Gain proficiency in technology-related security for emergency management, disaster recovery, and government administration with an online security technology degree. In this program, you’ll:

  • Prepare for your CompTIA Network+ and ISC2 certification exams
  • Discuss the concepts of ethical hacking, different types of hacking and penetration testing techniques
  • Explore the different types of scanning and scanning methodology
  • Examine the functions and effects of malicious programs and their countermeasures
  • Understand and apply various hacking technologies and features that administrators deploy to protect their networks
  • Discuss and identify web application vulnerabilities and web-based password-cracking techniques
  • Analyze system security, preventative measures and disaster recovery planning
  • Compare the fundamentals of business continuity plans, contingency plans, and virtualization data recovery
  • Gain an understanding of systems security and change control policies
  • Analyze and configure data storage technologies and data backup procedures
  • Explain, configure, and implement virtualization technologies

This course utilizes official EC-Council authorized curriculum and labs (iLabs). These learning resources and supporting certification exams have been accepted by, and meet the standards of the following organizations. *More Info


Summer Classes Start:

July 1

Courses to Complete:


Cost Per Course:


Campuses Near You:


These learning resources and supporting certification exams have been accepted by, and meet the standards of the following organizations:



American National Standards Institute (ANSI) ISO 17024

EC-Council's Certified Ethical Hacker (C|EH) and Computer Hacking Forensics Investigator (C|HFI) certifications are ANSI/ ISO 17024 accredited.




EC-Council's Certified Ethical Hacker (C|EH) and Computer Hacking Forensics Investigator (CHFI) learning resources and certifications map to supporting job roles job roles, Knowledge-Skills-Abilities (KSA's), and Knowledge Units (KU's) within the NICE framework. For a full listing of the EC-Council - NICE framework mapping, please click here.



Committee on National Security Systems (CNSS)

Certified Ethical Hacker (C|EH) and Computer Hacking Forensics Investigator (CHFI) learning resources and certifications meet the training standards for information security professionals in the federal government.


Only the learning resources and exams utilized by Strayer University in the select courses are certified or accredited.  



  • CIS 332 - Network Server Administration I

    Prepare to install, configure, secure and maintain the Windows server environment in a lab­based setting. Topics include configuring and managing DHCP and DNS; routing and remote access; and file and print services.

  • SEC 420 - Perimeter Defense Techniques

    Address topics in offensive network security, ethical hacking, network defense and countermeasures in a lab setting. Understand the tactics and tools used by hackers and methods to prepare strong countermeasures and defensive systems to protect an organization’s critical infrastructure and information. Topics include perimeter defense techniques, and scanning and attacking simulated networks with a variety of tools, viruses and malware.

  • SEC 459 - Disaster Recovery & Virtualization

    Explore practices designed to fortify disaster recovery preparation and virtualization technology knowledge in this lab­based class. Explore procedures and create disaster recovery plans using traditional methods and virtual technologies to ensure business continuity in the event of a disaster. Topics include disaster recovery planning, risk control policies and countermeasures, disaster recovery tools and services, and virtualization principles. 


  • CIS 111 - Introduction to Relational Database Management Systems

    Get an introduction to the theory and applied concepts of database design, database management and information management. Focus on identifying organizational information requirements, express those requirements using conceptual data modeling techniques, verify the structural characteristics with normalization techniques and convert conceptual data models into physical database models.

  • CIS 175 - Introduction to Networking

    Discover the fundamentals of networking technology. Focus on networking protocols, topologies, hardware and operating systems. Topics include data communications, telecommunications, infrastructure security, inter/internetworking and the application of networking to multimedia, information storage and distribution.

  • CIS 210 - Systems Analysis and Development

    This course presents the processes, methods, techniques and tools that organizations use to effectively architect computer-based technologies. Topics include a fundamental review of project management and data design followed by the processes required to gather and articulate business requirements. Students will acquire skills to procure, evaluate, test and systematically build systems for integration into an organization.

  • CIS 273 - Web Design and Development

    This course presents students the design, implementation and testing of web-based applications including related software, databases, scripting techniques, interfaces and digital media. It also covers social, ethical and security issues arising from the web, e-commerce and social networking software applications.

  • CIS 312 - Computer Architecture

    Discover the concepts and essential skills necessary to administer operating systems, networks, software, file systems, file servers, web systems, database systems, system documentation, policies and procedures. Topics include the methods required to select, deploy, integrate and administer computing platforms or components that support an organizations information technology infrastructure. Explore the fundamentals of hardware and software, as well as how they integrate to form essential components of systems.

  • CIS 333 - Networking Security Fundamentals

    Study computer information system security principles, challenges, vulnerabilities and countermeasure strategies. Topics include definition of security terms, concepts, elements, and goals. Explore industry standards and practices that focus on the availability, integrity and confidentiality aspects of information systems security.

  • CIS 375 - Human Computer Interaction

    Explore user-centered methodologies in the development, evaluation and deployment of information technology applications and systems. Study evolving technologies and devices and learn to design interactive products that enhance the way people communicate, interact and work with computers. Topics include user and task analysis, human factors, ergonomics, accessibility standards and cognitive psychology.

  • MAT 200 - Precalculus

    Review algebraic techniques. Selected advanced topics include matrices and determinants as techniques for solving linear systems in three or more variables, elementary concepts of analytic geometry, and logarithms. Focus on business-related word problems.

  • CIS 498 - Information Technology Capstone

    Take a senior management approach to examine and solve real-world problems and projects. Apply project management techniques to create integrative information technology solutions that include databases, systems analysis, security, networking, computer infrastructure, human/computer interaction and web design.

  • CIS 255 - Operating Systems

    Students can take either CIS 329, CIS 337, OR CIS 255

    Covers the development and execution of structured shell programs including scripts, menus, I/O redirection, pipes, variables, and other UNIX and Windows commands. Operating systems administration techniques also are covered including electronic mail, editors, online help, and file and directory techniques.

  • CIS 337 - Internetworking Basics

    Students can take either CIS 329, CIS 337, OR CIS 255

    Get an introduction to LAN, WAN and WLAN concepts and connectivity in an internetworking environment. Use command-line interface commands to secure, configure and troubleshoot router and switch operating systems. Topics include an overview of networking devices that operate at the OSI or TCP/IP stack, IP addressing and subnetting, collision and broadcast domains.


Technology advances so quickly that there is no way to guarantee complete protection, all of the time. Hackers think and move at jarring speeds— the instant one vulnerability is fixed, another may be detected and exploited.

Enterprise security experts need to react as quickly as hackers act in order to minimize and get ahead of leaks and risk. Gain the skills and knowledge to implement perimeter defense techniques and disaster recovery plans when you earn an enterprise security technology bachelor’s degree from Strayer University.

You will explore the tools, viruses, and malware hackers use to breach secure network systems and learn how to apply countermeasure techniques needed to protect an organization’s infrastructure. You’ll also review disaster recovery procedures and tools, risk control policies, and virtualization principles.

Every day, businesses are subject to virtual threats and face the risk of data theft or corruption. With a Strayer education in enterprise security technology, you can counter malicious hackers and protect your organization’s network systems from breach.



Each Bachelor of Science in Information Technology concentration can provide you with skills you’ll be able to apply immediately. You may want to explore these other Bachelor of Science in Information Technology concentrations.

Bachelor of Science in Information Technology


U.S. Military Affiliation

Do you have transfer credits?

You consent to receive autodialed marketing calls or text messages from Strayer University and partner school, Capella University, at the phone number you provided. Consent is not required to purchase goods or services. You can always call us at 1.866.314.3547.


Submitting your information,
this may take a few seconds...