DEGREE AT A GLANCE:
The explosive growth of the Internet has enabled Information Technology (IT) to become the core business driver in organizations; it gives organizations the competitive edge in developing and delivering products and services to the marketplace. Information Technology has been identified as a National Critical Infrastructure by the Department of Homeland Security and, according to the Bureau of Labor Statistics, three of the top ten fastest growing occupations are IT related. This rapid growth in IT has generated a significant demand for credentialed Information Technology, Information Technology Management, Information Assurance, Information Systems Security, and Digital Forensics Professionals to be productive difference makers in our global Ecommerce-based economy. The Master of Science in Information Technology was designed to meet the educational component of this market need for credentialed IT professionals. This degree program focuses on the theory, principles, best industry practices, methodologies, tools, and technologies associated with the Information Technology Marketplace. It uses scholarly research methods to develop analytic, problem-solving, and research skills that are required to solve real world business problems.
This degree program is market driven and prepares learners to exploit the high demand for IT professionals in various market sectors. It focuses on the development and implementation of information systems and includes topics such as database systems, object-oriented analysis and design, IS architectures, IT project management, security, and computer forensics. Students completing this IT program can apply for a broad range of IT-related positions, such as Systems Analyst, Business Systems Analyst, Enterprise Systems Analyst, Infrastructure Architect, Systems Analyst, Database Analyst, Application Development Manager, IT Project Manager, IT Security Manager, IT Security Analyst, Disaster Recovery Manager, Forensics Analyst, and E-Discovery Specialist.
Degree Specific Admission Requirements are students must meet one of the following:
In addition to the institutional and general education level learning objectives, the Master of Science in Information Technology also seeks the following specific learning outcomes of its graduates:
Master of Information Technology
To enroll in our Master of Science in Information Technology, you must provide an official transcript of your previously-completed bachelor’s or master’s degree and meet one of the following:
If the IT-specific requirements are not noted in the official bachelor's or master's transcript, you must provide official copies of your undergraduate transcripts that show the appropriate coursework.
Send your official transcripts to:
American Public University System
An admissions representative will be assigned to work with you and will contact you via email or phone to assist you with the enrollment process. Your admissions representative will also be reviewing documents verifying your previous education or work experience and will notify you when you have been admitted and can register for classes.
*Preadmission courses completed at the undergraduate level must be graded C or better; B or better at the graduate level.
Graduates with degrees in information technology have a competitive edge in this growing industry, as positions are readily available in the information technology field and consistently increasing to address new technological requirements. Vigilant information technology warriors are needed to address real and rapid security threats daily, create application software and to address customized requirements. While the information technology field has continued to grow, there have been an increasing number of entry level positions across the industry seeking workers with IT degrees, approved certifications and relevant work experience. Information technology professionals will continue to remain in demand in order to keep the U.S. competitive in our global e-commerce based economy.
Useful Skills within the Information Technology Field
Reading Comprehension — Understanding written sentences and paragraphs in work-related documents.
Active Listening — Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.
Critical Thinking — Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions, or approaches to problems.
Complex Problem Solving — Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.
Monitoring — Monitoring or assessing performance of yourself, other individuals, or organizations to make improvements or take corrective action.
Writing — Communicating effectively in writing as appropriate for the needs of the audience.
Coordination — Adjusting actions in relation to others' actions.
Speaking — Talking to others to convey information effectively.
Judgment and Decision Making — Considering the relative costs and benefits of potential actions to choose the most appropriate one.
Social Perceptiveness — Being aware of others' reactions and understanding why they react as they do.
Computer Network Architects
Document Management Specialists
Gaining real life experience is an ideal way to start a new career. The career services website has an extensive list of internships and fellowships. Browse through the internships organized by interest or by federal program.
There are government-organized internship programs which provide students or recent graduates the opportunity to gain real-life experience. Many require students to maintain either a half-time or full-time student status. The best ways to identify potential opportunities such as these is to contact branch offices directly, to search USAJobs.gov, or to look at the agencies' career portals. Keep in mind that these positions are not always posted online, so direct contact with the agency is key.
The Pathways Program is a federal initiative that offers internship programs for current students and training and career development opportunities for recent graduates. Recent graduates must apply within two years of degree or certificate completion (except for veterans, due to their military service obligation, will have up to six years to apply).The internship program for current students replaces the former Student Career Experience Program (SCEP) and Student Temporary Employment Program (STEP).
