Real-world cyberdefense skills with an MS in Information Assurance

Securing data and computer systems has become an essential part of doing business. Are you ready to expand your knowledge as a technology professional, to learn how to safeguard your organization’s data and stay a step ahead of cybercriminals?

With a Strayer University online MS in Information Assurance, our NSA-certified* curriculum will give you hands-on experience in defending against cyberattacks. You work with the same technologies used by hackers and terrorists, then learn how to foil their exploits.

Throughout your program, your coursework will help you prepare for industry-recognized certification exams.

*The National Security Agency’s (NSA) Committee on National Security Systems (CNSS) has certified that Strayer University’s security curriculum has been reviewed by the Information Assurance Courseware Evaluation Review Committee (IACE) and determined that it meets national training standards for information systems security professionals and system administrators, NSTISSI No. 4011 and 401.


Spring Classes Start:

April 6

Courses to Complete:


Cost Per Course:



  • CIS 500 - Information Systems for Decision Making

    Examine the strategic use and trends of organizational information systems with emphasis on the application of information technology. Study key computing concepts in the strategic context in which information technology is used with emphasis on how information technology enables improvement in quality, timeliness and competitive advantage.

  • CIS 502 - Theories of Security Management

    Prerequisite: CIS 500

    Explore current and emerging theories in security management. Topics include the policies, guidance, technologies and organizational concerns that security managers must address in leading and providing secure computing environments. Discuss topics such as access control, security architecture, cryptography and the CISSP Common Body of Knowledge.


    Discuss trends and topics in computer communications. Use a balance of technical foundations and business practices to develop a managerial level of knowledge in data communications. Topics also include networking, distributed applications, network management, security and network operating systems.

  • CIS 512 - Advanced Computer Architecture

    Examine the structure and operation of computers in the context of the enterprise solutions. Focus on strategies to select, deploy, integrate and administer platforms or components to support the organizations computing infrastructure. Topics include the framework and strategic trends essential to the administration of hardware; services provided by the operating system; and computer interaction.

  • CIS 527 - IT Risk Management

    This course addresses the topic of risk management and how risk, threats and vulnerabilities impact information systems. Topics include how to assess and manage risk based on defining an acceptable level of risk for information systems, elements of a business impact analysis, business continuity plan and disaster recovery planning.

  • CIS 534 - Advanced Network Security Design

    Examine strategies to design networking security, Virtual Private Networks (VPNs), and firewalls for securing a network. Review different types of VPNs for securing data, as well as security-related themes. Topics also include the benefits, architecture and implementation strategies of VPNs and the configuration, administration, utility and limitations of firewalls.

  • CIS 542 - Web Application Security

    Address the risks and threats to and vulnerabilities of Web-based applications and the people who use them. Discuss security strategies to mitigate the risk associated with Web applications and social networking. Topics also include a review of the evolutionary changes that have occurred in computing, communications and social networking; and securing systems against risks, threats and vulnerabilities associated with Web-enabled applications.

  • CIS 552 - Cybercrime Techniques & Response

    Examine the landscape, key terms and concepts of computer hackers and the criminals who break into networks, steal information and corrupt data. Topics include the various vulnerabilities of operating systems, software and networks, and the used by hackers to access unauthorized information and resources. Compare incident handling methods to use when information security is compromised.

  • CIS 558 - IT Audit and Control

    This course focuses on establishing the framework to audit, secure and ensure internal controls in an information technology environment. Topics include the technical and professional issues in the context of technology-driven audits, security, privacy, business continuity, legislative and governance changes.

  • CIS 560 - Security Access and Control Strategies

    This course presents the concept of access control to protect information systems and applications from unauthorized viewing, tampering or destruction. This course defines the components of access control, provides a business framework for implementation and discusses legal requirements that impact access control programs. Topics include the risks, threats and vulnerabilities prevalent in information systems and IT infrastructures and how to mitigate these conditions. In addition, security controls for access control including tokens, biometrics and use of public key infrastructures will be covered.

Strayer University is a proud recipient of the Academia Partner Circle of Excellence Award by EC-Council, a global leader in cybersecurity. Strayer's program now offers students Certified Ethical Hacker and Certified Hacking Forensics Investigator certifications.


Today’s information systems need defenders who can assess threats, develop protection and implement solutions to guard an organization’s information assets against cyberthreats. A master’s in information assurance can help you build the technical expertise to prevent attacks and develop strategies to mitigate them when they occur.

