Computer Forensic Management

Master of Science in Information Systems


Each online Master of Information Systems concentration can provide you with skills you’ll be able to apply immediately


  • Master your ability to process and report on digital computer evidence from a crime scene or relating to a cybersecurity investigation in the public or private sector
  • Focus on the managerial aspects of cybersecurity, including policy, practice, planning, risk management, response, and examination
  • Learn about the Sarbanes Oxley Act and Committee of Sponsoring Organizations framework
  • Understand and apply the Control Objectives for Information and related Technology framework to perform IT Audits
  • Describe information technology general controls based on the Information Technology Infrastructure Library best practices
  • Explore the various general controls and audit approaches for software and architecture, including operating systems, telecommunication networks, cloud computing, service oriented architecture, and virtualization
  • Develop an audit plan and control framework that addresses and solves a proposed cybersecurity problem
  • Design appropriate authentication solutions throughout an IT infrastructure based on user types and data classification standards
  • Identify the computer investigation process
  • Compare the various types of cybersecurity tools
  • Demonstrate the ability to develop procedural techniques in crime and incident scenes


Summer Classes Start:

July 6

Courses to Complete:


Cost Per Course:


Master of Science in Information Systems – Computer Forensic Management Concentration


  • CIS 558 - IT Audit and Control

    This course focuses on establishing the framework to audit, secure and ensure internal controls in an information technology environment. Topics include the technical and professional issues in the context of technology-driven audits, security, privacy, business continuity, legislative and governance changes.

  • CIS 560 - Security Access and Control Strategies

    This course presents the concept of access control to protect information systems and applications from unauthorized viewing, tampering or destruction. This course defines the components of access control, provides a business framework for implementation and discusses legal requirements that impact access control programs. Topics include the risks, threats and vulnerabilities prevalent in information systems and IT infrastructures and how to mitigate these conditions. In addition, security controls for access control including tokens, biometrics and use of public key infrastructures will be covered.

  • CIS 562 - Computer Forensics Planning

    This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab, investigating computer and cyber crime, tools, techniques and methods used to perform forensic investigations and concepts for collecting, analyzing, recovering and preserving forensic evidence.


  • CIS 500 - Information Systems for Decision Making

    Examine the strategic use and trends of organizational information systems with emphasis on the application of information technology. Study key computing concepts in the strategic context in which information technology is used with emphasis on how information technology enables improvement in quality, timeliness and competitive advantage.

  • CIS 502 - Theories of Security Management

    Prerequisite: CIS 500

    Explore current and emerging theories in security management. Topics include the policies, guidance, technologies and organizational concerns that security managers must address in leading and providing secure computing environments. Discuss topics such as access control, security architecture, cryptography and the CISSP Common Body of Knowledge.


    Discuss trends and topics in computer communications. Use a balance of technical foundations and business practices to develop a managerial level of knowledge in data communications. Topics also include networking, distributed applications, network management, security and network operating systems.

  • CIS 510 - Advanced Systems Analysis and Design

    Get an integrated approach to system analysis and design processes. Explore advanced topics to evaluate and select system development methodologies and design system solutions. Focus on the role of effective interpersonal communication techniques and integration practices with users and user systems.

  • CIS 512 - Advanced Computer Architecture

    Examine the structure and operation of computers in the context of the enterprise solutions. Focus on strategies to select, deploy, integrate and administer platforms or components to support the organizations computing infrastructure. Topics include the framework and strategic trends essential to the administration of hardware; services provided by the operating system; and computer interaction.

  • CIS 515 - Strategic Planning for Database Systems

    Explore the concepts, issues, principles and techniques around managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Focus on the application and strategic use of database systems.

  • CIS 517 - IT Project Management

    Get a practical and theoretical foundation for applying project management techniques to Information Technology projects. The course puts a managerial emphasis on the Project Management Institute Project Management Body of Knowledge (PMBOK) knowledge areas, with practical application of project management tools and software to address information technology opportunities.

  • CIS 524 - Computer Interaction and Design

    Understand the concepts, theory and design behind human-computer interaction (HCI) to address organizational issues. Learn the practical principles and guidelines to develop high quality interface designs that users can understand, predict and control. Topics include a strategic and tactical assessment of expert reviews, usability testing, direct manipulation, menu selection and form design. Address current HCI topics with a balanced emphasis on mobile devices, Web and desktop platforms.

  • CIS 599 - Graduate Information Systems Capstone

    Prerequisite: To be taken last or next to last;a grade of 'B' or higheris required.

    Examine and address real-world projects and problems and apply project management techniques to create practical solutions. Take an integrative and senior management approach to address the integration of a broad range of technologies, including databases, security, networking, computer infrastructure and human computer interaction.


A cybercrime is committed. How is evidence collected? How does the investigative process work? How is justice served?

Experts in cyber forensics help spearhead the critical work that drives the discovery, investigation and, ultimately, the solution to digital malfeasance. The computer forensic management track within Strayer’s online Master of Science in Information Systems program puts you on the front lines of the battle for data security, privacy, and protection.

When you earn a cyber forensics master’s degree online at Strayer University, you’ll learn how to identify, track, and catch cyber criminals while honing your eye to detect soft spots that 

allow these troublemakers into private data caches in the first place.

It’s an exciting — and lucrative — time to work in the data security field. Your skills are needed to protect millions of Americans and billions in digital assets. Be one of the good guys. Learn more about earning your cyber forensics master’s degree online at Strayer.



Each online Master of Information Systems Concentration can provide you with skills you’ll be able to apply immediately. You may want to explore these other Master of Information Systems concentrations.

Master of Science in Information Systems


U.S. Military Affiliation

Do you have transfer credits?

You consent to receive autodialed marketing calls or text messages from Strayer University and partner school, Capella University, at the phone number you provided. Consent is not required to purchase goods or services. You can always call us at 1.866.314.3547.


Submitting your information,
this may take a few seconds...