Information Systems Security (Master's)
In this master's concentration, learn to navigate real-world cyber security challenges such as setting up a secure network, securing servers, defining application security requirements, and solving hypothetical security breaches. As you develop specific technical knowledge and skills, also learn to place cyber security solutions within an overall enterprise context.
You’ll learn how to:
- Develop and implement information security policies and procedures
- Design secure network solutions and applications
- Create strategies to establish secure operations
- Plan for business continuity
- Evaluate encryption standards and solutions
- Conduct computer forensics analysis
The curriculum aligns with the Common Body of Knowledge for CISSP certification developed by the International Information Systems Security Certifications Consortium (ISC)². In addition, the concentration was developed in collaboration with the Colorado Springs and Denver chapters of the Information Security Systems Association (ISSA), and the courses have been mapped to the Committee on National Security Systems (CNSS) standards. The University of Denver has been designated by NSA/DHS as a National Center of Academic Excellence in Information Assurance/Cyber Defense Education.
Cybersecurity at the University of Denver
The University of Denver offers two master's degree programs related to cybersecurity that prepare students to meet the growing demand of IT security professionals.
Master of Science in Information Systems Security (University College)
- Online, on campus in the evenings, or a combination of both
- Full-time or part-time, finish in 18 months or up to five years
- Designed for professionals currently in the IT field or career changers
- Focuses on developing both technical and leadership skills
- On campus only
- Full-time, finish in 12 months
- Designed for early-career professionals
- Focuses on cybersecurity fundamentals and technical applications
MS in Information And Communications Technology with a concentration in Information Systems Security requires completion of 48 credit hours (12 courses)Core courses - 16 qtr. hrs
Core courses help students to understand the scope of activity, historical development, future direction and trends, and typical types and roles of organizations that operate within a career field. The Capstone course is the culminating academic endeavor of our degree programs, in which students explore a problem or issue within their field of study.
- ICT 4000 - ICT Business Foundations
- ICT 4005 - ICT Technical Foundations
- ICT 4010 - Enterprise Architecture
- ICT 4901 - ICT Capstone Project
- ICT 4902 - Capstone Seminar
- ICT 4904 - Interdisciplinary Capstone Seminar
Concentration courses allow students to focus on a specific professional area within the larger industry sector in which they are working or wish to work, and master the skills needed to excel in that area.
- ICT 4300 - Web Enabled Information Systems
- ICT 4605 - IS Security Principles
- ICT 4615 - Computer and Physical Security
- ICT 4845 - Network Security with Lab
Elective courses allow students to customize their degrees to match their career needs by either choosing in-depth study in their concentration by selecting three of the following courses, or exploring other options by using our Degree Builder tool.
- ICT 4405 - Database Design & Programming
- ICT 4505 - Website Design and Management
- ICT 4610 - TCP/IP Networks
- ICT 4670 - Disaster Recovery & Ops Security
- ICT 4675 - Information Systems Security in Healthcare
- ICT 4680 - Principles of Cryptography
- ICT 4685 - Cloud and Internet Law
- ICT 4690 - Computer Forensics with Lab
- ICT 4695 - Application Security
- ICT 4800 - Network Communications & the Internet
Design Your Custom Plan
Start Customizing Your Degree
View the tutorial or start building your plan now.Design Your Custom Plan!
Careers in Information Systems Security
Information System Security Officer (ISSO), Security Officer, Information Technology Specialist, Security Analyst, IT Manager, Information Assurance Officer, Strategist, Security Technology Architect.
Develop and maintain system security plans, management, training, policy interpretation, architecture, security testing, decision-making, policymaking.
The demand for information security specialists continues to expand as both public and private sector employers add positions, compounding the existing shortage of IT security professionals. According to intelligencecareers.com, former federal officials have estimated there are only 1,000 US security specialists with the interdisciplinary skills needed to fill 10,000 to 30,000 cyberspace and IT security positions. The top information systems security jobs in demand include computer forensics, wireless security, identity management, VoIP security, and disaster recovery.
Careers In Information and Communications Technology
YOU are in high demand!
One of the fastest growth rates among all occupations in the US, computer scientist and database administrator job openings are expected to grow 53% in the next ten years, according to the Bureau of Labor Statistics. Overall, the ICT career outlook is incredibly positive, with a 28% employment increase expected within the field. Whether you choose a career at a government agency, large corporation, or small organization, ICT professionals are in high demand—particularly if you have job experience and relevant education in information and communication technology under your belt.
ICT makes the grade.
The best jobs are in IT, according to U.S. News and World Report. From Information Technology Manager to Database Administrator, Software Developer to Web Developer, these jobs crack the top 10 careers on the U.S. News and World Report list of top 100 best jobs, as there is an explosive demand in the IT field. A master's degree is preferred for most positions, according to U.S. News and World Report, which also predicts that a focus on mobile application development will help professionals beat the competition.
Where are they now?
Alumni from University College who graduated with a master's degree in information and communication technology hold job titles such as Systems Administrator, Project Manager, Network Engineer, Managing Consultant, Network Architect, Lead IT Analyst, Data Engineer, and CEO in companies and organizations such as Pratt & Whitney, Ironware Technologies, iBoss Security, PayPal, Parsons Brinkerhoff, Vanguard Communication, CenturyLink, Advanced Program Group, Level 3, Verizon Wireless, IBM, IntelliDyne, Cisco Systems, Chevron, Time Warner, Harland Financial Solutions, and the United States Air Force.
Ready to Apply
It's time to gather your materials and apply to your program of choice. Remember to include:
How to Apply
Need More Information
Interested in attending University College, but need additional information before you make a decision? No problem−we're here to help. You may request additional information about a specific program and specialty, review and ask questions in our Frequently Asked Questions section, or contact University College directly.
- Request additional information
- Ask a question
- Email University College or call 303-871-2291 or 800-347-2042
Want to Take a Class
Even if you missed the application deadline, you can start taking courses for one quarter before you have to submit a completed application. We know how important it is to get started when you're ready, so review the class schedule or start the registration process now.