The Board of Trustees of Illinois Institute of Technology, during their Spring term meeting, approved the School of Applied Technology’s proposal to offer the Master of Cyber Forensics and Security degree. The program includes courses drawn from the ITM program and additional courses from the IIT Chicago-Kent College of Law curriculum to give cyber security and forensics practitioners a thorough grounding in legal issues and compliance. Core courses for this 30-credit-hour degree will include:
ITMS 538 Cyber Forensics
ITMS 543 Vulnerability Analysis and Control
ITMS 548 Cyber Security Technologies
ITMS 578 Cyber Security Management
LAW 273 Evidence
Electives will include twelve hours selected from:
ITMS 518 Coding Security
ITMS 528 Database Security
ITMS 539 Steganography
ITMS 549 Cyber Security Technologies: Projects and Advanced Methods
ITMS 555 Mobile Device Forensics
ITMS 558 Operating System Security
ITMS 579 Topics in Cyber Security (May be taken more than once)
ITMS 588 Incident Response, Disaster Recovery and Business Continuity
ITMM 585 Legal and Ethical Issues in Information Technology
ITMM 586 Information Technology Auditing
ITMO 456 Introduction to Open Source Operating Systems
ITMT 594 Special Projects in Information Technology
AND at least three hours chosen from:
LAW 240 National Security Law
LAW 478 Computer and Network Privacy and Security: Ethical, Legal, and Technical Considerations
LAW 495 Electronic Discovery
Prerequisites for this degree include ITM 301 or ITM 302, ITMD 411, ITMD 421, and ITMO 440 or ITMO 540. Watch here for more details!
When the Fall 2012 course schedule is published, you will notice something different: instead of ITM, courses in our program will have four-character “subject codes”. They’ll still all start with ITM but the fourth character will indicate a broad subject area. The new subject codes are:
ITMD Development: Application development, web development, multimedia, data management
ITMM Management: Management of information technology, business, law and ethics
ITMO Operations: Networking, communications, operating systems and system administration
ITMS Security: Security and forensics
ITMT Theory and Technology: Theory, systems, system design & general topics in IT
Initially all courses will still have the same number as they did before the transition, but new courses will gradually begin to overlap numbers so you will need to read both the subject code and the number to make sure it’s the correct course. 100-, 200- and 300-level courses will retain the familiar three-letter ITM subject code. We know it’s a bit of a hassle, but really, this is a good thing: it only happened because our program is so healthy that we were in danger of running out of course numbers!
The last day to add courses or to drop them without a fee is January 20th. Please decide very soon what you really want to do this term, and if you are not yet registered, GET REGISTERED! After the final add/drop date, we will add folks to our Microsoft Developer’s Network Academic Alliance software subscription.
Cloud computing is a hot topic these days; if you are considering taking ITM 444/ITM 544 Cloud Computing Technologies in Fall 2012, you should take ITM 456 Introduction to Open Source Operating Systems this spring. It is not a prerequisite, but students who do not have a solid grounding in Linux will be at a distinct disadvantage in the class. (And no one wants to be at at a distinct disadvantage now, do they?)
Social Media Marketing, ITM 495/ITM595, is a last-minute addition for the Spring term. Students in this course will explore the tactics, tools and strategies of incorporating new media channels to successfully grow a business, and/or to maximize the goals of other types of organizations. Topics will include social media components and tactics such as Social Networks, Blogs, Microblogs, Photo Sharing, Audiocasting/Videocasting, Search Engine Optimization, Search Engine Marketing, Mobile Apps; social media tools; social media strategies; how to run a business based on social media; and use of social media for customer relationship management (CRM). The course will be taught by Robert VanDame and will meet Tuesday evenings at 6:25pm in Stuart 238 on the Main Campus. Grading for the course will be based on three exams and a Student Project consisting of development of a Social Media Marketing program for a real or fictional organization. If you need a last-minute addition to your schedule this might be the thing.
As a reminder, our BookList is at http://www.itm.iit.edu/data/ITM_Booklist_12S.pdf.
