Skip Navigation
 

Information Technology

Online Master of Science in Information Technology (MS)

Save @ APU

$0 Application Fee
$0 Transfer Credit Evaluation
0 Entrance Exams
No GRE/GMAT Required

About This Program

The online master’s in information technology from American Public University (APU) provides you with an advanced understanding of information systems development and implementation, including database systems, object-oriented analysis and design, IS architectures, and IT project management.

With this MS in Information Technology, you’ll become familiar with best practices in security and computer forensics. You’ll also study the theory, principles, best practices, tools, and technologies associated with the IT marketplace, and improve your problem-solving, planning, research, leadership, and management skills for solving complex, real-world business problems.

Coursework in this program is taught by expert practitioners with considerable real-world knowledge.

What You Will Do

  1. Learn key management theories, principles, best practices, tools, and technologies associated with information systems, and enhance your knowledge of research methods and tools
  2. Grow your understanding of graduate-level critical thinking, reasoning, and writing to defend your logic and your conclusions in scholarly research projects
  3. Understand the processes, phases, domains, and measures for effective, complex IT project management
  4. Create an optimized enterprise database system and a plan addressing the principles and challenges in incorporating emerging network architectures, technologies, and protocols into IT systems
  5. Study how to produce legal, social, ethical, and technical solutions for securing information systems

View Program Outcome Assessment Results

Degree at a Glance

Number of Credits
36
Cost Per Credit
$370 | $250*
Courses Start Monthly
Online

Program Requirements Printable Catalog Version

Students must choose a concentration for this degree program:

The world of Information Technology is replete with projects that were abandoned because of runaway scope and cost. On the other hand, the trend in the world economy is shrinking budgets and shorter deadline, all this while projects are getting more complex. This concentration focuses on meeting industry needs for IT Managers that can manage cost, time, scope, quality, risk, and people to ensure that projects come in on time and under budget. It also addresses strategic planning and business systems analysis.

Objectives:

Upon successful completion of this concentration, the student will be able to:

  • Appraise the principles and practices for organizing, allocating, and managing project resources.
  • Analyze the project management framework, including the stakeholders, domains, phases, processes, integration, and lifecycle.
  • Examine the potential complexities and pitfalls in initiating and closing projects; and assess methods to mitigate this risk.
  • Appraise the unique challenges in managing the scope, time, and cost of Information Technology projects.
  • Examine various project cost models; also analyze the principles of earned value management (EVM).
  • Assess the principles, strategies, challenges, and measures for managing quality and risk on IT projects.
  • Analyze the phases, procedures, deliverables, and best practices for business systems analysis.

Must take all courses for this section.

Course ID: 4090

|
The course is an advanced study of project management; it takes a systems approach to project management and examines project integration, project management knowledge areas (domains), project life cycle, software development life cycles, phases, and process groups, such as project initiation, planning, executing, controlling, and closing. This course also appraises the challenges and the techniques for managing scope on IT projects. This course also assesses methods, tools, and techniques to perform time management. Students are recommended but not required to have access to Microsoft Project. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: ITMG624)
Registration Dates Course Dates Session Weeks
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session

Course ID: 4091

|
This course is an advanced study of the models, methods, principles, practices, and challenges pertaining to project life cycle cost management, including earned value management (EVM). This course also examines the process for developing project communications plans, and it analyzes various communications and technology tools to enhance project communications. Students are recommended but not required to have access to Microsoft Project. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: ITMG624)
Registration Dates Course Dates Session Weeks
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
10/26/21 - 04/01/22 04/04/22 - 05/29/22 Spring 2022 Session B 8 Week session

Course ID: 4092

|
This course is an advanced study of Human Resource Planning and Development; it also analyzes various human resource organizational structures for project success. It appraises various theories of human motivation and applies these theories to develop effective project teams. This course also appraises the inherent risk in various kinds of contracts and examines the principles of effective contract creation and administration. Students are recommended but not required to have access to Microsoft Project. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: ITMG624)
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session

Course ID: 4093

|
This course is an advanced study of engineering high quality on IT projects. Quality does not happen; it must be planned, promoted, and practiced intentionally and deliberately. This course also examines the various models and methods for assessing and managing project risk. This course also applies both qualitative and quantitative risk analysis to minimize project risk. Students are recommended but not required to have access to Microsoft Project. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: ITMG624)
Registration Dates Course Dates Session Weeks
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session

