An 911爆料网 student works on code

Cybersecurity (M.A.S.)

Master technical skills and build the legal fluency to defend against every attack in our flexible master of cybersecurity program.

Bridge Technical Skill with Legal Know-How to Become a Security Leader in 911爆料网鈥檚 M.A.S. in Cybersecurity

Technology in all forms is constantly under attack, and these threats continue to evolve in new and challenging ways. Equipping yourself with the technical depth and legal fluency to understand and defend against these threats prepares you become a cybersecurity leader for both today and tomorrow. 911爆料网鈥檚 M.A.S. in Cybersecurity unifies the technical rigor of information technology management, computer science, and electrical and computer engineering with the strategic and legal dimensions of cybersecurity law and policy to help you develop a well-rounded cybersecurity toolkit in a program offered by a university that is designated as a National Center of Academic Excellence in Cybersecurity by United States Department of Homeland Security and National Security Agency. You can also choose from one of seven specialized tracks鈥攃ybersecurity management, cybersecurity technology, digital forensics, computer engineering, power and energy, computer science, and law and policy鈥攖o enhance your skill set in ways that will set you apart from your peers, propelling you become a leader in a rapidly evolving cyber landscape.

Program Overview

Gain a foundation in data and information security, software and hardware security, systems and network security, and secure application specific infrastructure to be workforce-ready. Learn to defend against security-related risks while understanding how to increase data and systems protection, plan security measures, and recognize the potential legal and ethical issues by tackling real-world threat scenarios through hands-on labs, live attack-and-defend exercises, and other projects.

  • Hybrid Delivery with Online Primary Courses
  • 12鈥18 Month Degree Completion
  • STEM-Designated and CAE-Aligned
  • Seven unique specialized tracks (learn more below) to fine-tune your expertise

Career Opportunities

Prepare for high-impact roles in a multitude of sectors, ranging from federal law enforcement to critical infrastructure protection. Focus on developing tangible skills that allow you to step directly into leadership and operational roles.

Careers in cybersecurity are among the fastest growing in the United States, and they rank as the #2 Best Tech Job, #3 Best STEM Job, and #4 on the Best 100 Jobs, according to U.S. News & World Report.

Prepare for a variety of cybersecurity roles:

  • Digital Forensic Analyst
  • Incident Response Specialist
  • Cybersecurity Analyst
Disclaimer for prospective students, please read.
The information provided is sourced from a third party, Lightcast, and is provided here for informational and educational purposes only. Please be advised that the inclusion of the Lightcast resource on this website does not imply endorsement by Illinois Institute of Technology (911爆料网), nor is it a guarantee of the accuracy of this information. 911爆料网 makes no representation, warranty or guarantee, express or implied, that the information presented herein is reflective of the outcomes you can expect if you enroll in or graduate from an 911爆料网 program. 911爆料网 expressly disclaims any liability regarding Lightcast, or in connection with any actual or potential employment opportunity stemming from information on this site and you hereby irrevocably waive any claim(s) against the 911爆料网 for the same. Your use of this web page is an acknowledgement of your understanding and acceptance of the terms and conditions set forth herein. You are encouraged to conduct your own thorough research into job opportunities and outcomes in your field of study.

Build an expertise in cybersecurity through courses such as these: 

ITMS 583 Digital Evidence
In this course, you鈥檒l learn about the fundamental principles and concepts in order to conduct investigations in the digital realm. You will also explore the process and methods of obtaining, preserving, and presenting digital information for use as evidence in civil, criminal, or administrative cases. Other topics covered in this course include legal concepts and terminology, ethics, computer crime, investigative procedures, chain of custody, digital evidence controls, processing crime and incident scenes, data acquisition, email investigations, applicable case law, and serving as an expert witness in a judicial or administrative proceeding.

ITMS 527 AI for Cybersecurity
Gain the knowledge and skills necessary to understand, implement, and leverage artificial intelligence techniques within cybersecurity. In an era where cyber threats continue to evolve and grow in complexity, AI has emerged as a powerful tool to defend against and mitigate these threats. This course explores the intersection of AI and cybersecurity, providing a comprehensive understanding of how AI technologies can be used to protect computing systems. By the end of this course, you will be well-equipped to leverage AI to enhance your cybersecurity efforts, making it a valuable asset in the ever-evolving landscape of digital security.

ITMS 564 Cloud Computing Security
You鈥檒l learn how to effectively secure cloud-based services and infrastructure in an enterprise setting in this course. Among the topics that will be covered include the design principles of secure cloud computing, data security, platform and infrastructure security, application security and the Secure Software Development Life Cycle and DevSecOps processes, and security operations. This course will also cover the legal, risk, and compliance aspects of cloud computing, all in the context of a set of industry-standard learning domains.

