Available entirely online!

Master of Science in Information Technology

Prepare for a wide range of senior-level management and consulting careers with our 10-course online Master’s in Information Technology.

Get Information:

Please see our Privacy Policy.
Please see our Privacy Policy.
Mark WillardM.S. in IT
Photo of online Master's in Information Technology graduate student, Mark Willard.
Alarm Clock Next Start Date: September 4

Online Master’s in Information Technology

Advance your career with UMass Lowell’s 10-course online Master’s in Information Technology, offered through UMass Lowell’s Richard A. Miner School of Computer & Information Sciences. You’ll gain advanced knowledge and skills in areas such as systems and network infrastructure and software management. Courses focus on emerging technologies and trends in the field, as well as how to apply them to real-world business problems. Graduates of our Master’s in IT are well-equipped to pursue senior-level careers in the field.

18 month calendar

Earn Your Master's Degree in as Little as 18 Months

no symbol over paper and pencil

No GRE Required

under 20k

Earn a Top-Ranked Master's for Under $20k

Career Outlook

Jobs (2020)
% Change (2020-2021)
Median Earnings
Annual Openings


  • Business Analyst
  • Chief Information Officer
  • Chief Technology Officer
  • Corporate Security Officer
  • Director of Hosting and Managed Systems
  • Director of Information Technology
  • IT Consultant
  • Lead Systems Engineer Security Analyst
  • Manager of Information Services
  • Network Manager
  • Project Manager in Information Technology
  • Strategic IT Planner
  • Systems Analyst
  • Vice President of Informatics
Source: Lightcast, 2022
"The median annual wage for computer and information systems managers was $159,010 in May 2021."
— U.S. Department of Labor, Bureau of Labor Statistics, Occupational Outlook Handbook, 2018
Ranked as One of the Best Online Graduate Information Technology Programs in the Nation by U.S. News & World Report
Ranked #9 Best Online Graduate Computer Information Technology Program for Veterans in the Nation by U.S. News & World Report

Key Takeaways

Through this program, you will learn:

  • Definitions and characteristics of contemporary operating systems
  • Principles, processes, and concepts of network management
  • Legal and ethical aspects of information management
  • How to extract and manage system-critical information
  • How to manage the software environments of commercial systems
  • How to manage the environments for local and metropolitan area networks
  • How to identify the appropriate compliance criteria for selective information management
  • How to train and supervise IT professionals

Success Story

"I was looking to change careers, so I did some research and found that UMass Lowell had the best online program that would work with my schedule and allow me to study at night. I have a family, two kids, and a full-time job. I wanted to improve my future, and I knew an education from UMass Lowell would give me better opportunities."

Kasidit B., Master of Science in Information Technology
Kasidit B.

Kasidit B.

One Success Leads to Another

Apply credits from lower credentials to higher ones. Our programs are designed to build upon themselves:

"Employment of computer and information technology managers is projected to grow 16 percent from 2021 to 2031, much faster than the average for all occupations."
— U.S. Department of Labor, Bureau of Labor Statistics, Occupational Outlook Handbook, 2023

Curriculum Outline

- 10 courses total

Course Descriptions

MSIT.5110 Network and Systems Administration (3cr)

This course introduces the concepts and techniques of systems and network administration. The course covers topics in a wide range from host management, network management, host and network security to automating system administration. In this course learners will be installing and configuring various popular network based services in a Linux environment.

MSIT.5140 Systems Security and Auditing (3cr)

This course examines the strategies for deploying and auditing secure systems. IT auditors primarily study computer systems and networks form the point of view of examining the effectiveness of their technical and procedural controls to minimize risks. Risk analysis and the implementation of corresponding best practice control objectives will be studied. The material will include methodologies that help auditors to: Discover what's really going on at a point in time; Find out about potential problems, before it's too late to fix them; Evaluate business situations objectively; Make informed, if difficult decisions; Implement corrective actions, changes and improvements where needed.

MSIT.5170 Operating Systems Foundations (3cr)

This course investigates the organization and deployment of contemporary operating systems. The process model is examined both generically and in the context of the current Linux/Unix and Windows implemantations. Process attributes such as address spaces, threads, channels and handles, access rights, scheduling behavior and states and state transitions will be studied. Memory management, deadlock management and the file system development are also evaluated. A subsystem of system configuration options will be considered during the course in order to highlight the functional deployment of the core OS issues discussed. Pre-req: BS in IT or equivalent. Cannot be used toward MS or PhD in Computer Science.

