dcsimg

Master of Information Assurance Degree

By Woodrow Aames

Master of information assurance degree programs may train students in the standardized security protocols so they may step into the IA field with confidence. Information assurance experts may create and oversee measures that protect data systems against compromise.

In a nutshell, information assurance specialists provide the critical line of protection for the nation's government, military, financial, health care and business networks. Enterprise hardware and software networks are vulnerable to attacks that affect system-wide confidentiality, operational availability, authentication and integrity. IA professionals may safeguard against intrusions as well as may also create protocols that detect, block and react to threats while providing restoration measures.

Pursuing a Master of Information Assurance

The National Security Agency has created criteria for information assurance program standards, along with setting the knowledge bar for up-and-coming specialists. Graduate coursework in IA may vary by institution, but general concepts center on the following topics:

  1. Applied cryptography
  2. Computer forensics
  3. Digital rights
  4. Enterprise application architecture and security
  5. Ethics
  6. Security risk management
  7. Wireless security

In addition to classroom lectures, students may often take labs in which they simulate attacks and perform forensic investigations. Master's programs may prepare students to sit for the CISSP--Certified Information System Security Professional certification exam. Many programs are organized under Committee on National Security Systems, or CNSS, regulations and may prepare graduates to meet the Department of Homeland Security and U.S. National Security Agency CNSS 4011-4015 certification.

Enrollment prerequisites may vary by institution but typically require at least a bachelor's degree in computer science, information technology, network administration, computer security, engineering or programming. Time to degree may vary as well based on whether the course is held on campus or online.

Career options in information assurance and security

Information security specialists may seek work in a variety of careers. Graduates may become system managers, take jobs in a specialized IA field, or find an employer looking for someone with their precise credentials. Some may work for a government agency--like the Department of Homeland Security or the Central Intelligence agency--defending against cyber warfare. Some may join financial institutions with an eye toward protecting against hackers or information phishing. Still others enter law enforcement agencies at the Federal, state and local levels to perform forensic sleuthing or develop data security measures. Related job titles include these:

  • Computer security specialist
  • Computer scientist
  • Database administrator
  • Information assurance security professional
  • Network systems and data communications analyst
  • Security consultant

Salaries may vary by employer and are often tied to the candidate's education, experience, security certifications, governmental clearance and specializations. The BLS reports the following 2010 median annual earnings for these related positions:

  • Network and computer systems administrators: $69,160
  • Computer systems analysts: $77,740
  • Computer and information systems managers: $115,780

Famous degree-holders in computer security

Some former computer security students help the nation secure its digital borders and capture criminals; these professionals are called "white hat" hackers. Cyber criminals are known as "black hat" hackers. Here are some famous and notorious examples of security specialists:

  • Robert Tappan Morris. Morris, a Ph.D. from Harvard, made a fortune designing software. But before that, while a grad student at Cornell, black hatter Morris built a "worm" that attacked the Internet. He was fined and spent three years on probation for what he termed "an experiment."
  • Ronald L. Rivest. Rivest is the Viterbi Professor of Computer Science in MIT's Dept. of Electrical Engineering and Computer Science. He is a founder of RSA Data Security, a security partner for more than 90 percent of Fortune 500 companies.
  • Tsutomu Shimomura. Nobel laureate Shimomura is a scholar and physicist at University of California at San Diego. The former staff physicist at the Los Alamos National Laboratory is more famous for helping in the pursuit and arrest of cyber-criminal Kevin Mitnick.
  • Richard Stallman. Stallman is the legendary hacker who quit the MIT Artificial Intelligence Laboratory to found the GNU Project in an effort to create free operating system software.

Online master's degree programs in information assurance may offer the opportunity to gain an advanced degree while continuing professional activity and accumulating experience in the field. The Department of Labor's O*NET website shows a bright outlook for specialists in computer security.


Schools Offering Related Degree Programs

Campus Type :
Zip :

Matching School Ads
Colorado Technical University Online

Pursue Your Future in IT or Computer Science at Colorado Technical University
  • Master of Science in Management - Information Systems Security
  • Master of Science in Computer Science – Computer Systems Security
  • Master of Science in Cybersecurity Policy
  • More Programs..

Liberty University

100% Online & No Standardized Testing

  • MS in Cyber Security
  • Master of Science: Information Technology: Network Design & Security
  • Master of Science: Information Technology: Software Design & Management
  • More Programs..

Keiser University

Since 1977, Keiser University has provided quality student-centered, career-focused education.

  • Master of Business Administration, MBA - Information Security Management
  • More Programs..

Grand Canyon University

Earn your technology master's degree online and become globally competitive in your field. Learn how you can take your career to the next level!
  • Master of Science in Cyber Security (Bridge)
  • Master of Science in Cyber Security
  • M.S. in Information Technology Management
  • More Programs..

Utica College

What They’re Known For

Founded in 1946 and located in the heart of central New York, Utica College is a regionally accredited, independent, private institution that features many of the advantages of a large university — such as undergraduate and graduate degree options, excellent academics, and outstanding faculty — with the intimacy and high degree of personal attention more closely associated with smaller private institutions.

  • MS Cybersecurity - Computer Forensics
  • MS Cybersecurity - Electronic Crime
  • MS Cybersecurity - Intelligence
  • More Programs..

Syracuse University Cyber Security

Established in 1901, the College of Engineering and Computer Science has built a vibrant community of leaders with a reputation for responsiveness in meeting regional, national, and global needs.


EducationConnection

Get Matched to the Right IT, Computer Science, Cybersecurity, Software and Application Development, Web Design or Technology Management Degree Program for YOU.

South University, Online Programs

As a student at South University, Online Programs you will receive the same quality instruction, variety of learning options and level of service found at the campus locations.

Matching School Ads