, Organizations, and Search Engines

There are several government agencies and organizations that seek candidates with degrees in information technology. The list below provides a few places one might find employment specific to this degree.

Booz Allen Hamilton
Department of Agriculture
Department of Defense
Department of the Treasury
Department of Veterans Affairs

Elevate Technology Solutions
Higher Logic
National Aeronautics and Space Association

While many of the major job search engines will have positions in several fields to choose from, the list below is specific to the information technology field.

Computer Jobs
CIO IT Job Search

Joint Institute of Engineering
IT Management Central


Keeping Current: Professional Organizations and Associations
Conferences and Expositions
Get Connected: Social Media

American Society for Information Science and Technology (ASIS&T) - Facebook
ARMA International - LinkedIn
Association for Computing Machinery (ACM) - LinkedIn
Association of Information Technology Professionals (AITP) - Facebook
IEEE Computer Society - Twitter
CompTia - Twitter

Quick Links

Return to top

Digital Forensics Total Credits - 36 Hours
Core Requirements
18 Hours
Management Information Systems
3 hours

This course addresses information systems, to include their nature and role as key management resources. This course covers the information systems infrastructure, to include databases, knowledge management systems, enterprise information portals, telecommunications, the Internet, and wireless technology. It examines the topics of e-commerce, information systems in the global economy, managing global systems, securing information systems, and ethical and social issues in information systems.

Enterprise Database Systems
3 hours

This course examines the principles, practices, and methodologies of enterprise database systems from conceptual design to implementation; this includes architectures, models, design, management, implementation, and security. Included is a total life-cycle database design and implementation project that entails conceptual design, data modeling, normalization, optimization, and implementation. This course appraises object-relational and relational databases, examines Entity-Relationship (ER), Extended Entity-Relationship (EER), and Unified Modeling Language (UML) data models, and investigates relational procedures, dependencies, keys, relationships, cardinality, and referential integrity. It also evaluates query processing, performance tuning, transaction processing, concurrency, data integrity, database recovery, data security, data warehousing, data mining, and emerging technologies. Prior knowledge in a procedural database language such as PL/SQL or T/SQL using Oracle or MSSQL respectively is highly recommended.

Computer Networks and Data Systems
3 hours

This course is a study of computer networks and the evolution of modern communication systems. It examines the various layers of the basic reference models such as the five-layer IP model or the seven-layer OSI model, by scale, connection method, network architecture, or topology. This course also includes an in-depth analysis of transmission protocols, communications systems, and networks. A prior knowledge of networks and networking is recommended.

Information Security Management
3 hours

Information Security includes an evaluation of the techniques, policies and strategies to ensure that data stored in an organization's computers cannot be accessed or processed without the consent of the organization. Also included, is an analysis of Information Security & Risk Management, Access Control, Physical Security, Security Architecture & Design, Business Continuity & Disaster Recovery Planning, Telecommunications & Network Security, Application Security, Operations Security, Law, Compliance & Investigations. This course also reviews the building blocks of information systems and cryptography is provided to reinforce the scope of security management.

Research Methods in Information Systems and Technology
3 hours

REQUIRED AS FIRST PROGRAM COURSE; MAY TAKE ANOTHER COURSE WITH IT. This course focuses on the research methods, tools, instruments, and devices used in Information Sciences and Information Technology; it appraises the logic of the scientific method, research design, qualitative and quantitative analysis of data for the purpose of conducting and reporting basic research in a scholarly and academic setting. Through concentration-based case studies, it investigates current trends, legal and ethical issues, global and societal impact, policies, and applications in the fields of information technology, information security, cyberlaw, digital forensics, and media management. This course evaluates methods to collect, classify, categorize, evaluate, assess, and report research data, to formulate valid research questions, and to derive logical conclusions. The principles, practices, tools, and methodologies presented in this course are applicable throughout the program of graduate studies.

