An Illinois Tech student works on code

Cybersecurity (M.A.S.)

Master technical skills and build the legal fluency to defend against every attack in our flexible master of cybersecurity program.

Bridge Technical Skill with Legal Know-How to Become a Security Leader in Illinois Tech’s M.A.S. in Cybersecurity

Technology in all forms is constantly under attack, and these threats continue to evolve in new and challenging ways. Equipping yourself with the technical depth and legal fluency to understand and defend against these threats prepares you become a cybersecurity leader for both today and tomorrow. Illinois Tech’s M.A.S. in Cybersecurity unifies the technical rigor of information technology management, computer science, and electrical and computer engineering with the strategic and legal dimensions of cybersecurity law and policy to help you develop a well-rounded cybersecurity toolkit in a program offered by a university that is designated as a National Center of Academic Excellence in Cybersecurity by United States Department of Homeland Security and National Security Agency. You can also choose from one of seven specialized tracks—cybersecurity management, cybersecurity technology, digital forensics, computer engineering, power and energy, computer science, and law and policy—to enhance your skill set in ways that will set you apart from your peers, propelling you become a leader in a rapidly evolving cyber landscape.

Program Overview

Gain a foundation in data and information security, software and hardware security, systems and network security, and secure application specific infrastructure to be workforce-ready. Learn to defend against security-related risks while understanding how to increase data and systems protection, plan security measures, and recognize the potential legal and ethical issues by tackling real-world threat scenarios through hands-on labs, live attack-and-defend exercises, and other projects.

  • Hybrid Delivery with Online Primary Courses
  • 12–18 Month Degree Completion
  • STEM-Designated and CAE-Aligned
  • Seven unique specialized tracks (learn more below) to fine-tune your expertise

Career Opportunities

Prepare for high-impact roles in a multitude of sectors, ranging from federal law enforcement to critical infrastructure protection. Focus on developing tangible skills that allow you to step directly into leadership and operational roles.

Careers in cybersecurity are among the fastest growing in the United States, and they rank as the #2 Best Tech Job, #3 Best STEM Job, and #4 on the Best 100 Jobs, according to U.S. News & World Report.

Prepare for a variety of cybersecurity roles:

  • Digital Forensic Analyst
  • Incident Response Specialist
  • Cybersecurity Analyst
Disclaimer for prospective students, please read.
The information provided is sourced from a third party, Lightcast, and is provided here for informational and educational purposes only. Please be advised that the inclusion of the Lightcast resource on this website does not imply endorsement by Illinois Institute of Technology (Illinois Tech), nor is it a guarantee of the accuracy of this information. Illinois Tech makes no representation, warranty or guarantee, express or implied, that the information presented herein is reflective of the outcomes you can expect if you enroll in or graduate from an Illinois Tech program. Illinois Tech expressly disclaims any liability regarding Lightcast, or in connection with any actual or potential employment opportunity stemming from information on this site and you hereby irrevocably waive any claim(s) against the Illinois Tech for the same. Your use of this web page is an acknowledgement of your understanding and acceptance of the terms and conditions set forth herein. You are encouraged to conduct your own thorough research into job opportunities and outcomes in your field of study.

Build an expertise in cybersecurity through courses such as these: 

ITMS 583 Digital Evidence
In this course, you’ll learn about the fundamental principles and concepts in order to conduct investigations in the digital realm. You will also explore the process and methods of obtaining, preserving, and presenting digital information for use as evidence in civil, criminal, or administrative cases. Other topics covered in this course include legal concepts and terminology, ethics, computer crime, investigative procedures, chain of custody, digital evidence controls, processing crime and incident scenes, data acquisition, email investigations, applicable case law, and serving as an expert witness in a judicial or administrative proceeding.

ITMS 527 AI for Cybersecurity
Gain the knowledge and skills necessary to understand, implement, and leverage artificial intelligence techniques within cybersecurity. In an era where cyber threats continue to evolve and grow in complexity, AI has emerged as a powerful tool to defend against and mitigate these threats. This course explores the intersection of AI and cybersecurity, providing a comprehensive understanding of how AI technologies can be used to protect computing systems. By the end of this course, you will be well-equipped to leverage AI to enhance your cybersecurity efforts, making it a valuable asset in the ever-evolving landscape of digital security.

