Master of Science in Information Systems (MSIS) Computer Security Management
PROGRAM AT A GLANCE
12 master's courses
11 weeks long
$ 2490
Cost per course
Flexible learning
Online and in-person programs at select campuses, subject to availability
Why earn a degree in computer security management from Strayer?
Earning an MS in Information Systems with a computer security management concentration from Strayer University will introduce you to the latest network encryption and data monitoring techniques. This online program can help prepare you to protect computer network systems from malware, intruders and more.
Safeguard network systems and protect data
Discover all the ways hackers can exploit system weaknesses to steal and corrupt data – and the ways to fight back – with a Master of Science in Information Systems (MSIS), Computer Security Management from Strayer. You’ll learn to design better firewalls and network security systems and how to identify system vulnerabilities, shutting down pathways cybercriminals can use to gain access to networks and private information.
Skills you’ll learn with a Strayer MSIS, Computer Security Management concentration
A Strayer degree can help prepare you for career opportunities in computer security management while offering support, flexible learning options and career planning every step of the way.
- Understand and apply the control objectives for information and related technology framework to perform IT audits.
- Describe information technology general controls based on the Information Technology Infrastructure Library best practices.
- Identify the computer investigation process.
- Compare the various types of cybersecurity tools.
- Demonstrate the ability to develop procedural techniques in crime and incident scenes.
Earn your degree from an accredited university
Strayer University is an accredited institution and a member of the Middle States Commission on Higher Education (MSCHE or the Commission) www.msche.org. Strayer University’s accreditation status is Accreditation Reaffirmed. The Commission’s most recent action on the institution’s accreditation status on June 22, 2017 was to reaffirm accreditation. MSCHE is recognized by the U.S. Secretary of Education to conduct accreditation and pre-accreditation (candidate status) activities for institutions of higher education including distance, correspondence education, and direct assessment programs offered at those institutions. The Commission’s geographic area of accrediting activities is throughout the United States.

Master of Science in Information Systems (MSIS) in Computer Security Management cost breakdown
- 12 courses, $2490 per course
- $65 technology fee each term
- $150 one-time degree conferral fee
- Additional costs for textbooks and supplies
Estimate the cost of your degree
How much does a Master of Science in Information Systems (MSIS) in Computer Security Management cost?
Estimate the cost of your degree
How much does a Master of Science in Information Systems (MSIS) in Computer Security Management cost?
Expected Graduation
...
Approximate Total
...
*Student is required to take two courses per quarter during disbursement period
PREPARING YOUR RESULTS
Time commitment
Calculate the approximate time commitment of your degree.
Course load | ... courses/term |
Classroom time | ... hours/week |
Terms per year | ... terms |
Terms to graduation | ... terms |
Cost analysis
Calculate the approximate cost of your degree
Tuition | ... |
Books | ... |
Fees | ... |
No-cost gen ed | $0 |
Transfer credits | ... |
Transfer Credit Scholarship | $0 |
$4K scholarship | $0 |
Strayer Learn and Earn Scholarship | $0 |
Approximate total | ... |
Opportunities to save on tuition
$4K Alumni Master’s Scholarship
If you’re a Strayer University Alumni and ready to pursue a master’s degree, our Alumni Scholarship can save you $4,000. All you need to do is register for an eligible Strayer graduate program, maintain a GPA of 2.5 or greater and meet eligibility requirements.
50% off Master’s Scholarship
Enroll in two master’s courses, get 50% off tuition. Summer or fall 2025 term only.*
*Eligibility rules, restrictions and exclusions apply.
Civic and Community Alliance Scholarship
Ready to earn an affordable Strayer degree? Admitted Strayer or JWMI students who are employed in certain civic roles or volunteer for a nonprofit may be eligible to receive 25% off tuition for the duration of their program.
What coursework do you need to specialize in computer security?
Our computer security management master’s coursework can give you a combination of skills to address the risks and threats of web-based apps and social networks. You’ll learn how to identify the security measures necessary to develop effective information safety systems and policies. View all courses.
All MSIS students take a set list of required courses. The remaining credits come from their choice of concentration.
Required MSIS courses
This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.
This course addresses the risks, threats and vulnerabilities for web-based applications and the people who use them. This course presents security strategies to mitigate the risk associated with web applications and social networking. Topics also include a review of the evolutionary changes that have occurred in computing, communications, and social networking and securing systems against risks, threats and vulnerabilities associated with web-enabled applications.
This course examines the threats, crimes and other abuses that are present in the cyber realm. Topics include identifying the bad actors in cyberspace, examining how they used the internet for criminal activity, and evaluating techniques in preventing crime and abuse. Students will explore different types of cyberattacks and their characteristics. PREREQUISITE: CIS 502
This course provides an integrated approach to system analysis and design processes. Students will explore advanced topics to evaluate and select system development methodologies and design system solutions. The role of effective interpersonal communication techniques and integration practices with users and user systems is emphasized.
This course covers the concepts, issues, principles and techniques for managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Emphasis will be placed on the application and strategic use of database systems.
This course is an integrative capstone course for the Master of Science in Information Systems program. Students will examine and address real-world projects and problems and apply project management techniques to create practical solutions. The course takes an integrative and senior management approach to address the integration of a broad range of technologies inclusive of databases, security, networking, computer infrastructure and human computer interaction.
What can you do with an MSIS, Computer Security Management degree?
Your education can help you pursue your professional and personal goals. While Strayer cannot guarantee that a graduate will secure any specific career outcome, such as a job title, promotion or salary increase, we encourage you to explore the potential impact you can have in the information systems field.
Versatile skills for your future
The computer security management concentration can provide the skills to help you safeguard computer network systems against malware, intruders and other threats.
In addition, students who complete this concentration will be prepared to:
- Verify the functionality of data processing activities and security measures by conducting risk assessments and tests on data processing systems.
- Create documentation for computer security and emergency measures policies, procedures and tests.
- Manage data file use and control access to computer files to protect information.
- Conduct analyses of web service network traffic or waveforms to identify anomalies.
- Develop computer information resources, support data security, strategic computing and disaster recovery.
- Meet with users, management, vendors and technicians to evaluate computing needs and system requirements.
- Review an organization’s technology use and suggest enhancements, including hardware and software upgrades.
- Determine project feasibility and requirements based on data processing proposals.
86
of Strayer master's alumni agree that Strayer was the right choice for earning their degree.
Strayer Alumni Survey, 2023
Apply for your Computer Security Management degree today
An admissions officer can help you choose the right program, register for classes, transfer credits and find cost-savings opportunities.
Here’s what you’ll need to get started:
Fall classes start on October 6
Learn more about Strayer University’s admissions process.
Transferring to Strayer from another university?
Transfer up to four eligible classes from a prior college or university to your master’s degree, saving time and money.
Strayer welcomes international students
Strayer University is proud to have hosted more than 3,000 international students from over 110 countries. Earn your degree in the U.S. or completely online in your home country – it’s your choice.

Campus locations
Come to a campus near you for guidance and support. You’ll have access to helpful resources, a supportive community and plenty of spaces to learn and grow.
Ready to take the next step?
Your admissions officer is here to guide you through every step of the process, from completing your application to choosing your concentration.