Getting an online computer forensics degree will help you gain the skills necessary to analyze and recover data that’s been compromised. In this program, you’ll:

  • Prepare to take your CompTIA Network+ and ISC2 certification exams
  • Design a security policy framework and disaster recovery plan for an organization
  • Identify the role of computer forensics in responding to crimes and solving business challenges
  • Develop a computer forensics deployment plan that addresses and solves a proposed business problem
  • Analyze how security policies help mitigate risks and support business processes in various domains in the information technology (IT) infrastructure
  • Summarize the ethical components and basic requirements for creating a security policy framework
  • Compare and contrast the various types of computer crime
  • Evaluate and explain the various methods of computer investigation and evidentiary gathering techniques


Summer Classes Start:

July 1

Courses to Complete:


Cost Per Course:


Campuses Near You:



  • CIS 359 - Disaster Recovery Management

    Get a foundation in disaster recovery and incident response in computing environments. Learn to prepare a disaster recovery plan, assess risk and develop policies and procedures. Topics include contingency planning, business continuity and crisis management.

  • CIS 417 - Computer Forensics

    Explore system forensics investigation and response. Topics include procedures for investigating computer and cyber-crime; computer forensics tools, techniques and methods used to perform computer investigations; and concepts for collecting, analyzing, recovering and preserving digital forensic evidence.

  • CIS 462 - Security Strategy and Policy

    Students can take either CIS 438 OR 462


    Discuss the cyber security policies created to protect and maintain a computing network, such as password policy, e-mail policy and Internet policy. Students are presented with a comprehensive view of information and online security policies, frameworks and issues related to organizational behavior and crisis management. Topics also include governance, regulation, mandates, business drivers and legal considerations when implementing security policies and frameworks.

  • SEC 405 - Computer Crime Investigation

    Explore and identify various computer crimes and their associated criminal investigations. Students will be introduced to the field of computer crime, computer forensics, litigation related to computer crime, computer crimes that affect individuals and techniques that cyber criminals use to infiltrate computer systems.


  • CIS 333 - Networking Security Fundamentals

    Study computer information system security principles, challenges, vulnerabilities and countermeasure strategies. Topics include definition of security terms, concepts, elements, and goals. Explore industry standards and practices that focus on the availability, integrity and confidentiality aspects of information systems security.

  • CIS 336 - Enterprise Architecture

    Explore the design, selection, implementation and management of enterprise IT solutions. Topics include frameworks and strategies for infrastructure management, system administration, data/information architecture, content management, distributed computing, middleware, legacy system integration, system consolidation, software selection, total cost of ownership calculation, IT investment analysis and emerging technologies.

  • CIS 348 - Information Technology Project Management

    Examine the processes, methods, techniques and tools that organizations use to manage their information technology projects in accordance with the Project Management Institutes Project Management Body of Knowledge (PMBOK). Focus on the methodology and project management software for initiating, planning, executing, controlling and closing technology projects. Topics include various types of technologies to support group collaboration and the use of resources from within the firm as well as contracted from outside the organization.

  • CIS 349 - Information Technology Audit and Control

    Cover the principles, approaches and methodologies in auditing information systems to ensure the processes and procedures are in compliance with pertinent laws and regulatory provisions especially in the context of information systems security (ISS). Topics include the processes used to protect and secure business and consumer privacy data, an explanation of compliancy laws, and the process and legal requirements for conducting IT infrastructure compliance audits.

  • CIS 499 - Information Systems Capstone

    Take a senior management approach to examine issues in managing the information systems function in organizations and how information systems integrate, support and enable various types of organizational capabilities. Topics include developing an intellectual framework to critically assess existing information systems infrastructures, emerging technologies and how enabling technologies affect organizational strategy.

  • CIS 111 - Introduction to Relational Database Management Systems

    Get an introduction to the theory and applied concepts of database design, database management and information management. Focus on identifying organizational information requirements, express those requirements using conceptual data modeling techniques, verify the structural characteristics with normalization techniques and convert conceptual data models into physical database models.

  • CIS 175 - Introduction to Networking

    Discover the fundamentals of networking technology. Focus on networking protocols, topologies, hardware and operating systems. Topics include data communications, telecommunications, infrastructure security, inter/internetworking and the application of networking to multimedia, information storage and distribution.


One of the most important roles in information systems management is keeping the wrong people away from your data. Corporations, governmental institutions, healthcare facilities, and countless other businesses and organizations have sensitive information that must be stored securely and — when breached — sealed immediately.


Your online Bachelor of Science in Information Systems concentration in computer forensics management from Strayer University gives you the ability to be both gatekeeper and detective. We help you develop genuine expertise in 

cybercrime and data protection, allowing you to keep the door shut on your data and track down issues as soon as you suspect a problem.


Your online computer forensics management degree can qualify you for jobs in the digital forensics field that should remain in demand for the foreseeable future as the world adjusts to the looming threat that hackers pose to invaluable repositories of data.



Each Bachelor of Science in Information Systems concentration can provide you with skills you’ll be able to apply immediately. You may want to explore these other Bachelor of Science in Information Systems concentrations.

Bachelor of Science in Information Systems


U.S. Military Affiliation

Do you have transfer credits?

You consent to receive autodialed marketing calls or text messages from Strayer University and partner school, Capella University, at the phone number you provided. Consent is not required to purchase goods or services. You can always call us at 1.866.314.3547.


Submitting your information,
this may take a few seconds...