NCU’s Network Risk Management and Control specialization focuses on developing the skills and knowledge you need to ensure network integrity, functionality, and security by using assessment tools and procedures to evaluate network health and effectiveness of control structures. Specialization courses will cover topics such as network risk management, network modeling and design, and contingency planning and disaster recovery.
The specialization aligns with the knowledge areas required for a Certified in Risk and Information Systems Control (CRISC) certification.
|Credit Hours||Courses||Est. Time to Complete|
|MSIT||30||10||18-21 months||View Course Catalog|
Many online programs offer the ability to take courses without leaving your home, but few offer weekly course starts, no scheduled lecture hours, no group assignments, and the ability to schedule courses around your personal and professional obligations. The option to turn in your assignments as early in the week as you want, provide you the ability to schedule school around your life, not the other way around.
100% Doctoral Faculty
Whether you are completing your bachelor's degree, pursuing your graduate degree, or on the path to earning your doctoral degree, you can rest assured that you will be mentored by doctors in your field of study.
Not only will you learn from a doctor in the field, but you won't have to fight for facetime as one of many within a classroom. At NCU, you'll have the opportunity to interact one-to-one with your professor to get personalized mentoring.
Master of Science in Information Technology – Network Risk Management and Control Learning Outcomes
- Demonstrate an applied knowledge of IT industry standards, resources, and techniques
- Administer IT systems and services to optimize operations
- Conduct technical analysis, design, response, and documentation to support enterprise operations
- Incorporate project management methodology into planning, development, and implementation of IT solutions
- Assess legal, ethical, privacy, and security considerations throughout the information technology life cycle