MSIT.5180 Large Scale Application Deployment (3cr)

This course will develop a systematic framework for the life cycle management of large scale applications. Beginning with requirements assessments, and impact analysis, and continuing through regulatory compliance, lifetime maintenance, scalability concerns, and end-of-life evolution, the material in this course will characterize the stages and transitions of large scale applications. Deployment and management tools will be examined in the context of live applications, with an emphasis on convergent analysis and configuration. Several case studies will be considered, including operating systems, database applications, mailing systems and collaboration systems.

MSIT.5190 Virtual Systems (3cr)

This course will investigate the current state of virtualization in computing systems. Virtualization at both the hardware and software levels will be examined, with emphasis on the hypervisor configurations of systems such as Vmware, Zen and Hyper-V. The features and limitations of virtual environments will be considered, along with several case studies used to demonstrate the configuration and management of such systems. Para-virtualized software components will be analyzed and their pros and cons discussed. Processor and peripheral support for virtualization will also be examined, with a focus on emerging hardware features and the future of virtualization.

MSIT.5200 Digital Storage Architectures (3cr)

This course will focus on existing and proposed technologies for storing digital information. Both hardware and software issues will be examined, beginning with device and controller organization and proceeding through aggregation techniques, interconnect architectures and host consideration. At each level, specific components will be evaluated with respect to critical storage criteria, such as bandwidth and latency, fault tolerance, infrastructure requirements and cost. Students must already have completed a bachelor's degree in a related discipline and must meet all undergraduate prerequisite requirements specified for graduate IT programs to enroll in this course and in a graduate career.

MSIT.5310 Project Management (3cr)

This course explores the application of knowledge, skills, tools, and techniques that project managers use when managing information technology projects as well as the current IT factors that affect IT project management decision making. Special emphasis will be placed on learning the best practices currently used by organizations and practitioners to ensure the best chance for project success by learning and applying the concepts of managing scope, risk, budget, time, expectations, quality, people, communications, procurement, and externally provided services. Students will be expected to perform research in the above areas as well as using tools such as Microsoft Project to solve project management related problems. Special attention will also be placed on the issues affecting project managers today such as PMOs, virtualization, green IT, and out sourcing. Practical examples will be used to demonstrate the concepts and techniques, plus you will receive hands on experience by working on a case study.

MSIT.5320 Managing Large Data Sets (3cr)

The amount of data generated by businesses, science, Web, and social networks is growing at a very fast rate. This course will cover the algorithms and database techniques required to extract useful information from this flood of data. Data mining, which is the automatic discovery of interesting patterns and relationships in data, is a central focus of the course. Topics covered in data mining include association discovery, clustering, classification, and anomaly detection. Special emphasis will be given to techniques for data warehousing where extremely large datasets (e.g.,many terabytes) are processed. The course also covers Web mining. Topics covered include analysis of Web pages and links (like Google) and analysis of large social networks (like Facebook).

MSIT.5330 Developer Operations (DevOps) (3cr)

"DevOps" is a set of practices to support software development and business operations in live production environments. By using agile practices and automation, these practices enable software to be developed and deployed to users quickly and with high quality. In this course you will learn DevOps tools and techniques. Tools include micro services, continuous integration and deployments, monitoring, and infrastructure-as-code. Techniques include oh DevOps engineers blur traditional roles of IT, development, release engineering, and quality assurance. Case studies in DevOps from companies such Amazon and Facebook will be studied. For experimentation purposed, Linux will be used on AWS together with open source tools such as Jenkins, Ansible, and Kubernetes. Students must already have completed a bachelor's degree in a related discipline and must meet all undergraduate prerequisite requirements specified for graduate IT programs to enroll in this course and in a graduate career.

MSIT.5350 Agile and Iterative Project Management (3cr)

This course explores the differences between the Traditional Project management and the Agile management approaches, introduces the principles of Agile Development through applications within each major Project Management process: Project Initiation, Project Planning, Project Execution, and Project Closing. The project will be developed in a timely manner, using Agile techniques that encourage frequent adaptation, self-organization, accountability and with a focus towards rapid delivery. upon completion, students will understand how to apply Agile principles and practices, recognize ways to increase team performance through better communication and close involvement of stake holders, and recognize the key success criteria for implementing Agile Projects.

MSIT.5360 Data Mining (3cr)

Today, we are surrounded by big data applications. Smartphone and sensor data, medical and scientific data, financial data, web and text data, and social network data are just a few examples. As a result, mining useful information and discovering knowledge from the big data are increasingly important. It is fair to say that, without data mining, we would not be able to make good use of this large amount of data. In this course, we learn the state-of-the-art techniques in data mining and analysis. Topics include types and properties of data, exploring data, classification, association analysis, cluster analysis, and anomaly detection.


