Program Requirements
General Program Requirements:
Number of Credits Required Beyond the Baccalaureate: 30
Required Courses:
Information Technology Auditing Concentration
Code | Title | Credit Hours |
---|---|---|
Core Courses | ||
MIS 5202 | IT Governance | 3 |
MIS 5206 | Protection of Information Assets | 3 |
MIS 5214 | Security Architecture | 3 |
MIS 5687 | Business Skills for ITACS Professionals I 1 | 1.5 |
MIS 5688 | Business Skills for ITACS Professionals II 1 | 1.5 |
IT Auditing Concentration Courses 2 | ||
MIS 5201 | IT Audit Process | 3 |
MIS 5203 | Systems and Infrastructure Lifecycle Management 1 | 3 |
MIS 5205 | IT Service Delivery and Support | 3 |
MIS 5208 | Data Analytics for IT Auditors | 3 |
IT Auditing Elective 3 | ||
Select one from the following: | 3 | |
MIS 5121 | Enterprise Resource Planning Systems | |
MIS 5170 | Special Topics | |
MIS 5182 | Independent Study | |
IT Auditing Capstone Course | ||
MIS 5902 | IT Auditing Capstone | 3 |
Total Credit Hours | 30 |
- 1
For our partner program with the Beijing National Accounting Institute (BNAI) in China only, students may substitute MIS 5287 Business Skills for ITACS Professionals (3 s.h.) for MIS 5687 Business Skills for ITACS Professionals I (1.5 s.h.) and MIS 5688 Business Skills for ITACS Professionals II (1.5 s.h.).
- 2
MIS 5122 Enterprise Architecture for IT Auditors (3 s.h.) may also be required of students who are admitted to the program but lack sufficient technical background.
- 3
Students in the Information Technology Auditing concentration alternately may select up to two courses from the Cyber Security concentration and/or in Computer Science and/or Engineering Security as electives. This is done in consultation with the ITACS Program Director.
Cyber Security Concentration
Code | Title | Credit Hours |
---|---|---|
Core Courses | ||
MIS 5202 | IT Governance | 3 |
MIS 5206 | Protection of Information Assets | 3 |
MIS 5214 | Security Architecture | 3 |
MIS 5687 | Business Skills for ITACS Professionals I | 1.5 |
MIS 5688 | Business Skills for ITACS Professionals II | 1.5 |
Cyber Security Concentration Courses | ||
MIS 5211 | Ethical Hacking | 3 |
MIS 5213 | Intrusion Detection & Response | 3 |
MIS 5215 | Operating System Security | 3 |
MIS 5216 | Organizational Forensics | 3 |
MIS 5217 | Network Security | 3 |
Cyber Security Elective(s) 1 | ||
Select one or more from the following, if desired: 2 | 0 | |
MIS 5170 | Special Topics | |
MIS 5182 | Independent Study | |
MIS 5212 | Penetration Testing | |
Cyber Security Capstone Course | ||
MIS 5903 | Cyber Security Capstone | 3 |
Total Credit Hours | 30 |
- 1
Students in the Cyber Security concentration alternately may select up to two courses from the Information Technology Auditing concentration and/or in Computer Science and/or Engineering Security as electives. This is done in consultation with the ITACS Program Director.
- 2
Students earn credit for any elective course(s) taken. The Cyber Security concentration does not, however, require completion of an elective to earn the degree.
Culminating Event:
Capstone Course:
The MS ITACS program culminates in a capstone that prepares students to take the appropriate professional certification examination:
- Certified Information Systems Auditor (CISA®)
- Certified Information Systems Security Professional (CISSP®), with a minimum of five years' experience