Skip to main content

Online Master of Science in Information Technology


Master core IT concepts and gain advanced expertise in cybersecurity or systems management and security. Prepare for industry certifications such as Network+, CompTIA and Security+ and build a portfolio of work to share with employers.

Quick facts:

  • 100 percent online
  • Tuition under $23K
  • Complete in 16–18 months, part time
  • Concentrations in cybersecurity and systems management and security
  • No prerequisites or experience needed
  • No GRE or GMAT required
  • Financial aid eligible

Learn more about Merrimack’s M.S. in Information Technology.

By submitting this form, I agree to be contacted via email, phone, or text to learn more about the programs at Merrimack College.

The information technology job market is booming, with high-salary career opportunities across the United States.

Source: U.S. Bureau of Labor Statistics, 2025

Master of Science in Information Technology Online Coursework


The Master of Science in Information Technology (MSIT) program equips students with the technical and strategic skills to design and maintain IT systems — and offers concentrations in cybersecurity and systems management and security.

The cybersecurity concentration focuses on advanced topics such as ethical hacking, incident response, digital forensics and secure software development. Students gain practical experience in penetration testing, network security, forensic investigation and secure coding practices.

The systems management and security concentration emphasizes system optimization, security implementation, risk management and compliance. Students build expertise in network security, systems administration, disaster recovery and securing enterprise-level IT environments.

Core Courses (20 credits)

This course introduces programming concepts, emphasizing algorithms, test-driven design, development and structured programming in the Python language. Topics include program development, modularity, variables and data types as numbers, strings, arrays and lists, plus the basic programming concepts as conditionals and Boolean algebra, loops, I/O operations, classes and objects, abstract data types, sorting algorithms and recursion. Credits: 4

Prerequisite: None

This course investigates the dynamic realm of IT, encompassing the interplay of hardware/software and their transformative impact on today’s businesses and society. Students gain an introductory understanding of cybersecurity by exploring common threats and basic protective measures. Students also learn about the omnipresence of technology in everyday life, reflecting on its broader implications. From data storage to software applications, students emerge with a foundational awareness, primed to delve deeper into specialized IT areas, always cognizant of the intertwined nature of technology and security in our interconnected world. Credits: 4

Prerequisite: None

This course examines databases, including understanding their design, management and querying capabilities using SQL. Data remains a coveted asset in the digital age, so its secure storage is paramount. Beyond mastering relational structures and normalization, students confront pressing data breaches, protection mechanisms and regulatory compliance issues. The course balances the technical aspects of database management and the imperatives of cybersecurity, ensuring that future IT professionals can manage, retrieve and protect data with equal proficiency. Credits: 4

Prerequisite: ITS 6003

This course spans the intricate landscapes of computer networks, from foundational models to practical implementations. As data traverses these networks, its security becomes crucial. Students also explore the OSI and TCP/IP models, wireless networks, Quality of Service, Multipathing, channel bonding and additional networking technologies such as InfiniBand through a cybersecurity lens. They address real-world challenges like intrusion detection, secure communication protocols and the gamut of threats that lurk in the interconnected digital cosmos. Graduates emerge with a dual proficiency in designing efficient networks and safeguarding them against an ever-evolving landscape of cybersecurity threats. Credits: 4

Prerequisite: ITS 6003

This course examines the multifaceted arena of IT project management, melding methodologies like Agile with stakeholder communication and risk strategies. A holistic perspective demands cybersecurity integration, emphasizing data protection, regulatory compliance and secure project execution. Students dissect real-world case studies, deciphering both successful and flawed IT projects, always hunting for the cybersecurity angle. This comprehensive exploration ensures graduates can manage IT projects with an eye for efficiency, effectiveness and encompassing security. Credits: 4

Prerequisite: ITS 6213

Cybersecurity Concentration (8 credits)

This course examines the concepts of ethical hacking methodologies and penetration testing techniques. Students explore advanced topics such as legal and ethical considerations, information gathering, network scanning, vulnerability exploitation, web application hacking and wireless network security. The course provides the skills to identify, exploit and report security vulnerabilities in IT systems. Credits: 4

Prerequisite: ITS 6023

This course studies concepts on how to effectively manage and respond to security incidents by examining the incident response lifecycle. Students learn about the processes and tools involved in incident response and digital forensics. The course addresses key topics such as incident detection, containment strategies and system recovery, with a strong emphasis on digital forensics fundamentals, including evidence collection, disk analysis and malware forensics. Credits: 4

Prerequisite: ITS 6023

Systems Management and Security Concentration (8 credits)

This course helps students translate complex business needs into IT solutions. Grasping techniques like requirements elicitation, system design and prototyping become even more pivotal when viewed through the prism of cybersecurity. It emphasizes designing systems, elicitation and prototyping that aren’t just functional but inherently secure. Students review vulnerabilities, potential breaches and the need for systems prioritizing data protection. A forward-thinking approach integrating robust security into system design is indispensable in a world where software vulnerabilities can severely impact enterprises. Credits: 4

Prerequisite: ITS 6003

This course explores data center management in depth, focusing on vital technologies such as disaster recovery and RAID configurations, including hardware and software, InfiniBand, high-availability clustering and storage mechanisms like SANs and iSCSI. The course emphasizes hands-on learning and requires students to design, deploy and manage a cutting-edge data center in labs. Beyond the technological facets, the course intertwines cybersecurity principles, ensuring that when students create efficient data centers, they prioritize securing them against modern threats. The curriculum underscores the importance of balancing robust infrastructure with stringent security protocols. Credits: 4

Prerequisite: ITS 6023

Elective Courses (4 credits)

This course studies the multifaceted world of cybersecurity. Students learn about cutting-edge topics such as advanced persistent threats, cyber forensics, zero-day vulnerabilities and the intricacies of nation-state cyber warfare. They also gain a comprehensive understanding of encryption protocols, advanced intrusion detection and prevention systems and the ethical dilemmas surrounding cybersecurity practices in a globally interconnected world. Students emerge with a nuanced perspective on the technological and human-centric challenges in the advanced cybersecurity landscape through a blend of theoretical concepts, real-world case studies and hands-on labs. Credits: 4

Prerequisite: ITS 6023
Available to students in both concentrations.

