Online Master of Science Information Security and Assurance
PROGRAM AT A GLANCE
Why earn a degree in information security and assurance from Strayer?
Through our Master of Science in Information Security and Assurance (MSISA) program, you’ll learn advanced technologies and strategies to investigate cybersecurity events or crimes and minimize their impact on information technology systems.
The MS in Information Security and Assurance program overview
With the Master of Science in Information Security and Assurance program from Strayer, you’ll gain experience defending against cyberattacks and learn to wield technology used by hackers to beat them at their own game.
Is an MSISA good to have? It depends on what you learn.
- Conceptualize secure information technology systems.
- Provide the support, administration and maintenance to ensure effective, efficient information technology system performance and security.
- Lead, manage and promote policies that help organizations securely conduct work.
- Identify, analyze and mitigate threats to information technology systems.
- Investigate cybersecurity events or crimes related to information technology systems, networks and digital evidence.
Class size varies based on course objectives and the teaching demands of the subject matter.
How long does it take to get an MSISA?
- There are 10 11-week courses in this program.
- How many courses you take at a time will determine how long the overall program will be.
- Strayer University credits are expressed in quarter hours.
- One quarter hour of credit is granted for the successful completion of 10 contact hours per course.
- The standard requirement for one course is for students to spend 10 to 14 hours in weekly work, including in- and out-of-classroom work. The Strayer course design uses this requirement to meet applicable regulatory standards.
Features of Strayer's MSISA program
Designed around industry certifications
Get on the path to earning MSISA certifications in ISC2 SSCP and EC-Council CHFI with coursework designed around certification exams.
Meets national security standards
The MSISA program, updated to align with standards set by the National Initiative for Cybersecurity Education (NICE), led by the National Institute of Standards and Technology (NIST) in the U.S. Department of Commerce, is focused on cybersecurity education, training and workforce development.
Recognized by the National Security Agency
The MSISA program helps you gain key skills and knowledge certified by experts in the field and important to today’s employers. MSISA is validated by the National Security Agency (NSA).
Accredited online university
Strayer University has distinct accreditations and affiliations that attest to our academic quality. We’re committed to meeting quality standards, so you can earn a diploma you’re proud to display. View the ACBSP student achievement information.
Estimate the cost of your degree
How much does an MS in Information Security and Assurance cost?
Estimate the cost of your degree
How much does an MS in Information Security and Assurance cost?
Expected Graduation
...
Approximate Total
...
*Student is required to take two courses per quarter during disbursement period
PREPARING YOUR RESULTS
Time commitment
Calculate the approximate time commitment of your degree.
Course load | ... courses/term |
Classroom time | ... hours/week |
Terms per year | ... terms |
Terms to graduation | ... terms |
Cost analysis
Calculate the approximate cost of your degree
Tuition | ... |
Books | ... |
Fees | ... |
No-cost gen ed | $0 |
Transfer credits | ... |
$5K scholarship | $0 |
$4K scholarship | $0 |
Graduation Fund | $0 |
Approximate total | ... |
Program cost breakdown
The MSISA program consists of 10 courses, with the price of $2,490 per course. There are additional fees for textbooks and supplies, a $65 technology fee each term and a one-time $150 degree conferral fee. Earn a Master of Science in Information Systems and Assurance, a STEM degree program, for under $25,000 in tuition. Additional fees, eligibility rules and restrictions apply.
Transfer credits
Courses from another institution may be eligible for transfer credits to Strayer, which can help reduce the number of courses you need to graduate and your overall tuition. You can transfer up to four classes toward your master’s degree. The Strayer transfer credit page has more information as well as a tool to estimate how many transfer credits you may be able to apply to your Strayer degree program.
Students enrolled in the Master of Business Administration in North Carolina or Pennsylvania may transfer up to four classes
Scholarships and financial aid
There are a number of financial aid options worth exploring on our financial aid page. To apply for federal aid, prospective students should fill out the Free Application for Federal Student Aid (FAFSA) form. Stafford loans are available for graduate study. These are direct unsubsidized loans, not based on financial need. Unlike subsidized loans, Stafford loan interest will accrue while in the program. Making interest payments while in school will help reduce the amount of principal that would otherwise build up, reducing your end cost.
