Keeping data safe. It’s become an obsession for businesses of every kind. You need to understand the ever-changing tools and tricks of criminals from hackers to terrorists and you need to stay one step ahead. As a professional with a master’s of science in information assurance, you can take the next step within your organization or your career.


Save time and advance your career when you prep for the CompTIA Network+ and ISC2 certifications  while earning your information systems degree. 


*The National Security Agency’s (NSA) Committee on National Security Systems (CNSS) has certified that Strayer University’s security curriculum has been reviewed by the Information Assurance Courseware Evaluation Review Committee (IACE) and determined that it meets national training standards for information systems security professionals and system administrators, NSTISSI No. 4011 and 4013

Flexible learning


Take your courses online, on campus or both. Learn more about studying online and at a college campus near you.



Strayer University is Accredited by the Middle States Commission on Higher Education. Learn more why college accreditation matters. 



Get the most from your education with the help of your academic advisor. Learn more about our success coaches




Our degrees can help lay the foundation for your continued education.

Our information assurance degree allows you to develop your cyber security management skills while preparing to take your Certified Information Systems Security Professional (CISSP) exam. That can help save you time and money. We also help you develop the leadership skills that will prepare you for hybrid management roles that leverage your expertise in emerging technology to adapt operations at the organizational level. From cloud-based environments to the highly regarded Toolwire™ live labs, your Strayer educational experience will be steeped in real-world tools.

MISA More About

Learn how our curriculum combines an IT degree with certification exam preparation.

Program Disclosure | Information for Tennessee Online Students

Information for Tennessee Online Students

Strayer University is authorized for operation as a postsecondary educational institution by the Tennessee Higher Education Commission. In order to view detailed job placement and graduation information on the programs offered by Strayer University, please visit and click on the Authorized Institutions Data button. Please contact your campus director or campus dean with any questions regarding the information provided on the Tennessee Higher Education Commission website. Credits earned at Strayer University may not transfer to another educational institution. Credits earned at another educational institution may not be accepted by Strayer University. You should obtain confirmation that Strayer University will accept any credits you have earned at another educational institution before you execute an enrollment contract or agreement. You should also contact any educational institutions that you may want to transfer credits earned at Strayer University to determine if such institutions will accept credits earned at Strayer University prior to executing an enrollment contract or agreement. The ability to transfer credits from Strayer University to another educational institutions may be very limited. Your credits may not transfer and you may have to repeat courses previously taken at Strayer University if you enroll in another educational institution. You should never assume that credits will transfer to or from any educational institution. It is highly recommended and you are advised to make certain that you know the transfer of credit policy of Strayer University and of any other educational institutions you may in the future want to transfer the credits earned at Strayer University before you execute an enrollment contract or agreement.

Master of Science in Information Assurance

Information Assurance


Build a bridge to career advancement
Develop the skills to assess information security risks and devise solutions that safeguard information assets and enterprise information technology infrastructures
Design and deploy information security and assurance solutions to protect organizational assets and enhance their performance
Analyze and identify organizational security vulnerabilities with corresponding information assurance solutions
Design and develop effective information security and assurance plans within the user environment
Develop and apply management and leadership skills in support of information assurance operations
Evaluate and justify information assurance solutions that satisfy organizational needs
Analyze the impact of computing security and information assurance solutions on individuals, organization, and society
Apply critical analysis of data and research skills that mitigate organizational vulnerabilities created by network and Internet intrusions
Develop effective communication plans (using lab or graphic representations) to a wide range of audiences
Justify and support the professional, ethical, legal, security and social issues and responsibilities of securing data and infrastructure

start on

Oct. 2

Courses to complete

Take classes at these campuses nearest you:


45150 Russell Branch Pkwy Suite 100
Ashburn, VA 20147
United States


9990 Battleview Parkway
Manassas, VA 20109
United States


2121 15th Street North
Arlington, VA 22201
United States
See More Campuses

Or Search Campus

Visit our campus location page for a complete listing of our campuses.

Need more flexibility? Find out more about online learning.

You may also be interested in:

Degree Finder

Key Courses For Your Degree.

CIS 562-Computer Forensics Planning

Practice systematic methods for conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab; investigating computer and cyber-crime; tools, techniques and methods used to perform forensic investigations; and concepts for collecting, analyzing, recovering and preserving forensic evidence.

CIS 565-Cryptography

Study cryptography from historical, applied and theoretical approaches. Topics include the symmetric and asymmetric encryption techniques that include classical and modern algorithms. Explore the framework and practice of using cryptography in securing networks over the Internet and in organizational settings. Discuss legal and ethical issues, as well as techniques for protecting computing systems from security threats.

CIS 598-Information Assurance Capstone

Examine and solve real-world information assurance problems and apply associated techniques to create practical solutions. Use an integrative and senior security officer approach to address the policy, risk and control opportunities within cyberspace and IT environments.


