Cybersecurity (M.A.S.)
Master technical skills and build the legal fluency to defend against every attack in our flexible master of cybersecurity program.
Bridge Technical Skill with Legal Know-How to Become a Security Leader in Illinois Tech’s M.A.S. in Cybersecurity
Technology in all forms is constantly under attack, and these threats continue to evolve in new and challenging ways. Equipping yourself with the technical depth and legal fluency to understand and defend against these threats prepares you become a cybersecurity leader for both today and tomorrow. Illinois Tech’s M.A.S. in Cybersecurity unifies the technical rigor of information technology management, computer science, and electrical and computer engineering with the strategic and legal dimensions of cybersecurity law and policy to help you develop a well-rounded cybersecurity toolkit in a program offered by a university that is designated as a National Center of Academic Excellence in Cybersecurity by United States Department of Homeland Security and National Security Agency. You can also choose from one of seven specialized tracks—cybersecurity management, cybersecurity technology, digital forensics, computer engineering, power and energy, computer science, and law and policy—to enhance your skill set in ways that will set you apart from your peers, propelling you become a leader in a rapidly evolving cyber landscape.
Program Overview
Gain a foundation in data and information security, software and hardware security, systems and network security, and secure application specific infrastructure to be workforce-ready. Learn to defend against security-related risks while understanding how to increase data and systems protection, plan security measures, and recognize the potential legal and ethical issues by tackling real-world threat scenarios through hands-on labs, live attack-and-defend exercises, and other projects.
- Hybrid Delivery with Online Primary Courses
- 12–18 Month Degree Completion
- STEM-Designated and CAE-Aligned
- Seven unique specialized tracks (learn more below) to fine-tune your expertise
Career Opportunities
Prepare for high-impact roles in a multitude of sectors, ranging from federal law enforcement to critical infrastructure protection. Focus on developing tangible skills that allow you to step directly into leadership and operational roles.
Careers in cybersecurity are among the fastest growing in the United States, and they rank as the #2 Best Tech Job, #3 Best STEM Job, and #4 on the Best 100 Jobs, according to U.S. News & World Report.
Prepare for a variety of cybersecurity roles:
- Digital Forensic Analyst
- Incident Response Specialist
- Cybersecurity Analyst
Build an expertise in cybersecurity through courses such as these:
ITMS 583 Digital Evidence
In this course, you’ll learn about the fundamental principles and concepts in order to conduct investigations in the digital realm. You will also explore the process and methods of obtaining, preserving, and presenting digital information for use as evidence in civil, criminal, or administrative cases. Other topics covered in this course include legal concepts and terminology, ethics, computer crime, investigative procedures, chain of custody, digital evidence controls, processing crime and incident scenes, data acquisition, email investigations, applicable case law, and serving as an expert witness in a judicial or administrative proceeding.
ITMS 527 AI for Cybersecurity
Gain the knowledge and skills necessary to understand, implement, and leverage artificial intelligence techniques within cybersecurity. In an era where cyber threats continue to evolve and grow in complexity, AI has emerged as a powerful tool to defend against and mitigate these threats. This course explores the intersection of AI and cybersecurity, providing a comprehensive understanding of how AI technologies can be used to protect computing systems. By the end of this course, you will be well-equipped to leverage AI to enhance your cybersecurity efforts, making it a valuable asset in the ever-evolving landscape of digital security.
ITMS 564 Cloud Computing Security
You’ll learn how to effectively secure cloud-based services and infrastructure in an enterprise setting in this course. Among the topics that will be covered include the design principles of secure cloud computing, data security, platform and infrastructure security, application security and the Secure Software Development Life Cycle and DevSecOps processes, and security operations. This course will also cover the legal, risk, and compliance aspects of cloud computing, all in the context of a set of industry-standard learning domains.