Course ID: 4089

|
E-Business projects have become even more commonplace than the neighborhood bowling alley; e-Business development time lines have shrunk dramatically while costs have increased significantly. While traditional IT project managers have filled the gap, it should be recognized that e-Business introduces challenges over and above that of traditional IT project management. This course is a study of the project management framework related to e-Business, it includes: strategic planning, risk management, web content management, customer relationship management, security and privacy management, web usability, agile application development, application deployment, search engine optimization (SEO), internet marketing, and vendor management.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session

The primary challenge for ecommerce is assuring the security and integrity of information systems. We are bombarded daily by news of viruses, worms, malware, breaches, infiltrations, denial-of-service attacks, and the like. The ability of an organization to secure and assure its information technology assets is essential to conducting global commerce and to establishing a robust economy; this is a particular challenge given the rapidly changing face and assets of the virtual intruder. The ability to compromise an origination’s information assets is a direct threat to their competitive advantage; and the ability to protect the information assets of an organization is essential to maintaining clientele, trust, revenue streams, credibility, and the survival of the organization. This concentration focuses on securing the information technology assets of an organization. Areas include network security, telecommunications security, computer forensics, legal and ethical issues, cybercrime, computer forensics, information assurance, security risk mitigation, information systems audit and certification, intrusion detection, and incident handling.

Objectives:

Upon successful completion of this concentration, the student will be able to:

  • Profile the emerging security threats and trends, and analyze the information systems vulnerabilities that they exploit.
  • Assess the methods and techniques for recognizing and profiling attack patterns.
  • Categorize and analyze the different types of cryptography, encryption keys, malicious software, and types of attacks.
  • Analyze the methodologies for investigating computer-related crime and for incident handling.
  • Appraise the legal and regulatory compliance requirements related to Information Assurance and Information Systems.
  • Security and assess the social, ethical, economic, and technical impact of information systems security.
  • Analyze the challenges encountered in establishing information systems security, information assurance, and business continuity.
  • Examine the models and methodologies for performing security vulnerability assessment and risk mitigation; also analyze the principles and practices for appraising and certifying systems security.

Must take all courses for this section.

Course ID: 3871

|
Telecommunications networks are a critical component of the global economic and social infrastructures. Securing critical infrastructure is an established priority within Information Security Management. This course examines the field of secure telecommunications networks, including emerging threats, system vulnerability, network evolution, and network defense mechanisms.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session
10/26/21 - 04/01/22 04/04/22 - 05/29/22 Spring 2022 Session B 8 Week session

Course ID: 3872

|
This course examines the tenets of Intrusion Detection, Intrusion Prevention, and Incident Handling. Intrusion Detection focuses on the methods to detect attempts (attacks or intrusions) to compromise the confidentiality, integrity or availability of an information system. Also included is an analysis of the principles and practices of intrusion detection, intrusion prevention, and incident handling; network-based, host-based, and hybrid intrusion detection; identifying attack patterns; deployment of resources and responses to handle the incident, surveillance, damage assessment, risk assessment, data forensics, data mining, attack tracing, system recovery, and continuity of operation.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session
10/26/21 - 04/01/22 04/04/22 - 05/29/22 Spring 2022 Session B 8 Week session

Course ID: 3873

|
The course analyzes computer and systems security measures by examining a model for information assurance; it also examines the components of a comprehensive Information Assurance plan. Topics included are: asset identification, human factors, compliance with regulations, personnel security, risk assessment and ethical considerations, IA policy, as well as computer and network security tools.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session
10/26/21 - 04/01/22 04/04/22 - 05/29/22 Spring 2022 Session B 8 Week session

Course ID: 4103

|
This course is an advanced study of the principles, practices, procedures, and methodologies to assure the protection and availability of vital digital information systems assets. It examines information assurance, incident management and response, and security standards; and it appraises the convergence between information security, information systems security, and information warfare. This course appraises organizational, legal, technical, and ethical issues related to securing vital digital assets. Topics include: the role of the corporate security officer, corporate cybercrime, electronic commerce, cryptography, and international standards, policies, and security acts. (Prerequisite: ISSC660)
Registration Dates Course Dates Session Weeks
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
10/26/21 - 04/01/22 04/04/22 - 05/29/22 Spring 2022 Session B 8 Week session

