Sunteți pe pagina 1din 4

5/26/2018 Master of Cyber Forensics and Security | IIT School of Applied Technology

School of Applied Technology /


Information Technology and Management

About
Programs
Admissions
Students
Alumni
Partners & Business
News & Events

Master of Cyber Forensics and Security

https://appliedtech.iit.edu/information-technology-and-management/programs/master-cyber-forensics-and-security?_ga=2.73537490.1339580680.1527327269-13570
5/26/2018 Master of Cyber Forensics and Security | IIT School of Applied Technology

Illinois Institute of Technology (IIT) offers a master’s degree in Cyber Forensics and Security
that is cross-disciplinary and includes technology, management, compliance, and legal issues
and is available in Chicago and Wheaton.

The Cyber Forensics and Security degree is designed to help students, and experienced
information technology professionals, become cyber security and forensics practitioners,
investigators, managers, and leaders. This program is appropriate for students with a strong
academic background who are interested in cyber security, digital forensics, risk control, and
information assurance.

The courses will enhance your technology skills, prepare you for leadership and management,
and provide you with a better understanding of policy issues related to information systems
and networks. In addition to technology courses, you will take courses from IIT Chicago-Kent
College of Law to give cyber security and forensics practitioners a thorough grounding in
legal issues and compliance.

The program provides an innovative experience where students work on cutting-edge,


industry-sponsored projects. This teaching philosophy prepares students to become
innovators, entrepreneurs, and leaders of the future.

You will utilize the resources of the Cyber Forensics and Security Lab and work with
industry-standard tools such as EnCase, Forensic ToolKit, MPE+, other AccessData tools,
WinHex, Tableau hardware write blockers, and much more.

At the conclusion of their studies, graduates of the Master of Cyber Forensics and Security
degree should be able to:

Design and implement a comprehensive enterprise security program using both policy
and technology to implement technical, operational and managerial control
Comprehensively investigate information security incidents and violation of law using
computer resources in a manner such that all evidence is admissible in a court of law.
Technically secure enterprise information assets and resources to deter, detect, and
prevent the success of attacks and intrusions.

Course Requirements
Course
Course Title
Number
Core Courses (18 hours)
ITMS 538 Cyber Forensics
ITMS 543 Vulnerability Analysis and Control
ITMS 548 Cyber Security Technologies
ITMS 578 Cyber Security Management
AND 3 hours from the following:
ITMS 539 Steganography
ITMS 549 Cyber Security Technologies: Projects and Advanced Methods
Elective Courses (12 hours)

https://appliedtech.iit.edu/information-technology-and-management/programs/master-cyber-forensics-and-security?_ga=2.73537490.1339580680.1527327269-13570
5/26/2018 Master of Cyber Forensics and Security | IIT School of Applied Technology

Course
Course Title
Number

Select at least 9 hours from the following:


Any 500-level ITMS course not listed in required courses above.
ITMS 579, Topics in Cyber Security, may be taken more than once.
ITMM 585 Legal and Ethical Issues in Information Technology
ITMM 586 Information Technology Auditing
ITMO 556 Introduction to Open Source Software
ITMT 594 Special Projects in Information Technology
ITMT 597 Special Problems in Information Technology
AND at least 2 hours from the following:
LAW 240 National Security Law
Computer and Network Privacy and Security: Ethical, Legal, and Technical
LAW 478
Considerations
LAW 495 Electronic Discovery

Notes: 1) Core course requirements may be waived upon presentation of evidence of equivalent coursework,
certification or experience. When core courses are waived, appropriate course substitutions will be approved by
the student’s adviser or the ITM Associate Chair. 2) LAW electives not listed above may be substituted as
approved by the student’s adviser or the ITM Associate Chair.

Illinois Institute of Technology has been designated as a National Center of Academic


Excellence in Cyber Defense Education by the National Security Agency and the U.S.
Department of Homeland Security. This designation results from meeting stringent Center of
Academic Excellence criteria and mapping of Information Technology and Management
curricula to a core set of cyber defense knowledge units. Students attending Center of
Academic Excellence in Cyber Defense Education institutions are eligible to apply for
scholarships and grants through the Department of Defense Information Assurance
Scholarship Program and the Federal Cyber Service Scholarship for Service Program. This
designation reflects Illinois Tech’s commitment to producing professionals with cyber defense
expertise for the Nation.

Information Technology and Management

Perlstein Hall
10 West 33rd Street, Room 223
Chicago, IL 60616

Tel 312.567.5290

Rice Campus
201 East Loop Road, Room 138
Wheaton, IL 60189

https://appliedtech.iit.edu/information-technology-and-management/programs/master-cyber-forensics-and-security?_ga=2.73537490.1339580680.1527327269-13570
5/26/2018 Master of Cyber Forensics and Security | IIT School of Applied Technology

Tel 630.682.6000

Our Campuses

(http://www.linkedin.com/groups?gid=999247&trk=myg_ugrp_ovr)
(http://blogs.iit.edu/itm_loopback/)

Illinois Institute of Technology


10 West 35th Street
Chicago, IL 60616
312.567.3000
Illinois Tech Social Media
Directory(http://web.iit.edu/directory/social-media)
Emergency Information
Contact Us
Copyright Concerns
Privacy

https://appliedtech.iit.edu/information-technology-and-management/programs/master-cyber-forensics-and-security?_ga=2.73537490.1339580680.1527327269-13570

S-ar putea să vă placă și