Skip to Content

Explore our MS in Information Technology Information Assurance and Cyber Security specialization

From ensuring the privacy of our healthcare information to defending financial institutions from breach, information security professionals are in growing demand.*

In this specialization, you will learn techniques for detecting threats and protecting and defending resources against attacks, the security governance structures organizations use to manage IT-related risks, and legally sound methods for investigating and responding to security breaches. You will also explore ethical considerations and the organizational and human factors that affect cyber security.

Program Savings

Receive up to a $3,000 grant if you reside in the U.S. and start this program on September 27, 2021. Contact one of our Enrollment Specialists to learn more.

Get Started Now


Minimum Degree Requirements

  • 30 semester credits
    • Core courses (12 sem. cr.)
    • Specialization courses (18 sem. cr.)

This sequence represents the minimum time to completion. Time to completion will vary by student, depending on individual progress and credits transferred, if applicable. For a personalized estimate of the number of your transfer credits that Walden would accept, call an Enrollment Specialist at 855-646-5286.

*According to the Bureau of Labor Statistics, “Employment of information security analysts is projected to grow 37% from 2012 to 2022, much faster than the average for all occupations.” On the Internet at (viewed online February 16, 2014). National long-term projections may not reflect local and/or short-term economic or job conditions and do not guarantee actual job growth.


Course Code Title Credits


ITEC 6111

Information Technology in the Organization

Through a review of modern computer systems and the social and economic issues related to their use, students in this course are introduced to the conceptual foundations for designing, developing, and deploying large-scale management information systems. Students investigate the role of information technology in an organization—particularly the collection, storage, and distribution of information for operations, planning, and decision making.

(3 sem. cr.)
ITEC 6115

Computer Networking and Operating Systems

Within this course, students can learn the concepts of computer operating systems, including the main functions, similarities, and differences. Students can explore a variety of topics, including configuration, file systems, security, administration, interfacing, multitasking, and performance analysis. In addition, they can further their understanding of computers through the study of computer networks by learning key networking concepts, components, and the design of information and communication infrastructure solutions.

(3 sem. cr.)
ITEC 6030

Principles of Programming

The discipline of software development demands a variety of skills. Students in this course assess the fundamental practices and principles of designing and constructing object-oriented programs. They engage in substantial hands-on practice, reinforcing algorithmic thinking, logical design, precise coding, and careful attention to quality.

(3 sem. cr.)
ITEC 6145

Enterprise Database Design

In this course, students discuss the design, implementation, and operation of databases using a principal relational database management system (DBMS). Many fundamental topics are covered in this course including: data modeling using entity-relationship diagrams; data storage, manipulation, and queries using structured query language (SQL); functional dependencies, normalization concepts, data warehouse architectures, data warehouse modeling, and data analytics.

(3 sem. cr.)


ITEC 6120

Operating System and Network Architecture

The infrastructures of operating systems and networks are the fundamental technologies that support enterprise information systems. Students in this course examine the components of computer systems, their underlying operating systems, and their data communications networks. They critically investigate the services these components provide and draw implications for the large-scale enterprise. Students sharpen communication and critical-thinking skills through weekly discussions on related topics, such as modularity, abstraction, threading, virtual memory, Internet protocol, atomicity, and concurrency control.

(3 sem. cr.)
ITEC 6170

Fundamentals of Information Assurance

The principles of confidentiality, integrity, and availability of data while it is being stored, processed, or communicated guide the policies and practices of information assurance. In this course, students investigate the theory of information security and data protection, study common system risks and vulnerabilities, and follow best practices to protect computer and data assets. These practices address organizational policies, access controls, software and network design, and logging and auditing.

(3 sem. cr.)
ITEC 6610

Information Assurance and Risk Management

Students in this course learn about the security governance structure that organizations employ to manage risks. Various laws, regulations, and organizational objectives are typically mapped to organizational policies and translated into procedures, practices, standards, and guidelines. Students examine appropriate organizational structures for providing oversight and managing security throughout the enterprise.

(3 sem. cr.)
ITEC 6620

Information and Systems Security

Participants in this course study in-depth techniques for defending IT infrastructure against attack. Students explore tools for configuring and testing system and network security, and they examine administrative and operational countermeasures. Students discuss a range of active responses to a security breach.

(3 sem. cr.)
ITEC 6630

Computer Law, Crime, and Investigation

Security professionals need to understand the legal context of their work: Many laws apply to IT crimes, and botched investigations can have serious consequences. Students learn about the types of offenses and their consequences under the law. Investigations of breaches must be conducted methodically and with great care. Students examine the various types of cyber offenses and techniques for investigating them, as well as ethical uses of information and computing resources in organizations.

(3 sem. cr.)
ITEC 6640

Topics in High-Assurance Computing

Individual, group, and organizational behavior can have an enormous effect on safety and security. Because security professionals often observe that security is more dependent on people than on technology, they must have a clear understanding of human factors. Students examine advanced topics in the practice of information assurance, such as using social psychology to implement security.

(3 sem. cr.)

Tuition and Fees

Curriculum Component Requirements Cost amount
Tuition 30 semester credit hours $880 per semester hour $26,400
Technology Fee Per semester $210 $1,050


*Tuition reflects the minimum time to completion. Time to completion varies by student, depending on individual progress and credits transferred, if applicable. Tuition and time to complete may be reduced if transfer credits are accepted, or if you receive grants, scholarships or other tuition reductions. Walden may accept up to 15 transfer credits. For a personalized estimate of the number of your transfer credits that Walden would accept, call an Enrollment Specialist at 855-646-5286.

Tuition and fees are subject to change. Books and materials are not included and may cost between $1,000 and $1,400.


Many Walden degree-seeking students—67%—receive some form of financial aid.* Create a customized plan that makes sense for you.

*Source: Walden University’s Office of Financial Aid. Data reports as of 2018.

Find Ways to Save

Program Savings

Receive up to a $3,000 grant if you reside in the U.S. and start this program on September 27, 2021. Contact one of our Enrollment Specialists to learn more.

Get Started Now

Admission Requirements

Program Admission Considerations: All specializations require a bachelor's degree or higher.

General Admission Requirements: Completed online application and transcripts. Please note that the materials you are required to submit may vary depending on the academic program to which you apply. More information for international applicants.



Have a Question?

Chat with a MS in Information Technology - Information Assurance and Cyber Security Enrollment Specialist.

Chat Now