Course ID: 4098

|
This course examines the phases, processes, standards, the levels, and the process areas of the INFOSEC Assessment Capability Maturity Model (IA-CMM). The IA-CMM minimizes false indications of quality and maturity by relating the IA-CMM process areas to the INFOSEC Assessment Methodology (IAM). This course appraises the principles and methodologies of the IA-CMM; and applies it to develop an organizational ratings profile to provide a measure of maturity. The ratings profile is used to develop strategies to mature the organizational processes. (Prerequisite: ISSC660)
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session

The societal impact of cybercrime has become commonplace; it is broadcast on the evening news and is a favorite playing field for television shows and moviemakers. Technology is a boon to society, but, in malicious hands, it becomes a valuable instrument in a dark and sinister underworld; and, unfortunately, cyber legislation and forensics have been lagging way behind when it comes to cybercrime. The process of forensics investigation can destroy the very evidence it is seeking to assimilate. The window of opportunity for collecting evidence can be a few seconds or minutes depending on the sophistication of the perpetrator. This concentration pertains to the study of various forensics models to identify, preserve, collect, examine, analyze, prepare, and present evidence for prosecuting cybercrime.

Objectives:

Upon successful completion of this concentration, the student will be able to:

  • Evaluate data security, integrity, exposure from multifunctional devices, tracking techniques, and forensics models for analysis and examine the inherent challenges in the processes for seizing electronic evidence.
  • Evaluate the principles, practices, and inherent challenges of the e-discovery process and assess the tools, techniques, and procedures to legally seize and forensically evaluate digital crime scenes.
  • Analyze concealment and cloaking techniques and technologies such as cryptography, steganography, and data hiding and investigate corresponding legislation and mitigation techniques.
  • Assess and mitigate potential exposures and the risks of the chain of custody and examine the methodologies to mitigate the potentially narrow window of opportunity for collecting digital evidence.
  • Investigate models to examine the financial and societal impact of technology-related crime.
  • Appraise the legal and regulatory compliance requirements in investigating and prosecuting technology-related crimes.

Must take all courses for this section.

Course ID: 3860

|
This course examines information concealment techniques, technologies, hardware, software, and relevant legislation for cyber forensics to reveal and track legal and illegal activity. The course examines the process for investigation and introduces the tools and procedures required to legally seize and forensically evaluate a suspect machine. Also covered are the rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities, and revealing concealed information using cyber forensics.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session
10/26/21 - 04/01/22 04/04/22 - 05/29/22 Spring 2022 Session B 8 Week session

Course ID: 4099

|
The global reach of the Internet, the low cost of online activity, and the relative anonymity of users has led to an increase in computer related crimes. This course focuses on cybercrime investigation and prevention; it appraises the legal issues related to on-line criminal conduct, the collection of electronic evidence, and the onslaught of new technology. This course also analyzes the phases, processes, and challenges of cybercrime investigations, and it examines technical, legal, and social issues relating to the search and seizure of digital evidence and computer forensics. Students will encounter the challenges of the latency between technology and the law.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session
10/26/21 - 04/01/22 04/04/22 - 05/29/22 Spring 2022 Session B 8 Week session

Course ID: 4100

|
This course is an advanced study of information ethics, cyber privacy, and intellectual property. It examines the ethical, economic, and societal issues that face today’s information-entrenched society; this includes intellectual property rights, privacy, accessibility and censorship. The explosive growth of information technology, the increased competition in the global marketplace, and the surge in the use of information to protect society from terrorism has led to the unintended erosion of fundamental rights and values. This course appraises the current state of information ethics, the dangers and opportunities presented by information technology, and the potential solutions to the inherent risks in today’s information-bound society.
Registration Dates Course Dates Session Weeks
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session

Course ID: 4101

|
This course is an advanced study of the models of investigative methods for finding evidence in a wide scope of disparate digital devices such as computers, laptops, netbooks, networks, mobile devices – phones, notepads, PDAs, digital audio and video players, and any device or appliance that carries an electronic circuit board which could potentially store data or information. It also examines the science, the evidence, and the law related to digital forensics, the validation of findings, and determination of acceptable and irrefutable evidence in a court of law. It also evaluates various digital forensics models for data identification, preservation, collection, examination, analysis, preparation, and presentation. ( Prerequisite: ISSC621 )
Registration Dates Course Dates Session Weeks
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session

Course ID: 4102

|
This course is an advanced study of the principles and methodologies of the e-discovery process and the increasing importance of digital evidence in litigation. Topics include contemporary investigative methods, legal issues, cost containment, collecting and prioritizing data sets, preservation of digital evidence, document review, metadata and spoliation considerations, comparative assessments, and forensic investigations. (Prerequisite: ISSC621)
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session

Must take all courses for this section.

