UDM is a Center of Excellence in Information Assurance

Create Confidence and Secure Information in a World Full of Digital Vulnerabilities

We live in a global society that is dependent upon computers and the information that they process. News headlines frequently remind us of the threats that prey on the systems that comprise our critical infrastructure. Other nations, hackers and identity thieves work hard to exploit the weaknesses in an information system.

Cybersecurity is a field of study that is critical to our National well-being. Cybersecurity protects information in the public and private sectors through the strategic assessment of risk, design and development of the security architectures that mitigate risk, and enforce the necessary accountability to assure that all of our cyber assets are secure and that the information they contain is confidential, trustworthy and available.

University of Detroit Mercy (UDM) is recognized by the National Security Administration and the Department of Homeland Security as a Center for Academic Excellence in Information Assurance. Having held that designation since 2004, UDM has a decade of expertise behind each class that drives you as a professional to be the best in your field.

Complete Your Degree in One Year - In Class or Online

The UDM master's degree in Information Assurance consists of 30 credits and can be completed in one academic year at our Detroit, Michigan, McNichols Campus or for a substantial cost savings through our online campus.

Students will earn the following CNSS certifications upon graduation: NSTISSI 4011- fundamentals CNSSI 4012 IA management These certifications signify that an individual has a demonstrated understanding of information assurance (IA), computer systems, information management, and systems security.

What You Will Learn

UDM's master's program in Information Assurance will provide you with comprehensive knowledge of the entire field of cybersecurity. This holistic understanding will allow you to developing total protection solutions that will mitigate cyber-risks to acceptable levels in government, business and industry. You will learn all of the basic cybersecurity principles, technologies and processes and then take seven elective classes tailored to your interests. These elective classes are designed to prepare you to step into specific roles in the cybersecurity workforce and are geared to the National Cybersecurity Workforce Framework (NICE 2.0), which is the commonly accepted definition of the various jobs in the field.

Specialty courses will range from technical classes on one end of the spectrum, like ethical hacking, incident response and digital forensics. It also offers strategic and managerial knowledge in Cyber Operations, Software and System Assurance, Supply Chain Risk Management, Secure Governance and Controls and Regulatory Compliance on the other.

These courses are taught by experts in the field. Dr. Daniel Shoemaker one of the primary instructors. He is one of the authors of the National Software Assurance Common Body of Knowledge (CBK) for the Department of Homeland Security. Shoemaker has written and lectured on cybersecurity and information assurance topics throughout the eastern United States and Canada. He founded the International Cybersecurity Education Coalition (ICSEC), which is an NSA sponsored consortium of higher education institutions located in Michigan and Ohio.

Jobs, Jobs, Jobs

Qualified individuals with strong foundations in information assurance and cybersecurity are in high demand, with growth in the field projected to be 37 percent by 2022.  Review our "Successful Graduates" tab and look at many places our graduates are using their knowledge and skills.

Is This the Right Degree for You?

UDM's master's degree in Information Assurance is applicable across a broad range of careers and interests. Below are some of the types of people who have taken this course and advanced their careers. If you have an interest in cybersecurity, please contact us to discuss how this degree may be right for you.

  • Bachelor's degree with an interest in employment in government or business cybersecurity work
  • Management or technical position in cybersecurity with interest in developing capabilities
  • Currently employed in software or systems development with interest in transitioning to security
  • Currently employed in information systems or networking with interest in transitioning to security
  • Currently employed in financial sector with interest in transitioning to cyber Currently employed in physical security with interest in transitioning to cyber
  • Former military any MOS interested in transitioning to/entering field of cyber
  • Law enforcement or first responder interested in transitioning to/entering field of cyber Legal background interested in transitioning into new specialization
  • A concentration in information systems, or networking from a community college

To learn more or request information, email: clae@udmercy.edu.


CNSS_logo

The program in cybersecurity offered at the University of Detroit Mercy has been certified to meet all of the elements of the Committee on National Security Systems (CNSS) Standard for Information Assurance Professional (CNSS 4011) and System Management (CNSS 4012), making UDM part of an elite group of academic institutions certified by our government’s highest national security agency in offering educational programs in cybersecurity and information assurance.

