TECHNOLOGY LEADS THE WAY.

Your tech expertise already makes you uniquely qualified to bring a new perspective to the executive management level. Now you need to sharpen your leadership skills to bring competitive enterprise advantages to your organization. Help your company — and yourself — use technology to excel.

 

Our information systems degree allows you to develop your technical skills while preparing to take your Certified Information Systems Security Professional (CISSP)  exam. That can help save you time and money. We also help you develop the leadership skills that will prepare you for hybrid management roles that leverage your expertise in emerging technology to adapt operations at the organizational level.

 

*The National Security Agency’s (NSA) Committee on National Security Systems (CNSS) has certified that Strayer University’s security curriculum has been reviewed by the Information Assurance Courseware Evaluation Review Committee (IACE) and determined that it meets national training standards for information systems security professionals and system administrators, NSTISSI No. 4011 and 4013

Customized

Tailor your on campus or online master’s degree in information systems with one of six functional concentrations, including Computer Forensic Management and Computer Security Management

Flexible

Take your courses online, on campus or both. Learn more about studying online and at a college campus near you.

Practical

Our degrees can help lay the foundation for your continued education.

Respected

Strayer University is Accredited by the Middle States Commission on Higher Education. Learn more why college accreditation matters. 

Learn to design, implement, and manage systems with portability, scalability and interoperability. Strengthen your planning and communication skills, and deepen your awareness of business functions and technical operations. Empower yourself for a successful career in this rapidly growing field.

 

 

Information Systems

Learn how our curriculum combines an IT degree with certification exam preparation.

Program Disclosure | Information for Tennessee Online Students

Information for Tennessee Online Students

Strayer University is authorized for operation as a postsecondary educational institution by the Tennessee Higher Education Commission. In order to view detailed job placement and graduation information on the programs offered by Strayer University, please visit www.state.tn.us/thec and click on the Authorized Institutions Data button. Please contact your campus director or campus dean with any questions regarding the information provided on the Tennessee Higher Education Commission website. Credits earned at Strayer University may not transfer to another educational institution. Credits earned at another educational institution may not be accepted by Strayer University. You should obtain confirmation that Strayer University will accept any credits you have earned at another educational institution before you execute an enrollment contract or agreement. You should also contact any educational institutions that you may want to transfer credits earned at Strayer University to determine if such institutions will accept credits earned at Strayer University prior to executing an enrollment contract or agreement. The ability to transfer credits from Strayer University to another educational institutions may be very limited. Your credits may not transfer and you may have to repeat courses previously taken at Strayer University if you enroll in another educational institution. You should never assume that credits will transfer to or from any educational institution. It is highly recommended and you are advised to make certain that you know the transfer of credit policy of Strayer University and of any other educational institutions you may in the future want to transfer the credits earned at Strayer University before you execute an enrollment contract or agreement.

Master of Science in Information Systems

Computer Forensic Management

ADVANCE YOUR EXPERTISE:

FOR REAL-WORLD CAREERS SUCH AS:

Master the ability to process and report on digital computer evidence from a crime scene or in connection with a computer forensics investigation in the public or private sector
Focus on the managerial aspects of the field, including policy, practice, planning, risk management, response and examination
Learn about the Sarbanes Oxley (Sox) Act and Committee of Sponsoring Organizations (COSO) framework
Understand and apply the Control Objectives for Information and related Technology (COBIT) framework to perform IT Audits
Describe information technology general controls based on the Information Technology Infrastructure Library (ITIL) best practices
Explore the various general controls and audit approaches for software and architecture, including operating systems, telecommunication networks, cloud computing, service oriented architecture and virtualization
Develop an audit plan and control framework that addresses and solves a proposed business problem
Design appropriate authentication solutions throughout an IT infrastructure based on user types and data classification standards
Identify the computer investigation process
Compare and contrast the various types of computer forensics tools
Demonstrate the ability to develop procedural techniques in crime and incident scenes
Develop an information technology disaster recovery plan and a computer investigation plan that addresses and solves a proposed business problem

Classes
start on

Jul. 5

Courses to complete

12
Select a campus location nearest you:
There doesn't appear to be a campus near you or something is not working as intended, please campus location page for a complete campus listing.

Or Search Campus

Visit our campus location page for a complete listing of our campuses.

Or
Need more flexibility? Find out more about online learning.

You may also be interested in:

Degree Finder

CIS 558-Information Technology Audit and Control

Prerequisite: CIS 502
 

Focus on establishing the framework to audit, secure and ensure internal controls in an information technology environment. Topics include the technical and professional issues in the context of technology-driven audits, security, privacy, business continuity, and legislative and governance changes.

