Master of Science in Information Systems (MSIS) Computer Forensic Management
Why earn a degree in computer forensic management from Strayer?
Cyber forensics professionals help spearhead the critical work that drives the discovery, investigation and solution of digital theft, sabotage and even terrorism. The computer forensic management concentration of our online MS in Information Systems program puts you on the front lines of the battle for data security, privacy and protection.
- Program details
- Cost & savings
- Career exploration
Build your cyber forensic skills
When you earn an online computer forensic management degree at Strayer, you’ll learn how forensic experts identify, track and catch cybercriminals. You’ll also hone your eye to detect weak spots that allow these troublemakers into private data caches.
Is an MSIS in computer forensics good to have? It depends on what you learn.
- Understand and apply the control objectives for information and related technology framework to perform IT audits.
- Describe information technology general controls based on the Information Technology Infrastructure Library best practices.
- Identify the computer investigation process.
- Compare the various types of cybersecurity tools.
- Demonstrate the ability to develop procedural techniques in crime and incident scenes.
Class size varies based on course objectives and the teaching demands of the subject matter. In general, Strayer University aims to keep the student-to-instructor ratio low.
How long does it take to get a computer forensic management master’s degree?
- There are 12 11-week courses in this program.
- How many courses you take at a time will determine how long the overall program will be.
- Strayer University credits are expressed in quarter hours.
- One quarter hour of credit is granted for the successful completion of 10 contact hours per course.
- The standard requirement for one course is for students to spend 10 to 14 hours in weekly work, including in- and out-of-classroom work, for a total of 54 hours by the end of the course. Strayer’s course design uses this requirement to meet applicable regulatory standards.
Estimate the cost of your degree
How much does an MSIS in Computer Forensic Management cost?
Estimate the cost of your degree
How much does an MSIS in Computer Forensic Management cost?
*Student is required to take two courses per quarter during disbursement period
PREPARING YOUR RESULTS
Calculate the approximate time commitment of your degree.
|Terms per year
|Terms to graduation
Calculate the approximate cost of your degree
|No-cost gen ed
Program cost breakdown
The MSISA program consists of 10 courses, with the price of $2,490 per course. There are additional fees for textbooks and supplies, a $65 technology fee each term and a one-time $150 degree conferral fee.
Courses from another institution may be eligible for transfer credits to Strayer, which can help reduce the number of courses you need to graduate and your overall tuition. You can transfer up to four classes toward your master’s degree. The Strayer transfer credit page has more information as well as a tool to estimate how many transfer credits you may be able to apply to your Strayer degree program.
Students enrolled in the Master of Business Administration in North Carolina or Pennsylvania may transfer up to four classes
Scholarships and financial aid
There are a number of financial aid options worth exploring on our financial aid page. To apply for federal aid, prospective students should fill out the Free Application for Federal Student Aid (FAFSA) form. Stafford loans are available for graduate study. These are direct unsubsidized loans, not based on financial need. Unlike subsidized loans, Stafford loan interest will accrue while in the program. Making interest payments while in school will help reduce the amount of principal that would otherwise build up, reducing your end cost.
There are also scholarships and private loans available for Strayer students.
More than 500 organizations – including corporations and community colleges – invest in their employees by partnering with Strayer University to offer access to discounted education programs. If your employer is a Corporate Alliance Partner, you may qualify for programs that can help you discover career pathways in your field.
Non-federal loans may pay the difference between the cost of attendance and the total of loans and grants received from other tuition assistance programs. The terms and conditions of federal loans are often more favorable than private loans and should be considered before exploring private loans.
Military tuition assistance
Scholarships are offered to eligible students currently serving in the military, as well as military spouses. Strayer is also approved by Veterans Affairs to accept and process veteran education benefits. Learn more about the Strayer University active military assistance program here.
In addition to participating fully in the Yellow Ribbon Program, Strayer is approved by Veterans Affairs to accept and process veteran education benefits. Student veterans can receive transfer credit for military training and life experiences.
What coursework do you need to specialize in computer forensics?
Dig into the methods that solve cybercrimes and keep new crimes from happening. This program can show you how to lead computer forensic investigations, protect digital data, identify network vulnerabilities and develop countermeasure strategies to prevent information and data breaches. View all courses.
All MSIS students take a set list of required courses. The remaining credits come from their choice of concentration.
Required MSIS courses
This course focuses on establishing the framework to audit, secure and ensure internal controls in an information technology environment. Topics include the technical and professional issues in the context of technology-driven audits, security, privacy, business continuity, legislative and governance changes.
This course presents typical cyber operations including access and control, where ethical dilemmas arise and provides tools for legal and ethical decision making. Topics include various stages of a cyber operation, U.S. regulations and ethical implications of granting access and control. Students will explore the authorities, roles and steps associated with ethical cyber operations.
This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab, investigating computer and cybercrime, tools, techniques and methods used to perform forensic investigations and concepts for collecting, analyzing, recovering and preserving forensic evidence.
This course provides an integrated approach to system analysis and design processes. Students will explore advanced topics to evaluate and select system development methodologies and design system solutions. The role of effective interpersonal communication techniques and integration practices with users and user systems is emphasized.
This course covers the concepts, issues, principles and techniques for managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Emphasis will be placed on the application and strategic use of database systems.
This course is an integrative capstone course for the Master of Science in Information Systems program. Students will examine and address real-world projects and problems and apply project management techniques to create practical solutions. The course takes an integrative and senior management approach to address the integration of a broad range of technologies inclusive of databases, security, networking, computer infrastructure and human computer interaction.
What can you do with an MSIS, Computer Forensic Management degree?
Your education can help you pursue your professional and personal goals. While Strayer cannot guarantee that a graduate will secure any specific career outcome, such as a job title, promotion or salary increase, we encourage you to explore the potential impact you can have in the information systems field.
Versatile skills for your future
The computer forensic management concentration can provide the skills to help you identify, track and catch cybercriminals.
In addition, students who complete this concentration will be prepared to:
- Ensure digital media complies with legal policies and procedures.
- Produce system images or capture network settings from IT environments to keep as evidence.
- Create investigation strategies for computer crimes, violations or suspicious activities.
- Support cyber incident responses by maintaining cybersecurity software and hardware.
- Stay informed on laws, regulations, policies and other directives related to digital forensics or information privacy.
- Keep and safeguard digital forensic evidence for analysis.
- Monitor computer virus reports and decide when your organization should update its virus protection systems.
- Update computer security files to include new software, fix errors or modify individual access status.
- Record policies, procedures and tests for computer security and emergency measures.
- Manage data file use and control access to computer files to protect of information.
- Raise awareness about security and train users to help improve system security and server and network efficiency.
MSIS admission requirements
Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
International MSIS students
We welcome international students.