Information Technology

Online Master of Science in Information Technology (MS)

Save @ APU

$0 Application Fee
$0 Transfer Credit Evaluation

0 Entrance Exams
No GRE/GMAT Required

About This Program

The online master’s in information technology from American Public University (APU) provides you with an advanced understanding of information systems development and implementation, including database systems, object-oriented analysis and design, IS architectures, and IT project management.

With this MS in Information Technology, you’ll become familiar with best practices in security and computer forensics. You’ll also study the theory, principles, best practices, tools, and technologies associated with the IT marketplace, and improve your problem-solving, planning, research, leadership, and management skills for solving complex, real-world business problems.

Coursework in this program is taught by expert practitioners with considerable real-world knowledge.

What You Will Do

  1. Learn key management theories, principles, best practices, tools, and technologies associated with information systems, and enhance your knowledge of research methods and tools
  2. Grow your understanding of graduate-level critical thinking, reasoning, and writing to defend your logic and your conclusions in scholarly research projects
  3. Understand the processes, phases, domains, and measures for effective, complex IT project management
  4. Create an optimized enterprise database system and a plan addressing the principles and challenges in incorporating emerging network architectures, technologies, and protocols into IT systems
  5. Study how to produce legal, social, ethical, and technical solutions for securing information systems

View Program Outcome Assessment Results

Degree at a Glance

Number of Credits
36
Cost Per Credit
{{{GraduateTuition}}} | {{{GradPreferredMilitaryRate}}}*
{{{GraduateVeteranGrant}}}** | {{{GradOpportunityGrant}}}***
Courses Start Monthly
Online
  • Want to Learn More?

    Step One: Introduce Yourself
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here

Program Requirements Printable Catalog Version

Students must choose a concentration for this degree program:

The world of Information Technology is replete with projects that were abandoned because of runaway scope and cost. On the other hand, the trend in the world economy is shrinking budgets and shorter deadline, all this while projects are getting more complex. This concentration focuses on meeting industry needs for IT Managers that can manage cost, time, scope, quality, risk, and people to ensure that projects come in on time and under budget. It also addresses strategic planning and business systems analysis.

Objectives:

Upon successful completion of this concentration, the student will be able to:

  • Appraise the principles and practices for organizing, allocating, and managing project resources.
  • Analyze the project management framework, including the stakeholders, domains, phases, processes, integration, and lifecycle.
  • Examine the potential complexities and pitfalls in initiating and closing projects; and assess methods to mitigate this risk.
  • Appraise the unique challenges in managing the scope, time, and cost of Information Technology projects.
  • Examine various project cost models; also analyze the principles of earned value management (EVM).
  • Assess the principles, strategies, challenges, and measures for managing quality and risk on IT projects.
  • Analyze the phases, procedures, deliverables, and best practices for business systems analysis.

Must take all courses for this section.

Course ID: 4090

|
The course is an advanced study of project management; it takes a systems approach to project management and examines project integration, project management knowledge areas (domains), project life cycle, software development life cycles, phases, and process groups, such as project initiation, planning, executing, controlling, and closing. This course also appraises the challenges and the techniques for managing scope on IT projects. This course also assesses methods, tools, and techniques to perform time management. Students are recommended but not required to have access to Microsoft Project®. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: ITMG624) Microsoft Project® is a registered trademark of Microsoft Corporation.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session

Course ID: 4089

|
E-Business projects have become even more commonplace than the neighborhood bowling alley; e-Business development time lines have shrunk dramatically while costs have increased significantly. While traditional IT project managers have filled the gap, it should be recognized that e-Business introduces challenges over and above that of traditional IT project management. This course is a study of the project management framework related to e-Business, it includes: strategic planning, risk management, web content management, customer relationship management, security and privacy management, web usability, agile application development, application deployment, search engine optimization (SEO), internet marketing, and vendor management.
Registration Dates Course Dates Session Weeks
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session

Course ID: 5344

|
This course is an advanced study of the methods and practices associated with developing a project schedule with assigned resources. The course begins with the initiating process group and continues through scope, schedule, and resource planning. Students must have access to Microsoft Project®. Course software requirements, including the appropriate versions, are listed under the course materials site. (Prerequisite: ITMG624) Microsoft Project® is a registered trademark of Microsoft Corporation.
Registration Dates Course Dates Session Weeks
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session