 

 

Master of  Cybersecurity

REQUIREMENT

CREDITS

Minimum Degree Credits

30

Minimum Foundational Course Credits

12

Minimum 500-Level / Graduate Law Credits

24

Maximum 400-Level Credits

9

Requirements

 

CODE

TITLE

CREDIT HOURS

Foundational Courses

(12)

Master of Cybersecurity students must take at least 1 course in each foundational area.

 

Data Privacy and Security

3

or 

Advanced Computer Security

Computer Cyber Security

3

or 

Computer Network Security

Cyber Security Technologies

3

or 

Cyber Security Management

Computer & Network Privacy

3

or 

Law of Privacy

Tracks

(18)

Select 18 credit hours from one of the following tracks:

18

COMPUTER ENGINEERING TRACK

 

Offered by the Department of Electrical and Computer Engineering

 

ECE Cybersecurity Core Courses (select minimum 6 credit hours)

 

Analytical Methods for Power System Economics and Cybersecurity

3

Computer Cyber Security (required) 1

3

Computer Network Security (required) 1

3

Wireless Network Security

3

Secure Machine Learning Design and Applications 

3

Hardware Security and Advanced Computer Architectures

3

Special Problems

3

ECE Cybersecurity Elective Courses (select minimum 6 credit hours)

 

Analytical Methods for Power System Economics and Cybersecurity

3

5G Wireless Network: Architecture, New Radio, and Security

3

Internet of Things and Cyber Physical Systems

3

Modern Wireless Network Protocols and Standards

3

Communications Networks Performance Analysis

3

Computer Network Security

3

Modern Internet Technologies

3

Wireless Network Security

3

Computer Vision and Image Processing

3

Secure Machine Learning Design and Applications 

3

Cloud Computing and Cloud Native Systems

3

Data Science for Engineers

3

Elements of Smart Grid

3

Hardware Security and Advanced Computer Architectures

3

Object-Oriented Programming and Machine Learning

3

Special Problems

3

General Cybersecurity Elective Courses (select 0 to 1 course - advisor approved)

 

Option to select 0-3 credit hours

 

Computer & Network Privacy

3

Law of Privacy

3

Blockchain and the Law

2

Cyber Security Technologies

3

Cyber Security Management

3

Data Privacy and Security

3

Advanced Computer Security

3

ECE General Elective Courses (select 0 to 2 courses - advisor approved)

 

Option to select 0-8 credit hours

 

Digital and Data Communication Systems

3

Introduction to Computer Networks

3

Digital Signal Processing I

3

Smart and Connected Embedded System Design

4

Advanced Logic Design

4

Introduction to Signals and Systems for Advanced Studies 2

3

Introduction to Probability and Random Variables for Advanced Studies 2

3

Artificial Intelligence and Edge Computing

3

Wireless Communication System Design

3

Video Communications

3

Analysis of Random Signals

3

Communication Engineering Fundamentals

3

Modern Digital Communications

3

Coding for Reliable Communications

3

Design and Optimization of Computer Networks

3

Wireless and Mobile Networks

3

Artificial Intelligence in Smart Grid

3

Machine and Deep Learning

3

Digital Signal Processing II

3

Fiber-Optic Communication Systems

3

Operations and Planning and Distributed Power Grid

3

Elements of Sustainable Energy

3

Microgrid Design and Operation

3

Computer Organization and Design

3

POWER AND ENERGY TRACK

 

Offered by the Department of Electrical and Computer Engineering

18

ECE Cybersecurity Power and Energy Specialization Required Courses

 

Select 12 credit hours

 

Analytical Methods for Power System Economics and Cybersecurity

3

Internet of Things and Cyber Physical Systems

3

Computer Cyber Security (required) 1

3

Computer Network Security (required) 1

3

Special Problems

3

ECE Cybersecurity Elective Courses (select minimum 6 credit hours)

 

Select 6 credit hours

 

Introduction to Computer Networks

3

Introduction to Signals and Systems for Advanced Studies 2

3

Introduction to Probability and Random Variables for Advanced Studies 2

3

5G Wireless Network: Architecture, New Radio, and Security

3

Modern Wireless Network Protocols and Standards

3

Information Theory and Applications

3

Application Software Design

3

Communications Networks Performance Analysis

3

Modern Internet Technologies

3

Wireless Network Security

3

Artificial Intelligence in Smart Grid

3

Computer Vision and Image Processing

3

Cloud Computing and Cloud Native Systems

3

Elements of Smart Grid

3

Hardware Security and Advanced Computer Architectures

3

Object-Oriented Programming and Machine Learning

3

COMPUTER SCIENCE TRACK

 

Offered by the Department of Computer Science

18

CS Security Core Courses

 

