FOX SCHOOL OF BUSINESS AND MANAGEMENT

Learn more about the Master of Science in Information Technology Auditing and Cyber Security.

About the Program 

The Master of Science in Information Technology Auditing and Cyber Security (MS ITACS) program prepares students for careers as Information Technology (IT) risk managers, cyber security professionals and information systems auditors. MS ITACS is a STEM educational program taught by industry experts and recognized by employers in business and government as a top choice for students seeing to gain knowledge, skills, and competencies essential to employability and success in supervisory and leadership roles in the cyber security workforce.

MS ITACS’ educational program is aligned with IT governance and cyber risk and control knowledge domains of ISACA® and ISC2®, cybersecurity knowledge units of the U.S. National Security Agency, and is the basis for Temple University’s designation as a National Center of Academic Excellence in Cyber Defense Education. This enables MS ITACS program graduates to earn a three-year education experience waiver toward the Certified Information Systems Auditor (CISA®) designation and a one-year education experience waiver toward the Certified Information System Security Professional (CISSP®) designation.

On completion of the MS ITACS program, graduates have knowledge, skills, and competencies in tasks necessary for:

  • Governing and managing IT organizations
  • Explaining how IT systems are implemented and recommending appropriate management, operational, and technical controls
  • Protecting an organization’s information and information systems
  • Conducting research related to emerging IT issues
  • Explaining how IT services are delivered and maintained and recommending appropriate managerial, operational and technical controls
  • Planning IT audit processes, documenting and presenting findings, and making recommendations to organizational managers and business leaders
  • Understanding how organizations’ information systems are attacked and the skills used
  • Planning and explaining how organizations can mitigate cyber risks through effective prevention, detection and response

MS ITACS students take common core courses focused on IT governance, protection of information assets, security architecture, information assurance business acumen; and specialized courses in one of two concentrations: Information Technology (IT) Auditing or Cyber Security. The IT Auditing concentration is taught by industry practitioners, supported by ISACA’s Academic Partnership Program and culminates in a capstone course that prepares the student for the CISA® professional certification exam. The Cyber Security concentration is taught by industry practitioners, supported by EC-Council’s Academic Partnership program, validated by the U.S. National Security Agency and prepares the student for the Certified Information Systems Security Professional (CISSP®) certification exam. Qualified students with necessary prerequisites may take courses from both concentrations.

Time Limit for Degree Completion: 6 years

Campus Location: Main and/or Online

Full-Time/Part-Time Status: The MS ITACS program can be completed on a full- or part-time basis.

Affiliation(s): Research interests of Fox faculty are supported by numerous centers and institutes throughout the Fox School and Temple University.

Accreditation: The MS ITACS program is accredited by the Association to Advance Collegiate Schools of Business (AACSB International). Many MS ITACS instructors are official ISACA trainers/instructors. The MS Cyber Security concentration is a U.S. National Security Agency (NSA) validated Program of Study.

Areas of Specialization: ITACS students are trained in the application of: ISACA’s Control Objectives for Information and related Technologies (COBIT), National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) and Risk Management Framework (RMF), and Federal Risk and Authorization Management Program (FedRAMP®) System Security Plan (SSP). Two areas of concentration are offered:

  • Cyber Security
  • IT Auditing

Job Prospects: The Fox Center for Student Professional Development (CSPD) and the MS ITACS Program’s Industry Advisory Council provide students with career coaching, mentoring, and support throughout their job search and professional development. The MS ITACS degree prepares graduates for employment in IT risk management, cyber security and information systems auditing positions at accounting and consulting firms, banks and financial companies, businesses producing goods and providing services, computer software and hardware companies, information/data service providers, critical infrastructure organizations, government agencies and non-governmental organizations. The U.S. Bureau of Labor Statistics reports 33% job growth through 2033.

Licensure/Certification: Preparation for certification varies by area of concentration, as detailed below:

  • Certified Information Systems Auditor (CISA®): The MS ITACS program's IT Auditing concentration courses and capstone course (MIS 5902) prepare students in the IT Auditing concentration to take the CISA® certification exam. Many MS ITACS instructors are accredited by ISACA and APMG as official CISA trainers/instructors. The MS ITACS program does not require students to take the CISA® exam. This is optional. Experience required for CISA® certification is a minimum of five years of professional work experience in information systems auditing, control or security. The MS ITACS degree can be substituted for three years of experience. For more information, visit https://www.isaca.org/credentialing/cisa/get-cisa-certified.
  • Certified Information Systems Security Professional (CISSP®): The MS ITACS program’s Cyber Security concentration courses and capstone course (MIS 5903) prepare students in the Cyber Security concentration to take the CISSP® certification exam. The MS ITACS program does not require students to take the CISSP® exam. This is optional. CISSP® certification requires a minimum of five years of cumulative paid work experience in two or more of the eight domains of the CISSP® Common Body of Knowledge (CBK). Temple University’s designation as a National Center of Academic Excellence in Cyber Defense (NCAE-CD) qualifies MS ITACS graduates for a one-year waiver of the CISSP five-year work experience requirement. For more information, visit https://www.isc2.org/certifications/cissp.