Course ID: 2679

|
This course addresses information systems, to include their nature and role as key management resources. This course covers the information systems infrastructure, to include databases, knowledge management systems, enterprise information portals, telecommunications, the Internet, and wireless technology. It examines the topics of e-commerce, information systems in the global economy, managing global systems, securing information systems, and ethical and social issues in information systems.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session
10/26/21 - 04/01/22 04/04/22 - 05/29/22 Spring 2022 Session B 8 Week session

Course ID: 4095

|
This course focuses on the research methods, tools, instruments, and devices used in Information Sciences and Information Technology; it appraises the logic of the scientific method, research design, qualitative and quantitative analysis of data for the purpose of conducting and reporting basic research in a scholarly and academic setting. Through concentration-based case studies, it investigates current trends, legal and ethical issues, global and societal impact, policies, and applications in the fields of information technology, information security, cyberlaw, digital forensics, and media management. This course evaluates methods to collect, classify, categorize, evaluate, assess, and report research data, to formulate valid research questions, and to derive logical conclusions. The principles, practices, tools, and methodologies presented in this course are applicable throughout the program of graduate studies.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session
10/26/21 - 04/01/22 04/04/22 - 05/29/22 Spring 2022 Session B 8 Week session

Course ID: 4097

|
This course examines the principles, practices, and methodologies of enterprise database systems from conceptual design to implementation; this includes architectures, models, design, management, implementation, and security. Included is a total life-cycle database design and implementation project that entails conceptual design, data modeling, normalization, optimization, and implementation. This course appraises object-relational and relational databases, examines Entity-Relationship (ER), Extended Entity-Relationship (EER), and Unified Modeling Language (UML) data models, and investigates relational procedures, dependencies, keys, relationships, cardinality, and referential integrity. It also evaluates query processing, performance tuning, transaction processing, concurrency, data integrity, database recovery, data security, data warehousing, data mining, and emerging technologies. Prior knowledge in a procedural database language such as PL/SQL or T/SQL using Oracle or MSSQL respectively is highly recommended.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session
10/26/21 - 04/01/22 04/04/22 - 05/29/22 Spring 2022 Session B 8 Week session

Course ID: 3870

|
This course is a study of computer networks and the evolution of modern communication systems. It examines the various layers of the basic reference models such as the five-layer IP model or the seven-layer OSI model, by scale, connection method, network architecture, or topology. This course also includes an in-depth analysis of transmission protocols, communications systems, and networks. Prior knowledge of networks and networking is recommended.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session
10/26/21 - 04/01/22 04/04/22 - 05/29/22 Spring 2022 Session B 8 Week session

Course ID: 3874

|
Information Security includes an evaluation of the techniques, policies and strategies to ensure that data stored in an organization's computers cannot be accessed or processed without the consent of the organization. Also included, is an analysis of Information Security & Risk Management, Access Control, Physical Security, Security Architecture & Design, Business Continuity & Disaster Recovery Planning, Telecommunications & Network Security, Application Security, Operations Security, Law, Compliance & Investigations. This course also reviews the building blocks of information systems and cryptography is provided to reinforce the scope of security management.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session
10/26/21 - 04/01/22 04/04/22 - 05/29/22 Spring 2022 Session B 8 Week session

Course ID: 2756

|
This course explores successful project management for information technology projects. The System Development Life Cycle (SDLC) models are defined including the waterfall, spiral, incremental release, and prototyping models. Students will differentiate between these models and apply corresponding project management methods to identify critical checkpoints and reviews. Risk management, as applied to technology projects, is examined. Key project indicators are discussed, and students will explore defining measurement criteria for determining critical success factors on a project. The course defines the application of knowledge, skills, tools, and techniques to project activities and includes a tutorial for Microsoft Project. Emphasis is placed on the three dimensions of the information technology project constraints: scope, time, and cost. Students are recommended to have access to Microsoft Project. Course software requirements with the appropriate versions are listed under the course materials site.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session
10/26/21 - 04/01/22 04/04/22 - 05/29/22 Spring 2022 Session B 8 Week session

Choose 3 credit hours from this section.