  • NSTISSI 4011- fundamentals
  • CNSSI 4012 IA management
  • NSTISSI 4011 Information Systems Security (INFOSEC) Professionals
  • NSTISSI 4012 Senior Systems Managers

The University of Detroit Mercy is designated a Center of Academic Excellence in Information Assurance Education (CAE/IA) sponsored by the National Security Agency (NSA), Department of Defense (DoD), and Department of Homeland Security (DHS).

Master of Arts in Information Assurance

30 credit hours | Finish in One Academic Year!

Both the online and classroom courses for the Master of Arts in Information Assurance are designed to deliver the tools you need to think holistically for effective data protection across networks. Our faculty, who are experts, and have written leading text books, will help you to connect the dots between technology and the human side of enterprise to develop and deploy effective protection solutions that extend beyond electronic threats.

10-Years Strong as a National
Center of Academic Excellence in Information Assurance

 Curriculum

All Classes are 3 credits each.

FALL

CIS 5700 Principles (core - necessary foundations)

CIS 5730 Cyberlaw (compliance is a major issue in cyber – c.f. HIPAA, FISMA etc.)

CIS 5200 Specification (basis of all acquisitions – COTS and SCRM)

WINTER

CIS 5750 Technologies (core- technological countermeasures COMPUSEC, NETSEC and Crypto)

CIS 5790 Management Processes (core – managerial countermeasure areas Compliance, Continuity, Personnel and Physical Security and secure SSCA)

CIS 5300 Assurance Processes (techniques for security assurance – with a technological focus – blends with the two above)

SPRING

CIS 5910 Audit (fundamental basis of managerial control over IT processes but also applies directly to SOX)

FALL

CIS 5550 Database Design (this would normally NOT be included but we need it for the NSA criteria)

CIS 5720 Incident Management (specific techniques for assuring effective response to breaches)

CIS 5800 Supply Chain Risk Management (number one topic in DC because of COTS – needed to control vertical integration)


Specialization available: software assurance - secure software engineering

CIS 5700* Information Assurance Principles
CIS 5750* Information Assurance Technologies
CIS 5790* Information Assurance Processes

Electives (7 required)

CIS 5010 Introduction to Information Systems
CIS 5050 Project Management
CIS 5100 Object Orient software Development
CIS 5200 Specification
CIS 5250 Secure Software Construction
CIS 5300 Software Assurance
CIS 5350 Metrics and Models for Software Management
CIS 5400 Software Management
CIS 5540* Post-Release Sustainment
CIS 5550* Database Design
CIS 5570* Networks
CIS 5580 System Forensics
CIS 5590* Advanced Network Security
CIS 5600* Homeland Security Studies
CIS 5650 Information and Society
CIS 5660 Access Technology
CIS 5710 Ethical Hacking
CIS 5720  Incident Response
CIS 5800* Advanced Topics
CIS 5890 International Software Management
CIS 5900* Certifications
CIS 5910* Audit
CIS 5950 Directed Research
CIS 5990 Master's Thesis
SEC 5560 Terror Treats and Information Assurance
SEC 5870 Physical and Personal Security
SEC Select SEC courses with pre-approval

To learn more or request information, email: clae@udmercy.edu.

University of Detroit Mercy's master's degree in Information Assurance prepares graduates for careers identified by the National Workfrorce on Cybersecurity Framework in the "Securely Provision Category. This category relates to specialty areas that conceptualize, design and build secure information technology systems.  Opportunities exist under Information Assurance Compliance and Secure Software Engineering.

Below are a list of typical job descriptions and titles from the National Initiative for Cybersecurity Careers and Studies:

Information Assurance (IA) Compliance
Oversees, evaluates and supports the documentation, validation and accreditation processes necessary to ensure that new information technology systems meet an organization's security requirements. Ensures appropriate treatment of risk, compliance and assurance from internal and external perspectives.

Auditor Information Assurance Compliance Analyst/Manager Security Control Assessor
Certification Agent Information Assurance Manager Systems Analyst
Compliance Manager Information Assurance Officer Validator
Designated Accrediting Authority Portfolio Manager For a list of tasks and knowledge, skills
and abilities, visit the NICCS website.
Information Assurance Auditor Risk/Vulnerability Analyst

Software Assurance and Security Engineering

Develops and writes/codes (or modifies existing) computer applications, software or specialized utility programs following software assurance best practices.

