Master's Concentration

Information Systems Security

As one of the fastest growing and in-demand fields, cybersecurity is facing a shortage of talent. Fill the talent gap by learning to analyze security needs and provide effective solutions. Navigate cybersecurity challenges as you develop the technical skills needed to solve security breaches, conduct computer forensics analysis, and set up secure networks. The curriculum aligns with the Common Body of Knowledge for CISSP certification.

Information Systems Security image

At a Glance

Classes Begin
January 7
Format
Evening or Online
Term Length
10 Weeks
Admission
No GRE or GMAT
Master's Degree
Tuition
$32,928
Time
As few as 18 months
U.S. News Best Colleges
Top 100 University

U.S. News & World Report Rankings
Erin Toothaker
Talk to an Enrollment Manager

Erin Toothaker

Skills You'll Learn


Develop and implement information security policies and procedures


Design secure network solutions and applications


Evaluate encryption standards and solutions

Curriculum

Master of Science in Information and Communications Technology with a concentration in Information Systems Security requires completion of 48 credit hours (12 courses)

4
Core Courses
4
Concentration Courses
4
Elective Courses

Electives may be chosen from among all courses in the Information and Communications Technology program. You may also select courses from other University College graduate programs with approval from the academic director.

Your academic advisor will help you select electives that align with your career and personal goals, and your advisor will obtain any necessary approvals from the academic director.

Sample Schedule

Plan out your schedule and determine your preferred timeline for completing your master's degree—finish in as few as 18 months or take up to five years.

Time to Completion
Year 1 Q1 Q2 Q3 Q4
Classes 1 2 1 2
Year 2 Q1 Q2 Q3 Q4
Classes 1 2 1 2

Take a Course Before You Apply


We know how important it is to get started when you're ready and that's why you can enroll in a course before you officially apply.

Career Outcomes

Predicted outcomes for graduates of Information Systems Security


Employment of information security analysts is predicted to grow 28% through 2026, according to the Bureau of Labor Statistics.


Demand for cybersecurity professionals is expected to be high due to the rise of cyberattacks. Industries with the most need include finance, government, and healthcare.


U.S. News and World Report ranked information security analyst #2 on their “Best Technology Jobs” list due to factors such as salary and job growth.

Job Titles

Information System Security Officer (ISSO)
Cybersecurity Analyst
Information Security Analyst
Security Officer
Information Technology Specialist
Security Analyst
Information Assurance Officer
Security Technology Architect

Information Security Analyst Salary: National Average

$95,610
(U.S. Bureau of Labor Statistics)

Get Ahead with Career Services


One-on-one career coaching and mock interviews


Job database dedicated to DU students and alumni


Résumé and cover letter guidance

Hear from Our Students

Theme: Job Satisfaction
Flexible Online Classes

Flexible Online Classes

We understand the demands of balancing work, friends and family, and school can be challenging. That's why at University College, you can complete your program entirely online. Our online learning platform makes it easy to work anywhere at any time.

Featured Faculty

Accreditation

Higher Learning Commission logo
Higher Learning Commission

University College programs maintain the highest level of accreditation offered by The Higher Learning Commission, one of the regional accrediting bodies recognized by the federal government. The University of Denver and all of its academic programs are regionally accredited by this commission, and regional accreditation is the highest standard for universities in the United States.

CNSS logo
CNSS Accreditation

The curriculum aligns with the Common Body of Knowledge for CISSP certification developed by the International Information Systems Security Certifications Consortium (ISC)². In addition, the concentration was developed in collaboration with the Colorado Springs and Denver chapters of the Information Security Systems Association (ISSA), and the courses have been mapped to the Committee on National Security Systems (CNSS) standards. The University of Denver has been designated by NSA/DHS as a National Center of Academic Excellence in Information Assurance/Cyber Defense Education.

Colorado Technology Association Logo
Colorado Technology Association

The Colorado Technology Association represents technology leaders, professionals, companies, IT departments, government and legislative leaders, and industry advisors. CTA provides members with community, insight, connections and advocacy. Our industry development work spans public policy to education to leadership.

PMI logo
Project Management Institute

As a Registered Education Provider, University College has designed it's Project Management courses to parallel the Project Management Institute's (PMI*) "Project Management Body of Knowledge" (PMBOK* Guide).

Colorado Technology Association logo
Communications Technology Professionals

CTP is a non-profit, communications technology organization that focuses on promoting growth, innovation and leadership of communications companies and individuals in Colorado.

Take the Next Step