Master of Science in Information Systems - Maryland

Computer Security Management

Master the Future with an Advanced Degree in Information Systems with Computer Security Management

Consider a Strayer University Master of Science in Information Systems (MSIS) degree with Computer Security Management concentration for an exciting future. In today’s global, interconnected economy, information systems professionals are in high demand. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013)

You will:

  • Learn the knowledge, skills, legal background, and ethical principles necessary to identify threats and develop effective policies.
  • Hone skills related to designing firewalls and network security systems; analyzing system vulnerabilities; and counteracting and removing Trojans, backdoors, and malware.
  • Gain additional competencies necessary to lead, manage and support the computing security challenges faced by organizations of all sizes through a rich breadth of contemporary technology courses and topics that align with real-world scenarios.

Our online classes and on-campus coursework prepares graduates for roles as Information Technology Manager or Director, Information Security Manager of Director, Information Systems Director, Chief Information Security Officer or Security Director and Information Systems Manager.

Key Learning Outcomes

  • Explain the fundamental concepts of network security and associated ethical issues in addressing exploits.
  • Describe the impact that malicious exploits and attacks have on network security.
  • Identify network security tools and discuss techniques for network protection.
  • Assess firewall design strategies and design a secure network.
  • Describe network security implementation strategies and the roles each can play within the security life cycle.
  • Analyze system vulnerabilities exploited by hackers.
  • Design plans that remove Trojans, backdoors, and malware from infected systems.
  • Explain the process of network traffic analysis and sniffing and their appropriate tools.
  • Analyze wireless network vulnerabilities exploited by hackers.
  • Examine the appropriate methods for performing incident handling.


  • CIS 502-Theories of Security Management
  • CIS 523-Security in Distributed Computing
  • CIS 550-Case Studies in the Management of Information Security

Click here to see full Information Systems In Maryland – Computer Security Management curriculum and course descriptions

Program Disclosures

Information for Tennessee Online Students

IS/IT Programs


Strayer University is accredited by the Middle States Commission on Higher Education (3624 Market Street, Philadelphia, PA 19104. 267-284-5000), which is one of the six regional accrediting bodies in the United States. The Commission is an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education Accreditation.


Highly Respected by Employers Across the Country

Strayer University is a preferred education provider to more than 150 well-known, highly ranked organizations and government agencies across the United States.

Learn more about our Business Alliances, and how you may qualify for a tuition discount.