The Power of Cyber Security

With a Master of Information Assurance, you’ll learn how to safeguard your organization’s data, including staying a step ahead of the ever-changing tools and tricks of cyber criminals.

*The National Security Agency’s (NSA) Committee on National Security Systems (CNSS) has certified that Strayer University’s security curriculum has been reviewed by the Information Assurance Courseware Evaluation Review Committee (IACE) and determined that it meets national training standards for information systems security professionals and system administrators, NSTISSI No. 4011 and 401.

Fortify Your Knowledge of Information Security and Assurance

With the Strayer Master of Information Assurance, you’ll be exposed to the same technologies used by hackers and terrorists. From cloud-based environments to Toolwire™ live labs, your education will be steeped in real-world tools, showing you how to:

  • Assess risk and devise solutions that safeguard information assets and technology infrastructures
  • Design and deploy information security and assurance solutions to protect assets and enhance performance
  • Analyze and identify security vulnerabilities and solutions
  • Design and develop effective user security and assurance plans
  • Evaluate and justify solutions to satisfy organizational needs
  • Analyze the impact of solutions on individuals, organizations, and society
  • Apply data analysis and research to mitigate vulnerabilities created by network and Internet intrusions
  • Develop effective communication plans
  • Justify and support the professional, ethical, legal, security and social issues and responsibilities of securing data and infrastructure
  • And, if the CompTIA Network+ and ISC2 certifications are in your future, you’ll be prepping for the exams while earning your information assurance degree.