The Master of Science in Information Technology with a concentration in Information Security and Assurance program at Purdue Global is designed to teach you tools and methods for keeping corporate data and information systems secure. Get more details about this online graduate degree here.

    <h2 id="section---FrequentlyAskedQuestions">Frequently Asked Questions</h2> <h3 id="section---WhatKindOfProgramIsIt">What Kind of Program Is It?</h3> <p>From penetration testing to hacking prevention, Purdue Global's online Master of Science in Information Technology program with a concentration in Information Security and Assurance provides you with the opportunity to develop a full understanding of computer security concepts and techniques. In the area of concentration, you might learn more about computer virus fundamentals, firewalls, authentication and encryption, weaknesses in operating systems, hacking methods, and digital forensics tools. Core courses provide studies in network operating systems, local and wide area networks, wireless networks, systems analysis methods, and computer security components. Choose a two-part internship or a research project/thesis to complete the program, both of which call for the practical application of concepts and methods covered throughout the curriculum. </p> <h3 id="section---WhatAreThePrerequisites">What Are the Prerequisites?</h3> <p>A prerequisite course in information technology principles must be completed prior to starting the core coursework in this MS program. Previous courses in computer science are beneficial before enrollment. Applicants to Purdue Global's master's degree programs should already have a bachelor's degree; some programs may have additional requirements. </p> <h3 id="section---WhatAreTheCourseRequirements">What Are the Course Requirements?</h3> <p>A total of 40 credits in the core curriculum and 20 credits in the Information Security and Assurance concentration must be completed to earn this MS in Information Technology degree. </p> <p><u>Core Courses</u> </p> <p /> <table border="1"><tr><th>Course Code</th><th>Course Title</th></tr> <tr><td>IT504</td><td>Managing Information Technology in a Business Environment</td></tr> <tr><td>IT510</td><td>System Analysis and Design</td></tr> <tr><td>IT511</td><td>Information Systems Project Management</td></tr> <tr><td>IT513</td><td>Writing and Critical Thinking for the IT Professional</td></tr> <tr><td>IT525</td><td>Database Design and Data Modeling</td></tr> <tr><td>IT526</td><td>SQL Query Design</td></tr> <tr><td>IT530</td><td>Computer Networks</td></tr> <tr><td>IT540</td><td>Management of Information Security</td></tr> <tr><td>IT590</td><td>Legal and Ethical Issues in IT</td></tr> <tr><td> </td><td><b>Choose one of the following:</b></td></tr> <tr><td>IT597 &amp; IT598</td><td>Master's Level Information Technology Internship I and II</td></tr> <tr><td>IT599</td><td>Master's Capstone in Information Technology</td></tr> </table><p><u>Information Security and Assurance Concentration Courses</u> </p> <p /> <table border="1"><tr><th>Course Code</th><th>Course Title</th></tr> <tr><td>IT541</td><td>Computer and Network Security</td></tr> <tr><td>IT542</td><td>Ethical Hacking and Network Defense</td></tr> <tr><td>IT550</td><td>Computer Forensics and Investigations</td></tr> <tr><td>Two IT Electives</td><td /></tr> </table><h3 id="section---WhatCouldIDoAfterIGraduate">What Could I Do After I Graduate?</h3> <h4 id="section---CareerOpportunities">Career Opportunities</h4> <p>Once you have earned the MS in Information Technology - Information Security and Assurance, you might be able to pursue managerial positions in the IT departments of small or large corporations, government agencies, or nonprofit organizations. You might be responsible for the development, testing, implementation, and monitoring of network security and data security systems. </p> <p>Positions you may be able to pursue include: </p> <ul><li>Chief information security officer </li><li>Forensic computer analyst </li><li>Senior information security analyst </li><li>Security systems administrator</li></ul>