Master of Science in Information Systems

Computer Forensic Management

Secure an Advanced Degree in Information Systems with Computer Forensic Management

Consider a Strayer University Master of Science in Information Systems (MSIS) degree with Computer Forensic Management concentration for an exciting future. In today’s global, interconnected economy, information systems professionals are in high demand. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013)

With the Computer Forensic Management concentration you will:

  • Master the ability to process and report on digital computer evidence from a crime scene or in connection with a computer forensics investigation—in the public or private sector.
  • Focus on the managerial aspects of the field, including policy, practice, planning, risk management, response, and examination.

Our online classes and on-campus coursework provides preparation for students interested in roles such as Information Technology or Information Systems Manager/Director, Data Processing Manager, MIS Director, Computing Services Director, Director of Application Development, or Technical Services Manager.

Key Learning Outcomes

  • Describe the Sarbanes Oxley (Sox) act and Committee of Sponsoring Organizations (COSO) framework.
  • Describe and apply the Control Objectives for Information and related Technology (COBIT) framework to perform IT Audits.
  • Describe information technology general controls based on the Information Technology Infrastructure Library (ITIL) best practices.
  • Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service oriented architecture and virtualization.
  • Develop an audit plan and control framework that addresses and solves a proposed business problem.
  • Design appropriate authentication solutions throughout an IT infrastructure based on user types and data classification standards.
  • Identify the computer forensics investigation process.
  • Compare and contrast the various types of computer forensic tools.
  • Demonstrate the ability to develop procedural techniques in crime and incident scenes.
  • Develop an information technology disaster recovery plan and a computer forensics plan that addresses and solves a proposed business problem.


  • CIS 558-Information Technology Audit and Control
  • CIS 560-Security Access & Control Strategies
  • CIS 562-Computer Forensics Planning

Click here to see full Information Systems – Computer Forensic Management curriculum and course descriptions

Program Disclosures

Information for Tennessee Online Students

IS/IT Programs


Strayer University is accredited by the Middle States Commission on Higher Education (3624 Market Street, Philadelphia, PA 19104. 267-284-5000), which is one of the six regional accrediting bodies in the United States. The Commission is an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education Accreditation.


Highly Respected by Employers Across the Country

Strayer University is a preferred education provider to more than 150 well-known, highly ranked organizations and government agencies across the United States.

Learn more about our Business Alliances, and how you may qualify for a tuition discount.