Select 6 credit hours

 

Introduction to Information Security

3

Software Security

3

Data Privacy and Security

3

Cryptography and Network Security

3

Cyber-Physical Systems Security and Design

3

Advanced Computer Security

3

Biometrics

3

System and Network Security

3

CS Security Elective Courses

 

Select 3 credit hours

 

Introduction to Information Security

3

Data Integration, Warehousing, and Provenance

3

Advanced Data Mining

3

Advanced Database Organization

3

Software Security

3

Data Privacy and Security

3

Computer Networks II: Network Services

3

Cryptography and Network Security

3

Advanced Operating Systems

3

Operating System Design and Implementation

3

Cyber-Physical Systems: Languages and Systems

3

Cyber-Physical Systems Security and Design

3

Advanced Computer Security

3

Biometrics

3

Virtual Machines

3

Online Social Network Analysis

3

Machine Learning

3

Software Systems Architectures

3

Software Testing and Analysis

3

System and Network Security

3

CS Electives

 

Select 9 credit hours of 400-level and above CS or CSP courses 3

 

Students without a prior degree in computer science may be required to take some or all of the following courses: , and any other necessary prerequisites. This will likely increase the duration of the degree for such students.

 

CYBERSECURITY MANAGEMENT TRACK

 

Offered by the Department of Information Technology and Management

18

Select the following Foundational Course

 

Cyber Security Management

3

Select 15 credit hours

 

Programming for Cybersecurity Analytics

3

Coding Security

3

AI for Cybersecurity

3

Human Factors in Cybersecurity

3

Introduction to Cyber Warfare

3

Cloud Computing Security

3

Topics in Information Security

3-9

Governance, Risk, and Compliance

3

Incident Response, Disaster Recovery, and Business Continuity

3

Vendor Management and Service Level Agreements

3

Legal and Ethical Issues in Information Technology

3

Information Technology Auditing

3

Select 3 credit hours of Cybersecurity or Cybersecurity-related elective courses

 

Graduate courses from the College of Computing, Armour College of Engineering or Chicago-Kent College of Law

 

CYBERSECURITY TECHNOLOGY TRACK

 

Offered by the Department of Information Technology and Management

18

Select the following Foundational Course

 

Cyber Security Technologies

3

Select 15 credit hours

 

Programming for Cybersecurity Analytics

3

AI for Cybersecurity

3

Database Security

3

Human Factors in Cybersecurity

3

Active Cyber Defense

3

Cyber Security Technologies: Projects & Advanced Methods

3

Operating Systems Security

3

Cloud Computing Security

3

Legal and Ethical Issues in Information Technology

3

Shell Scripting for System Administration

3

Introduction to Open Source Software

3

Select 3 credit hours of Cybersecurity or Cybersecurity-related elective courses

 

Graduate courses from the College of Computing, Armour College of Engineering or Chicago-Kent College of Law

 

DIGITAL FORENSICS TRACK

 

Offered by the Department of Information Technology and Management 

18

Select the following Foundational Courses

 

Cyber Security Technologies

3

Computer & Network Privacy

3

Required Courses

 

Cyber Forensics

3

Mobile Device Forensics

3

Digital Evidence

3

Select 6 credit hours

 

Human Factors in Cybersecurity

3

Steganography

3

Vulnerability Analysis and Control

3

Introduction to Cyber Warfare

3

Topics in Information Security

3-9

Legal and Ethical Issues in Information Technology

3

Shell Scripting for System Administration

3

Introduction to Open Source Software

3

Select 3 credit hours of Cybersecurity or Cybersecurity-related elective courses

 

Graduate courses from the College of Computing, Armour College of Engineering or Chicago-Kent College of Law

 

LAW AND POLICY TRACK

 

Offered by Chicago-Kent College of Law

18

Select 12 credit hours

 

E Commerce

2,3

Legal Analytics 1

2

Emerging Technologies

2

Law of Privacy

3

Blockchain and the Law

2

Computer & Network Privacy

3

Legal Analytics 2

2

Programming for Lawyers

1,2

Privacy Rights in Employment

2

Select 6 credit hours of Cybersecurity or Cybersecurity-related elective courses

 

Graduate courses from the College of Computing, Armour College of Engineering or Chicago-Kent College of Law

 

Total Credit Hours

30

Course List

 or  will be counted towards Foundational ECE courses

Credit will be given only to students without the background of Computer or Electrical Engineering

This excludes:  and .

All foundational and security elective courses must be satisfied by courses taken at Illinois Institute of Technology. Courses transferred from other universities can be used only as electives.

Some tracks have required foundational course selections.

Students without a prior degree, significant coursework, or certifications in computing may be required to take some or all of the following courses: , and any other necessary prerequisites. This will likely increase the duration of the degree for such students.

