Earn your master’s degree in information technology with a specialization in information assurance while building skills to stand out in the fast-growing fields of information assurance and cyber security.
The Master of Science in information technology with a specialization in information assurance at University of Maryland University College will provide you with a practical understanding of the principles of data protection, cyber security, and computer forensics, while also strengthening your core IT knowledge and project management abilities.
These program requirements are for students who enroll in the 2018–2019 academic year. For prior year academic requirements, visit the catalog archive in the Current Students section.
About the Information Technology Master's Degree with Information Assurance Specialization
The information assurance curriculum can help you gain real-world experience through interactions with actual organizations. You'll learn job-relevant skills from case studies of real information assurance crises.
What You'll Learn
Through your coursework, you will learn how to
- Secure information using knowledge of symmetric and asymmetric keys, protocols for exchanging secure data (including the Data Encryption Standard and the Advanced Encryption Standard), and other cryptographic methods and cryptanalysis tools
- Protect networks using risk analysis, defense models, security policy development, authentication and authorization controls, firewalls, packet filtering, virtual private networks (VPNs), and wireless network security
- Respond to attacks with damage assessments, data forensics, attack tracing, and system recovery processes for continuity of operation
- Identify system vulnerabilities and attack patterns and solve problems with intrusion detection tactics
- Navigate ethics, relevant laws, regulations, policies, and standards
- Lead successful teams with advanced project management skills
In past projects, students have had the opportunity to
- Study and experiment with real-world tools and techniques to perform
- Information risk analysis
- Network packet analysis
- Forensics evidence collection and preservation
- Protocol analysis
- Intrusion detection and prevention
- Encryption/decryption of files and messages
- Vulnerability assessments
Information Technology Master's Degree with Information Assurance Specialization Requirements
Our curriculum is designed with input from employers, industry experts, and scholars. You'll learn theories combined with real-world applications and practical skills you can apply on the job right away.
Master's - specialization Courses
- UCSP 615
(to be taken within the first 6 credits of study)
- ITEC 610
- ITEC 625
- ITEC 626
- ITEC 630
- ITEC 640
Core Rules & Recommendations
- ITEC 610 must be taken in the first term of coursework.
- INFA 610
- INFA 620
- INFA 630
- INFA 640
- INFA 650
- INFA 660
Specialization Rules & Recommendations
- INFA 610 must be taken as the first specialization course.
- INFA 670
Capstone Rules & Recommendations
- You must complete all other specialization coursework before taking INFA 670. (You may take one 3-credit course concurrently.)
- You must maintain a GPA of 3.0 or higher at all times.
- All degree requirements must be fulfilled within five consecutive years.
- Any transfer credits must have been earned within the five-year time frame to be applied toward a graduate degree.
This program is designed to help prepare you for a career in the cyber security and information assurance field in the areas of network and Internet security, intrusion detection and prevention, cryptology, cyber law, and software assurance.
Experience Recommended for Success in the Program
This program is designed for midcareer professionals or career changers. We recommend a background in computing and programming. If you lack programming experience, we suggest you take UCSP 635 and UCSP 636 to gain the appropriate foundation. We recommend UCSP 605 if you'd like to improve your graduate writing skills.
It's important to look at the transferable skills that people have, so that with some additional education and training they can move into the cybersecurity field. That's part of how our programs are designed at UMUC—they help people move from one career field into the cybersecurity career field.
Emma Garrison-Alexander, PhD
Vice Dean, Cybersecurity and Information Assurance
The field of information technology . . . changes so much, and to have that fresh knowledge of what's going on in today's IT world, it makes a huge difference in organizations, and it really makes you an asset. That’s what you get from UMUC.
Information Technology Master's Degree with Information Assurance Specialization
What I really appreciate about the professors I have had the privilege of studying under at UMUC is the breadth and depth of their knowledge as it relates to real-life experience.
Vice President of Operations, Carolina West Wireless
[My program] is relevant—Law and Order, ripped-from-the-headlines…relevant…. The [things] that I [hear] from either working with government agencies or people in the commercial sector…are exactly the things that we are talking about in class. And it's that relevancy that makes this program fantastic.
Solutions Principal, RSA, The Security Division of EMC
Cybersecurity Technology Master's Degree
Student Clubs and Organizations
Type: Academic club
Available To: Undergraduate and Graduate
The Computing Club allows its student members to share experiences and offer each other guidance on academic major and career options. Club events provide opportunities for professional socialization and networking, and members are privy to club resources that will help them further their education and careers.
Cyber Competition Team
Type: Academic club
Available To: Undergraduate and Graduate
The Cyber Competition Team represent UMUC at various cybersecurity events and highly competitive tournaments nationwide. Being a member of the team allows students to develop their cybersecurity skills and to network with other students with similar interests.
This program has received a special designation as a Professional Science Master's Degree by the Council of Graduate Schools.
About the Faculty
Our world-class faculty members combine academic credentials with a wealth of experience in the field.
Faculty members in this program hold or have recently held positions including
- Chief information security officer
- Cryptologic manager
- Deputy chief of cyber security operations
- Director of server operations
- Team lead for cyber threat analysis
- Technical director of security engineering and testing
Our faculty work or have worked at organizations including
- Defense Information Systems Agency
- General Dynamics
- The Johns Hopkins University Applied Physics Laboratory
- Lucent Technologies
- National Security Agency
- Science Applications International Corporation
- Transportation Security Agency
- U.S. Department of Defense
- U.S. Department of Homeland Security
Frequently Asked Questions About the Program
Information assurance focuses on the confidentiality, integrity, availability, authentication, and validation of data. These are all accepted, well-understood, and mostly technical issues. Cyber security focuses on securing the safety of computers and computer systems in a networked environment—security issues typically are approached from a broader background, including socio-economic, political, and psychological contexts.