Program Requirements

General Program Requirements:
Number of Credits Required Beyond the Baccalaureate: 30

Required Courses:

Information Technology Auditing Concentration

Core Courses
²Ñ±õ³§Ìý5202IT Governance3
²Ñ±õ³§Ìý5206Protection of Information Assets3
²Ñ±õ³§Ìý5214Security Architecture3
²Ñ±õ³§Ìý5687Business Skills for ITACS Professionals I 11.5
²Ñ±õ³§Ìý5688Business Skills for ITACS Professionals II 11.5
IT Auditing Concentration Courses 2
²Ñ±õ³§Ìý5201IT Audit Process3
²Ñ±õ³§Ìý5203Systems and Infrastructure Lifecycle Management 13
²Ñ±õ³§Ìý5205IT Service Delivery and Support3
²Ñ±õ³§Ìý5208Data Analytics for IT Auditors3
IT Auditing Elective 3
Select one from the following:3
²Ñ±õ³§Ìý5121
Enterprise Resource Planning Systems
²Ñ±õ³§Ìý5170
Special Topics
²Ñ±õ³§Ìý5182
Independent Study
IT Auditing Capstone Course
²Ñ±õ³§Ìý5902IT Auditing Capstone3
Total Credit Hours30
1

For our partner program with the Beijing National Accounting Institute (BNAI) in China only, students may substitute ²Ñ±õ³§Ìý5287 Business Skills for ITACS Professionals (3 s.h.) for ²Ñ±õ³§Ìý5687 Business Skills for ITACS Professionals I (1.5 s.h.) and ²Ñ±õ³§Ìý5688 Business Skills for ITACS Professionals II (1.5 s.h.).

2

²Ñ±õ³§Ìý5122 Enterprise Architecture for IT Auditors (3 s.h.) may also be required of students who are admitted to the program but lack sufficient technical background.

3

Students in the Information Technology Auditing concentration alternately may select up to two courses from the Cyber Security concentration and/or in Computer Science and/or Engineering Security as electives. This is done in consultation with the ITACS Program Director.

Cyber Security Concentration

Core Courses
²Ñ±õ³§Ìý5202IT Governance3
²Ñ±õ³§Ìý5206Protection of Information Assets3
²Ñ±õ³§Ìý5214Security Architecture3
²Ñ±õ³§Ìý5687Business Skills for ITACS Professionals I1.5
²Ñ±õ³§Ìý5688Business Skills for ITACS Professionals II1.5
Cyber Security Concentration Courses
²Ñ±õ³§Ìý5211Ethical Hacking3
²Ñ±õ³§Ìý5213Intrusion Detection & Response3
²Ñ±õ³§Ìý5215Operating System Security3
²Ñ±õ³§Ìý5216Organizational Forensics3
²Ñ±õ³§Ìý5217Network Security3
Cyber Security Elective(s) 1
Select one or more from the following, if desired: 20
²Ñ±õ³§Ìý5170
Special Topics
²Ñ±õ³§Ìý5182
Independent Study
²Ñ±õ³§Ìý5212
Penetration Testing
Cyber Security Capstone Course
²Ñ±õ³§Ìý5903Cyber Security Capstone3
Total Credit Hours30
1

Students in the Cyber Security concentration alternately may select up to two courses from the Information Technology Auditing concentration and/or in Computer Science and/or Engineering Security as electives. This is done in consultation with the ITACS Program Director.

2

Students earn credit for any elective course(s) taken. The Cyber Security concentration does not, however, require completion of an elective to earn the degree.

Culminating Event:
Capstone Course:
The MS ITACS program culminates in a capstone that prepares students to take the appropriate professional certification examination:

  • Certified Information Systems Auditor (CISA®)
  • Certified Information Systems Security Professional (CISSP®), with a minimum of five years' experience