THE POWER OF CYBER SECURITY

With a Master of Information Assurance, you’ll learn how to safeguard your organization’s data, including staying a step ahead of the ever-changing tools and tricks of cyber criminals.

*The National Security Agency’s (NSA) Committee on National Security Systems (CNSS) has certified that Strayer University’s security curriculum has been reviewed by the Information Assurance Courseware Evaluation Review Committee (IACE) and determined that it meets national training standards for information systems security professionals and system administrators, NSTISSI No. 4011 and 401.


FORTIFY YOUR KNOWLEDGE OF INFORMATION SECURITY AND ASSURANCE

With the Strayer Master of Information Assurance, you’ll be exposed to the same technologies used by hackers and terrorists. From cloud-based environments to Toolwire™ live labs, your education will be steeped in real-world tools, showing you how to:

  • Assess risk and devise solutions that safeguard information assets and technology infrastructures
  • Design and deploy information security and assurance solutions to protect assets and enhance performance
  • Analyze and identify security vulnerabilities and solutions
  • Design and develop effective user security and assurance plans
  • Evaluate and justify solutions to satisfy organizational needs
  • Analyze the impact of solutions on individuals, organizations, and society
  • Apply data analysis and research to mitigate vulnerabilities created by network and Internet intrusions
  • Develop effective communication plans
  • Justify and support the professional, ethical, legal, security and social issues and responsibilities of securing data and infrastructure
  • And, if the CompTIA Network+ and ISC2 certifications are in your future, you’ll be prepping for the exams while earning your information assurance degree.

AT-A-GLANCE

Fall Classes Start:

October 1

Courses to Complete:

12

Cost Per Course:

$2,490

Campuses Near You:
FIND MY CAMPUS

Save on your master’s with a $3K scholarship available
for eligible programs through Oct. 1, 2019.

LEARN MORE

THE STRAYER EXPERIENCE

MEETING YOU WHERE YOU ARE

We know Strayer isn’t your only option for an online degree. But, we can offer you an education based on the highest academic standards, a strong return on your investment, and the supports you need to maintain a school-work-life balance. Our flexible programs let you pursue your degree while juggling the things that matter most—caring for kids and parents, growing and advancing in your career, and contributing to your community.

RECOGNIZED NATIONWIDE

Employers know our name. For more than 125 years, we’ve been making college possible for working adults.

  • Curriculum designed by industry leaders
  • Courses taught by experienced faculty
  • Sought-after accreditation
  • Pioneers in online education

FLEXIBILITY TO MATCH YOUR LIFESTYLE

Each of us has times when we’re at our best. Our programs let you make the most of them.

  • Work at your own pace
  • Four quarters each year
  • 24-hour online tech support

SCHOLARSHIPS, GRANTS & MORE

Cost should never prohibit an education. We help you start from the best possible financial place for you.

  • Financial aid advice – videos & in-person support
  • Eligible transfer and work credits honored
  • Guidance when seeking financial aid

KEY COURSES IN THE ONLINE MASTER OF SCIENCE IN INFORMATION ASSURANCE

  • CIS 500 - Information Systems for Decision Making

    Examine the strategic use and trends of organizational information systems with emphasis on the application of information technology. Study key computing concepts in the strategic context in which information technology is used with emphasis on how information technology enables improvement in quality, timeliness and competitive advantage.

  • CIS 502 - Theories of Security Management

    Prerequisite: CIS 500

    Explore current and emerging theories in security management. Topics include the policies, guidance, technologies and organizational concerns that security managers must address in leading and providing secure computing environments. Discuss topics such as access control, security architecture, cryptography and the CISSP Common Body of Knowledge.

  • CIS 505 - COMMUNICATION TECHNOLOGY

    Discuss trends and topics in computer communications. Use a balance of technical foundations and business practices to develop a managerial level of knowledge in data communications. Topics also include networking, distributed applications, network management, security and network operating systems.

  • CIS 512 - Advanced Computer Architecture

    Examine the structure and operation of computers in the context of the enterprise solutions. Focus on strategies to select, deploy, integrate and administer platforms or components to support the organizations computing infrastructure. Topics include the framework and strategic trends essential to the administration of hardware; services provided by the operating system; and computer interaction.

  • CIS 527 - IT Risk Management

    Prerequisite: CIS 502

    Address the topic of risk management and how risk, threats and vulnerabilities impact information systems. Topics include how to assess and manage risk based on defining an acceptable level of risk for information systems; elements of a business impact analysis and business continuity plan; and disaster recovery planning.

  • CIS 534 - Advanced Network Security Design

    Examine strategies to design networking security, Virtual Private Networks (VPNs), and firewalls for securing a network. Review different types of VPNs for securing data, as well as security-related themes. Topics also include the benefits, architecture and implementation strategies of VPNs and the configuration, administration, utility and limitations of firewalls.

  • CIS 542 - Web Application Security

    Address the risks and threats to and vulnerabilities of Web-based applications and the people who use them. Discuss security strategies to mitigate the risk associated with Web applications and social networking. Topics also include a review of the evolutionary changes that have occurred in computing, communications and social networking; and securing systems against risks, threats and vulnerabilities associated with Web-enabled applications.

