Master of Science in Information Systems
Computer Forensic Management
Secure an Advanced Degree in Information Systems with Computer Forensic Management
Consider a Strayer University Master of Science in Information Systems (MSIS) degree with Computer Forensic Management concentration for an exciting future. In today’s global, interconnected economy, information systems professionals are in high demand. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013)
With the Computer Forensic Management concentration you will:
- Master the ability to process and report on digital computer evidence from a crime scene or in connection with a computer forensics investigation—in the public or private sector.
- Focus on the managerial aspects of the field, including policy, practice, planning, risk management, response, and examination.
Our online classes and on-campus coursework provides preparation for students interested in roles such as Information Technology or Information Systems Manager/Director, Data Processing Manager, MIS Director, Computing Services Director, Director of Application Development, or Technical Services Manager.
Key Learning Outcomes
- Describe the Sarbanes Oxley (Sox) act and Committee of Sponsoring Organizations (COSO) framework.
- Describe and apply the Control Objectives for Information and related Technology (COBIT) framework to perform IT Audits.
- Describe information technology general controls based on the Information Technology Infrastructure Library (ITIL) best practices.
- Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service oriented architecture and virtualization.
- Develop an audit plan and control framework that addresses and solves a proposed business problem.
- Design appropriate authentication solutions throughout an IT infrastructure based on user types and data classification standards.
- Identify the computer forensics investigation process.
- Compare and contrast the various types of computer forensic tools.
- Demonstrate the ability to develop procedural techniques in crime and incident scenes.
- Develop an information technology disaster recovery plan and a computer forensics plan that addresses and solves a proposed business problem.
- CIS 558-Information Technology Audit and Control
- CIS 560-Security Access & Control Strategies
- CIS 562-Computer Forensics Planning