Two women work on code

Cyber Forensics and Security (M.A.S.)

Request Info Visit Apply

The Master of Cyber Forensics and Security is cross-disciplinary program that focuses on technology, management, compliance, and legal issues. It can be completed entirely online. The program is designed to help students and experienced information technology professionals become cybersecurity and forensics practitioners, investigators, managers, and leaders. The program's curriculum emphasizes a comprehensive understanding of issues such as information security; information assurance; ethical hacking; vulnerability analysis and control; securing databases; steganography; mobile device forensics; operating system security; business continuity response; disaster recovery; legal and ethical issues; auditing; evidence; intrusion detection; and forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence.

Program Overview

The Master of Cyber Forensics and Security is cross-disciplinary program that focuses on technology, management, compliance, and legal issues, and is designed to help students and experienced information technology professionals become cybersecurity and forensics practitioners, investigators, managers, and leaders.

Career Opportunities

At the conclusion of their studies, graduates of the Master of Cyber Forensics and Security program can fill roles such as:

  • Information security officer
  • Security manager
  • Security administrator
  • Cybersecurity analyst
  • Cybersecurity specialist
  • Computer forensic examiner
  • Forensic analyst
  • Vulnerability researcher/exploit developer

Students in this program must be admitted to Illinois Tech. Previous coursework or experience in technology is helpful but not required.

Program Objectives

Master of Science in Information Technology and Management Program Educational Objectives

At the conclusion of their studies, graduates of the Master of Science in Information Technology and Management should be able to:

  • Deliver optimal technical and policy technology solutions for the problems of business, industry, government, non-profit organizations, and individuals in each student’s particular area of focus.
  • Work with, lead, and manage teams in an enterprise environment to collaboratively arrive at optimal technology solutions.
  • Manage and deploy information resources applicable to each student’s particular area of focus in an enterprise setting.
  • Conduct and report on significant research in information technology and/or the management of information technology.

The United States Department of Homeland Security and the National Security Agency have designated Illinois Institute of Technology as a National Center of Academic Excellence in Cyber Defense Education.