Cybersecurity Center
Welcome to Strayer University's Cybersecurity Center
The Strayer University Cybersecurity Center is a dedicated space for this fast-paced and growing field. Strayer is focused on creating a pathway to infuse employer needs and emerging trends into our programs. This center focuses on providing information about Strayer’s cybersecurity course and program offerings as well as important cybersecurity trends and topics.
Contact Sr. Dean Dr. Carlo Sapijaszko with any questions.
Academic Opportunities
- Bachelor of Science in Information Technology (BSIT) with Cybersecurity Concentration
- Master of Science in Information Security and Assurance (MSISA)
- Master of Science in Information Systems (MSIS) with Computer Forensic Management Concentration
- Master of Science in Information Systems (MSIS) with Computer Security Management Concentration
The key mission of the IT Industry Advisory Board is to create pathways to infuse employer needs and emerging trends into the Information Technology programs. Board members range from industry practitioners, academicians, and entrepreneurs, all uniquely qualified to offer valuable input to further Strayer IT programs.
- Ray Caparros - Cybersecurity Engineer – Mantech
- Sunny Chowdhury - Entrepreneur/Cloud Architect - Amazon
- Tom Christensen - Amazon Solutions Architect - AWS
- Meggie Enxuto - Vice President of Education - Devmountain
- Mark Merkow - Application Security Architecture / Design / Engineering - HealthEquity, Inc.
- Louise Ng - Transformation Architect - VMware
- Delayne Sorrells - GSSP-Security Business Management Office Leader - Cisco
- Myles Vogel - Consultant - Principal
Faculty
The following faculty are associated with Strayer University’s cybersecurity-related programs.
- Darcel Ford, PhD
- Christopher Gorham, PhD
- James Manning, DSc
Cybersecurity News and Events
Strayer places high again in the 2023 NSA Codebreaker Challenge
Strayer University placed sixth out of 348 educational institutions in the U.S. that participated in the 2023 NSA Codebreaker Challenge. This is the second year that Strayer students competed in this challenge. In this year’s scenario, the US Coast Guard (USCG) discovered an unidentified signal near US waters. Individual students played the role of NSA employees providing technical assistance to the USCG to identify and investigate the unknown object producing the signal. Strayer University is proud of our students’ achievements as part of the NSA Codebreaker Challenge.
We invite all cybersecurity enthusiasts looking to enroll at Strayer University to reach out to Dr. Ford. We would love to share more about our participation in the codebreaker event and answer any questions you may have.
MSISA program earns key NSA designation
The National Security Agency (NSA) and a committee of academic peers designated Strayer University as a National Center of Academic Excellence in Cyber Defense (CAE-CD) and validated the Master of Science in Information Security and Assurance (MSISA) degree program.
To earn this recognition, Strayer was required to demonstrate that the MSISA program aligns closely with important cybersecurity knowledge units that have been validated by experts in the field.
Enrollment in our MSISA program gives students a path toward joining a highly skilled workforce that is critical to protecting the nation’s information infrastructure. MSISA students gain key skills and knowledge that are important to today’s employers in the cybersecurity and defense field.
Cybersecurity competition in CIS562
Starting in the Spring 2021 term, students enrolled in CIS562: Computer Forensics Planning had an opportunity to participate in a Cyber Challenge (competition). The first challenge was designed by Strayer faculty (Prof. Ford) and offered on May 19. The task given to students was to use industry-standard forensics tools to recover a deleted file with a specific characteristic, in this case, a specific modification date. Students had 90 minutes to complete the challenge, and their answers to questions while completing the challenge determined their rank. Students received a certificate of rank following the Cyber Challenge. The challenge has been offered every term thereafter, and students will have other competition opportunities in the future!
Student IT Career Community on Facebook
Current students have the opportunity to join Strayer’s Information Technology Career Community on Facebook to learn about careers in the IT field, learn how to find jobs, and connect with community members. Students also hear from guest speakers, including professionals currently working in the cybersecurity field.
External Links
- CAE Community and Cyber Activities: https://www.caecommunity.org
- Cybersecurity & Infrastructure Security Agency: https://www.cisa.gov/
- Krebs on Security: https://krebsonsecurity.com/
Cybersecurity Resources
Cybersecurity Talent Demand and Career Paths
- Cybersecurity Career Path https://www.cyberseek.org/pathway.html
- Cybersecurity Talent Demand https://www.cyberseek.org/heatmap.html
- Integrated Ecosystem of Cybersecurity education, training, and workforce development https://www.nist.gov/itl/applied-cybersecurity/nice
- Cyber Security Jobs https://www.cybersecurityjobs.com
Current Cyber Threats
- CheckPoint threatmap.checkpoint.com/ThreatPortal/livemap.html
- FireEye www.fireeye.com/cyber-map/threat-map.html
- Kaspersky cybermap.kaspersky.com
Institutional Security Resources and Awareness
In addition to the resources below, Strayer has additional cybersecurity policies, procedures, and resources that are available to students and staff who have Strayer log-in credentials.