Analyst Programmer Information Assurance Software Developer Software Developer
Computer Programmer Information Assurance Software Engineer Software Engineer/Architect
Configuration Manager Information Assurance Officer Systems Analyst
Database Developer/Engineer/Architect Research and Development Engineer Web Application Developer
Information Assurance Engineer Security Engineer For a list of tasks and knowledge, skills
and abilities, visit the NICCS website.

Systems Development

Works on the development phases of the systems development lifecycle.

Firewall Engineer Information Systems Security Engineer Systems Security Engineer
IA Developer Program Developer For a list of tasks and knowledge, skills
and abilities, visit the NICCS website.
IA Engineer Security Engineer
IA Software Engineer Systems Engineer

Systems Requirements Planning

Consults with customers to gather and evaluate functional requirements and translates these requirements into technical solutions. Provides guidance to customers about applicability of information systems to meet business needs.

Business Analyst Human Factors Engineer Systems Consultant
Business Process Analyst Requirements Analyst Systems Engineer
Computer Systems Analyst Solutions Architect  For a list of tasks and knowledge, skills
and abilities, visit the NICCS website.

Systems Security Architecture

Develops system concepts and works on the capabilities phases of the systems development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes.

IA Architect R&D Engineer Systems Engineer
Information Security Architect Security Architect Systems Security Analyst
Information systems Security Engineer Security Engineer   For a list of tasks and knowledge, skills
and abilities, visit the NICCS website.
Network Security Analyst Security Solutions Architect

Technology and Research Development

Conducts technology assessment and integration processes; provides and supports a prototype capability and/or evaluates its utility.

Capabilities and Development Specialist Chief Engineer R&D Engineer


Test and Evaluation

Develops system concepts and works on the capabilities phases of the systems development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes.

Application Security Tester R&D Research Engineer Systems Engineer
Information Systems Security Engineer Security Systems Engineer Testing and Evaluation Specialist
Quality Assurance Tester Software Quality Assurance Engineer   For a list of tasks and knowledge, skills
and abilities, visit the NICCS website.
R&D Engineer Software Quality Engineer

To learn more or request information, email: clae@udmercy.edu.

Especially if you are looking for a career in Washington, D.C., a UDM education will be looked at with respect. We regularly receive  notices of available jobs and have skillful relationships with many key organizations in the Beltway.   Look at our successful track record for graduates of our program:

Nikki W. – Department of Defense in the United Kingdom

Mary S. – Ford Motor Company, Dearborn, Michigan

Brent S.– Department of Defense.  Washington DC area

Katie C. –  Private Contractor in Germany

Shawn Cavanaugh after grad TACOM, EUCOM in Germany, NRC DC area

Adam H. – Federal Government Washington DC area

Keith J. – Private Contractor in Washington DC area

Jennifer M. – Private Contractor to Department of Defense in Washington DC area

Ken S.- Prof & Chair Oakland Community College

Tim R. – TACOM

Jason J. – Prof Sinclair Community College

Jason G. – GM book author on Secure Coding with McGraw-Hill

Jacob J. -TACOM

Habib A. –TACOM

Moe S.- West Point after Grad, now FORD

Janell M. – Department of Defense in Washington DC area

Jeff W. – Department of Defense in Washington DC area

Brad W. – EMU, DTE, adjunct at UDM

Amir J.- Silicon Valley Private CO

Phyllis J. – Department of Defense Washington DC area

Matt D.- US Army  stationed in IA at NSA, currently Samsung

Tanisha R. – Department of Defense Washington DC area

Maya C.– Department of Defense Washington DC area

Charmaine G. – Department of Defense Washington DC area

Jaosn N. – Chrysler Information Assurance

Paul G. – IRS

LaShawn E– Department of Defense Washington DC area

Michael C. - TACOM

Need More Information BEFORE You Apply?

If you would like more information about the Master of Science in Information Assurance, please use our contact form:

Are You Ready to Apply?

To apply for the Master of Science in Formation Assurance program, please visit the UDM Admissions page here:

http://www.udmercy.edu/apply/online/index.htm

Because our apply page needs to accommodate all of our applicants in the disciplines that UDM offers, it may seem a bit confusing at first. To help you navigate the admissions process, we encourage you to communicate with an admissions counselor by phone at 800-635-5020 or by email at admissions@udmercy.edu.