Tuition and Fees

Application Fee:$50 (not applicable in all states)

Technology Fee:$65.00 per quarter


$2,325.00 per course (Full-Time), $2,325.00 per course (Part Time). Textbooks and supplies are not included in the tuition rates and must be purchased by the student. You should allow approximately $1,800.00 for textbooks and supplies over the course of your degree.

Tuition rates apply to all new and readmit graduate students. For all students enrolled as an undergraudate prior to Winter 2014, please Click here for graduate tuition rates.


Graduate in 1.5 to 3 years

  Classes Per Quarter Time to Graduate
Full-time 2 or more per quarter (classes start 4 times per year) 1.5 years or fewer
Part-time 1 class per quarter (classes start 4 times per year) 3 years

Strayer University's academic calendar runs on te quarter systems, which means that classes start 4 times per year. Classes meet for 11 weeks with 1-2 week breaks between quarters. The above times to graduate assume that students are enrolled in consecutive quarters. All of these facts and figures refer to any concentration that you choose.


Compare Degrees

Master of Science in Information Systems

Master of Science in Human Resource Management


CIS 500-Information Systems for Decision Making

Examine the strategic use and trends of organizational information systems with emphasis on the application of information technology. Study key computing concepts in the strategic context in which information technology is used with emphasis on how information technology enables improvement in quality, timeliness and competitive advantage.

CIS 502-Theories of Security Management

Prerequisite: CIS 500

Explore current and emerging theories in security management. Topics include the policies, guidance, technologies and organizational concerns that security managers must address in leading and providing secure computing environments. Discuss topics such as access control, security architecture, cryptography and the CISSP Common Body of Knowledge.

CIS 505-Communication Technologies

Prerequisite: CIS 500 or CIS 512

Discuss trends and topics in computer communications. Use a balance of technical foundations and business practices to develop a managerial level of knowledge in data communications. Topics also include networking, distributed applications, network management, security and network operating systems.

CIS 512-Advanced Computer Architecture

Examine the structure and operation of computers in the context of the enterprise solutions. Focus on strategies to select, deploy, integrate and administer platforms or components to support the organizations computing infrastructure. Topics include the framework and strategic trends essential to the administration of hardware; services provided by the operating system; and computer interaction.

CIS 527-IT Risk Management

Prerequisite: CIS 502

Address the topic of risk management and how risk, threats and vulnerabilities impact information systems. Topics include how to assess and manage risk based on defining an acceptable level of risk for information systems; elements of a business impact analysis and business continuity plan; and disaster recovery planning.

CIS 534-Advanced Network Security Design

Examine strategies to design networking security, Virtual Private Networks (VPNs), and firewalls for securing a network. Review different types of VPNs for securing data, as well as security-related themes. Topics also include the benefits, architecture and implementation strategies of VPNs and the configuration, administration, utility and limitations of firewalls.

CIS 542-Web Application Security

Prerequisite: CIS 502 or CIS 505

Address the risks and threats to and vulnerabilities of Web-based applications and the people who use them. Discuss security strategies to mitigate the risk associated with Web applications and social networking. Topics also include a review of the evolutionary changes that have occurred in computing, communications and social networking; and securing systems against risks, threats and vulnerabilities associated with Web-enabled applications.

CIS 552-Cybercrime Techniques & Response

Prerequisite: CIS 502

Examine the landscape, key terms and concepts of computer hackers and the criminals who break into networks, steal information and corrupt data. Topics include the various vulnerabilities of operating systems, software and networks, and the used by hackers to access unauthorized information and resources. Compare incident handling methods to use when information security is compromised.

CIS 558-Information Technology Audit and Control

Prerequisite: CIS 502

Focus on establishing the framework to audit, secure and ensure internal controls in an information technology environment. Topics include the technical and professional issues in the context of technology-driven audits, security, privacy, business continuity, and legislative and governance changes.

CIS 560-Security Access & Control Strategies

Prerequisite: CIS 502

Understand the concept of access control to protect information systems and applications from unauthorized viewing, tampering or destruction. Define the components of access control, get a business framework for implementation, and discuss legal requirements that impact access control programs. Topics include the risks, threats and vulnerabilities prevalent in information systems and IT infrastructures and how to mitigate these conditions. Discuss security controls for access control including tokens, biometrics and the use of public key infrastructures (PKI).

You're ready for Strayer University.

Take Your Next Step

We’re here to help! Complete this form and a dedicated Admissions Officer will contact you shortly. Or call 888-311-0355 to talk to us now.

* All fields required

You must be an RN to enter the RN to BSN Program.

You consent to receive autodialed marketing calls or text from Strayer at the phone number you provided. Consent is not required to purchase goods or services. You can always call us at 866-314-3547.