Be a clutch player on any organization's IT team with an online master's in information security degree from Southern New Hampshire University. This hot, growing field involves managing and evaluating internal and external threats to security, system integrity and networks. Investigate human factors present in cyber security related to ethics, integrity, practices, policies and procedures. Learn the ins and outs of enforcing network-level security policies and how to ultimately "lock down" an organization's Internet entry.
SNHU's MS in IT Information Security program is recognized by the Professional Science Master's (PSM) national office as a Professional Science Master's program. The PSM is an innovative degree designed to allow students to pursue advanced training in science or mathematics while developing workplace skills valued by employers. PSM graduates are prepared to assume high-level careers with science/technology-based employers.
SNHU's MS in Information Technology with an information security concentration equips you with the foundational knowledge and analytical skills necessary to prevent, mitigate and respond to cyber security threats. You'll learn how to recommend best practices for planning, implementing and managing enterprise-level security and system integrity and develop organizational policies and procedures to evaluate and manage potential security threats related to human behaviors.
As a private, nonprofit university, SNHU has one mission – to help you see yourself succeed. The benefits of earning your MS in IT at SNHU include:
Acceptance decisions are made on a rolling basis throughout the year for our five graduate terms. You can apply at any time and get a decision within days of submitting all required materials. To apply, simply contact an admission counselor, who can help you explore financial options. Your counselor can also walk you through the application process, which involves completing a graduate application ($40 fee) and providing undergraduate transcripts.
Candidates must also submit a professional resume.
Occupations related to information and cyber security are in very high demand. The U.S. Bureau of Labor Statistics projects positions as an information security analyst will grow by 37 percent through 2022. Use your master’s in information security degree to launch a cyber security career in a variety of roles, including information security specialist, network firewall security analyst, security administrator, security architect, system security technician and web security analyst.
This unique master’s program reinforces your foundation in IT principles while enhancing your cyber security skills and experience. Courses are taught by knowledgeable faculty with years of real-world, hands-on experience.
This course explores the basic concepts and prepares students with the foundation skills for the protection of networks, communication, and data, as well as the knowledge base for planning, implementing, and managing enterprise level security and system integrity. Topics include approaches in an organization to prevent, detect and recover from the loss of information, cryptography and its applications, security in networks and distributed environments.
This course examines the human factors present in cyber security related to ethics, integrity, practices, policies and procedures. Students will design information technology security awareness training and optimize information technology organizational factors to foster a healthy security culture within an organization. Additionally, students will recommend mitigation strategies to protect an organization from human behaviors that could potentially cause a security threat.
This course covers the fundamental skills and knowledge in evaluating internal and external threats to network security and design. It includes a broad range of topics from secure network fundamentals, protocols and analysis; threats and vulnerabilities; application, data and host security, access control and identity management. Students who have completed the course will have a full understanding of defensive measures taken to secure their organization's network along with the proper knowledge necessary to comprehend overall network security posture and the basic practices in vulnerability assessment. This course is Lab Intensive.
This course focuses on the principles and practices underlying the analysis, design, implementation and management of information technology systems. Topics include information system development methodologies, systems planning, requirements analysis, systems implementation, software engineering, project management, and interface, database and process design.
This course provides a comprehensive introduction to the principles and practices of object- oriented software development and provides a foundation for developing quality software. Students develop skills in applying object- oriented concepts to solve software problems and implement solutions. The course also teaches the concepts and design of algorithms for problem solving and includes the topics of data structures as they are related to the algorithms that use them. The course provides the technical foundation necessary to handle the material covered in the subsequent IT courses.
In this course, students strengthen their understanding of leadership theory and ethical frameworks in the context of a technology enterprise. Students will apply this understanding to business cases that reflect the need for innovative technology solutions in today's workplace in order to transform the thinking of an organization when change is required or to develop ideas that enable new business strategies.
The course focuses on the essential oral and written technical communication skills needed for producing technical documentation and presentations in many different forms for varying business situations. The course enables students to understand the needs of stakeholders in order to develop different technical documents such as white papers, design specifications, project plans, test plans, user manuals, etc. The ability to communicate research findings using appropriate academic formatting will also be addressed.
This course focuses on computer architecture and the operating systems of digital computers. Students learn about the operational methods of hardware; the services provided by operating systems' software; acquisition, processing, storage and output data; and the interaction between computers. Topics include widely used operating systems such as DOS, Windows, and UNIX.
This course introduces the students to the principles and practices necessary to be an effective IT project manager. The course covers project scope, time, cost, quality and human resource management techniques as applied to the kinds of project management problems and issues unique to the IT environment. Students learn how to design an actual IT project structure and will obtain hands-on experience using project management software. Emphasis is on the techniques of project management, leadership, teamwork and project risk management as applied to the IT environment. Case work is an important part of this course.
Telecommunications is a business resource that must be well managed. This includes the technical aspects and the application of telecommunications technology to solve specific business problems and enhance the strategic position of a business enterprise. Topics include the importance of telecommunication in today's business environment, the analysis, design and implementation of telecommunications systems, the scope of the telecommunications industry and current trends; telecommunications hardware, the OSI network model, networking technologies and telecommunications software, protocols and standards.
This course is a study of the design, development and implementation of database management systems (DBMS) that emphasize relational DBMS architecture using SQL. Students will design and implement projects and complete case exercises as they are introduced to new developments in database design.
This capstone course is the culminating experience for the M.S. in Information Technology program. The aim of the capstone is to assess students' ability to synthesize and integrate the knowledge and skills they have developed throughout their coursework, rather than introducing new concepts. This course is structured to support student success in fulfilling program requirements.
For those who do not meet the minimum requirements, the following courses may be required:
This course familiarizes students with the basic concepts of information systems to strengthen their knowledge of hardware and software systems, including supporting information technology infrastructures. Students will gain an understanding of the application of fundamental information technology competencies related to computer networks, software and delivery systems for delivering products and service within an enterprise to customers, suppliers and clients. Additionally, students examine the skills and dispositions that shape their professional identities.
CD/DVD drive. External hard drive. Extra power cord. Headphones/earbuds
Tuition rates for SNHU's online degree programs are among the lowest in the nation. We offer a 25 percent tuition discount for active-duty service members and their spouses.
Application Fee ($40), Graduation Fee ($150), Books (course-by-course)
Southern New Hampshire University is a private, nonprofit institution accredited by the New England Association of Schools and Colleges as well as several other accrediting bodies. More...