Course ID: 5406

|
This course is an advanced study of information technology project management with a focus on the integrated project plan. This course will be taught from a mixture of analytical and practical methods. Topics include communication management, human resource management, project quality management, project risk management, procurement management, project stakeholder management, and project closure and lessons learned. It assesses various theories and applies these theories to help students develop effective project plans. This course also addresses the inherent risk in various kinds of plans and examines the principles of effective integrated project plans. Students are recommended to have access to Microsoft Project software. (Prerequisite: ITMG624)
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 5411

|
This course is an advanced study of executing, monitoring, and controlling IT projects. Quality projects do not happen; they must be planned, promoted, and practiced intentionally and deliberately. This course examines the various models and methods for directing and managing project work and risk. This course demonstrates how to apply appropriate execution, monitoring, control, and risk responses to minimize project failure. Students must have access to project management software and tools. (Prerequisite: ITMG624)
Registration Dates Course Dates Session Weeks
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session

The primary challenge for ecommerce is assuring the security and integrity of information systems. We are bombarded daily by news of viruses, worms, malware, breaches, infiltrations, denial-of-service attacks, and the like. The ability of an organization to secure and assure its information technology assets is essential to conducting global commerce and to establishing a robust economy; this is a particular challenge given the rapidly changing face and assets of the virtual intruder. The ability to compromise an organization’s information assets is a direct threat to their competitive advantage; and the ability to protect the information assets of an organization is essential to maintaining clientele, trust, revenue streams, credibility, and the survival of the organization. This concentration focuses on securing the information technology assets of an organization. Areas include network security, telecommunications security, computer forensics, legal and ethical issues, cybercrime, computer forensics, information assurance, security risk mitigation, information systems audit and certification, intrusion detection, and incident handling.

Objectives:

Upon successful completion of this concentration, the student will be able to:

  • Profile the emerging security threats and trends, and analyze the information systems vulnerabilities that they exploit.
  • Assess the methods and techniques for recognizing and profiling attack patterns.
  • Categorize and analyze the different types of cryptography, encryption keys, malicious software, and types of attacks.
  • Analyze the methodologies for investigating computer-related crime and for incident handling.
  • Appraise the legal and regulatory compliance requirements related to Information Assurance and Information Systems.
  • Security and assess the social, ethical, economic, and technical impact of information systems security.
  • Analyze the challenges encountered in establishing information systems security, information assurance, and business continuity.
  • Examine the models and methodologies for performing security vulnerability assessment and risk mitigation; also analyze the principles and practices for appraising and certifying systems security.

Must take all courses for this section.

Course ID: 3871

|
Telecommunications networks are a critical component of the global economic and social infrastructures. Securing critical infrastructure is an established priority within Information Security Management. This course examines the field of secure telecommunications networks, including emerging threats, system vulnerability, network evolution, and network defense mechanisms.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 3872

|
This course examines the tenets of Intrusion Detection, Intrusion Prevention, and Incident Handling. Intrusion Detection focuses on the methods to detect attempts (attacks or intrusions) to compromise the confidentiality, integrity or availability of an information system. Also included is an analysis of the principles and practices of intrusion detection, intrusion prevention, and incident handling; network-based, host-based, and hybrid intrusion detection; identifying attack patterns; deployment of resources and responses to handle the incident, surveillance, damage assessment, risk assessment, data forensics, data mining, attack tracing, system recovery, and continuity of operation.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 3873

|
The course analyzes computer and systems security measures by examining a model for information assurance; it also examines the components of a comprehensive Information Assurance plan. Topics included are: asset identification, human factors, compliance with regulations, personnel security, risk assessment and ethical considerations, IA policy, as well as computer and network security tools.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 4103

|
This course is an advanced study of the principles, practices, procedures, and methodologies to assure the protection and availability of vital digital information systems assets. It examines information assurance, incident management and response, and security standards; and it appraises the convergence between information security, information systems security, and information warfare. This course appraises organizational, legal, technical, and ethical issues related to securing vital digital assets. Topics include: the role of the corporate security officer, corporate cybercrime, electronic commerce, cryptography, and international standards, policies, and security acts. (Prerequisite: ISSC660)
Registration Dates Course Dates Session Weeks
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session