The Presidential Management Fellows Program (PMF)
PMF is designed to attract to federal service outstanding men and women from a wide variety of academic disciplines who have a clear interest in, and commitment to, a career in the analysis and management of public policies and programs. To be eligible for nomination, an individual must be a graduate student completing or expected to complete, during the current academic year, an advanced degree from a qualifying college or university. Graduate students who have had their degree conferred in the preceding two years, from the opening of the vacancy announcement are also eligible for PMF.
The Workforce Recruitment Program (WRP)
WRP is coordinated by the Office of Disability Employment Policy and the U.S. Department of Defense, and aims to provide summer work experience, and in some cases full-time employment, to college students with disabilities. The program develops partnerships with other federal agencies, each of whom makes a commitment to provide summer jobs and a staff recruiter. Each year, recruiters interview about 1,500 students with disabilities at college and university campuses across the nation and develop a database listing the qualifications of each student.
There are several government agencies and organizations that seek candidates with degrees in information technology. The list below provides a few places one might find employment specific to this degree.
While many of the major job search engines will have positions in several fields to choose from, the list below is specific to the information technology field.
Involvement in professional organizations is a great way to stay up-to-date on new technology, tools, and best practices in your field. Professional organizations are also a great networking opportunity. Below are a few professional organizations you may be interested in as an information technology major.
Association for Information Science and Technology (ASIS&T)
Association for Computing Machinery (ACM)
Association of Information Technology Professionals (AITP)
IEEE Computer Society
Institute for Operations Research and the Management Sciences (INFORMS)
International Association for Computer Information Systems (IACIS)
International Association for Cryptologic Research (IACR)
International Association of Privacy Professionals (IAPP)
International Council on Systems Engineering (INCOSE)
International Information Management Association (IIMA)
International Information Systems Security Certification Consortium (ISC)2
The IA Summit
IACIS 2015 International Conference
Oct. 7-10, 2015
IAPP Global Privacy Summit
Sept. 29, 2016
Las Vegas, Nev.
(ISC)2 Security Congress 2015
Sept. 28 - Oct. 1, 2015
PMI Global Congress 2015 - Northern America
Oct. 11-13, 2015
4th Annual Grand Rapids IT Symposium
July 11, 2015
Grand Rapids, Mich.
American Society for Information Science and Technology (ASIS&T) - Facebook
ARMA International - LinkedIn
Association for Computing Machinery (ACM) - LinkedIn
Association of Information Technology Professionals (AITP) - Facebook
IEEE Computer Society - Twitter
CompTia - Twitter
American Society for Quality
MC MCSE Resources
This course addresses information systems, to include their nature and role as key management resources. This course covers the information systems infrastructure, to include databases, knowledge management systems, enterprise information portals, telecommunications, the Internet, and wireless technology. It examines the topics of e-commerce, information systems in the global economy, managing global systems, securing information systems, and ethical and social issues in information systems.
This course examines the principles, practices, and methodologies of enterprise database systems from conceptual design to implementation; this includes architectures, models, design, management, implementation, and security. Included is a total life-cycle database design and implementation project that entails conceptual design, data modeling, normalization, optimization, and implementation. This course appraises object-relational and relational databases, examines Entity-Relationship (ER), Extended Entity-Relationship (EER), and Unified Modeling Language (UML) data models, and investigates relational procedures, dependencies, keys, relationships, cardinality, and referential integrity. It also evaluates query processing, performance tuning, transaction processing, concurrency, data integrity, database recovery, data security, data warehousing, data mining, and emerging technologies. Prior knowledge in a procedural database language such as PL/SQL or T/SQL using Oracle or MSSQL respectively is highly recommended.
This course is a study of computer networks and the evolution of modern communication systems. It examines the various layers of the basic reference models such as the five-layer IP model or the seven-layer OSI model, by scale, connection method, network architecture, or topology. This course also includes an in-depth analysis of transmission protocols, communications systems, and networks. A prior knowledge of networks and networking is recommended.
Information Security includes an evaluation of the techniques, policies and strategies to ensure that data stored in an organization's computers cannot be accessed or processed without the consent of the organization. Also included, is an analysis of Information Security & Risk Management, Access Control, Physical Security, Security Architecture & Design, Business Continuity & Disaster Recovery Planning, Telecommunications & Network Security, Application Security, Operations Security, Law, Compliance & Investigations. This course also reviews the building blocks of information systems and cryptography is provided to reinforce the scope of security management.
REQUIRED AS FIRST PROGRAM COURSE; MAY TAKE ANOTHER COURSE WITH IT. This course focuses on the research methods, tools, instruments, and devices used in Information Sciences and Information Technology; it appraises the logic of the scientific method, research design, qualitative and quantitative analysis of data for the purpose of conducting and reporting basic research in a scholarly and academic setting. Through concentration-based case studies, it investigates current trends, legal and ethical issues, global and societal impact, policies, and applications in the fields of information technology, information security, cyberlaw, digital forensics, and media management. This course evaluates methods to collect, classify, categorize, evaluate, assess, and report research data, to formulate valid research questions, and to derive logical conclusions. The principles, practices, tools, and methodologies presented in this course are applicable throughout the program of graduate studies.
This course explores successful project management for information technology projects. The System Development Life Cycle (SDLC) models are defined including the waterfall, spiral, incremental release, and prototyping models. Students will differentiate between these models and apply corresponding project management methods to identify critical checkpoints and reviews. Risk management, as applied to technology projects, is examined. Key project indicators are discussed, and students will explore defining measurement criteria for determining critical success factors on a project. The course defines the application of knowledge, skills, tools, and techniques to project activities and includes a tutorial for Microsoft Project. Emphasis is placed on the three dimensions of the information technology project constraints: scope, time, and cost. Students are recommended to have access to Microsoft Project. Course software requirements with the appropriate versions are listed under the course materials site.
This course examines information concealment techniques, technologies, hardware, software, and relevant legislation for cyber forensics to reveal and track legal and illegal activity. The course examines the process for investigation and introduces the tools and procedures required to legally seize and forensically evaluate a suspect machine. Also covered are the rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities, and revealing concealed information using cyber forensics.
The global reach of the Internet, the low cost of online activity, and the relative anonymity of users has led to an increase in computer related crimes. This course focuses on cybercrime investigation and prevention; it appraises the legal issues related to on-line criminal conduct, the collection of electronic evidence, and the onslaught of new technology. This course also analyzes the phases, processes, and challenges of cybercrime investigations, and it examines technical, legal, and social issues relating to the search and seizure of digital evidence and computer forensics. Students will encounter the challenges of the latency between technology and the law.
This course is an advanced study of information ethics, cyber privacy, and intellectual property. It examines the ethical, economic, and societal issues that face today’s information-entrenched society; this includes intellectual property rights, privacy, accessibility and censorship. The explosive growth of information technology, the increased competition in the global marketplace, and the surge in the use of information to protect society from terrorism has led to the unintended erosion of fundamental rights and values. This course appraises the current state of information ethics, the dangers and opportunities presented by information technology, and the potential solutions to the inherent risks in today’s information-bound society.
This course is an advanced study of the models of investigative methods for finding evidence in a wide scope of disparate digital devices such as computers, networks, mobile phones, PDAs, MP3 players, and any device or appliance that carries an electronic circuit board which could potentially store data or information. It also examines the science, the evidence, and the law related to digital forensics, the validation of findings, and determination of acceptable and irrefutable evidence in a court of law. It also evaluates various digital forensics models for data identification, preservation, collection, examination, analysis, preparation, and presentation. Prerequisite: ISSC621 or equivalent. Prerequisite: ISSC621
Pre Reqs: Computer Forensics(ISSC621)
This course is an advanced study of the principles and methodologies of the e-discovery process and the increasing importance of digital evidence in litigation. Topics include contemporary investigative methods, legal issues, cost containment, collecting and prioritizing data sets, preservation of digital evidence, document review, metadata and spoliation considerations, comparative assessments, and forensic investigations Prerequisite: ISSC621
Pre Reqs: Computer Forensics(ISSC621)
Capstone course of studies completed toward the graduate degree in Information Technology. The student will complete a research thesis or creative project that demonstrates mastery and application of advanced research and analytic skills related to the learning outcomes of this degree program. The student must submit a research proposal, preferably two months prior to enrolling in the course, and obtain approval from the Director of Graduate Information Technology Programs. This course may not be taken until all other courses are COMPLETED and student has a 3.0 GPA.
|Program Completion Rates, Median Debt and More|
View more details regarding our graduation rates, the median debt of students who completed the program, and other important information.