Skip to main section

Master of Science in Information Systems (MSIS) Computer Security Management

PROGRAM AT A GLANCE

school

12 master's courses

11 weeks long

monetization_on

$ 2490

Cost per course

local_library

Flexible learning

Online and in-person programs at select campuses, subject to availability

Why earn a degree in computer security management from Strayer?

Earning an MS in Information Systems with a computer security management concentration from Strayer University will introduce you to the latest network encryption and data monitoring techniques. This online program can help prepare you to protect computer network systems from malware, intruders and more.

Fall classes start October 6
Concentration overview

Safeguard network systems and protect data

Discover all the ways hackers can exploit system weaknesses to steal and corrupt data – and the ways to fight back – with a Master of Science in Information Systems (MSIS), Computer Security Management from Strayer. You’ll learn to design better firewalls and network security systems and how to identify system vulnerabilities, shutting down pathways cybercriminals can use to gain access to networks and private information.

Skills you’ll learn with a Strayer MSIS, Computer Security Management concentration

A Strayer degree can help prepare you for career opportunities in computer security management while offering support, flexible learning options and career planning every step of the way.

  • Understand and apply the control objectives for information and related technology framework to perform IT audits.
  • Describe information technology general controls based on the Information Technology Infrastructure Library best practices.
  • Identify the computer investigation process.
  • Compare the various types of cybersecurity tools.
  • Demonstrate the ability to develop procedural techniques in crime and incident scenes.

Earn your degree from an accredited university

Strayer University is an accredited institution and a member of the Middle States Commission on Higher Education (MSCHE or the Commission) www.msche.org. Strayer University’s accreditation status is Accreditation Reaffirmed. The Commission’s most recent action on the institution’s accreditation status on June 22, 2017 was to reaffirm accreditation. MSCHE is recognized by the U.S. Secretary of Education to conduct accreditation and pre-accreditation (candidate status) activities for institutions of higher education including distance, correspondence education, and direct assessment programs offered at those institutions. The Commission’s geographic area of accrediting activities is throughout the United States.

Master of Science in Information Systems (MSIS) in Computer Security Management cost breakdown

  • 12 courses, $2490 per course
  • $65 technology fee each term
  • $150 one-time degree conferral fee
  • Additional costs for textbooks and supplies

Estimate the cost of your degree

How much does a Master of Science in Information Systems (MSIS) in Computer Security Management cost?

The cost of a Master of Science in Information Systems (MSIS) in Computer Security Management depends on several factors. Our Cost Estimator Tool will approximate your tuition and expected graduation date in three easy steps.

Estimate the cost of your degree

How much does a Master of Science in Information Systems (MSIS) in Computer Security Management cost?

The cost of a Master of Science in Information Systems (MSIS) in Computer Security Management depends on several factors. Our Cost Estimator Tool will approximate your tuition and expected graduation date in three easy steps.

Expected Graduation

...

Approximate Total

...

Step 1 of 3
0
0

*Student is required to take two courses per quarter during disbursement period

PREPARING YOUR RESULTS

*Student is required to take two courses per quarter during disbursement period

Time commitment

Calculate the approximate time commitment of your degree.

Course load ... courses/term
Classroom time ... hours/week
Terms per year ... terms
Terms to graduation ... terms

Cost analysis

Calculate the approximate cost of your degree

Tuition ...
Books ...
Fees ...
No-cost gen ed $0
Transfer credits ...
Transfer Credit Scholarship $0
$4K scholarship $0
Strayer Learn and Earn Scholarship $0
Approximate total ...
false
Are you a Strayer graduate?
masters
How much does a Master of Science in Information Systems (MSIS) in Computer Security Management cost?
12
M-MSIS-COSM
M-MSIS
5000
4000

Opportunities to save on tuition

$4K Alumni Master’s Scholarship

If you’re a Strayer University Alumni and ready to pursue a master’s degree, our Alumni Scholarship can save you $4,000. All you need to do is register for an eligible Strayer graduate program, maintain a GPA of 2.5 or greater and meet eligibility requirements.

50% off Master’s Scholarship

Enroll in two master’s courses, get 50% off tuition. Summer or fall 2025 term only.*

*Eligibility rules, restrictions and exclusions apply.

