Close Menu

Cyber, System and Network Security and Forensics

Cyber, System and Network Security and Forensics at Illinois Tech

Illinois Institute of Technology’s (IIT) offers undergraduate, graduate and certificates in Chicago, Wheaton and online that are cross-disciplinary and include technology, management, compliance and legal issues.

The Cyber Forensics and Security degree and Network Security degrees are designed to help students and experienced information technology professionals become cyber security and forensics practitioners, investigators, managers and leaders.

Whether you are pursuing a network security bachelor’s degree, cyber security master’s degree or certificate, the courses will enhance your technology skills, prepare you for leadership and management, and provide you with a better understanding of policy issues related to information systems and networks.

National Security Agency (NSA) and U.S. Department of Homeland Security (DHS) Logos

The U.S. Department of Homeland Security and the National Security Agency have designated Illinois Institute of Technology (IIT) as a National Center of Academic Excellence in Cyber Defense Education. 

What Will I Learn?

The bachelor, master and certificate curriculum emphasizes a comprehensive understanding of issues such as information security; information assurance; ethical hacking; vulnerability analysis and control; coding security; securing databases; steganography; mobile device forensics; operating system security; business continuity response; disaster recovery; legal and ethical issues; auditing; evidence; intrusion detection; and forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence.

Where Will I Take Classes?

Courses are offered by IIT’s School of Applied Technology and IIT Chicago-Kent College of Law and are taught by experts in the field with significant academic knowledge and years of experience in the information security and forensics realm in both industry and government service.

Critical Need for Cyber Security and Forensics Professionals

There is a critical need in both the government and private sectors for professionals equipped to prevent, counteract and investigate cybercrimes and information security breaches. According to Bloomberg*, the average cost of security breaches in the U.S. is 7.2 million dollars per incident. Gartner** studies show the average enterprise spends 5.6% of their IT budget on information security, making this a nearly $1 trillion a year industry. The need for educated professionals in this field is clearly spelled out in documents such as the U.S. Committee on National Security Systems Directive No. 500 Information Assurance (IA) Education, Training, and Awareness which mandates information assurance education for the professionals necessary to ensure the development and implementation of a comprehensive approach for the protection of U.S. Government national security systems and the information they store, process, or transmit.

Career Outlook

A degree in Information Technology and Management with a specialization in Cyber, Systems and Network Security and Forensics provides you with knowledge and skills that qualifies you for a variety of careers in the Information Technology field.

  • Information Security Officer
  • Security Manager
  • Security Administrator
  • Cyber Security Analyst
  • Cyber Security Specialist
  • Computer Forensic Examiner
  • Forensic Analyst
  • Vulnerability Researcher/ Exploit Developer

This is a list of actual Information Technology positions that you may obtain as a result of completing your degree. This list is not comprehensive, and is not a guarantee of employment, but is meant to introduce you to the variety of possible career choices available to ITM degree graduates.

Students who have earned a degree in this program are highly recruited by private and public sector. Students who complete the program are also well prepared for advanced certifications such as Certified Information System Security Professional (CISSP) and Certified Information Security Manager (CISM).

Popular Courses in Cyber, System and Network Security and Forensics

ITMS 518 Coding Security
ITMS 528 Database Security
ITMS 538 Cyber Forensics
ITMS 539 Steganography
ITMS 543 Vulnerability Analysis and Control

View the
admission requirements for an:

View the full
course requirements for the: