The Master of Science in Information Technology with a concentration in Security Management program at Colorado Technical University can help you develop the skills needed to design and manage effective enterprise computer security systems. Learn more about the Master of Science in Information Technology with a concentration in Security Management program here.
<h2 id="section---FrequentlyAskedQuestions">Frequently Asked Questions</h2>
<h3 id="section---WhatKindOfProgramIsIt">What Kind of Program Is It?</h3>
<p>Colorado Technical University's Master of Science in Information Technology with a concentration in Security Management online program explores fundamental concepts of Enterprise Content Management (ECM) and techniques for developing and managing an enterprise information infrastructure. You will have the opportunity to study analytical and integrative tools used for strategic planning, TCP/IP protocols, and data governance, including the development, implementation, and management of policies and procedures necessary to ensure data availability, usability, integrity, and security. Concentration coursework explores network operating systems and architectures, digital forensics, and security concepts for a variety of topics, including software applications, databases, e-commerce, cloud computing, and virtualization. You can also learn about operating systems security, network security, security policy development, security management, and contingency planning.
</p>
<h3 id="section---WhatAreThePrerequisites">What Are the Prerequisites?</h3>
<p>If you'd like to apply to the Master of Science in Information Technology with a concentration in Security Management program, you must possess an undergraduate degree in either computer science or information technology, or have a minimum of two years work experience in the field. Applicants to all of Colorado Technical University's programs must have a high school diploma or equivalent; some programs have additional requirements
</p>
<h3 id="section---WhatAreTheCourseRequirements">What Are the Course Requirements?</h3>
<p>The Master of Science in Information Technology with a concentration in Security Management is a 48-credit program. You must complete 24 information technology credits, 24 security management credits, and have access to a computer and the Internet.
</p>
<p><u>Information Technology Course Requirements</u>
</p>
<p />
<table border="1"><tr><th>Course Code</th><th>Course Name</th></tr>
<tr><td>EMBA 690</td><td> Strategic Management in Dynamic Organizations</td></tr>
<tr><td>CS 651</td><td> Computer Systems Security Foundations</td></tr>
<tr><td>CS 663</td><td> Enterprise Systems Architecture</td></tr>
<tr><td>IT 621</td><td> Enterprise Data Management</td></tr>
<tr><td>IT 640</td><td> Networking and Telecommunications</td></tr>
<tr><td>PM 600</td><td> Project Management Processes in Organizations</td></tr>
</table><p><u>Security Management Course Requirements</u>
</p>
<p />
<table border="1"><tr><th>Course Code</th><th>Course Name</th></tr>
<tr><td>CS 631</td><td> Digital Forensics</td></tr>
<tr><td>CS 632</td><td> Data and Applications Security</td></tr>
<tr><td>CS 652</td><td> Operating Systems Security</td></tr>
<tr><td>CS 653</td><td> Network Security</td></tr>
<tr><td>CS 654</td><td> Security Management</td></tr>
<tr><td>IT 697</td><td> Information Technology Capstone</td></tr>
</table><h3 id="section---WhatCouldIDoAfterIGraduate">What Could I Do After I Graduate?</h3>
<h4 id="section---CareerOpportunities">Career Opportunities</h4>
<p>The Master of Science in Information Technology with a concentration in Security Management program is designed to prepare you for the challenges of protecting an organization's assets, information, and computing infrastructure. After successfully completing the program, you could seek positions such as:
</p>
<ul><li>Information security analyst
</li><li>Information systems manager
</li><li>System administrator
</li></ul><p><i>CTU does not guarantee employment or salary. University grants or scholarships are based on established criteria as published in the University's catalog and are awarded after verification that the conditions of eligibility have been met.</i></p>