By the way, we hope to add additional seats to all of our closed sections except ITM 461 sometime on Monday.
ITMS 555 Mobile Device Forensics will be offered in Fall 2012. BUT if you want to take it, you must take ITM 538 Computer and Network Forensics first. it will be taught in the spring 2012 semester so you need to do it in the coming term.
Here is a is a PDF file containing:
♦ An updated course description of ITM 538
♦ A description of ITMS 555 as we see it at this time
http://www.itm.iit.edu/data/ITM_Forensic_Courses.pdf
The Data Center Operations and Management specialization has a three course prerequisite chain which begins with ITM 554, Operating System Virtualization, which will be offered in Spring 2012. It is a lab course at the Rice Campus on Wednesday evenings, but there is a bus from the Main Campus. The follow-on courses include ITMT 535 Data Center Architecture in Fall 2012 and ITMM 576 Data Center Management in Spring 2013. These courses have already been identified by some major players in the data center industry as the best offered and will meet an urgent need for data center professionals. If you want to take advantage of this opportunity, start with ITM 554!
If you are working toward completing the security specialization, ITM 588 Incident Response, Disaster Recovery and Business Continuity will run this spring on Tuesday evenings at IIT’s Downtown Campus; there are buses there to and from the Main Campus, and it is less than a block from Union Station for those in the suburbs. This is also a course that EVERYONE in the Data Center Operations and Management specialization can take as a key elective in that program. It’s at the Downtown Campus because it’s also offered as part of the Master of Public Administration program in their Disaster Management specialization.
(Note the new course prefixes; there will be a bunch of these next fall) Hope you had a great great holiday–and g0t some rest to be energized for the next term!
Congratulations to IIT’s School of Applied Technology students for their award winning IPROs, student projects, and completion of final exams. We wish you a happy and safe holiday season and look forward to seeing you when classes begin on January 9th.
— C. Robert Carlson, Dean of IIT’s School of Applied Technology
The ITM Program is now accepting resumes for the following student positions:
Graduate Teaching Assistant – Jeffry Kimont
Graduate Teaching Assistant – Dennis Hood
Office Assistant – ITM Program and Office of the Dean
Click Read More… below for full details
Read more…
We know finals are exhausting! That is why we have refreshments for you.
The ITM Program will be offering
Free coffee and snacks for ITM students
10am – 5pm
Monday, December 5 – Thursday, December 8
Perlstein Hall, Room 223
Just stop by and grab some.
Also…
Don’t miss the Pre-Finals breakfast with Pat Anderson:
Start your finals day off with IIT’s First Lady Pat Anderson as she hosts the pre-finals breakfast from 9:45 – 10:30 am on Monday, December 5.
Enjoy coffee, fruit, donuts, and juice at Alumni Hall, Engineering 1, Life Sciences, Perlstein Hall, Siegel Hall, Stuart Building, Wishnick Hall, and Tech Park Central (3424 S. State).
ForenSecure12 – IT Forensics & Security Conference & Expo (Formerly NetSecure)
April 19 & 20, 2012
Illinois Institute of Technology – Wheaton, IL (Chicago Area)
We invite your participation as a sponsor/exhibitor, speaker, or attendee of ForenSecure™12: IT Forensics and Security Conference and Expo at Illinois Institute of Technology. This multi-track, technical conference attracts 200+ professionals for an intensive one- and a half-day schedule that includes discussion and debate over forensics, security, data/information
governance, cyber crime and security, ethical hacking, eDiscovery, cloud forensics, steganography, policy and compliance, privacy, wireless security, cloud computing, identity theft, and more. Read on for full details of how you can be a part of this event… Read more…
Topic: Project Presentations and Demonstrations by IIT Students in
Real-Time Communications
Wednesday, November 30, 6:30-9:30 PM
Speakers: IIT Students and Mentors
You are invited to join us for presentations, demonstrations and poster sessions about the Real-Time Communications projects created by students in the VoIP and Data-Communications courses of IIT’s School of Applied Technology. Click “Read more…” to see the full agenda and registration details… Read more…