Two women work on code

Cyber Forensics and Security (M.A.S.)

View all Illinois Tech Cybersecurity Programs

 

The Master of Cyber Forensics and Security is cross-disciplinary program that focuses on technology, management, compliance, and legal issues. Experienced information technology professionals and those new to the field can build the skills to become cybersecurity and forensics practitioners, investigators, managers, and leaders.

Build a comprehensive understanding of essential elements such as information security, information assurance, ethical hacking, vulnerability analysis and control, securing databases, steganography, mobile device forensics, operating system security, business continuity response, disaster recovery, legal and ethical issues, auditing, evidence, and intrusion detection. Work with forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence.

Complete this program on campus or completely online.

Program Overview

The Master of Cyber Forensics and Security is a cross-disciplinary program that focuses on technology, management, compliance, and legal issues. Experienced information technology professionals and those new to the field can become cybersecurity and forensics practitioners, investigators, managers, and leaders.

Career Opportunities

Graduates have found employment in companies from start ups to Fortune 500 companies including Zelle, Citibank, and Motorola. Others have gone on to work in law enforcement including Chicago Police Department and the FBI.

Graduates of the Master of Cyber Forensics and Security program can fill roles such as:

  • Information security analyst
  • Security manager
  • Security administrator
  • Cybersecurity analyst
  • Cybersecurity specialist
  • Computer forensic examiner
  • Forensic analyst
  • Vulnerability researcher/exploit developer
Disclaimer for prospective students, please read.
The information provided is sourced from a third party, Lightcast, and is provided here for informational and educational purposes only. Please be advised that the inclusion of the Lightcast resource on this website does not imply endorsement by Illinois Institute of Technology (Illinois Tech), nor is it a guarantee of the accuracy of this information. Illinois Tech makes no representation, warranty or guarantee, express or implied, that the information presented herein is reflective of the outcomes you can expect if you enroll in or graduate from an Illinois Tech program. Illinois Tech expressly disclaims any liability regarding Lightcast, or in connection with any actual or potential employment opportunity stemming from information on this site and you hereby irrevocably waive any claim(s) against the Illinois Tech for the same. Your use of this web page is an acknowledgement of your understanding and acceptance of the terms and conditions set forth herein. You are encouraged to conduct your own thorough research into job opportunities and outcomes in your field of study.

Admission to Illinois Tech is required to enroll in this program. Previous coursework or experience in technology is helpful but not required. Additional coursework may be required for those with no previous background in information technology.

Information Security Analyst Career Snapshot

Pushing Students Forward

Imani Weems found the tech background she sought as a student in the Masters of Cyber Forensics and Security degree program, as well as support from student organizations to help her thrive.

Littlefield 1280x850

Cyber Scholarship Program

Mark Littlefield earned an award from the United States Department of Defense (DoD) Cyber Scholarship Program. Littlefield was eligible to apply for the scholarship because Illinois Tech has been designated as a National Center of Academic Excellence in Cyber Defense Education by the National Security Agency (NSA) and the U.S. Department of Homeland Security.

Learn More

North American Defense and Security Academic Alliance (NADSAA)

The North American Aerospace Defense Command (NORAD) and US Northern Command (USNORTHCOM) North American Defense and Security Academic Alliance (NADSAA) exists as a collaborative information-based enterprise dedicated to strengthening and normalizing relationships between the two commands and academic institutions. This relationship stimulates and develops new thinking, examines cross-organizational solutions, and helps cultivate future generations of Defense and Security practitioners.

Internship Opportunities

The NORAD and USNORTHCOM Volunteer Student Internship Program (N&NC VSIP) is part of a larger effort by NORAD and USNORTHCOM to help cultivate future generations of Defense and Security practitioners. N&NC VSIP internships provide exposure to NORAD and USNORTHCOM missions and responsibilities, while working alongside current military and civilian professionals dedicated to the defense of North America.   

Gain valuable hands-on experience related to their education endeavors while working in a joint, interagency and international environment at NORAD and USNORTHCOM with a N&NC VSIP internship. Potentially earn academic credit for work performed, and some may qualify to receive a Department of Defense SECRET clearance.

Learn more about eligibility criteria, program timelines, and application requirements.

NAD&S logo
USSTRATCOM logo

National Center of Academic Excellence in Cyber Defense Education

The United States Department of Homeland Security and the National Security Agency have designated Illinois Institute of Technology as a National Center of Academic Excellence in Cyber Defense Education.

Seal of National Centers of Academic Excellence
DHS_Seal

Featured Faculty

Maurice Dawson
Associate Professor Director, Center for Cyber Security and Forensics Education
Yong Zheng
Associate Professor

Program Objectives

Master of Science in Cyber Forensics and Security Program Educational Objectives

At the conclusion of their studies, graduates of the Master of Cyber Forensics and Security should be able to:

  • Deliver optimal technical and policy technology solutions for the problems of business, industry, government, non-profit organizations, and individuals in each student’s particular area of focus.
  • Work with, lead, and manage teams in an enterprise environment to collaboratively arrive at optimal technology solutions.
  • Manage and deploy information resources applicable to each student’s particular area of focus in an enterprise setting.
  • Conduct and report on significant research in information technology and/or the management of information technology.