Master of Science in Information Systems - North Carolina
Computer Security Management
Master the Future with an Advanced Degree in Information Systems with Computer Security Management
Consider a Strayer University Master of Science in Information Systems (MSIS) degree with Computer Security Management concentration for an exciting future. In today’s global, interconnected economy, information systems professionals are in high demand. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013)
- Learn the knowledge, skills, legal background, and ethical principles necessary to identify threats and develop effective policies.
- Hone skills related to designing firewalls and network security systems; analyzing system vulnerabilities; and counteracting and removing Trojans, backdoors, and malware.
- Gain additional competencies necessary to lead, manage and support the computing security challenges faced by organizations of all sizes through a rich breadth of contemporary technology courses and topics that align with real-world scenarios.
Our online classes and on-campus coursework prepares graduates for roles as Information Technology Manager or Director, Information Security Manager of Director, Information Systems Director, Chief Information Security Officer or Security Director and Information Systems Manager.
Key Learning Outcomes
- Explain the fundamental concepts of network security and associated ethical issues in addressing exploits.
- Describe the impact that malicious exploits and attacks have on network security.
- Identify network security tools and discuss techniques for network protection.
- Assess firewall design strategies and design a secure network.
- Describe network security implementation strategies and the roles each can play within the security life cycle.
- Analyze system vulnerabilities exploited by hackers.
- Design plans that remove Trojans, backdoors, and malware from infected systems.
- Explain the process of network traffic analysis and sniffing and their appropriate tools.
- Analyze wireless network vulnerabilities exploited by hackers.
- Examine the appropriate methods for performing incident handling.
- CIS 502-Theories of Security Management
- CIS 523-Security in Distributed Computing
- CIS 550-Case Studies in the Management of Information Security