Master of Cybersecurity
REQUIREMENT | CREDITS |
|---|---|
Minimum Degree Credits | 30 |
Minimum Foundational Course Credits | 12 |
Minimum 500-Level / Graduate Law Credits | 24 |
Maximum 400-Level Credits | 9 |
Requirements | |
CODE | TITLE | CREDIT HOURS |
|---|---|---|
Foundational Courses | (12) | |
Master of Cybersecurity students must take at least 1 course in each foundational area. | ||
Data Privacy and Security | 3 | |
or CS 558 | Advanced Computer Security | |
Computer Cyber Security | 3 | |
or ECE 543 | Computer Network Security | |
Cyber Security Technologies | 3 | |
or ITMS 578 | Cyber Security Management | |
Computer & Network Privacy | 3 | |
or LAW 252 | Law of Privacy | |
Tracks | (18) | |
Select 18 credit hours from one of the following tracks: | 18 | |
COMPUTER ENGINEERING TRACK | ||
Offered by the Department of Electrical and Computer Engineering | ||
ECE Cybersecurity Core Courses (select minimum 6 credit hours) | ||
Analytical Methods for Power System Economics and Cybersecurity | 3 | |
Computer Cyber Security (required) 1 | 3 | |
Computer Network Security (required) 1 | 3 | |
Wireless Network Security | 3 | |
Secure Machine Learning Design and Applications | 3 | |
Hardware Security and Advanced Computer Architectures | 3 | |
Special Problems | 3 | |
ECE Cybersecurity Elective Courses (select minimum 6 credit hours) | ||
Analytical Methods for Power System Economics and Cybersecurity | 3 | |
5G Wireless Network: Architecture, New Radio, and Security | 3 | |
Internet of Things and Cyber Physical Systems | 3 | |
Modern Wireless Network Protocols and Standards | 3 | |
Communications Networks Performance Analysis | 3 | |
Computer Network Security | 3 | |
Modern Internet Technologies | 3 | |
Wireless Network Security | 3 | |
Computer Vision and Image Processing | 3 | |
Secure Machine Learning Design and Applications | 3 | |
Cloud Computing and Cloud Native Systems | 3 | |
Data Science for Engineers | 3 | |
Elements of Smart Grid | 3 | |
Hardware Security and Advanced Computer Architectures | 3 | |
Object-Oriented Programming and Machine Learning | 3 | |
Special Problems | 3 | |
General Cybersecurity Elective Courses (select 0 to 1 course - advisor approved) | ||
Option to select 0-3 credit hours | ||
Computer & Network Privacy | 3 | |
Law of Privacy | 3 | |
Blockchain and the Law | 2 | |
Cyber Security Technologies | 3 | |
Cyber Security Management | 3 | |
Data Privacy and Security | 3 | |
Advanced Computer Security | 3 | |
ECE General Elective Courses (select 0 to 2 courses - advisor approved) | ||
Option to select 0-8 credit hours | ||
Digital and Data Communication Systems | 3 | |
Introduction to Computer Networks | 3 | |
Digital Signal Processing I | 3 | |
Smart and Connected Embedded System Design | 4 | |
Advanced Logic Design | 4 | |
Introduction to Signals and Systems for Advanced Studies 2 | 3 | |
Introduction to Probability and Random Variables for Advanced Studies 2 | 3 | |
Artificial Intelligence and Edge Computing | 3 | |
Wireless Communication System Design | 3 | |
Video Communications | 3 | |
Analysis of Random Signals | 3 | |
Communication Engineering Fundamentals | 3 | |
Modern Digital Communications | 3 | |
Coding for Reliable Communications | 3 | |
Design and Optimization of Computer Networks | 3 | |
Wireless and Mobile Networks | 3 | |
Artificial Intelligence in Smart Grid | 3 | |
Machine and Deep Learning | 3 | |
Digital Signal Processing II | 3 | |
Fiber-Optic Communication Systems | 3 | |
Operations and Planning and Distributed Power Grid | 3 | |
Elements of Sustainable Energy | 3 | |
Microgrid Design and Operation | 3 | |
Computer Organization and Design | 3 | |