Course ID: 4098

|
This course examines the phases, processes, standards, the levels, and the process areas of the INFOSEC Assessment Capability Maturity Model (IA-CMM). The IA-CMM minimizes false indications of quality and maturity by relating the IA-CMM process areas to the INFOSEC Assessment Methodology (IAM). This course appraises the principles and methodologies of the IA-CMM; and applies it to develop an organizational ratings profile to provide a measure of maturity. The ratings profile is used to develop strategies to mature the organizational processes. (Prerequisite: ISSC660)
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

The societal impact of cybercrime has become commonplace; it is broadcast on the evening news and is a favorite playing field for television shows and moviemakers. Technology is a boon to society, but, in malicious hands, it becomes a valuable instrument in a dark and sinister underworld; and, unfortunately, cyber legislation and forensics have been lagging way behind when it comes to cybercrime. The process of forensics investigation can destroy the very evidence it is seeking to assimilate. The window of opportunity for collecting evidence can be a few seconds or minutes depending on the sophistication of the perpetrator. This concentration pertains to the study of various forensics models to identify, preserve, collect, examine, analyze, prepare, and present evidence for prosecuting cybercrime.

Objectives:

Upon successful completion of this concentration, the student will be able to:

  • Evaluate data security, integrity, exposure from multifunctional devices, tracking techniques, and forensics models for analysis and examine the inherent challenges in the processes for seizing electronic evidence.
  • Evaluate the principles, practices, and inherent challenges of the e-discovery process and assess the tools, techniques, and procedures to legally seize and forensically evaluate digital crime scenes.
  • Analyze concealment and cloaking techniques and technologies such as cryptography, steganography, and data hiding and investigate corresponding legislation and mitigation techniques.
  • Assess and mitigate potential exposures and the risks of the chain of custody and examine the methodologies to mitigate the potentially narrow window of opportunity for collecting digital evidence.
  • Investigate models to examine the financial and societal impact of technology-related crime.
  • Appraise the legal and regulatory compliance requirements in investigating and prosecuting technology-related crimes.

Must take all courses for this section.

Course ID: 3860

|
This course examines information concealment techniques, technologies, hardware, software, and relevant legislation for cyber forensics to reveal and track legal and illegal activity. The course examines the process for investigation and introduces the tools and procedures required to legally seize and forensically evaluate a suspect machine. Also covered are the rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities, and revealing concealed information using cyber forensics.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 4099

|
The global reach of the Internet, the low cost of online activity, and the relative anonymity of users has led to an increase in computer related crimes. This course focuses on cybercrime investigation and prevention; it appraises the legal issues related to on-line criminal conduct, the collection of electronic evidence, and the onslaught of new technology. This course also analyzes the phases, processes, and challenges of cybercrime investigations, and it examines technical, legal, and social issues relating to the search and seizure of digital evidence and computer forensics. Students will encounter the challenges of the latency between technology and the law.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 4100

|
This course is an advanced study of information ethics, cyber privacy, and intellectual property. It examines the ethical, economic, and societal issues that face today’s information-entrenched society; this includes intellectual property rights, privacy, accessibility and censorship. The explosive growth of information technology, the increased competition in the global marketplace, and the surge in the use of information to protect society from terrorism has led to the unintended erosion of fundamental rights and values. This course appraises the current state of information ethics, the dangers and opportunities presented by information technology, and the potential solutions to the inherent risks in today’s information-bound society.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 4101

|
This course is an advanced study of the models of investigative methods for finding evidence in a wide scope of disparate digital devices such as computers, laptops, netbooks, networks, mobile devices – phones, notepads, PDAs, digital audio and video players, and any device or appliance that carries an electronic circuit board which could potentially store data or information. It also examines the science, the evidence, and the law related to digital forensics, the validation of findings, and determination of acceptable and irrefutable evidence in a court of law. It also evaluates various digital forensics models for data identification, preservation, collection, examination, analysis, preparation, and presentation. ( Prerequisite: ISSC621 )
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 4102

|
This course is an advanced study of the principles and methodologies of the e-discovery process and the increasing importance of digital evidence in litigation. Topics include contemporary investigative methods, legal issues, cost containment, collecting and prioritizing data sets, preservation of digital evidence, document review, metadata and spoliation considerations, comparative assessments, and forensic investigations. (Prerequisite: ISSC621)
Registration Dates Course Dates Session Weeks
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session

Must take all courses for this section.

