TECH SENSE. PEOPLE SAVVY. THE BSIS DEGREE.

Combine your talent for technology with your people skills — overseeing teams and projects to deliver the future. Develop the technical and business expertise you need to deploy new information systems, write technology policies and tackle a host of information-related challenges.

Save time and advance your career when you prep for the CompTIA Network+ and ISC2 certifications while earning your information systems degree. 

 

 

Affordable

Our BSIS costs up to 36% less in tuition and fees than selected, comparable degrees at colleges like DeVry, ITT and Kaplan† 

Customized

Tailor your on campus or online degree with one of seven in-demand concentrations, including Cyber Security and IT Project Management 

Respected

Strayer University is Accredited by the Middle States Commission on Higher Education, and organizations like General Dynamics, SAIC and the FBI turn to us to help train their employees

Supported

Your academic advisor and professors will help guide you as you prepare for separately administered exams that lead to industry certifications

A Strayer BSIS degree prepares you to deliver successful computer information systems projects for government or businesses. We combine the study of today computer information systems challenges and emerging technologies with hands-on application of the latest technical standards. You’ll work with a complete range of platforms, devices and deployment environments. And you’ll learn critical communication and management skills for an information systems degree that will help you not just implement technological change, but lead it.

IT Curriculum

Learn how our curriculum combines an IT degree with certification preparation.

*The National Security Agency’s (NSA) Committee on National Security Systems (CNSS) has certified that Strayer University’s security curriculum has been reviewed by the Information Assurance. Courseware Evaluation Review Committee (IACE) and determined that it meets national training standards for information systems security professionals and system administrators, NSTISSI No. 4011 and 4013.

† Compare Strayer BSIS program costs at http://www.strayer.edu/academic-program-disclosure/bsis with the costs for DeVry’s BCIS program at http://www.devry.edu/degree-programs/ge/computer-information-systems-consumer-info.html, the costs for ITT’s BISC program at http://programinfo.itt-tech.edu/ind/bsisc/ and the costs for Kaplan's BSIT program at http://www.kaplanuniversity.edu/UploadedFiles/gao/ku_online/BSInformationTechnology/index.htm.

PIE Diagram

An Education That Pays Off

Over 64% of Strayer BSIS grads responding to our survey have higher earnings than the industry median for more than 100 other bachelor’s degrees, as reported by PayScale.  

OIRAE Graduates Survey in 2014 PayScale College Salary Report
Program Disclosure | Information for Tennessee Online Students

Information for Tennessee Online Students

Strayer University is authorized for operation as a postsecondary educational institution by the Tennessee Higher Education Commission. In order to view detailed job placement and graduation information on the programs offered by Strayer University, please visit www.state.tn.us/thec and click on the Authorized Institutions Data button. Please contact your campus director or campus dean with any questions regarding the information provided on the Tennessee Higher Education Commission website. Credits earned at Strayer University may not transfer to another educational institution. Credits earned at another educational institution may not be accepted by Strayer University. You should obtain confirmation that Strayer University will accept any credits you have earned at another educational institution before you execute an enrollment contract or agreement. You should also contact any educational institutions that you may want to transfer credits earned at Strayer University to determine if such institutions will accept credits earned at Strayer University prior to executing an enrollment contract or agreement. The ability to transfer credits from Strayer University to another educational institutions may be very limited. Your credits may not transfer and you may have to repeat courses previously taken at Strayer University if you enroll in another educational institution. You should never assume that credits will transfer to or from any educational institution. It is highly recommended and you are advised to make certain that you know the transfer of credit policy of Strayer University and of any other educational institutions you may in the future want to transfer the credits earned at Strayer University before you execute an enrollment contract or agreement.

Bachelor of Science in Information Systems

Homeland Security Management

HANDS-ON LEARNING:

Prepare to take your CompTIA Network+ and ISC2 certification exams
Develop a disaster recovery plan for an organization
Explain and develop a business continuity plan to addresses unforeseen incidents
Compare and contrast the different ISS policies associated with incident response teams (IRT)
Describe the foundations of homeland security and emergency management, and summarize border security and immigration issues
Compare and contrast homeland security agencies at the federal, state and local levels
List and describe the various types of and practice of cybercrime
Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge
Identify the strategic security management issues in cyber security planning and response

Classes
start on

Jan. 5th

Courses to complete

40
Take classes online or at these campuses nearest you:

Loudoun

45150 Russell Branch Pkwy Suite 200
Ashburn, VA 20147
United States
P:
703.729.8800

Manassas

9990 Battleview Parkway
Manassas, VA 20109
United States
P:
703.330.8400

Rockville

4 Research Place Suite 100
Rockville, MD 20850
United States
P:
301.548.5500
See More Campuses

Or Search Campus

With many campuses to choose from, the campus finder is an easy way to see if there is a Strayer University near you.

OR

You may also be interested in:

Degree Finder

Key Courses in Your Concentration.

CIS 359-Disaster Recovery Management

Get a foundation in disaster recovery and incident response in computing environments. Learn to prepare a disaster recovery plan, assess risk and develop policies and procedures. Topics include contingency planning, business continuity and crisis management.

