Information Technology

Master of Science

The Master of Science in Information Technology focuses on the development and implementation of information systems and includes topics such as database systems, object-oriented analysis and design, IS architectures, IT project management, security, and computer forensics. In this graduate program, you will study the theory, principles, best practices, tools, and technologies associated with the IT marketplace. You’ll also be taught the analytic, problem-solving, and research skills required to solve real world business problems. This master’s degree is applicable to many career opportunities including: systems analyst; infrastructure architect; database analyst; application development manager; project manager; IT security analyst; disaster recovery manager; and forensics specialist.

The curriculum for this online program is reviewed by an advisory council of industry experts for relevancy to today’s marketplace. Course topics include:

  • Management information systems
  • Enterprise database systems principles, practices, and designs
  • Computer networks and data systems
  • The evolution of modern communications systems
  • Information security management techniques and policies
  • Research methods in information systems and technology
  • IT project management
  • Cybercrime analysis and ethics

Note: This program has specific admission requirements. Please view the requirements below to be sure you qualify to apply for this program.

Program Objectives

In addition to the institutional and degree level learning objectives, graduates of this program are expected to achieve these learning outcomes:

  • Analyze selected research methods and tools.
  • Utilize graduate level critical thinking, reasoning, and writing to defend the logic and the conclusions in scholarly research.
  • Appraise the processes, phases, domains, and measures for effectively managing complex IT projects.
  • Examine the methodologies, tools, technologies, and practices to analyze, design, and develop object-oriented applications.
  • Design, normalize, and optimize enterprise database systems.
  • Examine the principles and challenges in incorporating emerging network architectures, technologies, and protocols into information technology systems.
  • Examine the legal, social, ethical, and technical issues related to information systems and to securing information systems.
  • Appraise the vulnerabilities of information systems with respect to security and examine the methodologies to mitigate this risk.
  • Perform in-depth research and critical analysis on a thesis subject or creative project.

Degree at a Glance


Concentrations are designed to help you group courses together so you can further specialize in your field and pursue a more focused path to degree completion. You will be asked to select a concentration when you enroll in this program.

Explore the concentrations available for this program.


Digital Forensics

Examines the investigation process, tools, and procedures for legally seizing and forensically evaluating a suspect machine. Teaches cybercrime investigation and prevention, including legal concerns and electronic evidence collection. Explores information ethics, cyber privacy, and intellectual property and their relevance to today’s information-bound society.  

Sample Courses

  • ISSC621 - Computer Forensics
  • ISSC650 - Advanced Digital Forensics
  • ISSC651 - Advanced eDiscovery
  • ISSC630 - Advanced Cybercrime Analysis
  • ISSC631 - Cyber Ethics: Privacy and Intellectual Property

Enterprise Software Development

Examines software development and the use of unified modeling language (UML) across object-oriented application implementation technologies. Explores enterprise software and its role in meeting the needs of an organization and solving business problems. Topics include emerging data warehousing technologies and decision support systems that help to give a competitive edge to business organizations.

Sample Courses

  • ENTD640 - Enterprise Software Development Methodologies
  • ENTD600 - Object Oriented Analysis and Design (OOAD)
  • ENTD610 - Object Oriented Applications: Design and Development
  • ENTD620 - Object Oriented Applications: Integration, Quality Assurance, and Deployment
  • INFO640 - Data Warehousing and Decision Support Systems

Information Assurance and Security

Examines the security of telecommunications networks, including emerging threats, system vulnerability, network evolution, and network defense mechanisms. Covers how to detect and prevent intrusions and how to handle security incidents. Explores the creation of a model and a comprehensive plan for information assurance.

Sample Courses

  • ISSC641 - Telecommunications and Network Security
  • ISSC642 - Intrusion Detection and Incident Handling
  • ISSC660 - Information Assurance
  • ISSC661 - Information Assurance: Assessment and Evaluation
  • ISSC662 - Information Assurance: Capability Maturity and Appraisals

IT Project Management

Covers different aspects of IT project management, including project life cycles, cost management, quality assurance, risks, and the necessity for proper communication. Topics include human resource planning and development and how human resources contribute to project success.

Sample Courses

  • ITMG627 - IT Project Management: HR and Procurement
  • ITMG628 - IT Project Management: Quality and Risk
  • ITMG625 - IT Project Management: Integration, Scope and Time
  • ITMG626 - IT Project Management: Cost and Communications
  • ITMG630 - Project Management for e-Business

Admission Requirements

All graduate programs require you to have earned a minimum of a bachelor’s degree from an institution whose accreditation is recognized by the Council for Higher Education Accreditation (CHEA).

For this program, you must provide an official transcript of your previously-completed bachelor's or master's degree and have ONE of the following:

  • Associate or bachelor's degree in information technology or a related field (ex: computer science, information systems, database development, etc.)
  • 2 years of work experience in the specific sub-field for this degree
  • Completion of one of our undergraduate IT certificates
  • Completion of 6 upper-level (300-400) undergraduate credits in IT-related courses
  • Completion of an IT-related minor or concentration during your undergraduate program
  • Certification from CompTIA A+ (2010 – Present) or a combination of the following (must have two) CompTIA Network +, CompTIA Project +, CompTIA Security+ (all 2010-Present)
  • A valid and current Project Management Professional certification from the Project Management Institute
  • Completion of CISSP certification (valid up until the expiration date)
  • If the IT-specific requirements are not noted in the official bachelor's or master's transcript, you must provide official copies of your undergraduate transcripts that show the appropriate coursework.


  • If the IT-specific requirements are not noted in the official bachelor's or master's transcript, you must provide official copies of your undergraduate transcripts that show the appropriate coursework.
  • The verification of the 2-years work experience needs to be sent to the university from your current/previous employer on company letterhead.
  • Preadmission courses completed at the undergraduate level must be graded C or better; B or better at the graduate level.

An admissions representative will contact you via email or phone to assist you with the enrollment process, review your documentation, and to notify you when you have been admitted into the program and may register for courses.

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an admission representative at 877-777-9081 or