Course ID: 2679

|
This course addresses information systems, to include their nature and role as key management resources. This course covers the information systems infrastructure, to include databases, knowledge management systems, enterprise information portals, telecommunications, the Internet, and wireless technology. It examines the topics of e-commerce, information systems in the global economy, managing global systems, securing information systems, and ethical and social issues in information systems.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 4097

|
This course examines the principles, practices, and methodologies of enterprise database systems from conceptual design to implementation; this includes architectures, models, design, management, implementation, and security. Included is a total life-cycle database design and implementation project that entails conceptual design, data modeling, normalization, optimization, and implementation. This course appraises object-relational and relational databases, examines Entity-Relationship (ER), Extended Entity-Relationship (EER), and Unified Modeling Language (UML) data models, and investigates relational procedures, dependencies, keys, relationships, cardinality, and referential integrity. It also evaluates query processing, performance tuning, transaction processing, concurrency, data integrity, database recovery, data security, data warehousing, data mining, and emerging technologies. Prior knowledge in a procedural database language such as PL/SQL or T/SQL using Oracle or MSSQL respectively is highly recommended.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 3870

|
This course is a study of computer networks and the evolution of modern communication systems. It examines the various layers of the basic reference models such as the five-layer IP model or the seven-layer OSI model, by scale, connection method, network architecture, or topology. This course also includes an in-depth analysis of transmission protocols, communications systems, and networks. Prior knowledge of networks and networking is recommended.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 3874

|
Information Security includes an evaluation of the techniques, policies and strategies to ensure that data stored in an organization's computers cannot be accessed or processed without the consent of the organization. Also included, is an analysis of Information Security & Risk Management, Access Control, Physical Security, Security Architecture & Design, Business Continuity & Disaster Recovery Planning, Telecommunications & Network Security, Application Security, Operations Security, Law, Compliance & Investigations. This course also reviews the building blocks of information systems and cryptography is provided to reinforce the scope of security management.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 4095

|
This course focuses on the research methods, tools, instruments, and devices used in Information Sciences and Information Technology; it appraises the logic of the scientific method, research design, qualitative and quantitative analysis of data for the purpose of conducting and reporting basic research in a scholarly and academic setting. Through concentration-based case studies, it investigates current trends, legal and ethical issues, global and societal impact, policies, and applications in the fields of information technology, information security, cyberlaw, digital forensics, and media management. This course evaluates methods to collect, classify, categorize, evaluate, assess, and report research data, to formulate valid research questions, and to derive logical conclusions. The principles, practices, tools, and methodologies presented in this course are applicable throughout the program of graduate studies.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 2756

|
This course explores successful project management for information technology projects. The System Development Life Cycle (SDLC) models are defined including the waterfall, spiral, incremental release, and prototyping models. Students will differentiate between these models and apply corresponding project management methods to identify critical checkpoints and reviews. Risk management, as applied to technology projects, is examined. Key project indicators are discussed, and students will explore defining measurement criteria for determining critical success factors on a project. The course defines the application of knowledge, skills, tools, and techniques to project activities and includes a tutorial for Microsoft Project. Emphasis is placed on the three dimensions of the information technology project constraints: scope, time, and cost. Students are recommended to have access to Microsoft Project. Course software requirements with the appropriate versions are listed under the course materials site.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session
Select any courses that have not been used to fulfill major requirements. Credits applied toward a minor or certificate in an unrelated field may be used to fulfill elective credit for the major.

Choose 3 credit hours from this section.

