Online & Education Innovation2018-2019
Computer Information Technology, Master
- Available Emphasis Areas:
- Mobile and Web Application Development - Emphasis
- Project Management - Emphasis
- Information Security & Assurance - Emphasis
The Master of Computer Information Technology (MCIT) program is designed to train students in the information technology domain while also helping students develop highly valued industry-relevant skills. This 30-credit hour non-thesis based master’s program has been developed in consultation with an advisory board of professionals to ensure the program meets current and anticipated workforce needs.
What Can I Do with a Master of Computer Information Technology?
In seeking to address the challenges associated with computer information technology as a persistent and pervasive force in society, organizations across the globe are increasingly looking for employees with skills that cross disciplines to effectively manage technology as well as individuals impacted by technology. Our Computer Information Technology degree takes the interdisciplinary and global approach needed to prepare you to address technology issues and the changes borne of technical advancements. Here, you can accelerate your career, boost your skill set, and learn to operate more effectively in a variety of professional environments.
Our program will educate you on the science of information technology concepts, the organizational impact of technology, the implications of technical innovations and globalization, the theory of change and change mitigation, and the value of research undertaken in technical settings. You will pursue one emphasis area oriented toward your interests in cybersecurity and assurance, or project management.
Career opportunities that might be pursued:
- Cybersecurity Administrator/Analyst
- Cyber Forensics Analyst
- Chief Security Officer
- Information Security Administrator, Analyst/Architect/Manager
- Project Manager
- Web Designer/Architect
- Mobile/Web Applications
- Research Assistant
To receive a master’s degree at Northern Arizona University, you must complete a planned group of courses from one or more subject areas, consisting of at least 30 units of graduate-level courses. (Many master’s degree programs require more than 30 units.)
You must additionally complete:
- All requirements for your specific academic plan(s). This may include a thesis.
- All graduate work with a cumulative grade point average of at least 3.0.
- All work toward the master’s degree must be completed within six consecutive years. The six years begins with the semester and year of admission to the program.
In addition to University Requirements:
- Complete individual plan requirements.
Please note that you may be able to use some courses to meet more than one requirement. Contact your faculty mentor for details.
|Minimum Units for Completion||30|
|Additional Admission Requirements||Admission requirements over and above admission to NAU are required.|
|Oral Defense||Oral Defense is required.
|Research||Individualized research is required.
|Progression Plan Link||View Program of Study|
The CIT Master’s program prepares students to advance their careers in the information technology domain as technology supervisors and project managers, business analysts, lead coders and designers, and researchers. Given the pervasiveness of technology worldwide, students outside the information technology domain may weave their prior industry experience with information technology theories, processes, and best practices to take on roles within the information technology industry. Students who would benefit most from completing this degree include individuals pursuing career advancement in the computer information technology domain as well as individuals transitioning their careers from non-technical backgrounds to the computer information technology domain.
The program emphasizes skills related to the interplay between computer information technology and its supervision, the organizational and human impact of technology, technical innovations, the global reach of technology, and research and associated methods as applied to the computer information technology domain. Theories and models associated with computer information technology, best practices, and current research and examples will provide students with learning experiences rooted in both theory and application of computer information technology concepts and methods to solve business problems. Students will also develop skills associated with critical thinking and reading, reflection, research, analysis, problem solving, and technical and scholarly writing.
Student Learning Outcomes
Core Learning Outcomes:
- Understand and explain overarching computer information technology concepts with respect to computer hardware and software, networking and security, business analytics and intelligence, big data, the importance of a Web presence and Web design across platforms, and the strategic use of information systems as business assets in a technology-infused society;
- Evaluate the impact of technology on business organizations and how information systems can be leveraged to improve the production of goods and services to maintain a competitive advantage;
- Outline the human challenges and opportunities associated with using computer information technology use in business organizations;
- Explain how ethics plays a role when using computer information technology for business purposes;
- Evaluate the impact of disruptive and innovative technologies on business organizations;
- Synthesize an understanding of change theories and prescribe solutions to problems associated with mitigating change in business organizations born of disruptive and innovative technologies;
- Analyze the impact of globalization and technologies for advancing globalization for business organizations as well as provide recommendations for advancing globalization;
- Examine processes and techniques associated with conducting scientific research and the components undergirding scientific research;
- Apply techniques for solving business problems from a scientific research-based perspective.