CSCE Graduate Restrictions

MSIT.5410 Information Security, Privacy and Regulatory Compliance (3cr)

This course focuses on enterprise-level information security, privacy and regulatory compliance through study of the rapidly emerging Information Governance (IG) discipline which is applied to electronic documents, records management and output of information organization-wide. The key principles of IG will be examined including the security, privacy and compliance of corporate e-documents/records as well as email, social media, instant messaging, cloud computing, and mobile computing. The student will learn how IG leverages existing information technologies to enforce policies, procedures and controls to manage information risk in compliance with legal and litigation demands, external regulatory requirements, and internal governance objectives.

MSIT.5430 Intrusion Detection Systems (3cr)

Intrusion Detection Systems is a survey of the hardware and software techniques that are applied to the detection, identification, classification and remediation of compromised information systems. From this introduction to intrusion detection systems, students will develop a solid foundation for understanding IDS and how they function. This course will give students a background in the technology of detection network attacks. It will introduce all the concepts and procedures used for IDS (intrusion Detection Systems) and IPS (intrusion Prevention Systems). Students will have hands-on experience with implementing and configuring software and hardware based IDS in a network infrastructure. This course is designed with a network administrator in mind.

MSIT.5450 Designing and Building a Cybersecurity Program (3cr)

This course focuses on best practices for designing and building a comprehensive Cybersecurity Program based on the NIST Framework for Improving Critical Infrastructure Cybersecurity ("The Framework"). The Framework was issued on February 12, 2014, as directed by President Obama in Executive Order 13636. This framework provides guidance for reducing cybersecurity risk for organizations, and this course will examine its basic tenets of: "Cybersecurity Fundamentals", techniques applied to "Building a Controls Factory", "Cybersecurity Programs" "Establishing Cybersecurity Centers of Expertise" and "The Cybersecurity Program Implementation Roadmap".

MSIT.5460 Introduction to Malware Analysis (3cr)

This course introduces the use of reverse engineering techniques to find and analyze the behavior of malware in binary form. The topics include basic static analysis, basic dynamic analysis, advanced static analysis, advanced dynamic analysis, shell code analysis, malware behavior and anti-reverse engineering. To take this course, students shall have experience in the C programming language. Knowledge of assembly language is preferred although not necessary since the course will have a crash mini-course in X86 disassembly covering assembly language. The students will do the assignments and labs on either their own computers or in a virtual lab environment. Students must already have completed a bachelor's degree in a related discipline and must meet all undergraduate prerequisite requirements specified for graduate IT programs to enroll in this course and in a graduate career.

MSIT.5470 Protecting against Ransomware Attacks (3cr)

This course focuses on the best approach for organizations to develop a ransomware protection strategy, plan / program and operational practices to defend against damaging ransomware attacks. The class includes an overview of recent ransomware attacks, the top trends of today's ransomware variants, a model for describing common tactics and techniques used by ransomware gangs (based on the MIRE ATT&CK framework, tools and playbooks used by the top ransomware families. The class discusses common ransomware controls models (NIST Risk Management Framework and Cybersecurity Framework), ransomware best practices (NIST SP1800 Ransomware Practice Guides and CISA MS-ISAC Ransomware Guide), as well as training and workshops based on Red Team, Blue Team and Purple Team Exercises.


Students must already have completed a bachelor's degree in a related discipline to enroll in this course and in a graduate career.

MSIT.5600 Network Infrastructures (3cr)

This course provides an introduction to the fundamental concepts in the design and implementation of computer communication networks, their protocols, and applications. Topics to be covered include: an overview of network architectures, applications, network programming interfaces (e.g. sockets) , transport, congestion, routing, and data link protocols, addressing, local area networks, network management, and emerging network technologies. Cannot be used toward MS or D.Sc. in Computer Science.

MSIT.5610 Computer Network Security (3cr)

This course is aimed to provide students with a solid understanding of key concepts of computer network security and practical solutions to network security threats. Topics to be covered include common network security attacks, basic security models, data encryption algorithms, public-key cryptography and key management, data authentication, network security protocols in practice, wireless network security, network perimeter security and firewall technology, the art of anti-malicious software, and the art of intrusion detection. Pre-Req: BS in IT or Equivalent. Cannot be used toward MS or D.Sc. in Computer Science.