Course ID: 4892

|
The Information Technology Creative Project Capstone course gives students the opportunity to address real-world issues relevant to their profession, plan and execute a project, contribute to their discipline while developing mastery of selected skills. Creative projects may originate from a wide variety of options such as standard operating procedures, training program manual, organizational change proposals, software and hardware design or development, or other information technology solutions. NOTE: This course may not be taken until all other courses are COMPLETED and student has a 3.0 GPA. THIS COURSE IS 16 WEEKS.
Registration Dates Course Dates Session Weeks
01/29/24 - 06/28/24 07/01/24 - 10/20/24 Summer 2024 Session A 16 Week session
03/25/24 - 08/30/24 09/02/24 - 12/22/24 Summer 2024 Session C 16 Week session

Course ID: 4094

|
Capstone course of studies completed toward the graduate degree in Information Technology. The student will complete a research thesis that demonstrates mastery and application of advanced research and analytic skills related to the learning outcomes of this degree program. NOTE: This course may not be taken until all other courses are COMPLETED and student has a 3.0 GPA.THIS COURSE IS 16 WEEKS.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 09/22/24 Spring 2024 Session C 16 Week session
01/29/24 - 06/28/24 07/01/24 - 10/20/24 Summer 2024 Session A 16 Week session
02/26/24 - 08/02/24 08/05/24 - 11/24/24 Summer 2024 Session K 16 Week session
03/25/24 - 08/30/24 09/02/24 - 12/22/24 Summer 2024 Session C 16 Week session

Courses Start Monthly

Next Courses Start
Register by

Admission Requirements

All APU master's degree and graduate certificate programs require a bachelor’s degree (or higher) from an institution whose accreditation is recognized by the Council for Higher Education Accreditation (CHEA).

For this program, you must provide an official transcript of your previously completed bachelor's or master's degree and have ONE of the following:

  • Associate or bachelor's degree in information technology or a related field (ex: computer science, information systems, database development, etc.)
  • 2 years of work experience in the specific sub-field for this degree
  • Completion of one of our undergraduate IT certificates
  • Completion of 6 credits in IT-related courses
  • Completion of an IT-related minor or concentration during your undergraduate program
  • Certifications in at least one of the below:
    1. CompTIA Security+® (2010 to present recommended)
    2. CompTIA Network+® (2010 to present recommended)
    3. CompTIA A+® (2010 to present recommended)
    4. CompTIA Project+® (2010 to present recommended)
    5. CompTIA CySA+® (2010 to present recommended)
    6. CISSP® certification (valid up until the expiration date)
    7. SSCP®
    8. EC-Council Ethical Hacking
    9. Cisco CCNA® Security
    10. A valid and current Project Management Professional certification from the Project Management Institute

CompTIA Security+®, CompTIA Network+®, CompTIA A+®, CompTIA Project+®, and CompTIA CySA+® are all registered trademarks of the Computer Technology Industry Association, Inc.

CISSP® and SSCP® are registered trademarks of International Information Systems Security Certification Consortium, Inc.

CCNA® is a registered trademark of Cisco Technology, Inc. 

IMPORTANT NOTES

  • If the IT-specific requirements are not noted in the official bachelor's or master's transcript, you must provide official copies of your undergraduate transcripts that show the appropriate coursework.
  • The verification of the 2-years work experience needs to be sent to the university via formal resume/CV.
  • Preadmission courses must have been completed within the last 7 years and at the undergraduate level must be graded C or better; B or better at the graduate level.

Please read all graduate admission requirements before applying to this program and be prepared to submit the required documentation.

An APU admissions coach will contact you via email or phone to assist you with the enrollment process, review your documentation, and to notify you when you have been admitted into the program and may register for courses.

Materials Cost

Technology fee: $85 per course 

Need Help?

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an APU admissions coach at 877-755-2787 or [email protected].

Quality Education Should Be Affordable

So you can focus on the opportunities ahead, without the financial burden of more expensive schools who are not as invested in your success. Learn more about paying for school.

Consumer Information

Disclosures

Maryland Residents learn more about costs, completion rates, median debt, and more.

 

1The University reserves the right to accept or deny credits according to policies outlined on our University website. Please see the University's transfer credit policy webpage for complete information.

*Cost Per Credit Hour

The Preferred Military Rate is $250 per credit hour for undergraduate and master's-level courses. This rate is available to all U.S. active-duty servicemembers, National Guard members, Reservists, and military families, including parents, spouses, legal partners, siblings, and dependents.

See all military student benefits.

Cost of Attendance

Learn more about American Public University's cost components and full cost of attendance