Course ID: 4892

|
The Information Technology Creative Project Capstone course gives students the opportunity to address real-world issues relevant to their profession, plan and execute a project, contribute to their discipline while developing mastery of selected skills. Creative projects may originate from a wide variety of options such as standard operating procedures, training program manual, organizational change proposals, software and hardware design or development, or other information technology solutions. NOTE: This course may not be taken until all other courses are COMPLETED and student has a 3.0 GPA. THIS COURSE IS 16 WEEKS.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 02/20/22 Fall 2021 Session K 16 Week session
07/27/21 - 12/31/21 01/03/22 - 04/24/22 Winter 2022 Session A 16 Week session
09/28/21 - 03/04/22 03/07/22 - 06/26/22 Winter 2022 Session C 16 Week session

Course ID: 4094

|
Capstone course of studies completed toward the graduate degree in Information Technology. The student will complete a research thesis that demonstrates mastery and application of advanced research and analytic skills related to the learning outcomes of this degree program. NOTE: This course may not be taken until all other courses are COMPLETED and student has a 3.0 GPA.THIS COURSE IS 16 WEEKS.
Registration Dates Course Dates Session Weeks
05/21/21 - 10/29/21 11/01/21 - 02/20/22 Fall 2021 Session K 16 Week session
06/28/21 - 12/03/21 12/06/21 - 03/27/22 Fall 2021 Session C 16 Week session
07/27/21 - 12/31/21 01/03/22 - 04/24/22 Winter 2022 Session A 16 Week session
08/31/21 - 02/04/22 02/07/22 - 05/29/22 Winter 2022 Session K 16 Week session
09/28/21 - 03/04/22 03/07/22 - 06/26/22 Winter 2022 Session C 16 Week session
10/26/21 - 04/01/22 04/04/22 - 07/24/22 Spring 2022 Session A 16 Week session

Courses Start Monthly

Next Courses Start Nov 1
Register by Oct 29

Admission Requirements

All APU master's degree and graduate certificate programs require a bachelor’s degree (or higher) from an institution whose accreditation is recognized by the Council for Higher Education Accreditation (CHEA).

For this program, you must provide an official transcript of your previously completed bachelor's or master's degree and have ONE of the following:

  • Associate or bachelor's degree in information technology or a related field (Example: computer science, information systems, database development, etc.)
  • 2 years of work experience in the specific subfield for this certificate to be documented in your resume or your Joint Services Transcript (JST) and DD214
  • Completion of one of our undergraduate IT certificates
  • Completion of 6 upper-level (300-400) undergraduate credits in IT-related courses
  • Completion of an IT-related minor or concentration during your undergraduate program
  • Certification from CompTIA A+ (2010 – present) or a combination of the following (must have two) CompTIA Network +, CompTIA Project +, CompTIA Security+ (all 2010-present)
  • A valid and current Project Management Professional certification from the Project Management Institute
  • Completion of CISSP certification (valid up until the expiration date)

IMPORTANT NOTES

  • If the IT-specific requirements are not noted in the official bachelor's or master's transcript, you must provide official copies of your undergraduate transcripts that show the appropriate coursework.
  • The verification of the 2-years work experience needs to be sent to the university from your current/previous employer on company letterhead.
  • Pre-admission courses completed at the undergraduate level must be graded C or higher; B or higher at the graduate level.
  • Please be prepared to submit a legible copy of your valid government-issued photo ID (civilian students) or government-issued JST or CCAF transcript (military students) upon request.
  • Please read all graduate admission requirements before applying to this program and be prepared to submit the required documentation.
  • There is no fee to complete the APU admission application. View steps to apply.

An APU admissions representative will contact you via email or phone to assist you with the enrollment process, review your documentation, and to notify you when you have been admitted into the program and may register for courses.

Materials Cost

Technology fee: $65 per course | $0 for active-duty military, National Guard members, and Reservists.

Need Help?

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an APU admissions representative at 877-755-2787 or info@apus.edu.

Quality Education Should Be Affordable

So you can focus on the opportunities ahead, without the financial burden of more expensive schools who are not as invested in your success. Learn more about paying for school.

Consumer Information

Department of Education and State Disclosures

For information on costs, median debt, state licensure requirements and more, view the gainful employment disclosures and the program disclosures for Maryland residents.

 

*Cost Per Credit Hour

To minimize out-of-pocket costs, U.S. active-duty servicemembers, their spouse/dependents, National Guard members, and Reservists receive a tuition grant that caps undergraduate, master's degree, and graduate certificate tuition at $250/credit hour. In addition, a university book grant provides no-cost textbooks and ebooks for all undergraduates and military-tuition-grant-eligible master’s-level students.
See all military student benefits.