Master of Science in Information Systems
Computer Forensic Management
Secure an Advanced Degree in Information Systems with Computer Forensic Management
Consider a Strayer University Master of Science in Information Systems (MSIS) degree with Computer Forensic Management concentration for an exciting future. In today’s global, interconnected economy, information systems professionals are in high demand. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013)
With the Computer Forensic Management concentration you will:
- Master the ability to process and report on digital computer evidence from a crime scene or in connection with a computer forensics investigation—in the public or private sector.
- Focus on the managerial aspects of the field, including policy, practice, planning, risk management, response, and examination.
Our online classes and on-campus coursework provides preparation for students interested in roles such as Information Technology or Information Systems Manager/Director, Data Processing Manager, MIS Director, Computing Services Director, Director of Application Development, or Technical Services Manager.
Key Learning Outcomes
- Describe the Sarbanes Oxley (Sox) act and Committee of Sponsoring Organizations (COSO) framework.
- Describe and apply the Control Objectives for Information and related Technology (COBIT) framework to perform IT Audits.
- Describe information technology general controls based on the Information Technology Infrastructure Library (ITIL) best practices.
- Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service oriented architecture and virtualization.
- Develop an audit plan and control framework that addresses and solves a proposed business problem.
- Design appropriate authentication solutions throughout an IT infrastructure based on user types and data classification standards.
- Identify the computer forensics investigation process.
- Compare and contrast the various types of computer forensic tools.
- Demonstrate the ability to develop procedural techniques in crime and incident scenes.
- Develop an information technology disaster recovery plan and a computer forensics plan that addresses and solves a proposed business problem.
- CIS 558-Information Technology Audit and Control
- CIS 560-Security Access & Control Strategies
- CIS 562-Computer Forensics Planning
Program LengthStrayer University students are mostly working adults who earn their degrees at their own pace and on their own schedule. Most students attend part-time, and the normal time to complete this program is 4.5 years.
On-Time Graduation Rate84% of our students who graduated from this program between July 1, 2011 and June 30, 2012, did so within 4.5 years.
Program CostsCost information for Strayer University programs is available at www.strayer.edu/tuition-and-fees. The tuition and fees for the entire program at current rates are $28,820 for both full-time and part-time students. Tuition rates apply to all new and readmit undergraduate students enrolling for Winter 2014 and future quarters. Rates also apply to undergraduate students who enrolled in the Fall 2013 Graduation Fund Plus Program at participating campuses in Virginia and Texas. For all other students enrolled prior to Winter 2014, please visit www.strayer.edu/tuition-and-fees for undergraduate tuition rates. The total estimated cost for books and supplies for the entire program is $1,800. Strayer University does not offer on-campus housing.
Median Loan DebtFor all students completing this program between July 1, 2011 and June 30, 2012, the median cumulative loan debt for each of the following are:
- Federal student loans: $31,700
- Private loans: $0
- Institutional finance loans: $0
Occupations for this program
The following U.S. Department of Labor Standard Occupational Classification (SOC) Codes and occupational titles are disclosed pursuant to U.S. Department of Education regulations, and correspond to the U.S. Department of Education Classification of Instructional Programs (CIP) Code for this program.
|Title||O*Net Link||SOC Code|
|Business Intelligence Analysts||http://www.onetonline.org/link/summary/15-1199.08||15-1199.08|
|Computer and Information Research Scientists||http://www.onetonline.org/link/summary/15-1111.00||15-1111.00|
|Computer and Information Systems Managers||http://www.onetonline.org/link/summary/11-3021.00||11-3021.00|
|Computer Science Teachers, Postsecondary||http://www.onetonline.org/link/summary/25-1021.00||25-1021.00|
|Data Warehousing Specialists||http://www.onetonline.org/link/summary/15-1199.07||15-1199.07|
|Document Management Specialists||http://www.onetonline.org/link/summary/15-1199.12||15-1199.12|
|Geographic Information Systems Technicians||http://www.onetonline.org/link/summary/15-1199.05||15-1199.05|
|Geospatial Information Scientists and Technologists||http://www.onetonline.org/link/summary/15-1199.04||15-1199.04|
|Search Marketing Strategists||http://www.onetonline.org/link/summary/15-1199.10||15-1199.10|
|Software Developers, Systems Software||http://www.onetonline.org/link/summary/15-1133.00||15-1133.00|
|Software Quality Assurance Engineers and Testers||http://www.onetonline.org/link/summary/15-1199.01||15-1199.01|