Master of Cyber Forensics and Security

At the conclusion of their studies, graduates of the Master of Cyber Forensics and Security degree should be able to:

  • Design and implement a comprehensive enterprise security program using both policy and technology to implement technical, operational, and managerial controls
  • Comprehensively investigate information security incidents and violation of law using computer resources in a manner such that all evidence is admissible in a court of law
  • Technically secure enterprise information assets and resources to deter, detect, and prevent the success of attacks and intrusions

Illinois Institute of Technology has been designated as a National Center of Academic Excellence in Cyber Defense Education by the National Security Agency and the Cybersecurity and Infrastructure Security Agency. This designation results from meeting stringent Center of Academic Excellence criteria and mapping of information technology and management curricula to a core set of cyber defense knowledge units. Students attending Center of Academic Excellence in Cyber Defense Education institutions are eligible to apply for scholarships and grants through the Department of Defense Cyber Scholarship Program and the Federal Cyber Service Scholarship for Service Program. This designation reflects Illinois Institute of Technology’s commitment to producing professionals with cyber defense expertise for the nation.

Master of Cyber Forensics and Security (Coursework Only Option)

Required Core Courses (18) 1
ITMS 538Cyber Forensics3
ITMS 543Vulnerability Analysis and Control3
ITMS 548Cyber Security Technologies3
ITMS 578Cyber Security Management3
ITMS 583Digital Evidence3
ITMM 585Legal and Ethical Issues in Information Technology3
Elective Courses (12)
Select a minimum of 12 credit hours from the following:12
Any 500-level ITMS course not listed in required courses above. 2, 3
Vendor Management and Service Level Agreements3
Information Technology Auditing3
Shell Scripting for System Administration3
Introduction to Data Networks and the Internet3
Introduction to Open Source Software3
Special Problems in Information Technology 43
Total Credit Hours30
1

Substitutions for core course requirements may be made upon presentation of evidence of equivalent coursework, certification, or experience. Approval of course substitutions will be made by the student’s adviser or an ITM associate chair.

2

Students pursuing the coursework only option may not choose ITMS 549 as an elective course.

3

ITMS 579 may be taken more than once.

4

A maximum of six credit hours of ITMT 597 may be used toward degree requirements.

Master of Cyber Forensics and Security (Master's Project Option)

Required Core Courses (18) 1
ITMS 538Cyber Forensics3
ITMS 543Vulnerability Analysis and Control3
ITMS 548Cyber Security Technologies3
ITMS 578Cyber Security Management3
ITMS 583Digital Evidence3
ITMM 585Legal and Ethical Issues in Information Technology3
Research Courses (6)
Select a minimum of six credit hours from the following:6
Special Projects in Information Technology3
or
Cyber Security Technologies: Projects & Advanced Methods3
or
Special Problems in Information Technology1-6
Elective Courses (6)
Select a minimum of six credit hours from the following:6
Any 500-level ITMS course not listed in required courses above. 2
Instructional Technologies3
Information Technology Auditing3
Shell Scripting for System Administration3
Introduction to Data Networks and the Internet3
Introduction to Open Source Software3
Special Problems in Information Technology 33
Total Credit Hours30
1

Substitutions for core course requirements may be made upon presentation of evidence of equivalent coursework, certification, or experience. Approval of course substitutions will be made by the student’s adviser or an ITM associate chair.

2

ITMS 579 may be taken more than once. 

3

A maximum of six credit hours of ITMT 597 may be used toward degree requirements.