MSIT.5620 Digital Forensics (3cr)

Identifying, preserving and extracting electronic evidence. Students learn how to examine and recover data from operating systems, core forensic procedures for any operating or file system, understanding technical issues in acquiring computer evidence and how to conduct forensically sound examinations to preserve evidence for admission and use in legal proceedings.

MSIT.5630 Secure Mobile Networks (3cr)

This course covers principles and practices of wireless networks, including cellular networks, wireless LANs, ad hoc mesh networks, and sensor networks. The potential attacks against these wireless networks and the security mechanisms to defend these networks will be discussed. Topics to be covered include cellular network architecture, wide-area mobile services, wireless LANs and MACs, introduction to emerging wireless networks, survey of malicious behaviors in wireless networks, securing wireless WANs and LANs, securing wireless routing, securing mobile applications, wireless intrusion detection and prevention, challenges in securing next-generation wireless networks, and privacy issues in wireless networks.

MSIT.5650 Cloud Computing (3cr)

This course starts with an overview of modern distributed models, exposing the design principles, systems architecture, and innovative applications of parallel, distributed, and cloud computing systems. The course will focus on the creation and maintenance of high-performance, scalable, reliable systems, providing comprehensive coverage of distributed and cloud computing, including: Facilitating management, debugging, migration, and disaster recovery through virtualization. Clustered systems for research or ecommerce applications. Designing systems as web services. Principles of cloud computing using examples from open-source and commercial applications.

MSIT.5660 Advanced Cloud Computing (3cr)

This course is a continuation of the MSIT.5650 Cloud Computing course and will cover in further detail such topics as Cloud Based Storage, Virtualization, Service Oriented Architecture (SOA), High Availability, Scaling, and Mobile Devices. The course will also study the role of Open Source cloud software such as Hadoop, OpenStack and others. Similar to the first course where hands-on projects included the use of Cloud Services such as Amazon Web Services (AWS), Google Apps and App Engine, and Windows Azure, this course will continue with those services and add others such as Rackspace and VMware. Current articles and publications in this fast moving field of Cloud Computing will also be followed.


MSIT.5650 Cloud Computing, or Permission of the Instructor.

Program Requirements

To be recommended for a University of Massachusetts Lowell master's degree, candidates must satisfy all of the general requirements below, plus any additional requirements that may be required by the department through which the program is offered. Any additional requirements for this program are either listed below or may be found in the University's Graduate Program Catalog.

General Requirements:

  • Students must complete the program of study designed by the Department in which they are enrolled and approved by the University.
  • Satisfactory grades in all subjects offered for the degree must be earned. See Academic Standing.
  • All financial obligations, including tuition, fees and expenses, must be satisfied as evidenced by completion.
  • Upon completion of all their courses, graduate degree candidates must submit a signed Declaration of Intent to Graduate (DIG) form to their coordinator. The coordinator will apply them in SIS, Graduation Tracking.

Graduate Program Policies

In applying for a degree program or registering for courses, each student assumes full responsibility for knowledge of and compliance with the definitions, regulations and procedures of UMass Lowell as set forth on our website. For additional information, please refer to the Graduate Program Policies found within the UMass Lowell Graduate Catalog.

Tuition & Fees

Tuition at UMass Lowell is typically half the cost of private colleges, and our online tuition is among the lowest in the nation. Tuition for online programs offered through the Division of Graduate, Online & Professional Studies is the same whether you live in-state, out-of-state or outside of the U.S.

Summer 2024 Tuition

Cost Per Credit Cost Per 3-Credit Course*


Online and Virtual $600 $1,800
Online Business1 $655 $1,965
Online Education2 $470 $1,410
Online 7000-Level Education $655 $1,965
Select Online Nursing M.S. courses3 $750 $2,250
Select On Campus courses4 $600 $1,800
All other On Campus courses5 View Here
*Tuition is priced on the listed credit hour unless the contact hour is different. Tuition is then based upon the listed contact hour.
1Applies to ACCT, BUSI, ENTR, FINA, MGMT, MKTG, MIST and POMS courses.
2Applies to EDUC courses excluding 7000-level courses.
3Applies to NURS.6510, NURS.6511, NURS.6512 and NURS.6513 courses.
5Applies to graduate on campus courses excluding select courses

Additional Costs

Term Registration Fee $30
Returned Check Fee $30
Graduate Degree and Certificate Application $50

Please note: Tuition and fees are subject to change.

Tuition Calculator

Estimate the cost of this program with our online tuition calculator

hand and coin

Looking for Financial Assistance?

UMass Lowell offers a variety of financial aid and scholarship options.