ITMS 564 Cloud Computing Security
You’ll learn how to effectively secure cloud-based services and infrastructure in an enterprise setting in this course. Among the topics that will be covered include the design principles of secure cloud computing, data security, platform and infrastructure security, application security and the Secure Software Development Life Cycle and DevSecOps processes, and security operations. This course will also cover the legal, risk, and compliance aspects of cloud computing, all in the context of a set of industry-standard learning domains.

 

 

Master of  Cybersecurity

REQUIREMENT

CREDITS

Minimum Degree Credits

30

Minimum Foundational Course Credits

12

Minimum 500-Level / Graduate Law Credits

24

Maximum 400-Level Credits

9

Requirements

 

CODE

TITLE

CREDIT HOURS

Foundational Courses

(12)

Master of Cybersecurity students must take at least 1 course in each foundational area.

 

CS 528

Data Privacy and Security

3

or CS 558

Advanced Computer Security

ECE 518

Computer Cyber Security

3

or ECE 543

Computer Network Security

ITMS 548

Cyber Security Technologies

3

or ITMS 578

Cyber Security Management

LAW 478

Computer & Network Privacy

3

or LAW 252

Law of Privacy

Tracks

(18)

Select 18 credit hours from one of the following tracks:

18

COMPUTER ENGINEERING TRACK

 

Offered by the Department of Electrical and Computer Engineering

 

ECE Cybersecurity Core Courses (select minimum 6 credit hours)

 

ECE 420

Analytical Methods for Power System Economics and Cybersecurity

3

ECE 518

Computer Cyber Security (required) 1

3

ECE 543

Computer Network Security (required) 1

3

ECE 546

Wireless Network Security

3

ECE 572

Secure Machine Learning Design and Applications 

3

ECE 586

Hardware Security and Advanced Computer Architectures

3

ECE 597

Special Problems

3

ECE Cybersecurity Elective Courses (select minimum 6 credit hours)

 

ECE 420

Analytical Methods for Power System Economics and Cybersecurity

3

ECE 503

5G Wireless Network: Architecture, New Radio, and Security

3

ECE 510

Internet of Things and Cyber Physical Systems

3

ECE 517

Modern Wireless Network Protocols and Standards

3

ECE 541

Communications Networks Performance Analysis

3

ECE 543

Computer Network Security

3

ECE 545

Modern Internet Technologies

3

ECE 546

Wireless Network Security

3

ECE 565

Computer Vision and Image Processing

3

ECE 572

Secure Machine Learning Design and Applications 

3

ECE 573

Cloud Computing and Cloud Native Systems

3

ECE 574

Data Science for Engineers

3

ECE 581

Elements of Smart Grid

3

ECE 586

Hardware Security and Advanced Computer Architectures

3

ECE 590

Object-Oriented Programming and Machine Learning

3

ECE 597

Special Problems

3

General Cybersecurity Elective Courses (select 0 to 1 course - advisor approved)

 

Option to select 0-3 credit hours

 

LAW 478

Computer & Network Privacy

3

LAW 252

Law of Privacy

3

LAW 379

Blockchain and the Law

2

ITMS 548

Cyber Security Technologies

3

ITMS 578

Cyber Security Management

3

CS 528

Data Privacy and Security

3

CS 558

Advanced Computer Security

3

ECE General Elective Courses (select 0 to 2 courses - advisor approved)

 

Option to select 0-8 credit hours

 

ECE 403

Digital and Data Communication Systems

3

ECE 408

Introduction to Computer Networks

3

ECE 437

Digital Signal Processing I

3

ECE 441

Smart and Connected Embedded System Design

4

ECE 446

Advanced Logic Design

4

ECE 460

Introduction to Signals and Systems for Advanced Studies 2

3

ECE 461

Introduction to Probability and Random Variables for Advanced Studies 2

3

ECE 501

Artificial Intelligence and Edge Computing

3

ECE 504

Wireless Communication System Design

3

ECE 508

Video Communications

3

ECE 511

Analysis of Random Signals

3

ECE 513

Communication Engineering Fundamentals

3

ECE 515

Modern Digital Communications

3

ECE 519

Coding for Reliable Communications

3

ECE 542

Design and Optimization of Computer Networks

3

ECE 544

Wireless and Mobile Networks

3

ECE 563

Artificial Intelligence in Smart Grid

3

ECE 566

Machine and Deep Learning

3

ECE 569

Digital Signal Processing II

3

ECE 570

Fiber-Optic Communication Systems

3

ECE 579

Operations and Planning and Distributed Power Grid

3

ECE 580

Elements of Sustainable Energy

3

ECE 582

Microgrid Design and Operation

3

ECE 585

Computer Organization and Design

3

POWER AND ENERGY TRACK

 

