Online Master of Science in Information Security and Assurance
this may take a few seconds...
Become a cybersecurity specialist
Complex information systems need defenders who can assess threats, prevent attacks and develop strategies to mitigate risks when they occur. With a Master of Science in Information Security and Assurance (MSISA), you’ll gain real-world experience with leading-edge technology and strategies to investigate cybersecurity events or crimes and minimize their impact on information technology systems.
Summer Classes Start on July 5
Program at a glance
10
11-week courses in the program
$2490
Cost per course
Online
Earn your degree online with Strayer
- Program details
- Costs & Savings
- Courses
- Admissions
Learn the latest in cyberdefense
Our MSISA curriculum, designed around standards set by the National Initiative for Cybersecurity Education (NICE) framework, covers leading-edge techniques to help you assess and recommend safeguards to protect an organization’s information assets. You’ll get hands-on experience defending against cyberattacks. You’ll learn to wield technology used by hackers and terrorists to beat them at their own game.
Build your skills
- Conceptualize secure information technology systems.
- Provide the support, administration and maintenance to ensure effective, efficient information technology system performance and security.
- Lead, manage and promote policies that help organizations securely conduct work.
- Identify, analyze and mitigate threats to information technology systems.
- Investigate cybersecurity events or crimes related to information technology systems, networks and digital evidence.
Features

Designed around industry certifications
Get on the path to earning MSISA certifications in ISC2 SSCP and EC-Council CHFI with coursework designed around certification exams.

Start-to-finish support
Your admissions officer and student services coach will mentor, motivate and support you from enrollment to the day you graduate.

Meets national security standards
The MSISA program, updated to align with standards set by the National Initiative for Cybersecurity Education (NICE), led by the National Institute of Standards and Technology (NIST) in the U.S. Department of Commerce, is focused on cybersecurity education, training and workforce development.
The high-quality higher education you deserve
Strayer University is proud to be certified
or accredited by
four respected organizations. We’re committed to meeting quality
standards, so you can earn an industry-recognized diploma you’re proud
to display. View
the ACBSP student achievement information.
83
of Strayer master's alumni agree that their degree was a worthwhile investment
Strayer Alumni Survey, 2021
Affording your degree
At Strayer, you’ll find plenty of ways to make your tuition affordable, so you can worry less about your budget and get down to business.
$2490
cost per course
$150
degree conferral (one-time only)
$65
technology fee (one per term)
Estimate the cost of your degree
How much time and money will you have to invest toward a Strayer degree?
Estimate the cost of your degree
How much time and money will you have to invest toward a Strayer degree?
Expected Graduation
...
Approximate Total
...
*Student is required to take two courses per quarter during disbursement period
PREPARING YOUR RESULTS
Time commitment
Calculate the approximate time commitment of your degree.
Course load | ... courses/term |
Classroom time | ... hours/week |
Terms per year | ... terms |
Terms to graduation | ... terms |
Cost analysis
Calculate the approximate cost of your degree
Tuition | ... |
Books | ... |
Fees | ... |
No-cost gen ed | $0 |
Transfer credits | ... |
$5K scholarship | $0 |
Graduation Fund | $0 |
Brand-new laptop | Included |
Approximate total | ... |
Ways to reduce your cost
Transfer up to 4 classes toward your master's degree.
Save up to 25% off the cost of select master’s degrees. Eligibility rules apply.
Explore additional scholarships & ways to save.
More than 500 organizations – including corporations and community colleges – invest in their employees by partnering with Strayer University to offer access to discounted education programs. If your employer is a Corporate Alliance Partner, you may qualify for programs that can help you advance in your company and your career.
Hands-on learning in live scenarios
You’ll explore real-world information assurance case studies and advanced technologies, then experience actual cyberthreats in lab settings. View all courses.
Sample courses
This course examines the structure and operation of digital computers in the context of providing data and infrastructure security. Emphasis will be placed on strategies to select, deploy, integrate and administer modern computing environments to support the organization's overall security posture. Topics include hardware components of modern computing environments and their deployment in compliance with applicable cybersecurity laws and policies.
This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.
This course presents typical cyber operations including access and control, where ethical dilemmas arise and provides tools for legal and ethical decision making. Topics include various stages of a cyber operation, U.S. regulations and ethical implications of granting access and control. Students will explore the authorities, roles and steps associated with ethical cyber operations.
This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab, investigating computer and cybercrime, tools, techniques and methods used to perform forensic investigations and concepts for collecting, analyzing, recovering and preserving forensic evidence.
This course covers cryptography from historical, applied, and theoretical perspectives. Topics include symmetric and asymmetric encryption techniques that include classical and modern algorithms. This course explores the framework and practice of using cryptography in securing information in organizational settings.
In this integrative capstone course, students will examine and solve real-world cybersecurity problems and apply associated techniques to create practical solutions. The course takes an integrative, senior security officer approach to address the policy, risk and control opportunities within cyberspace and IT environments.
Master’s admission requirements
Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
International students
We welcome international students from around the globe.
Campus Locations
Come to a campus near you for guidance and support. You’ll have access to helpful resources, a supportive community and plenty of spaces to learn and grow.

Ready to take the next step?
Your admissions officer is here to guide you through every step of the process, from completing your application to choosing your concentration.