Emphasis Learning Outcomes:
- Examine key project management theories, project manager roles, and project management frameworks and apply those concepts to information technology project management;
- Outline the key components of the PMBOK or Project Management Body of Knowledge;
- Apply project management techniques to initiate an information technology project;
- Examine the implications for making ethical decisions when managing information technology professionals as well as information technology projects;
- Create a project charter appropriate for an information technology project scenario;
- Analyze the components of a project scope document and how it applies to information technology project management;
- Explain how a project schedule is constructed based on a WBS, project scope, and resource requirements and techniques for project time management;
- Evaluate tools and methods for scheduling project deliverables and apply those concepts, including a Work Breakdown Structure, to identify roles and scheduling resources for information technology project scenarios;
- Create a project scope document for an approved information technology project charter;
- Create a transition plan appropriate for an information technology project scenario;
- Evaluate methods for managing information technology project related human capital including motivational theories, conflict management techniques, methods for building team cohesiveness, conflict management techniques, and communications tools;
- Apply communication strategies to relay complex information technology concepts to both internal and external stakeholders at all levels of an organization including remote/offsite project team members;
- Create an internal/external communication plan appropriate for an information technology project scenario;
- Evaluate types of costs and their relevance to information technology project management, and apply project cost estimating methods to information technology projects;
- Outline techniques for analyzing project risks and opportunities;
- Create a cost management plan for a given information technology project scenario;
- Create a risk management plan appropriate for an information technology project scenario;
- Apply project procurement processes to information technology project management scenarios;
- Perform an impact analysis on an information technology project plan in terms of time/schedule, cost/resources, quality, and scope;
- Identify change, explain how to document change, recommend techniques for mitigating change, and evaluate techniques to acquire stakeholder approval for change associated with a project management scenario;
- Apply quality management theories, tools, and processes to project management scenarios to ensure high quality deliverables;
- Assess techniques and processes associated with closing a project at multiple levels;
- Create a quality management plan appropriate for an information technology project scenario;
- Create a project closure plan for an information technology project management scenario;
- Apply information technology concepts to an information technology research project;
- Demonstrate project management skills, problem solving skills, and communication skills;
- Synthesize research findings in a technical document including the purpose of the research including the problem being solved, a literature review and appropriate theory, a data collection plan, findings and conclusions, and summary and recommendations;
- Create a comprehensive project plan document that at a high level of abstraction includes the following sections: pre-project setup/initiating, project planning, project execution and delivery, project change control and communication, and project closure; and
- Engage in an oral defense of the master’s project highlighting key components including: the problem and rationale for the project, solution, stakeholders, resources including human capital, time requirements, budgetary requirements, risks and opportunities, quality management, ethical considerations, and project closure.
Information Security and Assurance:
- Explore the technical, legal, social, and political theories and issues of Information Security and Assurance including cybersecurity including privacy and data classification as well as vulnerabilities and threats posed by cyber criminals, terrorists, and other threats to our national infrastructure including computer networks as legally regulated by federal laws, executive orders, regulations, and cases related to surveillance, cyber intrusions of national and global proportion, data breaches, privacy issues, and important civil liberties;
- Evaluate best practices associated with planning, managing personnel and processes, generating policies and procedures, and assuring adequate security measures to maintain confidentiality, integrity and availability of computer systems including secure software development, operating systems security, and database design security;
- Identify ethical and legal issues using technology and procedures to manage an equitable, sustainable, and safe computing environment including maintaining compliance with securing and protecting information, copyright laws, and privacy laws from state and national perspectives while accounting for social, ethical, and legal implications when designing technology initiatives and practical applications;
- Integrate risk assessment and management strategies including Control Focused Risk Management and Event Focused Risk Management as well as short and long term risk management and remediation techniques for information technology projects based on an assessment of the security landscape that also includes identifying possible threats, potential vulnerabilities, and likely consequences of security failures;
