Online Master’s in Cybersecurity Technology
Study Cybersecurity Technology on Your Schedule
- Apply By: 12/29/25
- Start Class: 01/12/26
The online master’s in cybersecurity technology program at Illinois Tech is designed for professionals ready to lead in the technical core of cybersecurity. Delivered in a 100 percent online format, the program offers the flexibility to balance work and life while gaining hands-on experience in areas like AI for cybersecurity, cloud security, and active cyber defense. You can finish in as few as 12 months and graduate with the skills to step into advanced roles.
Online Master’s in Cybersecurity Technology Details
- Learn from highly experienced professionals who are industry seasoned. Many are CSOs and manage large cybersecurity teams in their organizations.
- The flexibility of this online program lets you balance your studies with professional and personal commitments.
- You can prepare for various certification exams from CompTIA and ISC2 by completing appropriate elective courses.
- You will have opportunities to participate in hackathons, pen testing competitions, NCAE Cyber Games, and in CHICYBERCON, Chicago’s leading conference on Cybersecurity.
Cybersecurity Technology Curriculum
The online master’s in cybersecurity technology program at Illinois Tech equips you to deploy AI-enabled cybersecurity solutions through hands-on, project-based learning. Covering areas like cloud security, database protection, human factors, and active cyber defense, the curriculum is grounded in industry standards. You can also prepare for industry certification exams with the appropriate electives.
Prepare for These In-Demand Certification Exams
- ISC2 Certified Cloud Security Professional (CCSP)
- EC-Council CEH (Certified Ethical Hacker)
- EITCI EITC/IS/OS Operating Systems Security
- ISC2 Certified Information Systems Security Professional (CISSP)
- CompTIA CySA+ (Cybersecurity Analyst)
- CompTIA Security+
- CompTIA Linux+
- CompTIA Network+
M.A.S. Cybersecurity – Technology Required Courses
New technologies have increasingly enabled corporations and governments to collect, analyze, and share huge amount of data related to individuals. Today, the challenge is enabling the legitimate use of the collected data without violating privacy and security. In this course, we are going to analyze the fundamental models of ensuring data privacy and security, and explore potential theoretical models, algorithms, and technologies that can enhance data privacy and security in different contexts, such as market basket, search engine, location-based services, social network, cloud computing, cryptocurrencies, and smart grid. We will also design and implement different techniques (e.g., cryptographic protocols, secure computation, and data sanitization) as well as examine their performance in terms of three critical properties (privacy/security, utility, and efficiency).
LAW 252 Privacy Law
Privacy may be one of the most pervasively discussed issues in this decade as a result of the increased concerns for security in travel, the openness of the internet, the consolidation of information in massive databases both by corporations and by governments, high incidence of identity theft, and the development of more and more highly sophisticated “listening and viewing” devices. This class examines privacy as protected by statute B through a patchwork of privacy acts B and the concomitant freedom of information requirements of a democratic government, as developed through tort doctrine in the courts, and as articulated through the Constitution of the United States and those of the various states. All aspects of privacy are considered, including wiretapping, government-required personal and business information, personal, family, and reproductive autonomy, the “right to be let alone,” and the right of publicity.
OR
LAW 478 Computer and Network Privacy
More and more, both practice and the job market require lawyers who understand the interface between law and technology. This course provides a unique opportunity to understand that interface. No technical knowledge is required. Everything is explained in plain English. The course addresses the issue of privacy in an age of surveillance. How much privacy should we demand? Why does privacy matter? How is privacy to be defined? The course addresses security issues because in the internet age there is no privacy without security and security failures may yet lead to the end of the internet age. The course provides a unique opportunity to really understand the interface between law and technology.
This course is designed to equip students with knowledge and skills necessary to understand, implement, and leverage artificial intelligence (AI) techniques in the realm of cybersecurity. In an era where cyber threats continue to evolve and grow in complexity, AI has emerged as a powerful tool to defend against and mitigate these threats. This course explores the intersection of AI and cybersecurity, providing a comprehensive understanding of how AI technologies can be used to protect computing systems. By the end of this course, students will be well-equipped to leverage the power of AI to enhance cybersecurity efforts, making them valuable assets in the ever-evolving landscape of digital security. Join us on this exciting journey into the world of “AI for Cybersecurity” and prepare to defend against the digital threats of tomorrow. The course is intended for students with a basic understanding of computing and cybersecurity concepts.