With the Strayer MS in Information Assurance, you’ll explore real-world information assurance case studies and advanced technologies, then experience actual cyberthreats in live lab settings.

From cloud-based environments you’ll use real-world tools to learn how to:

  • Assess risk and devise solutions that safeguard information assets and technology infrastructures
  • Design and deploy information security and assurance solutions to protect assets and enhance performance
  • Analyze and identify security vulnerabilities and solutions
  • Design and develop effective user security and assurance plans
  • Evaluate and justify solutions to satisfy organizational needs
  • Analyze the impact of solutions on individuals, organizations, and society
  • Apply data analysis and research to mitigate vulnerabilities created by network and Internet intrusions
  • Develop effective communication plans
  • Justify and support the professional, ethical, legal, security and social issues and responsibilities of securing data and infrastructure

This program is an exciting opportunity for tech professionals and students who want to increase their understanding, advance their careers, and expand their opportunities in the world of information assurance and computing security.

Why choose Strayer?

A world of opportunity is waiting—for you

Discover how Strayer can help you achieve your personal and professional goals.

Transfer your credits, finish your degree

Strayer accepts a wide range of courses for college transfer credit. How many hours of credit you can transfer depends on which program you want to start. You can apply up to 18 quarter hour credits toward a master’s degree program.

Flexibility to match your lifestyle

We offer online learning that lets you work at your own pace. It’s designed to give you the best possible student experience while freeing you from a classroom schedule. You’ll pick up real-world skills on your own time, where and whenever classwork fits into your life. And our programs run all year round, four quarters a year.

Expert staff to support you

From day one, we give you the support you need for success. Our admissions officers and student services coaches will set you on the right path, helping you find the best program for you and guiding you through choosing financial aid, setting benchmarks for meeting your goals, and connecting you with mentors and tutors. 



We can help you identify, understand and qualify for a variety of financial aid options.

The financial assistance that may be available to you includes:

  • Federal financial aid programs
  • Military education benefits
  • Selected state grant programs
  • Tuition benefit programs

Tuition Information

Scholarships and Grants


To qualify for admission to an advanced degree program at Strayer, you’ll need to submit an application, proof that you completed a bachelor’s degree from an accredited college or university, and official copies of transcripts from all other colleges or universities you’ve attended.

Strayer also requires satisfactory performance in at least one of the following areas:

  • 2.50 out of 4.0 undergraduate GPA during the junior and senior years
  • Graduate Management Admission Test (GMAT) (450 or better)
  • Graduate Record Examination (GRE) (1,000 or better)

For more details, visit our course catalog.

Evidence of Graduate Potential

Information for Tennessee Students




Days. Nights. Weekends. Online anytime or on campus when you want. Our programs are designed for adults who lead busy lives.

  • We continually update our online resources to bring you the latest technology and facilitate a better student experience.
  • Our campuses offer resources whenever you need them.
  • Your personal Success Coach will help ensure it all fits together in a program that meets your goals.

Online Distance Learning

Campus Locations

At least three years of professional experience in a leadership, management, or problem-solving role.  This will also require evidence of graduate potential that may include an interview with a Campus Dean.


Strayer University is authorized for operation as a postsecondary educational institution by the Tennessee Higher Education Commission. In order to view detailed job placement and graduation information on the programs offered by Strayer University, please visit and click on the Authorized Institutions Data button. Please contact your campus director or campus dean with any questions regarding the information provided on the Tennessee Higher Education Commission website. Credits earned at Strayer University may not transfer to another educational institution. Credits earned at another educational institution may not be accepted by Strayer University. You should obtain confirmation that Strayer University will accept any credits you have earned at another educational institution before you execute an enrollment contract or agreement. You should also contact any educational institutions that you may want to transfer credits earned at Strayer University to determine if such institutions will accept credits earned at Strayer University prior to executing an enrollment contract or agreement. The ability to transfer credits from Strayer University to another educational institutions may be very limited. Your credits may not transfer and you may have to repeat courses previously taken at Strayer University if you enroll in another educational institution. You should never assume that credits will transfer to or from any educational institution. It is highly recommended and you are advised to make certain that you know the transfer of credit policy of Strayer University and of any other educational institutions you may in the future want to transfer the credits earned at Strayer University before you execute an enrollment contract or agreement.


U.S. Military Affiliation

Do you have transfer credits?

You consent to receive autodialed marketing calls or text messages from Strayer University and partner school, Capella University, at the phone number you provided. Consent is not required to purchase goods or services. You can always call us at 1.866.314.3547.


Submitting your information,
this may take a few seconds...