MS in Information Technology - Internet Security

What will this cost?

See Graduate Program Costs

or Use our Net price calculator to see how affordable a degree at SNHU really is.

Download a summary of Information Technology / Internet Security (MS)

MS in IT Internet Security Concentration Offers Real-World Opportunities

With the ever-growing use of the Internet to conduct business at all levels, the understanding of Internet security you earn with an online Master's in Information Technology – Internet Security concentration can be valuable whether you're an executive, IT network professional or IT systems administrator. The knowledge and skills gained by earning an MS in IT Internet Security concentration from Southern New Hampshire University can play an important role in advancing your career. The program's Internet Security classes, including lab-intensive course work, expose you to the latest Internet security measures and information security techniques. Internet Security courses can be completed online or on campus to meet the needs of your schedule and lifestyle.

Gain Key Skills in Internet Security Assurance

The Master's in Information Technology Internet Security Concentration will build your Internet security knowledge and skills with extensive hands-on activities. With the MS in IT Internet Security Concentration, students will:

  • Learn information security techniques to prevent, detect and recover from the loss of information.
  • Understand how to protect networks, communications and data files - as well as how to plan, implement and manage enterprise-level security and systems integrity.
  • Gain skills in building, reviewing and revising an information security organization to protect information that keeps businesses viable.
  • Evaluate internal and external threats to network security and design, and learn how to enforce security policies and protect an organization’s information.

MS in Information Technology / Internet Security Concentration - Growing Professional Opportunities

Maintaining Internet security has become a critical focus for many organizations, making IT professionals with Internet security expertise valuable members of the corporate team. Earning a Master of Science in Information Technology degree with an Internet Security Concentration can increase your value in the marketplace as an IT executive or as an independent Internet security consultant. Employment opportunities for IT professionals will continue to remain strong, according to the U.S. Bureau of Labor Statistics. Evolving technologies, including mobile technology, will help drive the demand for IT professionals, including those skilled in Internet security techniques and network protection.


Total Credits Required: 36 minimum

To complete your Master's in IT degree, you will take 12 courses (36 credits), including nine core MS in Information Technology courses and three IT concentration courses.

Internet Security Courses

Select Three of the Following:

IT-548: Information Security
This course provides students hands-on information security training as future executives, network professionals, system administrators and consultants. It explores the basic concepts in information security policies, models, and mechanisms for secrecy, integrity, and availability. Topics include approaches in an organization to prevent,detect and recover from the loss of information; cryptography and its applications; and security in computer networks and distributed systems.
IT-549: Foundation in Information Assurance
This course explores the basic concepts and prepares students with the foundation skills for the protection of networks, communication, and data, as well as the knowledge base for planning, implementing, and managing enterprise level security and system integrity. Topics include approaches in an organization to prevent, detect and recover from the loss of information, cryptography and its applications, security in networks and distributed environments. This course is Lab Intensive.
IT-500 or IT-510
IT-642: Information Security Management
Information Security Management will provide the techniques and skills necessary to build, review or revise an Information Security Organization using a combination of policies, architecture, risk assessments and business goals. These skills are necessary for organizations that have a need to protect information which is necessary in order to keep the business viable. Topics include risk management, project management and staff development. This course is Lab Intensive.
IT-643: Network Assessment and Defense
This course covers the fundamental skills and knowledge in evaluating internal and external threats to network security and design, how to enforce network level security policies, and how to ultimately protect an organization's information. It includes a broad range of topics from secure network fundamentals, protocols and analysis, standards and policy, compliance and operational security; threats and vulnerabilities; application, data and host security, access control and identity management; and cryptography. Students who have completed the course will have a full understanding of defensive measures taken to secure their organization's information, and along with the proper knowledge necessary to comprehend overall network security posture and the basic practices in vulnerability assessment. This course is Lab Intensive.