CIS 462-Security Strategy and Policy

Discuss the cyber security policies created to protect and maintain a computing network, such as password policy, e-mail policy and Internet policy. Students are presented with a comprehensive view of information and online security policies, frameworks and issues related to organizational behavior and crisis management. Topics also include governance, regulation, mandates, business drivers and legal considerations when implementing security policies and frameworks.

SEC 310-Homeland Security Organization and Administration

Examine the organization and practice of the Department of Homeland Security and the terrorist threats that dictate its operations. Topics include foundations of homeland security, terrorism, countermeasures and response to terrorist threats.

SEC 402-Cyber Security

Explore the practices and framework designed to ensure cyber security. Students will explore the areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge. Topics include the various roles, functions and competencies within the cyber security domain to mitigate risks and secure organizational assets.

 

Close

Tuition and Fees

Application Fee:$50 (not applicable in all states)

Technology Fee:$65.00 per quarter

Tuition:

$1,420.00 per course (Full-Time), $1,420.00 per course (Part Time). Textbooks and supplies are not included in the tuition rates and must be purchased by the student. You should allow approximately $6,000.00 for textbooks and supplies over the course of your degree.

Tuition rates apply to all new and readmit undergraduate students. For all students enrolled as an undergraudate prior to Winter 2014, please Click here for undergraduate tuition rates.

Close

Graduate in 3.3 to 5 years

  Classes Per Quarter Time to Graduate
Full-time 3 or more classes per quarter (classes start 4 times per year) 3.3 years or fewer (3 classes per quarter)
Part-time 2 or fewer classes per quarter (classes start 4 times per year) 5 years or more

Strayer University's academic calendar runs on te quarter systems, which means that classes start 4 times per year. Classes meet for 11 weeks with 1-2 week breaks between quarters. The above times to graduate assume that students are enrolled in consecutive quarters. All of these facts and figures refer to any concentration that you choose.

Close

Compare Degrees

Master of Science in Information Systems

Associate in Arts in Information Systems

KEY COURSES IN YOUR MAJOR.

CIS 210-Systems Analysis and Development

Explore the processes, methods, techniques and tools that organizations use to effectively architect computer-based technologies. Topics include a fundamental review of project management and data design followed by the processes required to gather and articulate business requirements. Acquire skills to procure, evaluate, test and systematically build systems for integration into an organization.

CIS 333-Networking Security Fundamentals

Study computer information system security principles, challenges, vulnerabilities and countermeasure strategies. Topics include definition of security terms, concepts, elements and goals. Explore industry standards and practices that focus on the availability, integrity and confidentiality aspects of information systems security.

CIS 336-Enterprise Architecture

Explore the design, selection, implementation and management of enterprise IT solutions. Topics include frameworks and strategies for infrastructure management, system administration, data/information architecture, content management, distributed computing, middleware, legacy system integration, system consolidation, software selection, total cost of ownership calculation, IT investment analysis and emerging technologies.

CIS 348-Information Technology Project Management

Examine the processes, methods, techniques and tools that organizations use to manage their information technology projects in accordance with the Project Management Institutes Project Management Body of Knowledge (PMBOK). Focus on the methodology and project management software for initiating, planning, executing, controlling and closing technology projects. Topics include various types of technologies to support group collaboration and the use of resources from within the firm as well as contracted from outside the organization.

CIS 349-Information Technology Audit and Control

Cover the principles, approaches and methodologies in auditing information systems to ensure the processes and procedures are in compliance with pertinent laws and regulatory provisions especially in the context of information systems security (ISS). Topics include the processes used to protect and secure business and consumer privacy data, an explanation of compliancy laws, and the process and legal requirements for conducting IT infrastructure compliance audits.

CIS 499-Information Systems Capstone

Take a senior management approach to examine issues in managing the information systems function in organizations and how information systems integrate, support and enable various types of organizational capabilities. Topics include developing an intellectual framework to critically assess existing information systems infrastructures, emerging technologies and how enabling technologies affect organizational strategy.

CIS 111-Introduction to Relational Database Management Systems

Get an introduction to the theory and applied concepts of database design, database management and information management. Focus on identifying organizational information requirements, express those requirements using conceptual data modeling techniques, verify the structural characteristics with normalization techniques and convert conceptual data models into physical database models.

CIS 175-Introduction to Networking

Prerequisite: CIS 106 or CIS 109 or CIS 111

This course introduces students to the fundamentals of networking technology. The focus of the course will include networking protocols, topologies, hardware and operating systems. Topics include data communications, telecommunications, infrastructure security, inter/intranetworking and the application of networking to multimedia, information storage and distribution.

THE STRAYER BACHELORS DEGREE DIFFERENCE.

Finish paying for college and begin to turn a profit on your degree sooner when you combine Strayer's more affordable bachelor’s degree with the option to complete your program in less than 4 years.**

** Transfer of college credit, challenge exams and other individual circumstances may allow you to complete your degree sooner. Students study at their own pace and on their own schedule. Most students attend part time. Normal time for program completion is six years.

You're ready for Strayer University

Get Started Now


Changing your future starts here.

Fill out this simple form and a representative from our admissions team will contact you shortly. To connect right now, call 1-888-863-0568. * required

*By checking this box, you consent for Strayer University to contact you by telephone, text, and/or e-mail, including for marketing purposes and through the use of pre-recorded and automated technology at any number and e-mail address you provided. This consent is not required to purchase goods or services and you may always call us directly at 866-314-3547.