Civic and Community Alliance Scholarship

Ready to earn an affordable Strayer degree? Admitted Strayer or JWMI students who are employed in certain civic roles or volunteer for a nonprofit may be eligible to receive 25% off tuition for the duration of their program.

What coursework do you need to specialize in computer security?

Our computer security management master’s coursework can give you a combination of skills to address the risks and threats of web-based apps and social networks. You’ll learn how to identify the security measures necessary to develop effective information safety systems and policies. View all courses.

All MSIS students take a set list of required courses. The remaining credits come from their choice of concentration.

Required MSIS courses

Online
CIS 534 - Advanced Network Security Design

This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.

Online
CIS 542 - Web Application Security

This course addresses the risks, threats and vulnerabilities for web-based applications and the people who use them. This course presents security strategies to mitigate the risk associated with web applications and social networking. Topics also include a review of the evolutionary changes that have occurred in computing, communications, and social networking and securing systems against risks, threats and vulnerabilities associated with web-enabled applications.

Online
CIS 552 - Cybercrime Techniques & Response

This course examines the threats, crimes and other abuses that are present in the cyber realm. Topics include identifying the bad actors in cyberspace, examining how they used the internet for criminal activity, and evaluating techniques in preventing crime and abuse. Students will explore different types of cyberattacks and their characteristics. PREREQUISITE: CIS 502

Online
CIS 510 - Advanced Systems Analysis and Design

This course provides an integrated approach to system analysis and design processes. Students will explore advanced topics to evaluate and select system development methodologies and design system solutions. The role of effective interpersonal communication techniques and integration practices with users and user systems is emphasized.

Online
CIS 515 - Strategic Planning for Database Systems

This course covers the concepts, issues, principles and techniques for managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Emphasis will be placed on the application and strategic use of database systems.

Online
CIS 599 - Graduate Information Systems Capstone

This course is an integrative capstone course for the Master of Science in Information Systems program. Students will examine and address real-world projects and problems and apply project management techniques to create practical solutions. The course takes an integrative and senior management approach to address the integration of a broad range of technologies inclusive of databases, security, networking, computer infrastructure and human computer interaction.

What can you do with an MSIS, Computer Security Management degree?

Your education can help you pursue your professional and personal goals. While Strayer cannot guarantee that a graduate will secure any specific career outcome, such as a job title, promotion or salary increase, we encourage you to explore the potential impact you can have in the information systems field.

Versatile skills for your future

The computer security management concentration can provide the skills to help you safeguard computer network systems against malware, intruders and other threats.

In addition, students who complete this concentration will be prepared to:

  • Verify the functionality of data processing activities and security measures by conducting risk assessments and tests on data processing systems.
  • Create documentation for computer security and emergency measures policies, procedures and tests.
  • Manage data file use and control access to computer files to protect information.
  • Conduct analyses of web service network traffic or waveforms to identify anomalies.
  • Develop computer information resources, support data security, strategic computing and disaster recovery.
  • Meet with users, management, vendors and technicians to evaluate computing needs and system requirements.
  • Review an organization’s technology use and suggest enhancements, including hardware and software upgrades.
  • Determine project feasibility and requirements based on data processing proposals.

86

of Strayer master's alumni agree that Strayer was the right choice for earning their degree.

Strayer Alumni Survey, 2023

Apply for your Computer Security Management degree today

An admissions officer can help you choose the right program, register for classes, transfer credits and find cost-savings opportunities.
Here’s what you’ll need to get started:

decorative

A completed application and enrollment agreement, as applicable

decorative

A diploma from an approved high school or its equivalent

decorative

Official copies of transcripts from all colleges or universities attended

decorative

A valid, current and legible government-issued photo ID

Fall classes start on October 6

Learn more about Strayer University’s admissions process.

Transferring to Strayer from another university?

Transfer up to four eligible classes from a prior college or university to your master’s degree, saving time and money.

Strayer welcomes international students

Strayer University is proud to have hosted more than 3,000 international students from over 110 countries. Earn your degree in the U.S. or completely online in your home country – it’s your choice.

Campus locations

Come to a campus near you for guidance and support. You’ll have access to helpful resources, a supportive community and plenty of spaces to learn and grow.

Ready to take the next step?

Your admissions officer is here to guide you through every step of the process, from completing your application to choosing your concentration.