 

You must complete the , regardless of which graduate program you wish to pursue. Visit our admission website to learn more about what information and documents you need to apply.

Please note that each college and individual programs may have additional requirements to apply.

Tuition and Fees

Learn more about the university鈥檚 general tuition and fees, visit the Student Accounting website.

Cedric Nartey standing with a laptop

Cedric N. Says...

鈥淢yself and a couple of my colleagues received a grant from Motorola Solutions in order to generate a prototype, and we ended up generating an AI-powered intrusion system. We were able to able to present some of the results of the research that we did [to Motorola Solutions].鈥 
鈥擟edric Nartey (ITM, M.A.S. CYF 3rd Year)

Featured Faculty

Maurice Dawson
Associate Professor Director, Center for Cyber Security and Forensics Education
Richard Warner
Professor of Law
Nik Sultana
Assistant Professor of Computer Science
Alexander Rabanal
Assistant Teaching Professor
Assistant Professor of Computer Science Yanxue Jia
Assistant Professor of Computer Science
Adam Weber
Associate Teaching Professor Associate Dean for LL.M. and International Programs
Yousef Elmehdwi
Associate Chair Associate Teaching Professor of Computer Science

Pick Your Path

As part of the M.A.S. in Cybersecurity, you are able to choose one of seven specialized tracks that allows you to focus more on an area of cybersecurity that is of most interest to you. Learn more about each track below: 

Computer Engineering Track

The computer engineering track provides you with a rigorous foundation in hardware and software protection, data security, cloud computing, and computer network security. This interdisciplinary program combines technical expertise with strategic insight, preparing students to design resilient systems and navigate complex legal and ethical challenges.  

Power and Energy Track

The power and energy track provides you with a comprehensive foundation in power system economics, secure smart grids, and the integration of artificial intelligence within energy infrastructures. The curriculum bridges cyber and physical systems, covering key topics such as power distribution, Internet of Things, wireless network protocols, and data security.

Computer Science

The computer science track will help you gain a deep understanding of data and information security, hardware and software security, and systems and network security. You鈥檒l develop the skills and knowledge to mitigate cyber risks while increasing data and systems protection, planning security measures, and recognizing potential legal and ethical issues.

Cybersecurity Management

The cybersecurity management track is designed to help you launch graduates into the roles that organizations are most urgently hiring for. The program鈥檚 foundational curriculum ensures every student develops fluency across technical, legal, and managerial dimensions simultaneously, while the cybersecurity management track鈥檚 elective core enables you to gain expertise in artificial intelligence-driven threat detection; cloud security architecture; governance, risk, and compliance frameworks; and incident response and business continuity planning, capabilities that map directly to roles such as chief information security officer, security analyst, governance, risk, and compliance analyst, cloud security engineer, and an information technology risk manager.

Cybersecurity Technology

The cybersecurity technology track is designed to help you work at the technical forefront of defending modern digital infrastructure. The program鈥檚 foundational courses establish a rigorous baseline across data privacy, computer security, and legal frameworks, ensuring that you understand not just how attacks happen but the regulatory and ethical landscape surrounding them. Students develop expertise in active cyber defense, operating systems security, cloud computing security, and database security, while also building programming fluency tailored specifically to cybersecurity analytics and automation through courses in shell scripting and open source systems. The integration of artificial intelligence for cybersecurity will prepare you to leverage machine learning in threat detection and response, a capability that is rapidly becoming a baseline expectation for senior technical roles.

Digital Forensics

The digital forensics track is designed to prepare you to uncover, preserve, and present digital evidence in both corporate and law enforcement contexts. The program鈥檚 foundational courses build a strong technical and legal baseline that spans advanced computer security, network security, cybersecurity technologies, and computer and network privacy law, ensuring that forensic work is conducted with both technical precision and evidentiary integrity from the start. The track鈥檚 three required core courses mirror the actual workflow of a digital forensics investigation, from device acquisition through courtroom-ready evidence handling. You鈥檒l also have access to legal and ethical coursework, along with elective courses provided by Chicago-Kent College of Law, that will help set you apart, as forensic professionals are routinely called upon to testify, advise counsel, and navigate complex chain-of-custody requirements that demand legal literacy as technical skill.

Law and Policy

The law and policy track offers lawyers and non-lawyers a systematic investigation of the interaction between law and cybersecurity. Sound cybersecurity management requires an understanding of that interaction. This track creates that understanding through a combination of law and technical courses, which identify problems and issues and emphasize practical solutions as well as provide a general conceptual framework that enables you to solve new problems as they arise. 

Get In Touch

To learn more about this program, please reach out to Associate Professor Maurice Dawson at mdawson2@illinoistech.edu.