Master of Science in Information Systems - North Carolina
Computer Security Management
Master the Future with an Advanced Degree in Information Systems with Computer Security Management
Consider a Strayer University Master of Science in Information Systems (MSIS) degree with Computer Security Management concentration for an exciting future. In today’s global, interconnected economy, information systems professionals are in high demand. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013)
- Learn the knowledge, skills, legal background, and ethical principles necessary to identify threats and develop effective policies.
- Hone skills related to designing firewalls and network security systems; analyzing system vulnerabilities; and counteracting and removing Trojans, backdoors, and malware.
- Gain additional competencies necessary to lead, manage and support the computing security challenges faced by organizations of all sizes through a rich breadth of contemporary technology courses and topics that align with real-world scenarios.
Our online classes and on-campus coursework prepares graduates for roles as Information Technology Manager or Director, Information Security Manager of Director, Information Systems Director, Chief Information Security Officer or Security Director and Information Systems Manager.
Key Learning Outcomes
- Explain the fundamental concepts of network security and associated ethical issues in addressing exploits.
- Describe the impact that malicious exploits and attacks have on network security.
- Identify network security tools and discuss techniques for network protection.
- Assess firewall design strategies and design a secure network.
- Describe network security implementation strategies and the roles each can play within the security life cycle.
- Analyze system vulnerabilities exploited by hackers.
- Design plans that remove Trojans, backdoors, and malware from infected systems.
- Explain the process of network traffic analysis and sniffing and their appropriate tools.
- Analyze wireless network vulnerabilities exploited by hackers.
- Examine the appropriate methods for performing incident handling.
- CIS 502-Theories of Security Management
- CIS 523-Security in Distributed Computing
- CIS 550-Case Studies in the Management of Information Security
Program LengthStrayer University students are mostly working adults who earn their degrees at their own pace and on their own schedule. Most students attend part-time, and the normal time to complete this program is 4.5 years.
On-Time Graduation Rate84% of our students who graduated from this program between July 1, 2011 and June 30, 2012, did so within 4.5 years.
Program CostsCost information for Strayer University programs is available at www.strayer.edu/tuition-and-fees. The tuition and fees for the entire program at current rates are $28,820 for both full-time and part-time students. Tuition rates apply to all new and readmit undergraduate students enrolling for Winter 2014 and future quarters. Rates also apply to undergraduate students who enrolled in the Fall 2013 Graduation Fund Plus Program at participating campuses in Virginia and Texas. For all other students enrolled prior to Winter 2014, please visit www.strayer.edu/tuition-and-fees for undergraduate tuition rates. The total estimated cost for books and supplies for the entire program is $1,800. Strayer University does not offer on-campus housing.
Median Loan DebtFor all students completing this program between July 1, 2011 and June 30, 2012, the median cumulative loan debt for each of the following are:
- Federal student loans: $31,700
- Private loans: $0
- Institutional finance loans: $0
Occupations for this program
The following U.S. Department of Labor Standard Occupational Classification (SOC) Codes and occupational titles are disclosed pursuant to U.S. Department of Education regulations, and correspond to the U.S. Department of Education Classification of Instructional Programs (CIP) Code for this program.
|Title||O*Net Link||SOC Code|
|Business Intelligence Analysts||http://www.onetonline.org/link/summary/15-1199.08||15-1199.08|
|Computer and Information Research Scientists||http://www.onetonline.org/link/summary/15-1111.00||15-1111.00|
|Computer and Information Systems Managers||http://www.onetonline.org/link/summary/11-3021.00||11-3021.00|
|Computer Science Teachers, Postsecondary||http://www.onetonline.org/link/summary/25-1021.00||25-1021.00|
|Data Warehousing Specialists||http://www.onetonline.org/link/summary/15-1199.07||15-1199.07|
|Document Management Specialists||http://www.onetonline.org/link/summary/15-1199.12||15-1199.12|
|Geographic Information Systems Technicians||http://www.onetonline.org/link/summary/15-1199.05||15-1199.05|
|Geospatial Information Scientists and Technologists||http://www.onetonline.org/link/summary/15-1199.04||15-1199.04|
|Search Marketing Strategists||http://www.onetonline.org/link/summary/15-1199.10||15-1199.10|
|Software Developers, Systems Software||http://www.onetonline.org/link/summary/15-1133.00||15-1133.00|
|Software Quality Assurance Engineers and Testers||http://www.onetonline.org/link/summary/15-1199.01||15-1199.01|