Offered by the Department of Electrical and Computer Engineering

18

ECE Cybersecurity Power and Energy Specialization Required Courses

 

Select 12 credit hours

 

ECE 420

Analytical Methods for Power System Economics and Cybersecurity

3

ECE 510

Internet of Things and Cyber Physical Systems

3

ECE 518

Computer Cyber Security (required) 1

3

ECE 543

Computer Network Security (required) 1

3

ECE 597

Special Problems

3

ECE Cybersecurity Elective Courses (select minimum 6 credit hours)

 

Select 6 credit hours

 

ECE 408

Introduction to Computer Networks

3

ECE 460

Introduction to Signals and Systems for Advanced Studies 2

3

ECE 461

Introduction to Probability and Random Variables for Advanced Studies 2

3

ECE 503

5G Wireless Network: Architecture, New Radio, and Security

3

ECE 517

Modern Wireless Network Protocols and Standards

3

ECE 520

Information Theory and Applications

3

ECE 528

Application Software Design

3

ECE 541

Communications Networks Performance Analysis

3

ECE 545

Modern Internet Technologies

3

ECE 546

Wireless Network Security

3

ECE 563

Artificial Intelligence in Smart Grid

3

ECE 565

Computer Vision and Image Processing

3

ECE 573

Cloud Computing and Cloud Native Systems

3

ECE 581

Elements of Smart Grid

3

ECE 586

Hardware Security and Advanced Computer Architectures

3

ECE 590

Object-Oriented Programming and Machine Learning

3

COMPUTER SCIENCE TRACK

 

Offered by the Department of Computer Science

18

CS Security Core Courses

 

Select 6 credit hours

 

CS 458

Introduction to Information Security

3

CS 527

Software Security

3

CS 528

Data Privacy and Security

3

CS 549

Cryptography and Network Security

3

CS 557

Cyber-Physical Systems Security and Design

3

CS 558

Advanced Computer Security

3

CS 559

Biometrics

3

CSP 544

System and Network Security

3

CS Security Elective Courses

 

Select 3 credit hours

 

CS 458

Introduction to Information Security

3

CS 520

Data Integration, Warehousing, and Provenance

3

CS 522

Advanced Data Mining

3

CS 525

Advanced Database Organization

3

CS 527

Software Security

3

CS 528

Data Privacy and Security

3

CS 544

Computer Networks II: Network Services

3

CS 549

Cryptography and Network Security

3

CS 550

Advanced Operating Systems

3

CS 551

Operating System Design and Implementation

3

CS 556

Cyber-Physical Systems: Languages and Systems

3

CS 557

Cyber-Physical Systems Security and Design

3

CS 558

Advanced Computer Security

3

CS 559

Biometrics

3

CS 562

Virtual Machines

3

CS 579

Online Social Network Analysis

3

CS 584

Machine Learning

3

CS 586

Software Systems Architectures

3

CS 589

Software Testing and Analysis

3

CSP 544

System and Network Security

3

CS Electives

 

Select 9 credit hours of 400-level and above CS or CSP courses 3

 

Students without a prior degree in computer science may be required to take some or all of the following courses: CS 201CS 401CS 402, and any other necessary prerequisites. This will likely increase the duration of the degree for such students.