There are also scholarships and private loans available for Strayer students.
More than 500 organizations invest in their employees by partnering with Strayer University to offer access to tuition savings and other educational benefits. If your employer is a corporate partner, you may qualify for programs that can help you discover career pathways in your field.
Private loans
Non-federal loans may pay the difference between the cost of attendance and the total of loans and grants received from other tuition assistance programs. The terms and conditions of federal loans are often more favorable than private loans and should be considered before exploring private loans.
Military tuition assistance
Scholarships are offered to eligible students currently serving in the military, as well as military spouses. Strayer is also approved by Veterans Affairs to accept and process veteran education benefits. Learn more about the Strayer University active military assistance program here.
Veteran benefits
In addition to participating fully in the Yellow Ribbon Program, Strayer is approved by Veterans Affairs to accept and process veteran education benefits. Student veterans can receive transfer credit for military training and life experiences.
What coursework do you need to earn an MSISA?
Designed around standards set by the National Initiative for Cybersecurity Education (NICE) framework, our MSISA curriculum covers leading-edge techniques to help you assess and recommend safeguards to protect an organization’s information assets. You’ll explore real-world information assurance case studies and advanced technologies, then experience actual cyberthreats in lab settings. View all courses.
Sample courses
This course examines the structure and operation of digital computers in the context of providing data and infrastructure security. Emphasis will be placed on strategies to select, deploy, integrate and administer modern computing environments to support the organization's overall security posture. Topics include hardware components of modern computing environments and their deployment in compliance with applicable cybersecurity laws and policies.
This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.
This course presents typical cyber operations including access and control, where ethical dilemmas arise and provides tools for legal and ethical decision making. Topics include various stages of a cyber operation, U.S. regulations and ethical implications of granting access and control. Students will explore the authorities, roles and steps associated with ethical cyber operations.
This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab, investigating computer and cybercrime, tools, techniques and methods used to perform forensic investigations and concepts for collecting, analyzing, recovering and preserving forensic evidence.
This course covers cryptography from historical, applied, and theoretical perspectives. Topics include symmetric and asymmetric encryption techniques that include classical and modern algorithms. This course explores the framework and practice of using cryptography in securing information in organizational settings.
In this integrative capstone course, students will examine and solve real-world cybersecurity problems and apply associated techniques to create practical solutions. The course takes an integrative, senior security officer approach to address the policy, risk and control opportunities within cyberspace and IT environments.
What can you do with an MSISA?
Your education can help you pursue your professional and personal goals. While Strayer cannot guarantee that a graduate will secure any specific career outcome, such as a job title, promotion or salary increase, we encourage you to explore the potential impact you can have in the information security and assurance field.
Versatile skills for your future
The information security and assurance program can provide the skills to help you defend against cyberattacks.
In addition, students who complete this concentration will be prepared to:
- Conduct risk assessments and carry out tests on data processing systems to ensure data processing tasks and security measures function properly.
- Control access to data files and monitor their use to protect information in computer files.
- Create strategies to protect computer files from accidental or unauthorized changes, destruction or disclosure, and to address emergency data processing requirements.
- Develop new applications, ideas, connections, systems or products.
- Document policies, procedures and tests for computer security and emergency measures.
- Educate users about security to enhance system security and optimize server and network efficiency.
- Evaluate relevant information to help you determine whether events or processes follow laws, regulations or standards.
- Examine computer security protocol violations and talk to those who violated them to help prevent future occurrences of the violations.
- Review and stay up to date on computer virus reports to determine when to update virus protection systems.
- Set up firewalls and encode data transmissions to hide sensitive information while it's being sent and to block malicious digital transfers.
- Speak with users to address matters like computer data access needs, security breaches and programming adjustments.
- Update computer security files to include new software, fix mistakes or adjust individual access permissions.
86
of Strayer master's alumni agree that Strayer was the right choice for earning their degree.
Strayer Alumni Survey, 2023
MSISA admission requirements
Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
International master’s students
We welcome international students.
Campus locations
Come to a campus near you for guidance and support. You’ll have access to helpful resources, a supportive community and plenty of spaces to learn and grow.
Ready to take the next step?
Your admissions officer is here to guide you through every step of the process, from completing your application to choosing your concentration.