This course examines the transformative world of cloud computing and virtualization, two pillars reshaping the IT landscape. Students explore the architectures, services and deployment models of leading cloud platforms, understanding the intricacies of Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). The virtualization journey demystifies the technologies enabling efficient resource management from server to network virtualization. The course emphasizes security challenges in cloud environments, ensuring students comprehend the cybersecurity implications and best practices to protect data and services in the cloud. Students also engage in hands-on labs, real-world scenarios and critical discussions, emerging as proficient practitioners in cloud computing and virtualization. Credits: 4

Prerequisite: ITS 6003
Available to students in both concentrations.

This course studies the vibrant world of web development, examining the duality of form and function. While aesthetics and user experience remain central, so does the commitment to secure web practices. Students learn about the intricacies of front-end languages and backend dynamics, always contextualizing with web vulnerabilities and defenses. Students also gain an understanding of concepts like Cross-Site Scripting, SQL injection and the Secure Socket Layer. As websites remain the front doors to businesses worldwide, ensuring they’re both inviting and secure is a paramount skill for modern IT professionals. Credits: 4

Prerequisite: CSC 6003
Systems management and security concentration only.

This course investigates the integration of security principles throughout the software development lifecycle. Topics include secure development practices, common vulnerabilities, effective authentication and authorization methods, cryptography, security testing and secure deployment strategies. Students gain the knowledge to create and maintain secure software applications. Credits: 4

Prerequisite: ITS 6003
Cybersecurity concentration only.

Student Support Resources

Students in the School of Engineering and Computational Sciences benefit from a dedicated success team.

Support includes:

  • Access to coding and LinkedIn Learning courses
  • Personal student success coaching
  • 1:1 tutoring
  • 1:1 mentoring from faculty and program staff
  • Career services support for professional growth

It’s Easy to Apply Online


A complete application includes:

  • Online application (no fee)
  • Official college transcripts from all institutions attended
  • Resume or LinkedIn profile
  • Personal statement
  • Contact information for one reference or one letter of recommendation

GRE and GMAT scores are not required.


Faculty Spotlight

Jolly Upadhyaya

Program Director and Instructional Professor of IT

Dr. Upadhyaya is a dedicated academic professional with extensive experience in computer science education and research, with around 20 years of experience as a faculty member and Head of the Department in CS and IT. During her tenure, she has been instrumental in course development, student activities, and program coordination. She played a crucial role as a mentor and advisor for CS/IT graduate students as well.

Dr. Upadhyaya holds a Ph.D. in Computer Science from the University of Petroleum and Energy Studies, where she focused on Quality-of-Service metrics for user experience in cloud computing applications and services in higher education. Her research has been published in various esteemed journals and conferences, highlighting her contributions to UX in cloud computing. Dr. Upadhyaya also holds certifications in Cybersecurity, Project Management, and Microsoft Solutions Development.

In addition to her academic achievements, Dr. Upadhyaya worked on the U.S. Department of Justice Grant for the Computer Forensics and Digital Evidence Student Opportunity Development Program in 2023. She collaborated with a team of research scholars to develop curricula for introductory and advanced cybersecurity courses. This work involved partnership with industry experts and focused on implementing innovative security measures to significantly improve the protection of sensitive data in online environments. Her efforts in this area underscore her commitment to advancing cybersecurity in higher education and she is committed to working on the IT and cybersecurity workforce development in the future.

 

Key Dates and Deadlines

This program enrolls six times a year. Each term is eight weeks.

Term
Application Deadline
Classes Begin
Summer I
Monday, April 28, 2025
Monday, May 12, 2025
Summer II
Monday, June 23, 2025
Monday, July 7, 2025
Fall I
Friday, August 15, 2025
Tuesday, September 2, 2025
Summer I
Application Deadline
Monday, April 28, 2025
Classes Begin
Monday, May 12, 2025
Summer II
Application Deadline
Monday, June 23, 2025
Classes Begin
Monday, July 7, 2025
Fall I
Application Deadline
Friday, August 15, 2025
Classes Begin
Tuesday, September 2, 2025

At Merrimack College, we’re proud of our long history of providing quality degrees to students entering the job market. Our faculty are more than just teachers. We are committed to helping you grow — academically, personally and spiritually — so that you may graduate as a confident, well-prepared citizen of the world.

  • Most Innovative Schools (No. 14)
  • Regional Universities North (No. 33)
  • Best Undergraduate Teaching (No. 31)
  • Best Undergraduate Engineering Programs (No. 86)
    (at schools where doctorate not offered)
  • Best Colleges for Veterans (No. 14)
  • Best Value Schools (No. 47)
  • Merrimack College is accredited by the New England Commission of Higher Education (NECHE).
U.S. News, Best Colleges 2024 badge.
Money, Best Colleges 2023 badge.
The Princeton Review, Best Regional Colleges 2023 badge.

Tell me more about Merrimack’s online programs.

By submitting this form, I agree to be contacted via email, phone, or text to learn more about the programs at Merrimack College.