 

CYBERSECURITY MANAGEMENT TRACK

 

Offered by the Department of Information Technology and Management

18

Select the following Foundational Course

 

ITMS 578

Cyber Security Management

3

Select 15 credit hours

 

ITMS 514

Programming for Cybersecurity Analytics

3

ITMS 518

Coding Security

3

ITMS 527

AI for Cybersecurity

3

ITMS 534

Human Factors in Cybersecurity

3

ITMS 557

Introduction to Cyber Warfare

3

ITMS 564

Cloud Computing Security

3

ITMS 579

Topics in Information Security

3-9

ITMS 584

Governance, Risk, and Compliance

3

ITMS 588

Incident Response, Disaster Recovery, and Business Continuity

3

ITMM 537

Vendor Management and Service Level Agreements

3

ITMM 585

Legal and Ethical Issues in Information Technology

3

ITMM 586

Information Technology Auditing

3

Select 3 credit hours of Cybersecurity or Cybersecurity-related elective courses

 

Graduate courses from the College of Computing, Armour College of Engineering or Chicago-Kent College of Law

 

CYBERSECURITY TECHNOLOGY TRACK

 

Offered by the Department of Information Technology and Management

18

Select the following Foundational Course

 

ITMS 548

Cyber Security Technologies

3

Select 15 credit hours

 

ITMS 514

Programming for Cybersecurity Analytics

3

ITMS 527

AI for Cybersecurity

3

ITMS 528

Database Security

3

ITMS 534

Human Factors in Cybersecurity

3

ITMS 546

Active Cyber Defense

3

ITMS 549

Cyber Security Technologies: Projects & Advanced Methods

3

ITMS 558

Operating Systems Security

3

ITMS 564

Cloud Computing Security

3

ITMM 585

Legal and Ethical Issues in Information Technology

3

ITMO 517

Shell Scripting for System Administration

3

ITMO 556

Introduction to Open Source Software

3

Select 3 credit hours of Cybersecurity or Cybersecurity-related elective courses

 

Graduate courses from the College of Computing, Armour College of Engineering or Chicago-Kent College of Law

 

DIGITAL FORENSICS TRACK

 

Offered by the Department of Information Technology and Management 

18

Select the following Foundational Courses

 

ITMS 548

Cyber Security Technologies

3

LAW 478

Computer & Network Privacy

3

Required Courses

 

ITMS 538

Cyber Forensics

3

ITMS 555

Mobile Device Forensics

3

ITMS 583

Digital Evidence

3

Select 6 credit hours

 

ITMS 534

Human Factors in Cybersecurity

3

ITMS 539

Steganography

3

ITMS 543

Vulnerability Analysis and Control

3

ITMS 557

Introduction to Cyber Warfare

3

ITMS 579

Topics in Information Security

3-9

ITMM 585

Legal and Ethical Issues in Information Technology

3

ITMO 517

Shell Scripting for System Administration

3

ITMO 556

Introduction to Open Source Software

3

Select 3 credit hours of Cybersecurity or Cybersecurity-related elective courses

 

Graduate courses from the College of Computing, Armour College of Engineering or Chicago-Kent College of Law

 

LAW AND POLICY TRACK

 

Offered by Chicago-Kent College of Law

18

Select 12 credit hours

 

LAW 215

E Commerce

2,3

LAW 231

Legal Analytics 1

2

LAW 248

Emerging Technologies

2

LAW 252

Law of Privacy

3

LAW 379

Blockchain and the Law

2

LAW 478

Computer & Network Privacy

3

LAW 493

Legal Analytics 2

2

LAW 496

Programming for Lawyers

1,2

LAW 660

Privacy Rights in Employment

2

Select 6 credit hours of Cybersecurity or Cybersecurity-related elective courses

 

Graduate courses from the College of Computing, Armour College of Engineering or Chicago-Kent College of Law

 

Total Credit Hours

30

Course List

ECE 518 or ECE 543 will be counted towards Foundational ECE courses

Credit will be given only to students without the background of Computer or Electrical Engineering

This excludes: CS 401CS 402CS 403CS 406CS 491CS 497CS 591CS 691 and CS 695.

All foundational and security elective courses must be satisfied by courses taken at Illinois Institute of Technology. Courses transferred from other universities can be used only as electives.

Some tracks have required foundational course selections.

Students without a prior degree, significant coursework, or certifications in computing may be required to take some or all of the following courses: CS 201CS 401CS 402ECE 407ECE 408ITMD 504ITMO 503, and any other necessary prerequisites. This will likely increase the duration of the degree for such students.

 

You must complete the Illinois Tech graduate application, regardless of which graduate program you wish to pursue. Visit our admission website to learn more about what information and documents you need to apply.

Please note that each college and individual programs may have additional requirements to apply.

Tuition and Fees

Learn more about the university’s general tuition and fees, visit the Student Accounting website.