Information Technology Project Management
3 hours

This course explores successful project management for information technology projects. The System Development Life Cycle (SDLC) models are defined including the waterfall, spiral, incremental release, and prototyping models. Students will differentiate between these models and apply corresponding project management methods to identify critical checkpoints and reviews. Risk management, as applied to technology projects, is examined. Key project indicators are discussed, and students will explore defining measurement criteria for determining critical success factors on a project. The course defines the application of knowledge, skills, tools, and techniques to project activities and includes a tutorial for Microsoft Project. Emphasis is placed on the three dimensions of the information technology project constraints: scope, time, and cost. Students are recommended to have access to Microsoft Project. Course software requirements with the appropriate versions are listed under the course materials site.

Concentration Requirements
15 Hours
Computer Forensics
3 hours

This course examines information concealment techniques, technologies, hardware, software, and relevant legislation for cyber forensics to reveal and track legal and illegal activity. The course examines the process for investigation and introduces the tools and procedures required to legally seize and forensically evaluate a suspect machine. Also covered are the rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities, and revealing concealed information using cyber forensics.

Advanced Cybercrime Analysis
3 hours

The global reach of the Internet, the low cost of online activity, and the relative anonymity of users has led to an increase in computer related crimes. This course focuses on cybercrime investigation and prevention; it appraises the legal issues related to on-line criminal conduct, the collection of electronic evidence, and the onslaught of new technology. This course also analyzes the phases, processes, and challenges of cybercrime investigations, and it examines technical, legal, and social issues relating to the search and seizure of digital evidence and computer forensics. Students will encounter the challenges of the latency between technology and the law.

Cyber Ethics: Privacy and Intellectual Property
3 hours

This course is an advanced study of information ethics, cyber privacy, and intellectual property. It examines the ethical, economic, and societal issues that face today’s information-entrenched society; this includes intellectual property rights, privacy, accessibility and censorship. The explosive growth of information technology, the increased competition in the global marketplace, and the surge in the use of information to protect society from terrorism has led to the unintended erosion of fundamental rights and values. This course appraises the current state of information ethics, the dangers and opportunities presented by information technology, and the potential solutions to the inherent risks in today’s information-bound society.

Advanced Digital Forensics
3 hours

This course is an advanced study of the models of investigative methods for finding evidence in a wide scope of disparate digital devices such as computers, networks, mobile phones, PDAs, MP3 players, and any device or appliance that carries an electronic circuit board which could potentially store data or information. It also examines the science, the evidence, and the law related to digital forensics, the validation of findings, and determination of acceptable and irrefutable evidence in a court of law. It also evaluates various digital forensics models for data identification, preservation, collection, examination, analysis, preparation, and presentation. Prerequisite: ISSC621 or equivalent. Prerequisite: ISSC621

Pre Reqs: Computer Forensics(ISSC621)

Advanced eDiscovery
3 hours

This course is an advanced study of the principles and methodologies of the e-discovery process and the increasing importance of digital evidence in litigation. Topics include contemporary investigative methods, legal issues, cost containment, collecting and prioritizing data sets, preservation of digital evidence, document review, metadata and spoliation considerations, comparative assessments, and forensic investigations Prerequisite: ISSC621

Pre Reqs: Computer Forensics(ISSC621)

Final Program Requirement
3 Hours
Information Technology Capstone
3 hours

Capstone course of studies completed toward the graduate degree in Information Technology. The student will complete a research thesis or creative project that demonstrates mastery and application of advanced research and analytic skills related to the learning outcomes of this degree program. The student must submit a research proposal, preferably two months prior to enrolling in the course, and obtain approval from the Director of Graduate Information Technology Programs. This course may not be taken until all other courses are COMPLETED and student has a 3.0 GPA.

Graduate Electives
0 Hours
Electives are typically courses available at your degree level that are not currently required as a part of your degree program/academic plan. Please visit the catalog to view a complete listing of courses.

Program Completion Rates, Median Debt and More

View more details regarding our graduation rates, the median debt of students who completed the program, and other important information.


American Public University System, American Public University, and American Military University are not affiliated with American University or the U.S. Military. American Public University System (APUS) is accredited by the Higher Learning Commission (HLC). © 2015 American Public University System | 111 W. Congress Street, Charles Town, WV 25414 | Toll Free: 1-877-755-2787 | Privacy Policy | Terms