{"id":483,"date":"2012-02-17T02:23:03","date_gmt":"2012-02-17T07:23:03","guid":{"rendered":"http:\/\/blogs.iit.edu\/itm_loopback\/?p=483"},"modified":"2012-02-22T21:50:40","modified_gmt":"2012-02-23T02:50:40","slug":"iit-trustees-approve-new-graduate-degree","status":"publish","type":"post","link":"https:\/\/blogs.iit.edu\/itm_loopback\/2012\/02\/17\/iit-trustees-approve-new-graduate-degree\/","title":{"rendered":"IIT Trustees Approve New Graduate Degree"},"content":{"rendered":"<p><strong>The Board of Trustees of Illinois Institute of Technology<\/strong>, during their Spring term meeting, approved the School of Applied Technology&#8217;s proposal to offer the <em><strong>Master of Cyber Forensics and Security<\/strong><\/em> degree. The program includes courses drawn from the ITM program and additional courses from the IIT Chicago-Kent College of Law curriculum to give cyber security and forensics practitioners a thorough grounding in legal issues and compliance.\u00a0\u00a0Core courses for this 30-credit-hour degree will include:<br \/>\n<strong>ITMS 538<\/strong> Cyber Forensics<br \/>\n<strong>ITMS 543<\/strong> Vulnerability Analysis and Control<br \/>\n<strong>ITMS 548<\/strong> Cyber Security Technologies<br \/>\n<strong>ITMS 578<\/strong> Cyber Security Management<br \/>\n<strong>LAW 273<\/strong> Evidence<\/p>\n<p>Electives will include twelve hours selected from:<br \/>\n<strong>ITMS 518<\/strong> Coding Security<br \/>\n<strong>ITMS 528<\/strong> Database Security<br \/>\n<strong>ITMS 539<\/strong> Steganography<br \/>\n<strong>ITMS 549<\/strong> Cyber Security Technologies: Projects and Advanced Methods<br \/>\n<strong>ITMS 555<\/strong> Mobile Device Forensics<br \/>\n<strong>ITMS 558<\/strong> Operating System Security<br \/>\n<strong>ITMS 579<\/strong> Topics in Cyber Security (May be taken more than once)<br \/>\n<strong>ITMS 588<\/strong> Incident Response, Disaster Recovery and Business Continuity<br \/>\n<strong>ITMM 585<\/strong> Legal and Ethical Issues in Information Technology<br \/>\n<strong>ITMM 586<\/strong> Information Technology Auditing<br \/>\n<strong>ITMO 456<\/strong> Introduction to Open Source Operating Systems<br \/>\n<strong>ITMT 594<\/strong> Special Projects in Information Technology<br \/>\n<strong>AND<\/strong> at least three hours chosen from:<br \/>\n<strong>LAW 240<\/strong> National Security Law<br \/>\n<strong>LAW 478<\/strong> Computer and Network Privacy and Security: Ethical, Legal, and Technical Considerations<br \/>\n<strong>LAW 495<\/strong> Electronic Discovery<\/p>\n<p>Prerequisites for this degree include ITM 301 or ITM 302, ITMD 411, ITMD 421, and ITMO 440 or ITMO 540. Watch here for more details!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Board of Trustees of Illinois Institute of Technology, during their Spring term meeting, approved the School of Applied Technology&#8217;s proposal to offer the Master of Cyber Forensics and Security degree. The program includes courses drawn from the ITM program and additional courses from the IIT Chicago-Kent College of Law curriculum to give cyber security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3884,3869],"tags":[1648,3886,3898],"class_list":["post-483","post","type-post","status-publish","format-standard","hentry","category-academic","category-security","tag-academics","tag-degrees","tag-security-2"],"_links":{"self":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts\/483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/comments?post=483"}],"version-history":[{"count":4,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts\/483\/revisions"}],"predecessor-version":[{"id":485,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts\/483\/revisions\/485"}],"wp:attachment":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/media?parent=483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/categories?post=483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/tags?post=483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}