Master of Science in Information Systems (MSIS) Computer Security Management
PROGRAM AT A GLANCE
Why earn a degree in computer security management from Strayer?
Earning an MS in Information Systems with a computer security management concentration from Strayer University will introduce you to the latest network encryption and data monitoring techniques. This online program can help prepare you to protect computer network systems from malware, intruders and more.
- Program details
- Cost & savings
Build your computer security skills
Email attachments, web-enabled applications, addictive new games – potentially harmless, yet they are all possible avenues for bad actors to try to gain access to network systems. You can learn how hackers exploit weaknesses to steal and corrupt data, and the ways to fight back.
Is an MSIS in computer security good to have? It depends on what you learn.
- Improve your ability to design firewalls and network security systems.
- Analyze system vulnerabilities, counteract and remove Trojans, backdoors and malware.
- Identify network security tools and discuss techniques for developing computer security systems.
- Assess firewall design strategies and design a secure network.
- Explore web application security, including social networking applications.
Class size varies based on course objectives and the teaching demands of the subject matter. In general, Strayer University aims to keep the student-to-instructor ratio low.
How long does it take to get a computer security management master’s degree?
- There are 12 11-week courses in this program.
- How many courses you take at a time will determine how long the overall program will be.
- Strayer University credits are expressed in quarter hours.
- One quarter hour of credit is granted for the successful completion of 10 contact hours per course.
- The standard requirement for one course is for students to spend 10 to 14 hours in weekly work, including in- and out-of-classroom work, for a total of 54 hours by the end of the course. Strayer’s course design uses this requirement to meet applicable regulatory standards.
Accredited online university
Strayer University has distinct accreditations and affiliations that attest to our academic quality. We're committed to meeting quality standards, so you can earn a diploma you're proud to display. View the ACBSP student achievement information.
3 out of 4 Strayer Master of Science in Information Systems alumni agree that their degree was a worthwhile investment.
Strayer Alumni Survey, 2021
Estimate the cost of your degree
How much does an MSIS cost?
Estimate the cost of your degree
How much does an MSIS cost?
*Student is required to take two courses per quarter during disbursement period
PREPARING YOUR RESULTS
Calculate the approximate time commitment of your degree.
|Course load||... courses/term|
|Classroom time||... hours/week|
|Terms per year||... terms|
|Terms to graduation||... terms|
Calculate the approximate cost of your degree
|No-cost gen ed||$0|
Program cost breakdown
The Strayer MSIS program consists of 12 courses, with the price of $2,490 per course. There are additional fees for textbooks and supplies, a $65 technology fee each term and a one-time $150 degree conferral fee.
Courses from another institution may be eligible for transfer credits to Strayer, which can help reduce the number of courses you need to graduate and your overall tuition. You can transfer up to four classes toward your master’s degree. The Strayer transfer credit page has more information as well as a tool to estimate how many transfer credits you may be able to apply to your Strayer degree program.
Scholarships and financial aid
There are a number of financial aid options worth exploring on our financial aid page. To apply for federal aid, prospective students should fill out the Free Application for Federal Student Aid (FAFSA) form. Stafford loans are available for graduate study. These are direct unsubsidized loans, not based on financial need. Unlike subsidized loans, Stafford loan interest will accrue while in the program. Making interest payments while in school will help reduce the amount of principal that would otherwise build up, reducing your end cost.
There are also scholarships and private loans available for Strayer students.
More than 500 organizations – including corporations and community colleges – invest in their employees by partnering with Strayer University to offer access to discounted education programs. If your employer is a Corporate Alliance Partner, you may qualify for programs that can help you discover career pathways in your field.
Nonfederal loans can help pay the difference between the cost of attendance and the total of loans and grants received from other tuition assistance programs.
Military tuition assistance
Scholarships are offered to eligible students currently serving in the military, as well as military spouses. Strayer is also approved by Veterans Affairs to accept and process veteran education benefits. Learn more about the Strayer active military assistance program here.
In addition to participating fully in the Yellow Ribbon Program, Strayer is approved by Veterans Affairs to accept and process veteran education benefits. Student veterans can receive transfer credit for military training and life experiences.
What coursework do you need to specialize in computer security?
Our computer security management master’s coursework can give you a combination of skills to address the risks and threats of web-based apps and social networks. You’ll learn how to identify the security measures necessary to develop effective information safety systems and policies. View all courses.
All MSIS students take a set list of required courses. The remaining credits come from their choice of concentration.
Required MSIS courses
This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.
This course addresses the risks, threats and vulnerabilities for web-based applications and the people who use them. This course presents security strategies to mitigate the risk associated with web applications and social networking. Topics also include a review of the evolutionary changes that have occurred in computing, communications, and social networking and securing systems against risks, threats and vulnerabilities associated with web-enabled applications.
Examine the landscape, key terms and concepts of computer hackers and the criminals who break into networks, steal information and corrupt data. Topics include the various vulnerabilities of operating systems, software and networks used by hackers to access unauthorized information and resources. Compare incident handling methods to use when information security is compromised.
This course provides an integrated approach to system analysis and design processes. Students will explore advanced topics to evaluate and select system development methodologies and design system solutions. The role of effective interpersonal communication techniques and integration practices with users and user systems is emphasized.
This course covers the concepts, issues, principles and techniques for managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Emphasis will be placed on the application and strategic use of database systems.
This course is an integrative capstone course for the Master of Science in Information Systems program. Students will examine and address real-world projects and problems and apply project management techniques to create practical solutions. The course takes an integrative and senior management approach to address the integration of a broad range of technologies inclusive of databases, security, networking, computer infrastructure and human computer interaction.
MSIS admission requirements
Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
International MSIS students
We welcome international students.
Come to a campus near you for guidance and support. You’ll have access to helpful resources, a supportive community and plenty of spaces to learn and grow.
Ready to take the next step?
Your admissions officer is here to guide you through every step of the process, from completing your application to choosing your concentration.