Cedric Nartey standing with a laptop

Cedric N. Says...

“Myself and a couple of my colleagues received a grant from Motorola Solutions in order to generate a prototype, and we ended up generating an AI-powered intrusion system. We were able to able to present some of the results of the research that we did [to Motorola Solutions].” 
—Cedric Nartey (ITM, M.A.S. CYF 3rd Year)

Featured Faculty

Maurice Dawson
Associate Professor Director, Center for Cyber Security and Forensics Education
Richard Warner
Professor of Law
Nik Sultana
Assistant Professor of Computer Science
Alexander Rabanal
Assistant Teaching Professor
Assistant Professor of Computer Science Yanxue Jia
Assistant Professor of Computer Science
Adam Weber
Associate Teaching Professor Associate Dean for LL.M. and International Programs
Yousef Elmehdwi
Associate Chair Associate Teaching Professor of Computer Science

Pick Your Path

As part of the M.A.S. in Cybersecurity, you are able to choose one of seven specialized tracks that allows you to focus more on an area of cybersecurity that is of most interest to you. Learn more about each track below: 

Computer Engineering Track

The computer engineering track provides you with a rigorous foundation in hardware and software protection, data security, cloud computing, and computer network security. This interdisciplinary program combines technical expertise with strategic insight, preparing students to design resilient systems and navigate complex legal and ethical challenges.  

Power and Energy Track

The power and energy track provides you with a comprehensive foundation in power system economics, secure smart grids, and the integration of artificial intelligence within energy infrastructures. The curriculum bridges cyber and physical systems, covering key topics such as power distribution, Internet of Things, wireless network protocols, and data security.

Computer Science

The computer science track will help you gain a deep understanding of data and information security, hardware and software security, and systems and network security. You’ll develop the skills and knowledge to mitigate cyber risks while increasing data and systems protection, planning security measures, and recognizing potential legal and ethical issues.

Cybersecurity Management

The cybersecurity management track is designed to help you launch graduates into the roles that organizations are most urgently hiring for. The program’s foundational curriculum ensures every student develops fluency across technical, legal, and managerial dimensions simultaneously, while the cybersecurity management track’s elective core enables you to gain expertise in artificial intelligence-driven threat detection; cloud security architecture; governance, risk, and compliance frameworks; and incident response and business continuity planning, capabilities that map directly to roles such as chief information security officer, security analyst, governance, risk, and compliance analyst, cloud security engineer, and an information technology risk manager.

Cybersecurity Technology

The cybersecurity technology track is designed to help you work at the technical forefront of defending modern digital infrastructure. The program’s foundational courses establish a rigorous baseline across data privacy, computer security, and legal frameworks, ensuring that you understand not just how attacks happen but the regulatory and ethical landscape surrounding them. Students develop expertise in active cyber defense, operating systems security, cloud computing security, and database security, while also building programming fluency tailored specifically to cybersecurity analytics and automation through courses in shell scripting and open source systems. The integration of artificial intelligence for cybersecurity will prepare you to leverage machine learning in threat detection and response, a capability that is rapidly becoming a baseline expectation for senior technical roles.

Digital Forensics

The digital forensics track is designed to prepare you to uncover, preserve, and present digital evidence in both corporate and law enforcement contexts. The program’s foundational courses build a strong technical and legal baseline that spans advanced computer security, network security, cybersecurity technologies, and computer and network privacy law, ensuring that forensic work is conducted with both technical precision and evidentiary integrity from the start. The track’s three required core courses mirror the actual workflow of a digital forensics investigation, from device acquisition through courtroom-ready evidence handling. You’ll also have access to legal and ethical coursework, along with elective courses provided by Chicago-Kent College of Law, that will help set you apart, as forensic professionals are routinely called upon to testify, advise counsel, and navigate complex chain-of-custody requirements that demand legal literacy as technical skill.

Law and Policy

The law and policy track offers lawyers and non-lawyers a systematic investigation of the interaction between law and cybersecurity. Sound cybersecurity management requires an understanding of that interaction. This track creates that understanding through a combination of law and technical courses, which identify problems and issues and emphasize practical solutions as well as provide a general conceptual framework that enables you to solve new problems as they arise. 

Get In Touch

To learn more about this program, please reach out to Associate Professor Maurice Dawson at mdawson2@illinoistech.edu.