MS in Information Technology Core Courses

IT-510: Advanced Information Technology
This course focuses on the principles and practices underlying the analysis, design, implementation and management of information technology systems. Topics include information system development methodologies, systems planning, requirements analysis, systems implementation, software engineering, project management, and interface, database and process design.
IT-511: Object Oriented Application Development
This course provides a comprehensive introduction to the principles and practices of object- oriented software development and provides a foundation for developing quality software. Students develop skills in applying object- oriented concepts to solve software problems and implement solutions. The course also teaches the concepts and design of algorithms for problem solving and includes the topics of data structures as they are related to the algorithms that use them. The course provides the technical foundation necessary to handle the material covered in the subsequent IT courses.
IT-600: Operating Systems
This course focuses on computer architecture and the operating systems of digital computers. Students learn about the operational methods of hardware; the services provided by operating systems' software; acquisition, processing, storage and output data; and the interaction between computers. Topics include widely used operating systems such as DOS, Windows, and UNIX.
IT-501 and IT-510
IT-610: Object-Oriented Systems Analysis
This course focuses on the systems analysis tools and techniques that underlie the development of information systems. Object-oriented analysis is emphasized. The course examines approaches for establishing the scope of a system, capturing and modeling information gathered during analysis, and managing and controlling project development. Students will get a working understanding of the methods for developing and specifying application system requirements. CASE tools will be used to develop system models.
IT-501 and IT-510 or permission of instructor
IT-625: Information Technology Project and Team Management
This course introduces the students to the principles and practices necessary to be an effective IT project manager. The course covers project scope, time, cost, quality and human resource management techniques as applied to the kinds of project management problems and issues unique to the IT environment. Students learn how to design an actual IT project structure and will obtain hands-on experience using project management software. Emphasis is on the techniques of project management, leadership, teamwork and project risk management as applied to the IT environment. Case work is an important part of this course.
IT-501 and IT-510 or permission of instructor
IT-630: Computer Simulation and Modeling
This course focuses on the theory and practice of discrete system simulation. Topics include simulation/modeling techniques and methodologies illustrated by business and industrial applications such as computer and network modeling, manufacturing simulation and queuing systems. Queuing theory and input/output statistical analysis are included. Modeling software is used.
IT-501 and IT-510 or permission of instructor
IT-640: Telecommunications and Networking
Telecommunications is a business resource that must be well managed. This includes the technical aspects and the application of telecommunications technology to solve specific business problems and enhance the strategic position of a business enterprise. Topics include the importance of telecommunication in today's business environment, the analysis, design and implementation of telecommunications systems, the scope of the telecommunications industry and current trends; telecommunications hardware, the OSI network model, networking technologies and telecommunications software, protocols and standards.
IT-600 and Minimum grade C, T, WV
IT-650: Principles of Database Design
This course is a study of the design, development and implementation of database management systems (DBMS) that emphasizes relational DBMS architecture using SQL. Students will design and implement projects and complete case exercises as they are introduced to new developments in data- base design.
IT-501 and IT-510
IT-700: Information Technology Strategy & Policy
This is the capstone course of the IT master's degree program and is designed to provide in-depth understanding of the central role of information technology in the contemporary business environment. Students develop an understanding of the strategic uses of information technology from a business perspective at the enterprise level. Students also learn how to manage the introduction of new information technologies in the firm. They learn how to harness the power of these new technologies, enabling them to make better decisions and more effectively manage their organizations. Students conduct an extensive research project on the business impact of emerging technologies.
IT-510, IT-600, IT-610, IT-625, IT-630, IT-640 and IT-650 or permission of instructor

Admission Requirements

Acceptance decisions are made on a rolling basis throughout the year for our five graduate terms. You can apply at any time and get a decision within days of submitting all required materials. To apply, simply contact an admission counselor, who can help you explore financial options.  Your counselor can also walk you through the application process, which involves completing a graduate application ($40 fee) and providing undergraduate transcripts.

Candidates are also required to submit a resume.

Contact Us

Phone: 888.387.0861