Skip to main section

Master of Science in Information Systems (MSIS) Computer Security Management


12 master's courses
11 weeks long
$ 2490
Cost per course
Online program
Earn your degree on your terms.

Why earn a degree in computer security management from Strayer?

Earning an MS in Information Systems with a computer security management concentration from Strayer University will introduce you to the latest network encryption and data monitoring techniques. This online program can help prepare you to protect computer network systems from malware, intruders and more.

Summer classes start July 1

Build your computer security skills

Email attachments, web-enabled applications, addictive new games – potentially harmless, yet they are all possible avenues for bad actors to try to gain access to network systems. You can learn how hackers exploit weaknesses to steal and corrupt data, and the ways to fight back.

Is an MSIS in computer security good to have? It depends on what you learn.

  • Improve your ability to design firewalls and network security systems.
  • Analyze system vulnerabilities, counteract and remove Trojans, backdoors and malware.
  • Identify network security tools and discuss techniques for developing computer security systems.
  • Assess firewall design strategies and design a secure network.
  • Explore web application security, including social networking applications.

Class size varies based on course objectives and the teaching demands of the subject matter. In general, Strayer University aims to keep the student-to-instructor ratio low.

How long does it take to get a computer security management master’s degree?

  • There are 12 11-week courses in this program.
  • How many courses you take at a time will determine how long the overall program will be.
  • Strayer University credits are expressed in quarter hours.
  • One quarter hour of credit is granted for the successful completion of 10 contact hours per course.
  • The standard requirement for one course is for students to spend 10 to 14 hours in weekly work, including in- and out-of-classroom work, for a total of 54 hours by the end of the course. Strayer’s course design uses this requirement to meet applicable regulatory standards.

Accredited online university

Strayer University has distinct accreditations and affiliations that attest to our academic quality. We're committed to meeting quality standards, so you can earn a diploma you're proud to display. View the ACBSP student achievement information.

Estimate the cost of your degree

How much does an MSIS in Computer Security Management cost?

The cost of an MS in IS depends on a number of factors, including the price per course, the purchase of textbooks, and the scholarships and financial aid available to you. Read on for a breakdown of the costs, as well as money-saving opportunities associated with the program.

Estimate the cost of your degree

How much does an MSIS in Computer Security Management cost?

The cost of an MS in IS depends on a number of factors, including the price per course, the purchase of textbooks, and the scholarships and financial aid available to you. Read on for a breakdown of the costs, as well as money-saving opportunities associated with the program.

Expected Graduation


Approximate Total


Step 1 of 3

*Student is required to take two courses per quarter during disbursement period


*Student is required to take two courses per quarter during disbursement period

Time commitment

Calculate the approximate time commitment of your degree.

Course load ... courses/term
Classroom time ... hours/week
Terms per year ... terms
Terms to graduation ... terms

Cost analysis

Calculate the approximate cost of your degree

Tuition ...
Books ...
Fees ...
No-cost gen ed $0
Transfer credits ...
$5K scholarship $0
$4K scholarship $0
Graduation Fund $0
Brand-new laptop Included
Approximate total ...
Are you a Strayer graduate?
How much does an MSIS in Computer Security Management cost?

Program cost breakdown

The MSISA program consists of 10 courses, with the price of $2,490 per course. There are additional fees for textbooks and supplies, a $65 technology fee each term and a one-time $150 degree conferral fee.

Transfer credits

Courses from another institution may be eligible for transfer credits to Strayer, which can help reduce the number of courses you need to graduate and your overall tuition. You can transfer up to four classes toward your master’s degree. The Strayer transfer credit page has more information as well as a tool to estimate how many transfer credits you may be able to apply to your Strayer degree program.

Students enrolled in the Master of Business Administration in North Carolina or Pennsylvania may transfer up to four classes

Scholarships and financial aid

There are a number of financial aid options worth exploring on our financial aid page. To apply for federal aid, prospective students should fill out the Free Application for Federal Student Aid (FAFSA) form. Stafford loans are available for graduate study. These are direct unsubsidized loans, not based on financial need. Unlike subsidized loans, Stafford loan interest will accrue while in the program. Making interest payments while in school will help reduce the amount of principal that would otherwise build up, reducing your end cost.

There are also scholarships and private loans available for Strayer students.

More than 500 organizations invest in their employees by partnering with Strayer University to offer access to tuition savings and other eductional benefits. If your employer is a corporate partner, you may qualify for programs that can help you discover career pathways in your field.