POWER AND ENERGY TRACK | ||
Offered by the Department of Electrical and Computer Engineering | 18 | |
ECE Cybersecurity Power and Energy Specialization Required Courses | ||
Select 12 credit hours | ||
Analytical Methods for Power System Economics and Cybersecurity | 3 | |
Internet of Things and Cyber Physical Systems | 3 | |
Computer Cyber Security (required) 1 | 3 | |
Computer Network Security (required) 1 | 3 | |
Special Problems | 3 | |
ECE Cybersecurity Elective Courses (select minimum 6 credit hours) | ||
Select 6 credit hours | ||
Introduction to Computer Networks | 3 | |
Introduction to Signals and Systems for Advanced Studies 2 | 3 | |
Introduction to Probability and Random Variables for Advanced Studies 2 | 3 | |
5G Wireless Network: Architecture, New Radio, and Security | 3 | |
Modern Wireless Network Protocols and Standards | 3 | |
Information Theory and Applications | 3 | |
Application Software Design | 3 | |
Communications Networks Performance Analysis | 3 | |
Modern Internet Technologies | 3 | |
Wireless Network Security | 3 | |
Artificial Intelligence in Smart Grid | 3 | |
Computer Vision and Image Processing | 3 | |
Cloud Computing and Cloud Native Systems | 3 | |
Elements of Smart Grid | 3 | |
Hardware Security and Advanced Computer Architectures | 3 | |
Object-Oriented Programming and Machine Learning | 3 | |
COMPUTER SCIENCE TRACK | ||
Offered by the Department of Computer Science | 18 | |
CS Security Core Courses | ||
Select 6 credit hours | ||
Introduction to Information Security | 3 | |
Software Security | 3 | |
Data Privacy and Security | 3 | |
Cryptography and Network Security | 3 | |
Cyber-Physical Systems Security and Design | 3 | |
Advanced Computer Security | 3 | |
Biometrics | 3 | |
System and Network Security | 3 | |
CS Security Elective Courses | ||
Select 3 credit hours | ||
Introduction to Information Security | 3 | |
Data Integration, Warehousing, and Provenance | 3 | |
Advanced Data Mining | 3 | |
Advanced Database Organization | 3 | |
Software Security | 3 | |
Data Privacy and Security | 3 | |
Computer Networks II: Network Services | 3 | |
Cryptography and Network Security | 3 | |
Advanced Operating Systems | 3 | |
Operating System Design and Implementation | 3 | |
Cyber-Physical Systems: Languages and Systems | 3 | |
Cyber-Physical Systems Security and Design | 3 | |
Advanced Computer Security | 3 | |
Biometrics | 3 | |
Virtual Machines | 3 | |
Online Social Network Analysis | 3 | |
Machine Learning | 3 | |
Software Systems Architectures | 3 | |
Software Testing and Analysis | 3 | |
System and Network Security | 3 | |
CS Electives | ||
Select 9 credit hours of 400-level and above CS or CSP courses 3 | ||
Students without a prior degree in computer science may be required to take some or all of the following courses: CS 201, CS 401, CS 402, and any other necessary prerequisites. This will likely increase the duration of the degree for such students. | ||
CYBERSECURITY MANAGEMENT TRACK | ||
Offered by the Department of Information Technology and Management | 18 | |
Select the following Foundational Course | ||
Cyber Security Management | 3 | |
Select 15 credit hours | ||
Programming for Cybersecurity Analytics | 3 | |
Coding Security | 3 | |
AI for Cybersecurity | 3 | |
Human Factors in Cybersecurity | 3 | |
Introduction to Cyber Warfare | 3 | |
Cloud Computing Security | 3 | |
Topics in Information Security | 3-9 | |
Governance, Risk, and Compliance | 3 | |
Incident Response, Disaster Recovery, and Business Continuity | 3 | |
Vendor Management and Service Level Agreements | 3 | |
Legal and Ethical Issues in Information Technology | 3 | |