Frequently Asked Questions

  • A Master's in Information Technology will provide you with specialized knowledge and skills that are highly valued in today's job market. You'll gain a deep understanding of complex IT concepts and technologies, as well as hands-on experience with cutting-edge tools and software.

    Consequently, earning a master's can open a world of career advancement opportunities. With a deeper understanding of IT concepts and technologies, you'll become eligible for higher-level positions such as chief information officer, computer and information systems manager and IT consultant.

    Additionally, a master's degree can give you a competitive edge when applying for promotions. Many master's degree holders will see an increase in salary. According to data analytics firm Lightcast, the median salary earnings for IT bachelor's degree holders was $93,600 per year in 2022. However, those with a Master's in IT working in New England report median earnings of $122,800 per year.

    Flexible scheduling options also make earning a Master's in IT achievable for full-time working professionals. The online program at UMass Lowell is designed to accommodate students with busy schedules. The flexibility and affordability of our program will allow you to save time and money while you continue working and earning your degree.

  • There are a variety of job opportunities available for those with an advanced degree in IT. Here are five potential career paths to consider.

    IT Manager

    An IT manager is responsible for overseeing the technology infrastructure of an organization. They manage an IT team and ensure that all technology systems are running smoothly and efficiently. They also work closely with other departments to identify technology needs and implement solutions to improve business operations.

    IT Consultant

    An IT consultant works with organizations to identify their technology needs and develop solutions to improve operations. Consultants must have strong communication and problem-solving skills, as well as a deep understanding of technology and its applications in various industries. This career path offers the opportunity to work with a variety of clients and industries and can be highly lucrative for those with the right skills and experience.

    Systems Analyst

    A systems analyst is a crucial member of any organization's IT team, responsible for analyzing and improving computer systems and processes. To succeed as a systems analyst, you'll need a combination of technical and soft skills. Technical skills include knowledge of programming languages, database management and software development methodologies. Soft skills include communication, problem-solving, and critical thinking. You will also need to be able to work well in a team environment and be able to multitask. Systems analysts should stay updated with new technologies and industry trends.

    Network Manager

    A network manager is responsible for overseeing the design, implementation and maintenance of an organization's computer network. This includes managing hardware and software, ensuring network security, and troubleshooting any issues that arise. They work closely with other IT professionals to ensure that the network is running smoothly and efficiently, and they are responsible for ensuring that the network meets the needs of the organization. A network manager must have a strong understanding of networking technologies and protocols, as well as excellent communication and problem-solving skills. Additionally, they may be responsible for developing and implementing network policies and procedures, as well as staying up to date with the latest networking technologies and protocols.

    Software Developer

    Many information technology majors move on to positions as software developers. Software developers design, develop, and maintain software applications for a variety of industries and purposes. They may work on anything from mobile apps to enterprise-level software systems.

    This career path requires strong programming skills, as well as the ability to work collaboratively with other developers and stakeholders. Software developers work for software companies, tech startups and in-house IT departments for larger organizations. The demand for skilled software developers is high, making this a lucrative and rewarding career path for those with a passion for technology and programming.


Applying into a Graduate Degree Program

You can apply anytime. There are no deadlines. Applications are accepted throughout the year.

All applicants must submit:
    • An application
    • An application fee ($50)
    • A statement of purpose
    • Two letters of recommendation
    • Official transcripts
    • Offcial test scores
        • GRE not required
        • If English is NOT the national language in your home country, please submit one of the following English proficiency tests:
            • TOEFL: minimum acceptable score is 79
            • IELTS: minimum acceptable score is 6.5
            • Duolingo: minimum acceptable score is 115
            • ASC English: minimum acceptable level is 6
            • Pearson Test of English: minimum acceptable score is 53

Admission Requirements

  • Bachelor's degree from an accredited institution
  • Mathematical Maturity: Students should have completed a minimum of one semester of precalculus mathematics, one semester of discrete mathematics and one semester of statistics as part of their undergraduate studies, or possess the equivalent experience
  • C Programming proficiency, to include a minimum of one semester of C Programming and one semester of Data Structures, or the equivalent experience
  • Students who do not meet the requirements above may need to take additional undergraduate courses in order to satisfy them

Additional Information

F1 student visas are not issued for this program.

Apply Now

Questions Regarding Your Graduate Application?

Email Graduate_Admissions@uml.edu or call 800-656-4723 (for U.S. students) or 978-934-2390 (for international students).

For General Assistance:

For general questions about registering for courses or to find out who the advisor is for your graduate program, call 800-480-3190. Our admissions and advising teams are here to help!

Already Applied?

Check the Status of Your Application