  • CIS 552 - Cybercrime Techniques & Response

    Examine the landscape, key terms and concepts of computer hackers and the criminals who break into networks, steal information and corrupt data. Topics include the various vulnerabilities of operating systems, software and networks, and the used by hackers to access unauthorized information and resources. Compare incident handling methods to use when information security is compromised.

  • CIS 558 - IT Audit and Control

    Focus on establishing the framework to audit, secure and ensure internal controls in an information technology environment. Topics include the technical and professional issues in the context of technology-driven audits, security, privacy, business continuity, and legislative and governance changes.

  • CIS 560 - Security Access & Control Strategies

    Understand the concept of access control to protect information systems and applications from unauthorized viewing, tampering or destruction. Define the components of access control, get a business framework for implementation, and discuss legal requirements that impact access control programs. Topics include the risks, threats and vulnerabilities prevalent in information systems and IT infrastructures and how to mitigate these conditions. Discuss security controls for access control including tokens, biometrics and the use of public key infrastructures (PKI).

Strayer University is a proud recipient of the Academia Partner Circle of Excellence Award by EC-Council, a global leader in cybersecurity. Strayer's program now offers students Certified Ethical Hacker and Certified Hacking Forensics Investigator certifications

KEEP THE DIGITAL ENVIRONMENT SECURE

Cybersecurity is one of the most important issues in the world today. That’s not an overstatement — the social, political, and economic interests of nearly every person on the planet depends, to some extent, on the safety of sensitive digital information.

The demand for cybersecurity experts is skyrocketing. And when you complete Strayer University’s Master of Science in Information Assurance program, you can become part of the firewall protecting governments, businesses, and everyday citizens from cyber crime.

Strayer’s Master of Science in Information Assurance explores cybersecurity theory and technology, including important concepts like security management, computer architecture, and network design.

Today’s digital landscape is growing and changing at the speed of thought. This is your chance to be one of the unsung heroes keeping digital technology safe and effective for the rest of us.

Answer the call and learn more about earning your Master of Science in Information Assurance degree from Strayer now.

MAKING IT ALL POSSIBLE

FINANCIAL ASSISTANCE & TOOLS

We can help you identify, understand and qualify for a variety of financial aid options.

The financial assistance that may be available to you includes:

  • Federal financial aid programs
  • Military education benefits
  • Selected state grant programs
  • Tuition benefit programs

Tuition Information

Scholarships and Grants

ADMISSION TO A STRAYER’S MASTER’S PROGRAM

To qualify for admission to an advanced degree program at Strayer, you’ll need to submit an application, proof that you completed a bachelor’s degree from an accredited college or university, and official copies of transcripts from all other colleges or universities you’ve attended.

Strayer also requires satisfactory performance in at least one of the following areas:

  • 2.50 out of 4.0 undergraduate GPA during the junior and senior years
  • Graduate Management Admission Test (GMAT) (450 or better)
  • Graduate Record Examination (GRE) (1,000 or better)

For more details, visit our course  catalog
 

Evidence of Graduate Potential

Program Disclosure

Information for Tennessee Students

 

YOUR CHOICE IN CHANNELS

Days. Nights. Weekends. Online anytime or on campus when you want. Our programs are designed for adults who lead busy lives.

  • We continually update our online resources to bring you the latest technology and facilitate a better student experience.
  • Our campuses offer resources whenever you need them.
  • Your personal Success Coach will help ensure it all fits together in a program that meets your goals.
     

Online Distance Learning

Campus Locations

At least three years of professional experience in a leadership, management, or problem-solving role.  This will also require evidence of graduate potential that may include an interview with a Campus Dean.

INFORMATION FOR TENNESSEE ONLINE STUDENTS

Strayer University is authorized for operation as a postsecondary educational institution by the Tennessee Higher Education Commission. In order to view detailed job placement and graduation information on the programs offered by Strayer University, please visit  www.state.tn.us/thec and click on the Authorized Institutions Data button. Please contact your campus director or campus dean with any questions regarding the information provided on the Tennessee Higher Education Commission website. Credits earned at Strayer University may not transfer to another educational institution. Credits earned at another educational institution may not be accepted by Strayer University. You should obtain confirmation that Strayer University will accept any credits you have earned at another educational institution before you execute an enrollment contract or agreement. You should also contact any educational institutions that you may want to transfer credits earned at Strayer University to determine if such institutions will accept credits earned at Strayer University prior to executing an enrollment contract or agreement. The ability to transfer credits from Strayer University to another educational institutions may be very limited. Your credits may not transfer and you may have to repeat courses previously taken at Strayer University if you enroll in another educational institution. You should never assume that credits will transfer to or from any educational institution. It is highly recommended and you are advised to make certain that you know the transfer of credit policy of Strayer University and of any other educational institutions you may in the future want to transfer the credits earned at Strayer University before you execute an enrollment contract or agreement.

REQUEST INFORMATION

U.S. Military Affiliation

Do you have transfer credits?

You consent to receive autodialed marketing calls or text messages from Strayer University and partner school, Capella University, at the phone number you provided. Consent is not required to purchase goods or services. You can always call us at 1.866.314.3547.

 

Submitting your information,
this may take a few seconds...