Program Requirements
General Program Requirements:
Number of Credits Required Beyond the Baccalaureate: 30
Required Courses:
Information Technology Auditing Concentration
Code | Title | Credit Hours |
---|---|---|
Core Courses | ||
²Ñ±õ³§Ìý5202 | IT Governance | 3 |
²Ñ±õ³§Ìý5206 | Protection of Information Assets | 3 |
²Ñ±õ³§Ìý5214 | Security Architecture | 3 |
²Ñ±õ³§Ìý5687 | Business Skills for ITACS Professionals I 1 | 1.5 |
²Ñ±õ³§Ìý5688 | Business Skills for ITACS Professionals II 1 | 1.5 |
IT Auditing Concentration Courses 2 | ||
²Ñ±õ³§Ìý5201 | IT Audit Process | 3 |
²Ñ±õ³§Ìý5203 | Systems and Infrastructure Lifecycle Management 1 | 3 |
²Ñ±õ³§Ìý5205 | IT Service Delivery and Support | 3 |
²Ñ±õ³§Ìý5208 | Data Analytics for IT Auditors | 3 |
IT Auditing Elective 3 | ||
Select one from the following: | 3 | |
²Ñ±õ³§Ìý5121 | Enterprise Resource Planning Systems | |
²Ñ±õ³§Ìý5170 | Special Topics | |
²Ñ±õ³§Ìý5182 | Independent Study | |
IT Auditing Capstone Course | ||
²Ñ±õ³§Ìý5902 | IT Auditing Capstone | 3 |
Total Credit Hours | 30 |
- 1
For our partner program with the Beijing National Accounting Institute (BNAI) in China only, students may substitute ²Ñ±õ³§Ìý5287 Business Skills for ITACS Professionals (3 s.h.) for ²Ñ±õ³§Ìý5687 Business Skills for ITACS Professionals I (1.5 s.h.) and ²Ñ±õ³§Ìý5688 Business Skills for ITACS Professionals II (1.5 s.h.).
- 2
²Ñ±õ³§Ìý5122 Enterprise Architecture for IT Auditors (3 s.h.) may also be required of students who are admitted to the program but lack sufficient technical background.
- 3
Students in the Information Technology Auditing concentration alternately may select up to two courses from the Cyber Security concentration and/or in Computer Science and/or Engineering Security as electives. This is done in consultation with the ITACS Program Director.
Cyber Security Concentration
Code | Title | Credit Hours |
---|---|---|
Core Courses | ||
²Ñ±õ³§Ìý5202 | IT Governance | 3 |
²Ñ±õ³§Ìý5206 | Protection of Information Assets | 3 |
²Ñ±õ³§Ìý5214 | Security Architecture | 3 |
²Ñ±õ³§Ìý5687 | Business Skills for ITACS Professionals I | 1.5 |
²Ñ±õ³§Ìý5688 | Business Skills for ITACS Professionals II | 1.5 |
Cyber Security Concentration Courses | ||
²Ñ±õ³§Ìý5211 | Ethical Hacking | 3 |
²Ñ±õ³§Ìý5213 | Intrusion Detection & Response | 3 |
²Ñ±õ³§Ìý5215 | Operating System Security | 3 |
²Ñ±õ³§Ìý5216 | Organizational Forensics | 3 |
²Ñ±õ³§Ìý5217 | Network Security | 3 |
Cyber Security Elective(s) 1 | ||
Select one or more from the following, if desired: 2 | 0 | |
²Ñ±õ³§Ìý5170 | Special Topics | |
²Ñ±õ³§Ìý5182 | Independent Study | |
²Ñ±õ³§Ìý5212 | Penetration Testing | |
Cyber Security Capstone Course | ||
²Ñ±õ³§Ìý5903 | Cyber Security Capstone | 3 |
Total Credit Hours | 30 |
- 1
Students in the Cyber Security concentration alternately may select up to two courses from the Information Technology Auditing concentration and/or in Computer Science and/or Engineering Security as electives. This is done in consultation with the ITACS Program Director.
- 2
Students earn credit for any elective course(s) taken. The Cyber Security concentration does not, however, require completion of an elective to earn the degree.
Culminating Event:
Capstone Course:
The MS ITACS program culminates in a capstone that prepares students to take the appropriate professional certification examination:
- Certified Information Systems Auditor (CISA®)
- Certified Information Systems Security Professional (CISSP®), with a minimum of five years' experience