{"id":99,"date":"2012-07-29T23:34:33","date_gmt":"2012-07-30T03:34:33","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs\/?page_id=99"},"modified":"2022-07-19T12:59:09","modified_gmt":"2022-07-19T16:59:09","slug":"overview","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/itacs\/admissions\/overview\/","title":{"rendered":"Why ITACS?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1000 alignleft\" src=\"http:\/\/community.mis.temple.edu\/itacs\/files\/2012\/07\/overview-300x200.jpg\" alt=\"Fox School of Business\" width=\"300\" height=\"200\" srcset=\"https:\/\/community.mis.temple.edu\/itacs\/files\/2012\/07\/overview-300x200.jpg 300w, https:\/\/community.mis.temple.edu\/itacs\/files\/2012\/07\/overview.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Learn how to assess and control organizational cyber risks with the <a href=\"http:\/\/www.fox.temple.edu\/specialized-masters\/it-auditing-and-cyber-security\/\">Fox Master of Science in Information Technology (IT) Auditing and Cyber Security<\/a>. Our program offers a robust introduction to the field through a cutting-edge curriculum. Choose from two industry-aligned specialization tracks for a one-of-a-kind education that prepares you to excel in your career as an information systems security professional.<\/p>\n<p>The dynamic, hands-on curriculum behind the Master of Science in IT Auditing and Cyber Security \u00a0(ITACS) program will equip you with the knowledge to make smart business decisions within a rising industry. You\u2019ll learn to analyze data; identify, assess, and communicate cyber risk enabling sound organizational leadership. \u00a0ITACS&#8217; IT Auditing track prepares you to pass <a href=\"https:\/\/www.isaca.org\/pages\/default.aspx\">ISACA<\/a>&#8216;s (Information Systems Audit and Control Association&#8217;s) Certified Information System Auditor (<a href=\"http:\/\/www.isaca.org\/certification\/cisa-certified-information-systems-auditor\/pages\/default.aspx\">CISA<\/a>) exam. Our Cyber Security track prepares you to pass the International Information Systems Security Certification Consortium&#8217;s (<a href=\"https:\/\/www.isc2.org\/\">ISC<sup>2<\/sup><\/a>) Certified Information System Security Professional (<a href=\"https:\/\/www.isc2.org\/Certifications\/CISSP\">CISSP<\/a>) exam. \u00a0Both tracks prepare you to function as an IT professional enabling IT governance and improving information systems security equipped with business savvy and skills to participate as a member of a community of cyber security leaders.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1876 alignleft\" src=\"http:\/\/community.mis.temple.edu\/itacs\/files\/2012\/07\/Thu-Nguyen-e1487107381523.jpg\" alt=\"Thu-Nguyen\" width=\"100\" height=\"139\" \/><em>&#8220;Personally, I believe that a candidate who goes through this program and ultimately becomes certified will be well rounded and will increase his\/her chances landing a job within the profession. In addition, the professional credential will give them an advantage over other candidates during the hiring process.&#8221;<\/em><\/p>\n<blockquote><p><strong>Thu Nguyen, AVP Internal Audit &#8211; Wells Fargo, Academic Relations Committee &#8211; ISACA Philadelphia Chapter<\/strong><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to assess and control organizational cyber risks with the Fox Master of Science in Information Technology (IT) Auditing and Cyber Security. Our program offers a robust introduction to the field through a cutting-edge curriculum. Choose from two industry-aligned specialization tracks for a one-of-a-kind education that prepares you to excel in your career as [&hellip;]<\/p>\n","protected":false},"author":14218,"featured_media":0,"parent":70,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"content-sidebar","jetpack_post_was_ever_published":false,"footnotes":""},"class_list":{"0":"post-99","1":"page","2":"type-page","3":"status-publish","5":"entry"},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P2CTMC-1B","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/pages\/99","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/users\/14218"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/comments?post=99"}],"version-history":[{"count":61,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/pages\/99\/revisions"}],"predecessor-version":[{"id":3086,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/pages\/99\/revisions\/3086"}],"up":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/pages\/70"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/media?parent=99"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}