Keeping data safe. It’s become an obsession for businesses of every kind. You need to understand the ever-changing tools and tricks of criminals from hackers to terrorists and you need to stay one step ahead. As a professional with a master’s of science in information assurance, you can take the next step within your organization or your career.
*The National Security Agency’s (NSA) Committee on National Security Systems (CNSS) has certified that Strayer University’s security curriculum has been reviewed by the Information Assurance Courseware Evaluation Review Committee (IACE) and determined that it meets national training standards for information systems security professionals and system administrators, NSTISSI No. 4011 and 4013
Strayer University is Accredited by the Middle States Commission on Higher Education. Learn more why college accreditation matters.
Get the most from your education with the help of your academic advisor. Learn more about our success coaches.
Our information assurance degree allows you to develop your cyber security management skills while preparing to take your Certified Information Systems Security Professional (CISSP) exam. That can help save you time and money. We also help you develop the leadership skills that will prepare you for hybrid management roles that leverage your expertise in emerging technology to adapt operations at the organizational level. From cloud-based environments to the highly regarded Toolwire™ live labs, your Strayer educational experience will be steeped in real-world tools.
Learn how our curriculum combines an IT degree with certification exam preparation.
A Degree With a Difference
Nearly 87% of Strayer master’s degree recipients responding to our survey said their degree had an impact on them meeting their professional or career goals.
— OIRAE Graduates Survey, April 2013
ADVANCE YOUR EXPERTISE:
Courses to complete12
Take classes online or at these campuses nearest you:
Or Search Campus
CIS 500-Information Systems for Decision Making
Examine the strategic use and trends of organizational information systems with emphasis on the application of information technology. Study key computing concepts in the strategic context in which information technology is used with emphasis on how information technology enables improvement in quality, timeliness and competitive advantage.
CIS 502-Theories of Security Management
Prerequisite: CIS 500
Explore current and emerging theories in security management. Topics include the policies, guidance, technologies and organizational concerns that security managers must address in leading and providing secure computing environments. Discuss topics such as access control, security architecture, cryptography and the CISSP Common Body of Knowledge.
CIS 505-Communication Technologies
Prerequisite: CIS 500 or CIS 512
Discuss trends and topics in computer communications. Use a balance of technical foundations and business practices to develop a managerial level of knowledge in data communications. Topics also include networking, distributed applications, network management, security and network operating systems.
CIS 512-Advanced Computer Architecture
Examine the structure and operation of computers in the context of the enterprise solutions. Focus on strategies to select, deploy, integrate and administer platforms or components to support the organizations computing infrastructure. Topics include the framework and strategic trends essential to the administration of hardware; services provided by the operating system; and computer interaction.
CIS 527-IT Risk Management
Prerequisite: CIS 502
Address the topic of risk management and how risk, threats and vulnerabilities impact information systems. Topics include how to assess and manage risk based on defining an acceptable level of risk for information systems; elements of a business impact analysis and business continuity plan; and disaster recovery planning.
CIS 534-Advanced Network Security Design
Examine strategies to design networking security, Virtual Private Networks (VPNs), and firewalls for securing a network. Review different types of VPNs for securing data, as well as security-related themes. Topics also include the benefits, architecture and implementation strategies of VPNs and the configuration, administration, utility and limitations of firewalls.
CIS 542-Web Application Security
Prerequisite: CIS 502 or CIS 505
Address the risks and threats to and vulnerabilities of Web-based applications and the people who use them. Discuss security strategies to mitigate the risk associated with Web applications and social networking. Topics also include a review of the evolutionary changes that have occurred in computing, communications and social networking; and securing systems against risks, threats and vulnerabilities associated with Web-enabled applications.
CIS 552-Cybercrime Techniques & Response
Prerequisite: CIS 502
Examine the landscape, key terms and concepts of computer hackers and the criminals who break into networks, steal information and corrupt data. Topics include the various vulnerabilities of operating systems, software and networks, and the used by hackers to access unauthorized information and resources. Compare incident handling methods to use when information security is compromised.
CIS 558-Information Technology Audit and Control
Prerequisite: CIS 502
Focus on establishing the framework to audit, secure and ensure internal controls in an information technology environment. Topics include the technical and professional issues in the context of technology-driven audits, security, privacy, business continuity, and legislative and governance changes.
CIS 560-Security Access & Control Strategies
Prerequisite: CIS 502
Understand the concept of access control to protect information systems and applications from unauthorized viewing, tampering or destruction. Define the components of access control, get a business framework for implementation, and discuss legal requirements that impact access control programs. Topics include the risks, threats and vulnerabilities prevalent in information systems and IT infrastructures and how to mitigate these conditions. Discuss security controls for access control including tokens, biometrics and the use of public key infrastructures (PKI).