The online cybersecurity degree program explores all aspects of managing online safeguards, teaching you how to minimize a company’s risk and protect digital assets. In this program, you’ll:

  • Prepare to take your CompTIA Network+ and ISC2 certification exams
  • Design a cybersecurity policy framework and disaster recovery plan for an organization
  • Identify the role of computer forensics in responding to crimes and solving business challenges
  • Develop a computer forensics deployment plan that addresses and solves a proposed business problem
  • Analyze how online security policies help mitigate risks and support business processes in various domains in the information technology infrastructure
  • Summarize the ethical components and basic requirements for creating a cybersecurity policy framework
  • Compare the types of computer crimes
  • Evaluate and explain the methods of computer investigation and evidentiary gathering techniques


Summer Classes Start:

July 1

Courses to Complete:


Cost Per Course:


Campuses Near You:



  • CIS 359 - Disaster Recovery Management

    Get a foundation in disaster recovery and incident response in computing environments. Learn to prepare a disaster recovery plan, assess risk and develop policies and procedures. Topics include contingency planning, business continuity and crisis management.

  • CIS 438 - Information Security Legal Issues

    Students can take either CIS 438 OR 462

    Explore the area where law and information security concerns intersect. Students will be presented with fundamental security and privacy concepts, recent U.S. laws that address information technology management in terms of security and privacy, and security and privacy for organizations. Topics also include issues related to governance, risk analysis, incidence response and contingency planning.

  • CIS 462 - Security Strategy and Policy

    Students can take either CIS 438 OR 462


    Discuss the cyber security policies created to protect and maintain a computing network, such as password policy, e-mail policy and Internet policy. Students are presented with a comprehensive view of information and online security policies, frameworks and issues related to organizational behavior and crisis management. Topics also include governance, regulation, mandates, business drivers and legal considerations when implementing security policies and frameworks.

  • SEC 402 - Cyber Security

    Explore the practices and framework designed to ensure cyber security. Students will explore the areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge. Topics include the various roles, functions and competencies within the cyber security domain to mitigate risks and secure organizational assets.


  • CIS 210 - Systems Analysis and Development

    This course presents the processes, methods, techniques and tools that organizations use to effectively architect computer-based technologies. Topics include a fundamental review of project management and data design followed by the processes required to gather and articulate business requirements. Students will acquire skills to procure, evaluate, test and systematically build systems for integration into an organization.

  • CIS 333 - Networking Security Fundamentals

    Study computer information system security principles, challenges, vulnerabilities and countermeasure strategies. Topics include definition of security terms, concepts, elements, and goals. Explore industry standards and practices that focus on the availability, integrity and confidentiality aspects of information systems security.

  • CIS 336 - Enterprise Architecture

    Explore the design, selection, implementation and management of enterprise IT solutions. Topics include frameworks and strategies for infrastructure management, system administration, data/information architecture, content management, distributed computing, middleware, legacy system integration, system consolidation, software selection, total cost of ownership calculation, IT investment analysis and emerging technologies.

  • CIS 348 - Information Technology Project Management

    Examine the processes, methods, techniques and tools that organizations use to manage their information technology projects in accordance with the Project Management Institutes Project Management Body of Knowledge (PMBOK). Focus on the methodology and project management software for initiating, planning, executing, controlling and closing technology projects. Topics include various types of technologies to support group collaboration and the use of resources from within the firm as well as contracted from outside the organization.

  • CIS 349 - Information Technology Audit and Control

    Cover the principles, approaches and methodologies in auditing information systems to ensure the processes and procedures are in compliance with pertinent laws and regulatory provisions especially in the context of information systems security (ISS). Topics include the processes used to protect and secure business and consumer privacy data, an explanation of compliancy laws, and the process and legal requirements for conducting IT infrastructure compliance audits.

  • CIS 499 - Information Systems Capstone

    Take a senior management approach to examine issues in managing the information systems function in organizations and how information systems integrate, support and enable various types of organizational capabilities. Topics include developing an intellectual framework to critically assess existing information systems infrastructures, emerging technologies and how enabling technologies affect organizational strategy.

  • CIS 111 - Introduction to Relational Database Management Systems

    Get an introduction to the theory and applied concepts of database design, database management and information management. Focus on identifying organizational information requirements, express those requirements using conceptual data modeling techniques, verify the structural characteristics with normalization techniques and convert conceptual data models into physical database models.

  • CIS 175 - Introduction to Networking

    Discover the fundamentals of networking technology. Focus on networking protocols, topologies, hardware and operating systems. Topics include data communications, telecommunications, infrastructure security, inter/internetworking and the application of networking to multimedia, information storage and distribution.

Strayer University is a proud recipient of the Academia Partner Circle of Excellence Award by EC-Council, a global leader in cybersecurity. Strayer's program now offers students Certified Ethical Hacker and Certified Hacking Forensics Investigator certifications.


What happens when a disaster — natural or otherwise — takes down a computer network? Who identifies the right people or the right roles to fill when creating a protection plan for a complex information system? Where should a business turn when it needs to untangle privacy issues or respond to the threat of data compromise?


If you have a Bachelor of Science in Information Systems with a concentration in cybersecurity management from Strayer University, the answer may be you.

cybercrime and data protection, allowing you to keep the door shut on your data and track down issues as soon as you suspect a problem.


Your online computer forensics management degree can qualify you for jobs in the digital forensics field that should remain in demand for the foreseeable future as the world adjusts to the looming threat that hackers pose to invaluable repositories of data.



Each Bachelor of Science in Information Systems concentration can provide you with skills you’ll be able to apply immediately. You may want to explore these other Bachelor of Science in Information Systems concentrations.

Bachelor of Science in Information Systems


U.S. Military Affiliation

Do you have transfer credits?

You consent to receive autodialed marketing calls or text messages from Strayer University and partner school, Capella University, at the phone number you provided. Consent is not required to purchase goods or services. You can always call us at 1.866.314.3547.


Submitting your information,
this may take a few seconds...