The MSIT is a 100% online, instructor-led degree program. Its convenient format enables students to continue working while earning their degree and to apply what they learn in the classroom to their work environment.

The program begins with a two-week orientation. Learn more about the orientation, online learning activities and program structure on our admissions requirements page.

Instructional Excellence

Seidenberg School of Computer Science and Information Systems faculty members developed many of the online MSIT courses with input from industry professionals and, in keeping with higher education best practices, the school encourages faculty to both adhere to a syllabus and to bring their own interests and passion to the courses they teach.

Our students partner with faculty on research, in collaboration with:

  • Top agencies to solve problems including mobile forensics, skimmer fraud and biometrics
  • Corporations and startups to address IT challenges including e-commerce and cloud computing

Designated by the National Security Agency (NSA) and the Department of Homeland Security (DHS) as a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE), all of the School’s cybersecurity courses map to the rigorous standards established by these agencies.


The online MSIT provides students with the opportunity to customize their education to meet their specific needs and career goals. Academic advisors work closely with students to create a personalized academic plan. A broad array of electives enables students to bridge knowledge gaps, acquire specialized knowledge, gain broader exposure to the IT ecosystem, or get a leg up on emerging industry trends.

The program culminates with a Capstone Project, giving students the opportunity to delve into an area of interest with the enthusiastic support of one of our distinguished faculty members; Charles Tappert, PhD, professor of computer science, Fulbright scholar, and consultant to leading companies, teaches the Capstone Project course, which many students report is a highlight of their Seidenberg School education.

Students are required to take 30 credits to complete the MSIT. The program requires three core courses, four courses in the Cybersecurity or Network Administration specialization, two additional electives, and a Capstone Project course.

MSIT: Core Courses

This course introduces students to computer networking, the OSI network reference model, TCP/IP, and the Web architecture. It also includes an overview of operating system (both Windows and Linux) security, network security, Web security, social engineering, and legal and ethical issues.
This course introduces students to database concepts, SQL, and Web based database design. The major goal is to provide students with an understanding of the basic concepts underlying the use of a database system. A database management system will be used as a vehicle for illustrating some of the concepts discussed in the course.
This course combines project management methods and structured systems development techniques and applies them to the complex world of information systems development. The central project management functions of planning, organizing and controlling are presented in the context of the systems development process. Topics include project planning, estimating, testing, implementation, documentation, management of change, utilization of services consultants, software houses, turn-key systems and proprietary software packages.
This course covers concepts of Web computing, layered Web architecture, website structure, and creating websites with Content Management Systems (CMS). It also addresses enabling and managing social networking features, including blogging, polling, discussion forums, and RSS publishing. For the course project, each student designs and implements an effective corporate website for a fictitious company.
This course provides an introduction to programming with Python, and shows how to use Python to retrieve and visualize data. No prior programming experience is assumed. Topics include data structures in Python, control flow statements such as if-then-else and for loops, functions, accessing data from the web and from databases, and visualizing data.
Prerequisite: IS 612 Introduction to Coding with a minimum grade of “C”
Integrated hands-on coverage of fundamental concepts and technologies for enterprise and Internet computing. Topics include data storage; XML data specification, parsing and validation; data and language translation; networking and Web technology overview; software framework technology for controlling software system complexity; and a roadmap for the enterprise computing technologies.

*Core courses can also be used as electives in consultation with a faculty advisor.

Cybersecurity Courses (12 credits)

This course covers the most important issues and topics in computer and network security. Topics include encryption techniques (DES, AES, contemporary symmetric ciphers, public key cryptography and RSA); message authentication and hash functions; digital signatures and authentication protocols; IP security (IPsec); SNMP vulnerabilities; e-mail security; secure socket layer (SSL) and transport layer security; Web security; intruders; malicious software; and firewalls.
This course covers technologies for securing e-commerce Web applications against vicious hacker attacks in both business-to-client (B2C) and business-to-business (B2B) environments. Server-side topics include Web server security, Web service security, secure transactions, intrusion detection, access control, firewall management, log analysis, SSL, digital certificate generation, and defense against attacks such as denial-of-service. Client-side topics include the applet sandbox security model, digital certificate management, cookie management, and defense against attacks like virus and JavaScript-enabled spoofing. Data security topics include cryptography basics, non-repudiation, dematerialized moneys, virtual purses, EDI and its security, and defense against various e-commerce frauds.
This course provides a general overview of the theory and application of information warfare and forensic computing. The background information on information warfare highlights the inherent problems in today’s computing environment and indicates the necessity of forensics to complement computer security. The course focuses on information warfare arsenal and tactics, defensive strategies, and causalities; network surveillance tools for information warfare; fundamentals of computer forensics; computer forensics services and technologies; search and seizure; data recovery and identification and digital evidence collection, duplication, and preservation; computer image verification and authentication; reconstruction of past events; legal issues; and advanced topics in forensics.
This course discusses information security from organizational and managerial perspectives. For an organization, information security is a continuous management process. Security technology alone cannot facilitate this process without security professionals being aware of the tradeoffs and various policy issues embedded in this process. This course will provide students with a background in managing information security in organizations. Topics include risk identification and assessment, security policy and planning, personnel and security, privacy, security auditing, and legal issues.
The field of mobile forensics has expanded over the past few years as more of our lives are captured on smartphones and other mobile devices. This course will provide students with an overview of cellular networks and the various devices that operate on these networks. Moreover, an in-depth analysis of the file systems and operating systems, including the iOS and Android platforms will be explained. Students will have the opportunity to use professional mobile forensic tools utilized to examine mobile telephones, SIM cards, media cards and synced data on paired computers in a forensic manner. The course will introduce students to professional investigation techniques, legal procedures and reporting standards necessary to build a successful case. Other topics in the course will include investigations involving tablet computers, digital cameras, multimedia players and Global Positioning System (GPS) electronics.