Non-Matriculated Student Policy: This program requires the student to be matriculated in the degree program or graduate certificate program.

Financing Opportunities: Citizens and permanent residents of the United States are considered domestic students and are typically eligible for federal student loans and alternative loans through private lenders. The Fox School grants 5% tuition scholarships to alumni who are admitted to the program. Temple University’s designation by the U.S. National Security Agency as a National Center of Academic Excellence in Cyber Defense enables qualified MS ITACS domestic students to apply for Department of Defense Cyber Service Academy scholarships.

Admission Requirements and Deadlines

Application Deadline:

Fall:

  • December 15 – Early Admissions Deadline
  • March 1 – Scholarship Deadline and International Deadline
  • June 30 – Final Deadline

Applications are reviewed as they are received and can sometimes be considered after the deadline.

APPLY ONLINE to this Fox graduate program.

Letters of Reference:
Number Required: 1

From Whom: Professional references from an immediate supervisor, current or past, are preferred. Academic references are acceptable.

Bachelor's Degree in Discipline/Related Discipline: The equivalent of a four-year U.S. baccalaureate degree from an accredited university or college is required. For three-year degrees, an evaluation of mark sheets may be required by WES or another NACES organization.

Statement of Goals: Essay prompts can be found in the online application portal.

Standardized Test Scores:
GRE/GMAT: Scores may be requested based on the applicant's academic and/or professional background. Candidates with an undergraduate GPA below 3.0 are required to submit valid GMAT or GRE test scores. Consult an admissions advisor with any questions.

Applicants who earned their baccalaureate degree from an institution outside of the United States must report scores for standardized test of English that meet the minimums below. Exceptions are made for applicants who have subsequently earned a baccalaureate or masters degree from the approved list of countries provided bout the Graduate School.

  • TOEFL iBT: 90
  • IELTS Academic: 7.0
  • Duolingo: 110
  • PTE Academic: 68

Resume: Current resume or CV is required.

Interview: Candidates are invited to interview virtually. Interviews are required on a case-by-case basis.

Optional Essay: Prompts for this optional essay can be found in the online application portal.

Transfer Credit: Upper-level graduate credits from an AACSB-accredited graduate business program, but not previously applied to a conferred degree, may be transferred into the MS ITACS program. The credits must be part of the required degree program at Temple University. To be transferred, the grade must be a "B" or better. The Admissions Committee makes recommendations for transferring credits to the department chair. The maximum number of credits a student may transfer is 6.

Program Requirements

General Program Requirements:
Number of Credits Required Beyond the Baccalaureate: 30

Required Courses:

Information Technology Auditing Concentration

Core Courses
MIS 5202IT Governance3
MIS 5206Protection of Information Assets3
MIS 5214Security Architecture3
MIS 5687Business Skills for ITACS Professionals I 11.5
MIS 5688Business Skills for ITACS Professionals II 11.5
IT Auditing Concentration Courses 2
MIS 5201IT Audit Process3
MIS 5203Systems and Infrastructure Lifecycle Management 13
MIS 5205IT Service Delivery and Support3
MIS 5208Data Analytics for IT Auditors3
IT Auditing Elective 3
Select one from the following:3
Enterprise Resource Planning Systems
Special Topics
Independent Study
IT Auditing Capstone Course
MIS 5902IT Auditing Capstone3
Total Credit Hours30
1

For our partner program with the Beijing National Accounting Institute (BNAI) in China only, students may substitute MIS 5287 Business Skills for ITACS Professionals (3 s.h.) for MIS 5687 Business Skills for ITACS Professionals I (1.5 s.h.) and MIS 5688 Business Skills for ITACS Professionals II (1.5 s.h.).

2

MIS 5122 Enterprise Architecture for IT Auditors (3 s.h.) may also be required of students who are admitted to the program but lack sufficient technical background.

3

Students in the Information Technology Auditing concentration alternately may select up to two courses from the Cyber Security concentration and/or in Computer Science and/or Engineering Security as electives. This is done in consultation with the ITACS Program Director.

