The MSIT–Cybersecurity is a 100% online, instructor-led degree program. Its convenient format enables students to continue working while earning their degree and to apply what they learn in the classroom to their work environment.

The program begins with a two-week orientation. Learn more about the orientation, online learning activities and program structure on our admissions requirements page.

Instructional Excellence

Seidenberg School of Computer Science and Information Systems faculty members developed many of the online MSIT–Cybersecurity courses with input from industry professionals and, in keeping with higher education best practices, the school encourages faculty to both adhere to a syllabus and to bring their own interests and passion to the courses they teach.

Our students partner with faculty on research, in collaboration with:

  • Top agencies to solve problems including mobile forensics, skimmer fraud and biometrics
  • Corporations and startups to address IT challenges including e-commerce and cloud computing

Designated by the National Security Agency (NSA) and the Department of Homeland Security (DHS) as a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE), all of the School’s cybersecurity courses map to the rigorous standards established by these agencies.


The online MSIT–Cybersecurity provides students with the opportunity to customize their education to meet their specific needs and career goals. Academic advisors work closely with students to create a personalized academic plan. A broad array of electives enables students to bridge knowledge gaps, acquire specialized knowledge, gain broader exposure to the IT ecosystem, or get a leg up on emerging industry trends.

The program culminates with a Capstone Project, giving students the opportunity to delve into an area of interest with the enthusiastic support of one of our distinguished faculty members; Charles Tappert, PhD, professor of computer science, Fulbright scholar, and consultant to leading companies, teaches the Capstone Project course, which many students report is a highlight of their Seidenberg School education.

Students are required to take 30 credits to complete the MSIT-Cybersecurity degree. The program requires three core courses, four courses in the Cybersecurity specialization, two additional electives, and a Capstone Project course.

MSIT–Cybersecurity: Core Courses

This course introduces students to computer networking, the OSI network reference model, TCP/IP, and the Web architecture. It also includes an overview of operating system (both Windows and Linux) security, network security, Web security, social engineering, and legal and ethical issues.
This course introduces students to database concepts, SQL, and Web based database design. The major goal is to provide students with an understanding of the basic concepts underlying the use of a database system. A database management system will be used as a vehicle for illustrating some of the concepts discussed in the course.
This course combines project management methods and structured systems development techniques and applies them to the complex world of information systems development. The central project management functions of planning, organizing and controlling are presented in the context of the systems development process. Topics include project planning, estimating, testing, implementation, documentation, management of change, utilization of services consultants, software houses, turn-key systems and proprietary software packages.
This course covers concepts of Web computing, layered Web architecture, website structure, and creating websites with Content Management Systems (CMS). It also addresses enabling and managing social networking features, including blogging, polling, discussion forums, and RSS publishing. For the course project, each student designs and implements an effective corporate website for a fictitious company.
This course covers methods for developing solutions to business and system problems using object-oriented techniques. The course covers the three fundamental elements of object-oriented programming: inheritance, encapsulation, and polymorphism. Students will learn how to use classes and objects, abstract data types, and interfaces to develop object oriented solutions using Python.
Prerequisite: IS 612 Object Oriented Concepts and Development with a minimum grade of “C”
Integrated hands-on coverage of fundamental concepts and technologies for enterprise and Internet computing. Topics include data storage; XML data specification, parsing and validation; data and language translation; networking and Web technology overview; software framework technology for controlling software system complexity; and a roadmap for the enterprise computing technologies.

*Core courses can also be used as electives in consultation with a faculty advisor.

Cybersecurity Courses (12 credits)

This course covers the most important issues and topics in computer and network security. Topics include encryption techniques (DES, AES, contemporary symmetric ciphers, public key cryptography and RSA); message authentication and hash functions; digital signatures and authentication protocols; IP security (IPsec); SNMP vulnerabilities; e-mail security; secure socket layer (SSL) and transport layer security; Web security; intruders; malicious software; and firewalls.
This course covers technologies for securing e-commerce Web applications against vicious hacker attacks in both business-to-client (B2C) and business-to-business (B2B) environments. Server-side topics include Web server security, Web service security, secure transactions, intrusion detection, access control, firewall management, log analysis, SSL, digital certificate generation, and defense against attacks such as denial-of-service. Client-side topics include the applet sandbox security model, digital certificate management, cookie management, and defense against attacks like virus and JavaScript-enabled spoofing. Data security topics include cryptography basics, non-repudiation, dematerialized moneys, virtual purses, EDI and its security, and defense against various e-commerce frauds.
This course provides a general overview of the theory and application of information warfare and forensic computing. The background information on information warfare highlights the inherent problems in today’s computing environment and indicates the necessity of forensics to complement computer security. The course focuses on information warfare arsenal and tactics, defensive strategies, and causalities; network surveillance tools for information warfare; fundamentals of computer forensics; computer forensics services and technologies; search and seizure; data recovery and identification and digital evidence collection, duplication, and preservation; computer image verification and authentication; reconstruction of past events; legal issues; and advanced topics in forensics.
This course discusses information security from organizational and managerial perspectives. For an organization, information security is a continuous management process. Security technology alone cannot facilitate this process without security professionals being aware of the tradeoffs and various policy issues embedded in this process. This course will provide students with a background in managing information security in organizations. Topics include risk identification and assessment, security policy and planning, personnel and security, privacy, security auditing, and legal issues.

Capstone Project (3 credits)

All students are required to complete the Capstone Project course as the culmination of their MSIT–Cybersecurity degree.

In this project-oriented course, student teams develop real-world computer information systems for actual customers. Students learn the importance of a systematic approach in the process of developing robust computer information systems, the management of projects, how to interact with customers and conduct requirements analysis, and the technical and soft skills required. Emphasis is placed on developing skills and knowledge in technical areas that have real value in the workplace.

Depending on the nature of a project, the technical skills can involve e-commerce and Internet technologies, security testing, client-server systems, especially those with Web interfaces to backend databases, relational databases, Web design and interfaces. In addition to technical skills, students develop problem-solving, critical thinking, communication, and teamwork skills. By working on real-world systems with actual customers, the students learn the appropriate skills–both technical and soft–for filling meaningful roles in the professional IT workplace.

Elective Courses (6 credits)

Students, in consultation with their advisor, may choose two courses for a total of six credits from the following list of suggested IT courses, provided they have taken the prerequisites. Alternatively, they may choose any Seidenberg School graduate course or any Lubin School of Business graduate course (MBA/MGT/MAR), provided they have taken the prerequisites and have obtained the chair’s approval.

  • IT 605 Database Management Systems (3 credits)
  • IT 607 Systems Development and Project Management (3 credits)
  • IT 610 Web Development with Content Management Systems (3 credits)
  • IS 612 Object Oriented Concepts and Development (3 credits)
  • IT 614 Responsive Web Development with HTML/CSS and jQuery (3 credits)
  • IT 624 Application Development with .Net and Web Services (3 credits)
  • IT 626 Concepts and Structures in Internet Computing (3 credits)
  • IT 632 Internet Computing with Distributed Components (3 credits)
  • IT 634 Introduction to Data Mining (3 credits)
  • IT 636 XML Application Development (3 credits)
  • IT 640 Introduction to Cloud Computing Technology (3 credits)
  • IT 670 Mobile Forensics Investigation (3 credits)

Request Information

To learn more about MS in Information Technology, fill out the fields in this form to download a free brochure. If you have any questions at any time, please contact an admission advisor at (886) 843-7205.

* All Fields are Required. Your Privacy is Protected.
Are you enrolling from outside the U.S.? Click here.