Computer Science Department
Master of Science in Information and Cybersecurity
Nearly every day there are incidents of computer hacking into bank records, business databases, government information, and more, causing untold damage to our economy and security.
In the Information and Cybersecurity (MSIC) program at ITU, you’ll benefit from a graduate education that goes beyond the typical cybersecurity program so you’re prepared to combat this global problem. Topics you’ll explore include network security, risk and data management, preventative measures, computer ethics, digital signatures, and cryptography.
Once you graduate, you’ll have the technical skills, experience, and knowledge to develop solutions from the ground up, making you into an in-demand cybersecurity professional in Silicon Valley and beyond.
58% of students are involved in internships | 54 countries represented in our student body. |
>50% Annual Earnings are double the national average in Silicon Valley. | 25% Less Fee: Compared to Average Tuition for a Master’s Degree in The US. “Finance and Fee”. |

Curriculum
Our 39 credit hour curriculum is completed in 16 months. The 39 credit hours are composed of core courses, electives, cross disciplinary electives, capstone or thesis, and an internship.
Program Structure
Required Courses
- 3 Core Courses (9 credit hours)
- Elective Courses (15 credit hours)
- Capstone course – Project or Thesis (3 credit hours)
- Internship (up to 9 credit hours)
- Nugget courses (up to 3 credit hours)
- ITU Presents (1 credit hour)
- ITU Nuggets (2 credit hours)
Elective Courses
A sufficient number of Elective Courses must be completed to bring the total of credit hours to 39.
A minimum 3.0 cumulative GPA (Grade Point Average) is required for granting of the Master’s degree.
Core Courses
ICS 602 | Cryptography and Advanced Cybersecurity |
ICS 503 | Cybersecurity & Network Defense |
ICS 530 | Ethical Hacking & Attack Countermeasures |
Capstone Courses
SWE 690 Capstone Project
or
SWE 695 Master’s Thesis
Internship
INT 593 Internship (1 credit hour required)
Transfer Credits
Up to 9 credit hours from a graduate program of a regionally accredited school with department chair’s approval.
ITU Presents
PRE 500 ITU Presents (1/3)
ITU Nugget Courses
1/3 credit to 2 credit courses
IDS 558 1 | Blockchain and Peer to Peer Software |
IDS 525 1 | Digital Forensic in Finance & Accounting |
IDS 526 1 | HTML/CSS Programming & JavaScript |
IDS 520 1 | Introduction to AI & Machine Learning |
IDS 568 1 | Introduction to Cryptography |
IDS 569 1 | Introduction to Cybersecurity |
IDS 567 1 | Introduction to Digital Forensics |
IDS 540 1 | Introduction to Python Programming |
IDS 570 1 | Mobile and Wireless Ethical Hacking |
IDS 515 1 | Mobile Applications (iOS, Android, and IoT) |
IDS 566 1 | Python for Cybersecurity |
IDS 527 1 | Python for Excel and data analysis programming |
Elective Courses for the Three MS Programs
In each of the 3 MS programs (MSCS, MSIC, MSSE) Electives must be chosen from the list below so that the total number of credit hours is at least 39. All electives count in each program, except when explicitly stated otherwise.
ICS 690 1 | Capstone Project |
ICS 602 1 | Cryptography and Advanced Cybersecurity |
ICS 503 1 | Cybersecurity & Network Defense |
ICS 630 1 | Digital Forensics & Internet Security |
ICS 530 1 | Ethical Hacking & Attack Countermeasures |
ICS 635 1 | Penetration Testing |
ICS 636 1 | Threat Intelligence |
AMS 510 | Linear Algebra (3) |
AMS 540 | Discrete Mathematics (3) |
AMS 750 | Abstract Algebra (3) |
AMS 760 | Practical Number Theory (3) |
CEN566 | Routing in Computer Networks (3) |
CSC505 | The UNIX/Linux OS (3) |
CSC507 | Unix/Linux System Administration (3) |
CSC509 | Windows Administration (3) |
CSC511 | OO Programming with C++ (3) |
CSC512 | Data Structures (3) |
CSC515 | I-Phone Application Development (3) |
CSC518 | OO Programming with Java (3) |
CSC519 | Android Application Development (3) |
CSC520 | Python Programming (3) |
CSC527 | Mobile Web Development (3) |
CSC570 | Web Security Fundamentals (3) |
CSC580 | Computer Algorithms (3) |
CSC633 | Machine Learning (3) |
CSC670 | Network and Data Security (3) |
CSC730 | Cryptography & Cryptanalysis (3) |
CSC750 | Coding Theory (3) |
CSC760 | Advanced Topics in Data Science (3) |
ICS550 | Security Policies (3) |
ICS520 | Personal Computer Security (3) |
ICS620 | Computer Malware (3) |
ICS630 | Digital Forensics Technology (3) |
ICS688 | Special Topics (3) |
SWE510 | Information Security Countermeasures (3) |
SWE520 | Principles of Ethical Hacking (3) |
SWE530 | Cloud Computing Security (3) |
SWE561 | Cloud Computing (3) |
Admission Requirements
- Bachelor’s degree with a minimum GPA of 2.75, or a Master’s degree with a minimum GPA of 3.0.
- Proof of English proficiency:* All applicants whose native language is not English and who did not receive either a bachelor’s or graduate degree from an English-speaking institution must take one of the following English proficiency tests:
- Test of English as a Foreign Language (TOEFL) examination: score of 72 or better for the internet-based test (iBT).
- International English Language Testing System (IELTS) examination: band score of 6.0 or better for the academic module.
- Duolingo English Test: score of 120 or better out of 160.
- Demonstrated commitment to contribute to and complete the program
*U.S. citizens or U.S. Permanent Residents who have earned an undergraduate or graduate degree from a regionally accredited institution in the U.S. are waived from this requirement.
*Who has 2+ years of work experience in the United States are waived from this requirement.
Who
should
apply
ITU’s Information & Cybersecurity program is designed for students who want to acquire in-demand technology skills while learning in a collaborative and entrepreneurial environment in Silicon Valley.
Learning Outcomes
- Be able to secure organizations’ on-premise and cloud-based computing resources.
- Demonstrate in depth knowledge of IS techniques to provide leadership for effective solutions to security problems.
- Have sound knowledge of IS techniques that play a role in organizational processes and decision making.
- Communicate effectively risk management issues and their impacts to a variety of audiences.
- Understand the legal and appreciate the ethical importance of ICS for individuals as well as organizations.
- Business enabler in organizations such as finance, insurance, healthcare, e-commerce, and mail services.
- Work as security expert in federal agencies for whom cyber security is of highest importance such as DOD, DHS, and FBI.