Private loans

Non-federal loans may pay the difference between the cost of attendance and the total of loans and grants received from other tuition assistance programs. The terms and conditions of federal loans are often more favorable than private loans and should be considered before exploring private loans.

Military tuition assistance

Scholarships are offered to eligible students currently serving in the military, as well as military spouses. Strayer is also approved by Veterans Affairs to accept and process veteran education benefits. Learn more about the Strayer University active military assistance program here.

Veteran benefits

In addition to participating fully in the Yellow Ribbon Program, Strayer is approved by Veterans Affairs to accept and process veteran education benefits. Student veterans can receive transfer credit for military training and life experiences.

What coursework do you need to specialize in computer security?

Our computer security management master’s coursework can give you a combination of skills to address the risks and threats of web-based apps and social networks. You’ll learn how to identify the security measures necessary to develop effective information safety systems and policies. View all courses.

All MSIS students take a set list of required courses. The remaining credits come from their choice of concentration.

Required MSIS courses

CIS 534 - Advanced Network Security Design

This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.

CIS 542 - Web Application Security

This course addresses the risks, threats and vulnerabilities for web-based applications and the people who use them. This course presents security strategies to mitigate the risk associated with web applications and social networking. Topics also include a review of the evolutionary changes that have occurred in computing, communications, and social networking and securing systems against risks, threats and vulnerabilities associated with web-enabled applications.

CIS 552 - Cybercrime Techniques & Response

This course examines the threats, crimes and other abuses that are present in the cyber realm. Topics include identifying the bad actors in cyberspace, examining how they used the internet for criminal activity, and evaluating techniques in preventing crime and abuse. Students will explore different types of cyberattacks and their characteristics. PREREQUISITE: CIS 502

CIS 510 - Advanced Systems Analysis and Design

This course provides an integrated approach to system analysis and design processes. Students will explore advanced topics to evaluate and select system development methodologies and design system solutions. The role of effective interpersonal communication techniques and integration practices with users and user systems is emphasized.

CIS 515 - Strategic Planning for Database Systems

This course covers the concepts, issues, principles and techniques for managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Emphasis will be placed on the application and strategic use of database systems.

CIS 599 - Graduate Information Systems Capstone

This course is an integrative capstone course for the Master of Science in Information Systems program. Students will examine and address real-world projects and problems and apply project management techniques to create practical solutions. The course takes an integrative and senior management approach to address the integration of a broad range of technologies inclusive of databases, security, networking, computer infrastructure and human computer interaction.

What can you do with an MSIS, Computer Security Management degree?

Your education can help you pursue your professional and personal goals. While Strayer cannot guarantee that a graduate will secure any specific career outcome, such as a job title, promotion or salary increase, we encourage you to explore the potential impact you can have in the information systems field.

Versatile skills for your future

The computer security management concentration can provide the skills to help you safeguard computer network systems against malware, intruders and other threats.

In addition, students who complete this concentration will be prepared to:

  • Verify the functionality of data processing activities and security measures by conducting risk assessments and tests on data processing systems.
  • Create documentation for computer security and emergency measures policies, procedures and tests.
  • Manage data file use and control access to computer files to protect information.
  • Conduct analyses of web service network traffic or waveforms to identify anomalies.
  • Develop computer information resources, support data security, strategic computing and disaster recovery.
  • Meet with users, management, vendors and technicians to evaluate computing needs and system requirements.
  • Review an organization’s technology use and suggest enhancements, including hardware and software upgrades.
  • Determine project feasibility and requirements based on data processing proposals.


of Strayer master’s alumni agree that Strayer was the right choice for earning their degree.

Alumni Survey 2022

MSIS admission requirements

Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university. 

A completed application and enrollment agreement, as applicable

Proof of a completed baccalaureate degree from an accredited college or university with a cumulative GPA of 2.50 out of 4.0

Official copies of transcripts from all other colleges or universities attended

A valid, current and legible government-issued photo identification

Learn more about the admission process at Strayer.

Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.

Transferring to Strayer from another university?

Some or all of the credits you’ve earned may be transferable.

International MSIS students

We welcome international students.

Campus locations

Come to a campus near you for guidance and support. You’ll have access to helpful resources, a supportive community and plenty of spaces to learn and grow.

Ready to take the next step?

Your admissions officer is here to guide you through every step of the process, from completing your application to choosing your concentration.