Network Administration Courses (12 credits)

This course covers the most important issues and topics in computer and network security. Topics include encryption techniques (DES, AES, contemporary symmetric ciphers, public key cryptography and RSA); message authentication and hash functions; digital signatures and authentication protocols; IP security (IPsec); SNMP vulnerabilities; e-mail security; secure socket layer (SSL) and transport layer security; Web security; intruders; malicious software; and firewalls.

Cloud computing involves running applications on infrastructure other than your own. By going on the cloud, businesses decrease the expense involved in maintaining and managing their own data centers, not only in terms of hardware and software but also personnel.

This course will cover fundamental topics such as IaaS, PaaS, SaaS, virtualization, and multi-tenancy. Students will learn common cloud platforms, tools, and technology with a focus on Google App Engine. They will do hands-on app development locally on their machine using Python programming language and, when ready, upload their apps to Google data centers.

Knowledge of programming is assumed but Python will be covered from the beginning.

This course studies the key principles and building blocks of optical communications and networks.

The first part of the course focuses on optical communications and includes the following topics: light propagation in optical fiber, loss and bandwidth, chromatic dispersion, nonlinear effects, solitons, couplers, isolators and circulators, multiplexers and filters, optical amplifiers, transmitters, switches, wavelength converters, modulation and demodulation, and transmission system engineering.

The second part of the course looks at optical networks and includes the following topics: client layers of the optical layer (ONET/SDH, ATM, storage area networks), WDM network elements and design, control and management, network survivability, access networks (HFC, FTTC, PON), photonic packet switching, and deployment considerations.

Principles of managerial accounting, financial analysis and project management are introduced and applied to the planning, implementation and operation of telecommunications systems.
This course builds upon CS 633 to examine local area networks, Internetworking via the TCP/IP protocols, and the Internet. The OSI reference model and the TCP/IP protocols form the framework. Topics include: multi-access network strategies; basic traffic and capacity models; LAN standards and the evolution from shared access to switched and wireless Ethernet; LAN internetworking using bridges and routers; routing strategies and congestion in networks; the IP protocol; transport-layer issues and the TCP and UDP protocols; network security, Internet services and applications such as the Domain Name System, FTP, SMTP mail, and the HTTP protocol for the Web.
This course will examine current networking practices being employed in the telecommunications industry. Emphasis will be placed on private corporate networks built from common carrier building blocks. A portion of the course will be devoted to specific networks; preliminary topics include T1 networks, satellite networks, software-defined networks and so-called Wide Area Networks (WANs).

Capstone Project (3 credits)

All students are required to complete the Capstone Project course as the culmination of their MSIT.

In this project-oriented course, student teams develop real-world computer information systems for actual customers. Students learn the importance of a systematic approach in the process of developing robust computer information systems, the management of projects, how to interact with customers and conduct requirements analysis, and the technical and soft skills required. Emphasis is placed on developing skills and knowledge in technical areas that have real value in the workplace.

Depending on the nature of a project, the technical skills can involve e-commerce and Internet technologies, security testing, client-server systems, especially those with Web interfaces to backend databases, relational databases, Web design and interfaces. In addition to technical skills, students develop problem-solving, critical thinking, communication, and teamwork skills. By working on real-world systems with actual customers, the students learn the appropriate skills–both technical and soft–for filling meaningful roles in the professional IT workplace.

Elective Courses (6 credits)

Students, in consultation with their advisor, may choose two courses for a total of six credits from the following list of suggested IT courses, provided they have taken the prerequisites. Alternatively, they may choose any Seidenberg School graduate course or any Lubin School of Business graduate course (MBA/MGT/MAR), provided they have taken the prerequisites and have obtained the chair’s approval.

  • IT 605 Database Management Systems (3 credits)
  • IT 607 Systems Development and Project Management (3 credits)
  • IT 610 Web Development with Content Management Systems (3 credits)
  • IS 612 Introduction to Coding (3 credits)
  • IT 614 Responsive Web Development with HTML/CSS and jQuery (3 credits)
  • IT 624 Application Development with .Net and Web Services (3 credits)
  • IT 626 Concepts and Structures in Internet Computing (3 credits)
  • IT 632 Internet Computing with Distributed Components (3 credits)
  • IT 634 Introduction to Data Mining (3 credits)
  • IT 636 XML Application Development (3 credits)
  • IT 640 Introduction to Cloud Computing Technology (3 credits)
  • IT 670 Mobile Forensics Investigation (3 credits)

Request Information

To learn more about MS in Information Technology, fill out the fields in this form to download a free brochure. If you have any questions at any time, please contact an admission advisor at (866) 843-7205.

* All Fields are Required. Your Privacy is Protected.
Are you enrolling from outside the US? Click here.