This course introduces the applied theories relevant to human factors in information security, digitalization, and sociotechnical environments. It examines the human element through a comprehensive approach that explores human errors, new technologies, and cybersecurity incidents. The course investigates human-related aspects that have an impact on the practices, policies, and procedures that are in place in an organization to secure the firm’s information. Topic areas include human behavior, ethics, psychology, social engineering, the culture of hacking, cybercrimes, security fatigue, and burnout. The analysis covers techniques to prevent intrusions and attacks that threaten organizational data and methods to identify potential insider threats.
This course addresses hands-on ethical hacking, penetration testing, and detection of malicious probes and their prevention. It provides students with in-depth theoretical and practical knowledge of the vulnerabilities of networks of computers, including the networks themselves, operating systems, and important applications. Integrated with the lectures are laboratories focusing on the use of open-source and freeware tools; students will learn in a closed environment to probe, penetrate, and hack other networks.
This course addresses hands-on ethical hacking, penetration testing, and detection of malicious probes and their prevention. It provides students with in-depth theoretical and practical knowledge of the vulnerabilities of networks of computers, including the networks themselves, operating systems, and important applications. Integrated with the lectures are laboratories focusing on the use of open-source and freeware tools; students will learn in a closed environment to probe, penetrate, and hack other networks.
This course will address theoretical concepts of operating system security, security architectures of current operating systems, and details of security implementation using best practices to configure operating systems to industry security standards. Server configuration, system-level firewalls, file system security, logging, anti-virus and anti-spyware measures, and other operating system security strategies will be examined.
ITMS 564 Cloud Computing
Students will learn how to effectively secure cloud-based services and infrastructure in an enterprise setting. Areas addressed will include design principles of secure cloud computing, data security, platform and infrastructure security, application security and the Secure Software Development Life Cycle (SDLC) and DevSecOps processes, and security operations. The course will cover legal, risk, and compliance aspects of cloud computing, all in the context of a set of industry-standard learning domains.
OR
ITMS 514 Programming for Cybersecurity Analytics
This course will introduce essential programming concepts and techniques used in analytics. Students will learn and make use of industry-standard programming languages widely used in application programming for data and statistical analysis in cybersecurity as well as other purposes. Students will understand and use various libraries for data manipulation, preparation, and analysis, and will be equipped to use the programming languages covered in real-world scenarios and circumstances upon completion.
This course includes in-depth examination of topics in the management of information technology security, including access control systems and methodology, business continuity and disaster recovery planning, legal issues in information system security, ethics, computer operations security, physical security, and security architecture, and models using current standards and models.
Prepare for In-Demand Cybersecurity Technology Careers
Graduates of the online cybersecurity technology master’s program are prepared for high-impact roles such as security engineer, cloud security architect, and network defense analyst.
Career opportunities span top employers like Amazon, Cisco, and Accenture, as well as federal agencies like the NSA and FBI. As cyber threats grow more advanced, demand for information security analysts is projected to rise 33 percent from 2023 to 2033.1
Cloud Security Specialist $136,485 per year2
Information Security Engineer $102,282 per year3
Explore More Online Cybersecurity Tracks
Tailor your degree to your career goals with unique cybersecurity degree tracks from Illinois Tech. No matter what your focus is, each track blends technical depth with real-world application. This flexible structure helps you build specialized expertise while preparing for leadership roles in a rapidly evolving field.
Sources
- U.S. Bureau of Labor Statistics. “Information Security Analysts.” Retrieved July 8,2025, from https://www.bls.gov.
- Payscale.com. “Cloud Security Specialist.” Retrieved July 8, 2025, from https://www.payscale.com/.
- Payscale.com. “Information Security Engineer.” Retrieved July 8, 2025, from https://www.payscale.com/.