Information Technology Auditing | 3 | |
Select 3 credit hours of Cybersecurity or Cybersecurity-related elective courses | ||
Graduate courses from the College of Computing, Armour College of Engineering or Chicago-Kent College of Law | ||
CYBERSECURITY TECHNOLOGY TRACK | ||
Offered by the Department of Information Technology and Management | 18 | |
Select the following Foundational Course | ||
Cyber Security Technologies | 3 | |
Select 15 credit hours | ||
Programming for Cybersecurity Analytics | 3 | |
AI for Cybersecurity | 3 | |
Database Security | 3 | |
Human Factors in Cybersecurity | 3 | |
Active Cyber Defense | 3 | |
Cyber Security Technologies: Projects & Advanced Methods | 3 | |
Operating Systems Security | 3 | |
Cloud Computing Security | 3 | |
Legal and Ethical Issues in Information Technology | 3 | |
Shell Scripting for System Administration | 3 | |
Introduction to Open Source Software | 3 | |
Select 3 credit hours of Cybersecurity or Cybersecurity-related elective courses | ||
Graduate courses from the College of Computing, Armour College of Engineering or Chicago-Kent College of Law | ||
DIGITAL FORENSICS TRACK | ||
Offered by the Department of Information Technology and Management | 18 | |
Select the following Foundational Courses | ||
Cyber Security Technologies | 3 | |
Computer & Network Privacy | 3 | |
Required Courses | ||
Cyber Forensics | 3 | |
Mobile Device Forensics | 3 | |
Digital Evidence | 3 | |
Select 6 credit hours | ||
Human Factors in Cybersecurity | 3 | |
Steganography | 3 | |
Vulnerability Analysis and Control | 3 | |
Introduction to Cyber Warfare | 3 | |
Topics in Information Security | 3-9 | |
Legal and Ethical Issues in Information Technology | 3 | |
Shell Scripting for System Administration | 3 | |
Introduction to Open Source Software | 3 | |
Select 3 credit hours of Cybersecurity or Cybersecurity-related elective courses | ||
Graduate courses from the College of Computing, Armour College of Engineering or Chicago-Kent College of Law | ||
LAW AND POLICY TRACK | ||
Offered by Chicago-Kent College of Law | 18 | |
Select 12 credit hours | ||
E Commerce | 2,3 | |
Legal Analytics 1 | 2 | |
Emerging Technologies | 2 | |
Law of Privacy | 3 | |
Blockchain and the Law | 2 | |
Computer & Network Privacy | 3 | |
Legal Analytics 2 | 2 | |
Programming for Lawyers | 1,2 | |
Privacy Rights in Employment | 2 | |
Select 6 credit hours of Cybersecurity or Cybersecurity-related elective courses | ||
Graduate courses from the College of Computing, Armour College of Engineering or Chicago-Kent College of Law | ||
Total Credit Hours | 30 | |
Course List | ||
1
ECE 518 or ECE 543 will be counted towards Foundational ECE courses
2
Credit will be given only to students without the background of Computer or Electrical Engineering
3
This excludes: CS 401, CS 402, CS 403, CS 406, CS 491, CS 497, CS 591, CS 691 and CS 695.
All foundational and security elective courses must be satisfied by courses taken at Illinois Institute of Technology. Courses transferred from other universities can be used only as electives.
Some tracks have required foundational course selections.
Students without a prior degree, significant coursework, or certifications in computing may be required to take some or all of the following courses: CS 201, CS 401, CS 402, ECE 407, ECE 408, ITMD 504, ITMO 503, and any other necessary prerequisites. This will likely increase the duration of the degree for such students.
You must complete the Illinois Tech graduate application, regardless of which graduate program you wish to pursue. Visit our admission website to learn more about what information and documents you need to apply.
