Bachelor of Science in Information Systems
Advance with an Information Systems Degree with Cybersecurity Management
A Strayer University Bachelor of Science in Information Systems (BSIS) with Cybersecurity Management concentration will give you the foundation to manage day-to-day technical operations and to deploy forward-looking technologies effectively. Online classes and on-campus coursework will prepare you for roles such as an Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst.
With a Cybersecurity Management concentration you will:
- Become an authority on protecting data assets
- Explore the design, implementation, and management of security initiatives in common and complex computing environments
- Learn the knowledge, skills, legal background, and ethical principles necessary for sound and effective policy development
Key Learning Outcomes
- Design a security policy framework and develop a disaster recovery plan for an organization.
- Compare and contrast the methods of disaster recovery and business continuity.
- Develop techniques for different disaster scenarios.
- Compare and contrast the different methods, roles, responsibilities, and accountabilities of personnel, along with the governance and compliance of security policy framework.
- Compare and contrast the different ISS policies associated with incident response teams (IRT).
- Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge.
- Identify and analyze the role of the Chief Information Officer, Information Security Officer and IT Security compliance officer in the context of Cybersecurity.
- CIS 359-Disaster Recovery Management
- CIS 438-Information Security Legal Issues
- CIS 462-Security Strategy and Policy
- SEC 402-Cyber Security