ADVANCE YOUR BUSINESS EXPERTISE

Each online Master of Information Systems concentration can provide you with skills you’ll be able to apply immediately

 

  • Master your ability to process and report on digital computer evidence from a crime scene or relating to a cybersecurity investigation in the public or private sector
  • Focus on the managerial aspects of cybersecurity, including policy, practice, planning, risk management, response, and examination
  • Learn about the Sarbanes Oxley Act and Committee of Sponsoring Organizations framework
  • Understand and apply the Control Objectives for Information and related Technology framework to perform IT Audits
  • Describe information technology general controls based on the Information Technology Infrastructure Library best practices
  • Explore the various general controls and audit approaches for software and architecture, including operating systems, telecommunication networks, cloud computing, service oriented architecture, and virtualization
  • Develop an audit plan and control framework that addresses and solves a proposed cybersecurity problem
  • Design appropriate authentication solutions throughout an IT infrastructure based on user types and data classification standards
  • Identify the computer investigation process
  • Compare the various types of cybersecurity tools
  • Demonstrate the ability to develop procedural techniques in crime and incident scenes

AT-A-GLANCE

Winter Classes Start:

January 6

Courses to Complete:

12

Cost Per Course:

$2,490

Campuses Near You:
FIND MY CAMPUS

ONLINE MASTER OF COMPUTER FORENSIC MANAGEMENT COURSES

COURSES IN CONCENTRATION

  • CIS 502 - Theories of Security Management

    Prerequisite: CIS 500

    Explore current and emerging theories in security management. Topics include the policies, guidance, technologies and organizational concerns that security managers must address in leading and providing secure computing environments. Discuss topics such as access control, security architecture, cryptography and the CISSP Common Body of Knowledge.

  • CIS 560 - Security Access & Control Strategies

    Understand the concept of access control to protect information systems and applications from unauthorized viewing, tampering or destruction. Define the components of access control, get a business framework for implementation, and discuss legal requirements that impact access control programs. Topics include the risks, threats and vulnerabilities prevalent in information systems and IT infrastructures and how to mitigate these conditions. Discuss security controls for access control including tokens, biometrics and the use of public key infrastructures (PKI).

  • CIS 562 - Computer Forensics Planning

    Practice systematic methods for conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab; investigating computer and cyber-crime; tools, techniques and methods used to perform forensic investigations; and concepts for collecting, analyzing, recovering and preserving forensic evidence.

COURSES IN MAJOR

  • CIS 500 - Information Systems for Decision Making

    Examine the strategic use and trends of organizational information systems with emphasis on the application of information technology. Study key computing concepts in the strategic context in which information technology is used with emphasis on how information technology enables improvement in quality, timeliness and competitive advantage.

  • CIS 502 - Theories of Security Management

    Prerequisite: CIS 500

    Explore current and emerging theories in security management. Topics include the policies, guidance, technologies and organizational concerns that security managers must address in leading and providing secure computing environments. Discuss topics such as access control, security architecture, cryptography and the CISSP Common Body of Knowledge.

  • CIS 505 - COMMUNICATION TECHNOLOGY

    Discuss trends and topics in computer communications. Use a balance of technical foundations and business practices to develop a managerial level of knowledge in data communications. Topics also include networking, distributed applications, network management, security and network operating systems.

  • CIS 510 - Advanced Systems Analysis and Design

    Get an integrated approach to system analysis and design processes. Explore advanced topics to evaluate and select system development methodologies and design system solutions. Focus on the role of effective interpersonal communication techniques and integration practices with users and user systems.

  • CIS 512 - Advanced Computer Architecture

    Examine the structure and operation of computers in the context of the enterprise solutions. Focus on strategies to select, deploy, integrate and administer platforms or components to support the organizations computing infrastructure. Topics include the framework and strategic trends essential to the administration of hardware; services provided by the operating system; and computer interaction.

  • CIS 515 - Strategic Planning for Database Systems

    Explore the concepts, issues, principles and techniques around managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Focus on the application and strategic use of database systems.

  • CIS 517 - IT Project Management

    Get a practical and theoretical foundation for applying project management techniques to Information Technology projects. The course puts a managerial emphasis on the Project Management Institute Project Management Body of Knowledge (PMBOK) knowledge areas, with practical application of project management tools and software to address information technology opportunities.

  • CIS 524 - Computer Interaction and Design

    Understand the concepts, theory and design behind human-computer interaction (HCI) to address organizational issues. Learn the practical principles and guidelines to develop high quality interface designs that users can understand, predict and control. Topics include a strategic and tactical assessment of expert reviews, usability testing, direct manipulation, menu selection and form design. Address current HCI topics with a balanced emphasis on mobile devices, Web and desktop platforms.

  • CIS 599 - Graduate Information Systems Capstone

    Prerequisite: To be taken last or next to last;a grade of 'B' or higheris required.

    Examine and address real-world projects and problems and apply project management techniques to create practical solutions. Take an integrative and senior management approach to address the integration of a broad range of technologies, including databases, security, networking, computer infrastructure and human computer interaction.

STOPPING THE BAD GUYS IS ALL IN A DAY’S WORK

A cybercrime is committed. How is evidence collected? How does the investigative process work? How is justice served?

Experts in cyber forensics help spearhead the critical work that drives the discovery, investigation and, ultimately, the solution to digital malfeasance. The computer forensic management track within Strayer’s online Master of Science in Information Systems program puts you on the front lines of the battle for data security, privacy, and protection.

When you earn a cyber forensics master’s degree online at Strayer University, you’ll learn how to identify, track, and catch cyber criminals while honing your eye to detect soft spots that 

allow these troublemakers into private data caches in the first place.

It’s an exciting — and lucrative — time to work in the data security field. Your skills are needed to protect millions of Americans and billions in digital assets. Be one of the good guys. Learn more about earning your cyber forensics master’s degree online at Strayer.

OTHER MASTER OF INFORMATION SYSTEMS CONCENTRATIONS

EXPAND YOUR OPTIONS

Each online Master of Information Systems Concentration can provide you with skills you’ll be able to apply immediately. You may want to explore these other Master of Information Systems concentrations.

Master of Science in Information Systems

REQUEST INFORMATION

U.S. Military Affiliation

Do you have transfer credits?

You consent to receive autodialed marketing calls or text messages from Strayer University and partner school, Capella University, at the phone number you provided. Consent is not required to purchase goods or services. You can always call us at 1.866.314.3547.

 

Submitting your information,
this may take a few seconds...