Online Master of Science Information Security and Assurance
Why earn a degree in information security and assurance from Strayer?
Through our Master of Science in Information Security and Assurance (MSISA) program, you’ll learn advanced technologies and strategies to investigate cybersecurity events or crimes and minimize their impact on information technology systems.
- Program details
- Cost & savings
The MS in Information Security and Assurance program overview
With the Master of Science in Information Security and Assurance program from Strayer, you’ll gain experience defending against cyberattacks and learn to wield technology used by hackers to beat them at their own game.
Is an MSISA good to have? It depends on what you learn.
- Conceptualize secure information technology systems.
- Provide the support, administration and maintenance to ensure effective, efficient information technology system performance and security.
- Lead, manage and promote policies that help organizations securely conduct work.
- Identify, analyze and mitigate threats to information technology systems.
- Investigate cybersecurity events or crimes related to information technology systems, networks and digital evidence.
Class size varies based on course objectives and the teaching demands of the subject matter.
How long does it take to get an MSISA?
- There are 10 11-week courses in this program.
- How many courses you take at a time will determine how long the overall program will be.
- Strayer University credits are expressed in quarter hours.
- One quarter hour of credit is granted for the successful completion of 10 contact hours per course.
- The standard requirement for one course is for students to spend 10 to 14 hours in weekly work, including in- and out-of-classroom work. The Strayer course design uses this requirement to meet applicable regulatory standards.
Features of Strayer's MSISA program
Designed around industry certifications
Get on the path to earning MSISA certifications in ISC2 SSCP and EC-Council CHFI with coursework designed around certification exams.
Meets national security standards
The MSISA program, updated to align with standards set by the National Initiative for Cybersecurity Education (NICE), led by the National Institute of Standards and Technology (NIST) in the U.S. Department of Commerce, is focused on cybersecurity education, training and workforce development.
Recognized by the National Security Agency
The MSISA program helps you gain key skills and knowledge certified by experts in the field and important to today’s employers. MSISA is validated by the National Security Agency (NSA).
Estimate the cost of your degree
How much does an MSISA cost?
Estimate the cost of your degree
How much does an MSISA cost?
*Student is required to take two courses per quarter during disbursement period
PREPARING YOUR RESULTS
Calculate the approximate time commitment of your degree.
|Course load||... courses/term|
|Classroom time||... hours/week|
|Terms per year||... terms|
|Terms to graduation||... terms|
Calculate the approximate cost of your degree
|No-cost gen ed||$0|
Starting January 10, 2023, the Graduation Fund will no longer be available to new students enrolling in a master’s degree program. Your results from this website may not reflect that change. To get more information on the total cost of your program, please contact a Strayer admissions officer.
Program cost breakdown
The MSISA program consists of 10 courses, with the price of $2,490 per course. There are additional fees for textbooks and supplies, a $65 technology fee each term and a one-time $150 degree conferral fee.
Courses from another institution may be eligible for transfer credits to Strayer, which can help reduce the number of courses you need to graduate and your overall tuition. You can transfer up to four classes toward your master’s degree. The Strayer transfer credit page has more information as well as a tool to estimate how many transfer credits you may be able to apply to your Strayer degree program.
Scholarships and financial aid
There are a number of financial aid options worth exploring on our financial aid page. To apply for federal aid, prospective students should fill out the Free Application for Federal Student Aid (FAFSA) form. Stafford loans are available for graduate study. These are direct unsubsidized loans, not based on financial need. Unlike subsidized loans, Stafford loan interest will accrue while in the program. Making interest payments while in school will help reduce the amount of principal that would otherwise build up, reducing your end cost.
There are also scholarships and private loans available for Strayer students.
More than 500 organizations – including corporations and community colleges – invest in their employees by partnering with Strayer University to offer access to discounted education programs. If your employer is a Corporate Alliance Partner, you may qualify for programs that can help you discover career pathways in your field.
Nonfederal loans can help pay the difference between the cost of attendance and the total of loans and grants received from other tuition assistance programs.
Military tuition assistance
Scholarships are offered to eligible students currently serving in the military, as well as military spouses. Strayer is also approved by Veterans Affairs to accept and process veteran education benefits. Learn more about the Strayer University active military assistance program here.
In addition to participating fully in the Yellow Ribbon Program, Strayer is approved by Veterans Affairs to accept and process veteran education benefits. Student veterans can receive transfer credit for military training and life experiences.
What coursework do you need to earn an MSISA?
Designed around standards set by the National Initiative for Cybersecurity Education (NICE) framework, our MSISA curriculum covers leading-edge techniques to help you assess and recommend safeguards to protect an organization’s information assets. You’ll explore real-world information assurance case studies and advanced technologies, then experience actual cyberthreats in lab settings. View all courses.
This course examines the structure and operation of digital computers in the context of providing data and infrastructure security. Emphasis will be placed on strategies to select, deploy, integrate and administer modern computing environments to support the organization's overall security posture. Topics include hardware components of modern computing environments and their deployment in compliance with applicable cybersecurity laws and policies.
This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.
This course presents typical cyber operations including access and control, where ethical dilemmas arise and provides tools for legal and ethical decision making. Topics include various stages of a cyber operation, U.S. regulations and ethical implications of granting access and control. Students will explore the authorities, roles and steps associated with ethical cyber operations.
This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab, investigating computer and cybercrime, tools, techniques and methods used to perform forensic investigations and concepts for collecting, analyzing, recovering and preserving forensic evidence.
This course covers cryptography from historical, applied, and theoretical perspectives. Topics include symmetric and asymmetric encryption techniques that include classical and modern algorithms. This course explores the framework and practice of using cryptography in securing information in organizational settings.
In this integrative capstone course, students will examine and solve real-world cybersecurity problems and apply associated techniques to create practical solutions. The course takes an integrative, senior security officer approach to address the policy, risk and control opportunities within cyberspace and IT environments.
MSISA admission requirements
Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
International master's students
We welcome international students from around the globe.