- Compare and contrast common security standards, associated catalogues of security controls, and cybersecurity models including the CIA triad as well as best practices for implementing security training including certification and accreditation;
- Justify the need for business continuity planning, disaster recovery planning, addressing incident response mechanisms and processes, and describe the components of such plans and processes including information security metrics and key performance indicators (KPIs), security policies, and associated documentation and processes as part of a security assessment and governance initiative to manage cyber-attacks, computer crimes, or natural disasters;
- Explore key concepts and theories of network architecture and associated topics such as network architecture, network security, logical and physical security, cryptography, encryption/decryption, network and security management tools including firewalls, VPNs, virtualization, cloud technologies, intrusion detection DNAs, DMZs, and wireless networks and accompanying security issues;
- Explore techniques and processes associated with computer forensics including computer crimes, electronic evidence, data extraction, and data preservation across various hardware platforms and operating systems incorporating the use of varied media types, boot processes, file systems, and file metadata as well as data recovery, encryption/decryption, steganography, recovering deleted files, identifying hidden files, and log files and monitoring software;
- Apply network forensic techniques and processes including collecting and analyzing network-based evidence, reconstructing Web browsing history, email activity, windows registry changes, intrusion detection, and tracking offenders by using tools and techniques such as intrusion detection and intrusion prevention systems;
- Evaluate the impact of information security and assurance on corporate culture as well as techniques for regulating compliance with security measures and policies in a corporate setting; and
- Demonstrate acquired knowledge and skills in research, writing, and oral presentation by critically applying theories, concepts, and skills to a master’s project.
- Outline a history of the Internet.
- Examine the foundations of mobile and Web application development.
- Assess trends in mobile and Web development.
- Apply the software development life cycle to mobile applications.
- Explore business uses associated with mobile and Web application development.
- Examine the concept of full stack Web development.
- Survey various types of tools used in mobile and Web application development.
- Outline the need for software versioning or version control and associated tools.
- Differentiate between client and server-side programming/processing.
- Examine the use of databases in mobile and Web applications.
- Explain essential database concepts.
- Survey SQL as a means of accessing databases.
- Explore Web server uses.
- Synthesize a protocol for user interface design techniques and best practices.
- Explore editing environments for writing HTML and CSS code.
- Examine the Document Object Model.
- Specify the general HTML structure for a Web page.
- Apply HTML tags for specific uses in Web pages.
- Apply HTML validation techniques and interpret the results.
- Explain the value of CSS and why it is used.
- Evaluate the placement of CSS and when to use each variant.
- Apply CSS to various HTML tags for an enhanced aesthetic and user experience.
- Examine responsive Web design.
- Examine core programming concepts including but not limited to sequence of code, syntax, declarations, data types, variables, assignment, operators such as mathematical, Boolean, and comparison, and control structures such as conditions and looping, and comments.
- Evaluate scripting languages and frameworks for server-side scripting.
- Examine Android fundamentals.
- Download and install the Android Studio development environment.
- Synthesize various Android Studio interface options for application (app) development.
- Implement Android application features using Java.
- Submit applications to Google Play.
- Examine iOS fundamentals.
- Download and install the Xcode development environment.
- Synthesize various Xcode interface options for application (app) development.
- Implement iOS application features using Swift 3.
- Submit applications to the Apple App Store.
- Demonstrate acquired knowledge and skills in research, writing, and oral presentation by critically applying theories, concepts, and skills to a master’s project.
Additional Admission Requirements
- Admission requirements over and above admission to NAU are required.
- NAU Graduate Online application is required for all programs. Details on admission requirements are included in the online application.
- Undergraduate degree from a regionally accredited institution
- Grade Point Average (GPA) of 3.00 (scale is 4.00 = "A"), or the equivalent.
- Admission to many graduate programs is on a competitive basis, and programs may have higher standards than those established by the Graduate College.
- For details on graduate admission policies, please visit the Graduate Admissions Policy
- International applicants have additional admission requirements. Please see the International Graduate Admissions Policy
Individual program admission requirements include:
- Three references - Professional if possible
- Personal statement or essay
- Resume or Curriculum Vitae
Emphasis Requirements - Select One (18 units)
Project Mangement (18 Units)
Be aware that some courses may have prerequisites that you must also take. For prerequisite information click on the course or see your advisor.
Go to mobile site