CIS 560-Security Access & Control Strategies

Prerequisite: CIS 502

Understand the concept of access control to protect information systems and applications from unauthorized viewing, tampering or destruction. Define the components of access control, get a business framework for implementation, and discuss legal requirements that impact access control programs. Topics include the risks, threats and vulnerabilities prevalent in information systems and IT infrastructures and how to mitigate these conditions. Discuss security controls for access control including tokens, biometrics and the use of public key infrastructures (PKI).

CIS 562-Computer Forensics Planning

Practice systematic methods for conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab; investigating computer and cyber-crime; tools, techniques and methods used to perform forensic investigations; and concepts for collecting, analyzing, recovering and preserving forensic evidence.

Close

Tuition and Fees

Application Fee:$50 (not applicable in all states)

Technology Fee:$65.00 per quarter

Tuition:

$2,325.00 per course (Full-Time), $2,325.00 per course (Part Time). Textbooks and supplies are not included in the tuition rates and must be purchased by the student. You should allow approximately $1,800.00 for textbooks and supplies over the course of your degree.

Tuition rates apply to all new and readmit graduate students. For all students enrolled as an undergraudate prior to Winter 2014, please Click here for graduate tuition rates.

Close

Graduate in 1.5 to 3 years

  Classes Per Quarter Time to Graduate
Full-time 2 or more per quarter (classes start 4 times per year) 1.5 years or fewer
Part-time 1 class per quarter (classes start 4 times per year) 3 years

Strayer University's academic calendar runs on te quarter systems, which means that classes start 4 times per year. Classes meet for 11 weeks with 1-2 week breaks between quarters. The above times to graduate assume that students are enrolled in consecutive quarters. All of these facts and figures refer to any concentration that you choose.

Close

Compare Degrees

Master's Degree in Business Administration

Jack Welch MBA

Key Courses in Your Major

CIS 500-Information Systems for Decision Making

Examine the strategic use and trends of organizational information systems with emphasis on the application of information technology. Study key computing concepts in the strategic context in which information technology is used with emphasis on how information technology enables improvement in quality, timeliness and competitive advantage.

CIS 502-Theories of Security Management

Prerequisite: CIS 500

Explore current and emerging theories in security management. Topics include the policies, guidance, technologies and organizational concerns that security managers must address in leading and providing secure computing environments. Discuss topics such as access control, security architecture, cryptography and the CISSP Common Body of Knowledge.

CIS 505-Communication Technologies

Prerequisite: CIS 500 or CIS 512

Discuss trends and topics in computer communications. Use a balance of technical foundations and business practices to develop a managerial level of knowledge in data communications. Topics also include networking, distributed applications, network management, security and network operating systems.

CIS 510-Advanced Systems Analysis and Design

Get an integrated approach to system analysis and design processes. Explore advanced topics to evaluate and select system development methodologies and design system solutions. Focus on the role of effective interpersonal communication techniques and integration practices with users and user systems.

CIS 512-Advanced Computer Architecture

Examine the structure and operation of computers in the context of the enterprise solutions. Focus on strategies to select, deploy, integrate and administer platforms or components to support the organizations computing infrastructure. Topics include the framework and strategic trends essential to the administration of hardware; services provided by the operating system; and computer interaction.

CIS 515-Strategic Planning for Database Systems

Prerequisite: CIS 500 or CIS 512

Explore the concepts, issues, principles and techniques around managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Focus on the application and strategic use of database systems.

CIS 517-IT Project Management

Get a practical and theoretical foundation for applying project management techniques to Information Technology projects. The course puts a managerial emphasis on the Project Management Institute Project Management Body of Knowledge (PMBOK) knowledge areas, with practical application of project management tools and software to address information technology opportunities.

CIS 524-Computer Interaction and Design

Understand the concepts, theory and design behind human-computer interaction (HCI) to address organizational issues. Learn the practical principles and guidelines to develop high quality interface designs that users can understand, predict and control. Topics include a strategic and tactical assessment of expert reviews, usability testing, direct manipulation, menu selection and form design. Address current HCI topics with a balanced emphasis on mobile devices, Web and desktop platforms.

CIS 599-Graduate Information Systems Capstone

Prerequisite: To be taken last or next to last;a grade of 'B' or higheris required.

Examine and address real-world projects and problems and apply project management techniques to create practical solutions. Take an integrative and senior management approach to address the integration of a broad range of technologies, including databases, security, networking, computer infrastructure and human computer interaction.

You're ready for Strayer University.

Take Your Next Step

We’re here to help! Complete this form and a dedicated Admissions Officer will contact you shortly. Or call 888-311-0355 to talk to us now.

* All fields required

You must be an RN to enter the RN to BSN Completion Program.