Cyber Security Concentration

Core Courses
MIS 5202IT Governance3
MIS 5206Protection of Information Assets3
MIS 5214Security Architecture3
MIS 5687Business Skills for ITACS Professionals I1.5
MIS 5688Business Skills for ITACS Professionals II1.5
Cyber Security Concentration Courses
MIS 5211Ethical Hacking3
MIS 5213Intrusion Detection & Response3
MIS 5215Operating System Security3
MIS 5216Organizational Forensics3
MIS 5217Network Security3
Cyber Security Elective(s) 1
Select one or more from the following, if desired: 20
Special Topics
Independent Study
Penetration Testing
Cyber Security Capstone Course
MIS 5903Cyber Security Capstone3
Total Credit Hours30
1

Students in the Cyber Security concentration alternately may select up to two courses from the Information Technology Auditing concentration and/or in Computer Science and/or Engineering Security as electives. This is done in consultation with the ITACS Program Director.

2

Students earn credit for any elective course(s) taken. The Cyber Security concentration does not, however, require completion of an elective to earn the degree.

Culminating Event:
Capstone Course:
The MS ITACS program culminates in a capstone that prepares students to take the appropriate professional certification examination:

  • Certified Information Systems Auditor (CISA®)
  • Certified Information Systems Security Professional (CISSP®), with a minimum of five years' experience

Accelerated Programs

Undergraduate student may opt to pursue an accelerated +1 program, enabling them to complete both a bachelor's degree and master's degree in less time that the traditional route.

The accelerated pathway for the Information Technology Auditing and Cyber Security MS is open to all Fox School of Business and Management students pursuing a BBA or a BS degree as well as any other undergraduate students who meet the admissions criteria.

Cohort Code: XMISTACS

Minimum Cumulative GPA: 3.25

Graduate Courses Approved to Count for Both Undergraduate and Graduate Degrees

MIS 5202IT Governance3
MIS 5203Systems and Infrastructure Lifecycle Management 1 13
MIS 5206Protection of Information Assets3
MIS 5214Security Architecture3
MIS 5215Operating System Security 23
1

Approved for IT Audit Track only.

2

Approved for Cyber Security Track only

Note: The following courses may be taken with permission of advisor if unable to register for the courses in the above list: MIS 5121, MIS 5122, MIS 5201, MIS 5205, MIS 5208, MIS 5211, MIS 5213, MIS 5216, MIS 5217.

Suggested Academic Plan for Information Technology Auditing Concentration

Plan of Study Grid
Year 3
FallCredit Hours
MIS 5202 IT Governance 3
 Credit Hours3
Spring
MIS 5203 Systems and Infrastructure Lifecycle Management 1 3
 Credit Hours3
Year 4
Fall
MIS 5206 Protection of Information Assets 3
 Credit Hours3
Spring
MIS 5214 Security Architecture 3
 Credit Hours3
 Total Credit Hours12

Suggested Academic Plan for Cyber Security Concentration

Plan of Study Grid
Year 3
FallCredit Hours
MIS 5206 Protection of Information Assets 3
 Credit Hours3
Spring
MIS 5214 Security Architecture 3
 Credit Hours3
Year 4
Fall
MIS 5202 IT Governance 3
 Credit Hours3
Spring
MIS 5215 Operating System Security 3
 Credit Hours3
 Total Credit Hours12

Admissions Criteria

Candidates to the +1 program must:

  • meet the general +1 program admissions criteria:
    • possess a minimum GPA of 3.25 in at least 45 credits of coursework.
    • apply in spring semester of sophomore year. Junior year applicants will be considered for all programs assuming they meet other eligibility criteria.
    • be able to complete junior and senior years within four full-time semesters.
    • possess 12 credits of elective space to be used for graduate coursework. Candidates with less elective space will be considered with the understanding that they will therefore have more than 18 credits remaining to complete the master's degree.
    • be able to complete a graduate degree in the year directly following undergraduate graduation.
  • possess sufficient foundational skills as determine by the program's academic director in a pre-admission skill assessment consultation for each track.
  • provide two letters of recommendation from Temple faculty.

Application link: https://fox.az1.qualtrics.com/jfe/form/SV_a9vvymYpuGaWY8l

Contact Information

Rachel Carr
rachel.carr@temple.edu

Learn more about the accelerated IT Auditing and Cybersecurity program.

Contacts

Program Web Address:

https://www.temple.edu/academics/degree-programs/information-technology-auditing-and-cyber-security-ms-bu-itac-ms

Department Information:

Fox School of Business and Management

1801 Liacouras Walk

701 Alter Hall (006-22)

Philadelphia, PA 19122

foxinfo@temple.edu

215-204-5890

215-204-7678

Fax: 215-204-1632

Submission Address for Application Materials:

https://apply.temple.edu/FOX/Account/Login

Department Contacts:

ITACS Academic Director:

David Lanter, PhD, GISP, CISA, CISSP

david.lanter@temple.edu

215-204-3077

Specialized Master’s Programs Coordinator:

Rachel Carr

Senior Associate Director for Specialized Master’s Programs

foxms@temple.edu

215-204-7678