Please note that each college and individual programs may have additional requirements to apply.
Tuition and Fees
Learn more about the university’s general tuition and fees, visit the Student Accounting website.
Cedric N. Says...
“Myself and a couple of my colleagues received a grant from Motorola Solutions in order to generate a prototype, and we ended up generating an AI-powered intrusion system. We were able to able to present some of the results of the research that we did [to Motorola Solutions].”
—Cedric Nartey (ITM, M.A.S. CYF 3rd Year)
Pick Your Path
As part of the M.A.S. in Cybersecurity, you are able to choose one of seven specialized tracks that allows you to focus more on an area of cybersecurity that is of most interest to you. Learn more about each track below:
Computer Engineering Track
The computer engineering track provides you with a rigorous foundation in hardware and software protection, data security, cloud computing, and computer network security. This interdisciplinary program combines technical expertise with strategic insight, preparing students to design resilient systems and navigate complex legal and ethical challenges.
Power and Energy Track
The power and energy track provides you with a comprehensive foundation in power system economics, secure smart grids, and the integration of artificial intelligence within energy infrastructures. The curriculum bridges cyber and physical systems, covering key topics such as power distribution, Internet of Things, wireless network protocols, and data security.
Computer Science
The computer science track will help you gain a deep understanding of data and information security, hardware and software security, and systems and network security. You’ll develop the skills and knowledge to mitigate cyber risks while increasing data and systems protection, planning security measures, and recognizing potential legal and ethical issues.
Cybersecurity Management
The cybersecurity management track is designed to help you launch graduates into the roles that organizations are most urgently hiring for. The program’s foundational curriculum ensures every student develops fluency across technical, legal, and managerial dimensions simultaneously, while the cybersecurity management track’s elective core enables you to gain expertise in artificial intelligence-driven threat detection; cloud security architecture; governance, risk, and compliance frameworks; and incident response and business continuity planning, capabilities that map directly to roles such as chief information security officer, security analyst, governance, risk, and compliance analyst, cloud security engineer, and an information technology risk manager.
Cybersecurity Technology
The cybersecurity technology track is designed to help you work at the technical forefront of defending modern digital infrastructure. The program’s foundational courses establish a rigorous baseline across data privacy, computer security, and legal frameworks, ensuring that you understand not just how attacks happen but the regulatory and ethical landscape surrounding them. Students develop expertise in active cyber defense, operating systems security, cloud computing security, and database security, while also building programming fluency tailored specifically to cybersecurity analytics and automation through courses in shell scripting and open source systems. The integration of artificial intelligence for cybersecurity will prepare you to leverage machine learning in threat detection and response, a capability that is rapidly becoming a baseline expectation for senior technical roles.
Digital Forensics
The digital forensics track is designed to prepare you to uncover, preserve, and present digital evidence in both corporate and law enforcement contexts. The program’s foundational courses build a strong technical and legal baseline that spans advanced computer security, network security, cybersecurity technologies, and computer and network privacy law, ensuring that forensic work is conducted with both technical precision and evidentiary integrity from the start. The track’s three required core courses mirror the actual workflow of a digital forensics investigation, from device acquisition through courtroom-ready evidence handling. You’ll also have access to legal and ethical coursework, along with elective courses provided by Chicago-Kent College of Law, that will help set you apart, as forensic professionals are routinely called upon to testify, advise counsel, and navigate complex chain-of-custody requirements that demand legal literacy as technical skill.
Law and Policy
The law and policy track offers lawyers and non-lawyers a systematic investigation of the interaction between law and cybersecurity. Sound cybersecurity management requires an understanding of that interaction. This track creates that understanding through a combination of law and technical courses, which identify problems and issues and emphasize practical solutions as well as provide a general conceptual framework that enables you to solve new problems as they arise.
Get In Touch
To learn more about this program, please reach out to Associate Professor Maurice Dawson at mdawson2@illinoistech.edu.