- Strayer’s Privacy Policy https://www.strayer.edu/privacy-policy
- Strayer’s Security Awareness https://www.strayer.edu/security-awareness
Courses
The following courses are relevant to the field of cybersecurity and are included in the degree programs offered at Strayer. Click on the course below to learn about the associated course descriptions in the University Catalog.
This is a lab-based course that helps to prepare students to install, configure, secure and maintain the Windows server environment. Topics include configuring and managing DHCP, DNS, routing and remote access, file and print services. Prerequisite(s): CIS175, CIS225, CIS312 or CIS337.
Certification offering: Certification availability is subject to change.
Course preparation requirements: Course may require that prerequisites are satisfied through completion of a course at Strayer University, transfer credit or review of previous certifications earned. Contact a dean, advisor or coach for additional information.
This is a lab-based course that provides an overview of information technology security principles, challenges, vulnerabilities and countermeasure strategies. Topics include definition of security terms, concepts, elements and goals. Students will explore industry standards and practices that focus on the availability, integrity and confidentiality aspects of information systems security.
This course presents current and emerging theories in security management. Topics include the policies, guidance, technologies and organizational concerns that security managers must address in leading and providing secure computing environments. Students will explore topics such as access control, risk identification and cryptography.
This course examines the structure and operation of digital computers in the context of providing data and infrastructure security. Emphasis will be placed on strategies to select, deploy, integrate and administer modern computing environments to support the organization's overall security posture. Topics include hardware components of modern computing environments and their deployment in compliance with applicable cybersecurity laws and policies.
This course addresses the topic of risk management and how risk, threats and vulnerabilities impact information systems. Topics include how to assess and manage risk based on defining an acceptable level of risk for information systems, elements of a business impact analysis, business continuity plan, and disaster recovery planning. PREREQUISITE: CIS 502
This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.
This course addresses the risks, threats and vulnerabilities for web-based applications and the people who use them. This course presents security strategies to mitigate the risk associated with web applications and social networking. Topics also include a review of the evolutionary changes that have occurred in computing, communications, and social networking and securing systems against risks, threats and vulnerabilities associated with web-enabled applications.
This course examines the threats, crimes and other abuses that are present in the cyber realm. Topics include identifying the bad actors in cyberspace, examining how they used the internet for criminal activity, and evaluating techniques in preventing crime and abuse. Students will explore different types of cyberattacks and their characteristics. PREREQUISITE: CIS 502
This course presents typical cyber operations including access and control, where ethical dilemmas arise and provides tools for legal and ethical decision making. Topics include various stages of a cyber operation, U.S. regulations and ethical implications of granting access and control. Students will explore the authorities, roles and steps associated with ethical cyber operations.
This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab, investigating computer and cybercrime, tools, techniques and methods used to perform forensic investigations and concepts for collecting, analyzing, recovering and preserving forensic evidence.
This course covers cryptography from historical, applied, and theoretical perspectives. Topics include symmetric and asymmetric encryption techniques that include classical and modern algorithms. This course explores the framework and practice of using cryptography in securing information in organizational settings.
In this integrative capstone course, students will examine and solve real-world cybersecurity problems and apply associated techniques to create practical solutions. The course takes an integrative, senior security officer approach to address the policy, risk and control opportunities within cyberspace and IT environments.
Get the knowledge and skills to identify, track and prosecute cyber criminals. Understand computer forensics; creating a secure lab; and the process for forensic investigation, including first responder response techniques, incident management, and reports used by computer forensic investigators. Cover a broad base of topics designed to detect attacks and collect evidence in a forensically sound manner. Take preparatory steps to identify evidence in computer-related crime and abuse cases and track a hacker’s path through a client system.
This is a lab-based course that covers topics in offensive network security, ethical hacking, network defense and countermeasures. The course provides an understanding of the tactics and tools used by hackers and methods to prepare strong countermeasures and defensive systems to protect an organization’s critical infrastructure and information. Topics include perimeter defense techniques, scanning and attacking simulated networks with a variety of tools, viruses, and malware.
This is a lab-based course that covers topics in advanced penetration testing and information security analysis. Students are exposed to methodologies in conducting thorough information security analysis and advanced penetration testing techniques to effectively identify and mitigate risks to the security of an organization’s infrastructure.