20-21 Graduate Catalog

MSIT in Information Assurance

Area of Study Overview

Return to the School of Applied Science and Technology Homepage

The Information Assurance area of study is designed to prepare students with the knowledge and skills needed to address the operational issues, policies and procedures, threat and response mechanisms, risk analysis, system recovery, and information security frameworks that can be deployed to secure corporate assets. The program focuses on preparing students to be able to protect an organization’s data assets and manage all aspects of information assurance and security across an organization’s systems.

Credit Distribution

I. Core Courses (15-18* Credits)

MSI-501Foundations of Information Technology

3

MSI-502Telecommunications and Networking

3

MSI-503Object-Oriented Application Development

3

MSI-504Information Systems Analysis, Modeling, and Design

3

MSI-505Principles of Database Design

3

APS-510Project Management for Technology

3

II. Area of Study (15 Credits)

IAS-551Foundations of Information Assurance

3

IAS-552Vulnerabilities, Threats, and Attacks

3

IAS-553Countermeasures Design and Implementation

3

IAS-554Policies and Procedures Development and Implementation

3

IAS-555Computer Forensics and Information Systems Auditing

3

III. Capstone (6 Credits)

APS-700Master Project in Applied Science and Technology

6

Total Credit Hours: 36-39

Note:

MSI-501: This course is required for learners who need a refresher or who lack the prerequisite knowledge in IT as determined during the application evaluation period.

Learning Outcomes

Upon completion of the area of study in Information Assurance, graduates will be able to:

  • evaluate new and existing security systems;
  • lead the development, implementation, evaluation, and management of information security solutions;
  • utilize qualitative and quantitative methodologies to develop comprehensive risk assessments of an organization’s information assets;
  • develop comprehensive risk mitigation and system recovery plans; and
  • collaborate with organizational stakeholders to develop and implement enterprise-level information assurance policies and procedures.