Master of Science in Information Systems (MSIS) Computer Security Management
Why earn a degree in computer security management from Strayer?
Earning an MS in Information Systems with a computer security management concentration from Strayer University will introduce you to the latest network encryption and data monitoring techniques. This online program can help prepare you to protect computer network systems from malware, intruders and more.
- Program details
- Cost & savings
- Career exploration
Build your computer security skills
Email attachments, web-enabled applications, addictive new games – potentially harmless, yet they are all possible avenues for bad actors to try to gain access to network systems. You can learn how hackers exploit weaknesses to steal and corrupt data, and the ways to fight back.
Is an MSIS in computer security good to have? It depends on what you learn.
- Improve your ability to design firewalls and network security systems.
- Analyze system vulnerabilities, counteract and remove Trojans, backdoors and malware.
- Identify network security tools and discuss techniques for developing computer security systems.
- Assess firewall design strategies and design a secure network.
- Explore web application security, including social networking applications.
Class size varies based on course objectives and the teaching demands of the subject matter. In general, Strayer University aims to keep the student-to-instructor ratio low.
How long does it take to get a computer security management master’s degree?
- There are 12 11-week courses in this program.
- How many courses you take at a time will determine how long the overall program will be.
- Strayer University credits are expressed in quarter hours.
- One quarter hour of credit is granted for the successful completion of 10 contact hours per course.
- The standard requirement for one course is for students to spend 10 to 14 hours in weekly work, including in- and out-of-classroom work, for a total of 54 hours by the end of the course. Strayer’s course design uses this requirement to meet applicable regulatory standards.
Estimate the cost of your degree
How much does an MSIS in Computer Security Management cost?
Estimate the cost of your degree
How much does an MSIS in Computer Security Management cost?
*Student is required to take two courses per quarter during disbursement period
PREPARING YOUR RESULTS
Calculate the approximate time commitment of your degree.
|Terms per year
|Terms to graduation
Calculate the approximate cost of your degree
|No-cost gen ed
Program cost breakdown
The MSISA program consists of 10 courses, with the price of $2,490 per course. There are additional fees for textbooks and supplies, a $65 technology fee each term and a one-time $150 degree conferral fee.
Courses from another institution may be eligible for transfer credits to Strayer, which can help reduce the number of courses you need to graduate and your overall tuition. You can transfer up to four classes toward your master’s degree. The Strayer transfer credit page has more information as well as a tool to estimate how many transfer credits you may be able to apply to your Strayer degree program.
Students enrolled in the Master of Business Administration in North Carolina or Pennsylvania may transfer up to four classes
Scholarships and financial aid
There are a number of financial aid options worth exploring on our financial aid page. To apply for federal aid, prospective students should fill out the Free Application for Federal Student Aid (FAFSA) form. Stafford loans are available for graduate study. These are direct unsubsidized loans, not based on financial need. Unlike subsidized loans, Stafford loan interest will accrue while in the program. Making interest payments while in school will help reduce the amount of principal that would otherwise build up, reducing your end cost.
There are also scholarships and private loans available for Strayer students.
More than 500 organizations – including corporations and community colleges – invest in their employees by partnering with Strayer University to offer access to discounted education programs. If your employer is a Corporate Alliance Partner, you may qualify for programs that can help you discover career pathways in your field.
Non-federal loans may pay the difference between the cost of attendance and the total of loans and grants received from other tuition assistance programs. The terms and conditions of federal loans are often more favorable than private loans and should be considered before exploring private loans.
Military tuition assistance
Scholarships are offered to eligible students currently serving in the military, as well as military spouses. Strayer is also approved by Veterans Affairs to accept and process veteran education benefits. Learn more about the Strayer University active military assistance program here.
In addition to participating fully in the Yellow Ribbon Program, Strayer is approved by Veterans Affairs to accept and process veteran education benefits. Student veterans can receive transfer credit for military training and life experiences.
What coursework do you need to specialize in computer security?
Our computer security management master’s coursework can give you a combination of skills to address the risks and threats of web-based apps and social networks. You’ll learn how to identify the security measures necessary to develop effective information safety systems and policies. View all courses.
All MSIS students take a set list of required courses. The remaining credits come from their choice of concentration.
Required MSIS courses
This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.
This course addresses the risks, threats and vulnerabilities for web-based applications and the people who use them. This course presents security strategies to mitigate the risk associated with web applications and social networking. Topics also include a review of the evolutionary changes that have occurred in computing, communications, and social networking and securing systems against risks, threats and vulnerabilities associated with web-enabled applications.
This course examines the threats, crimes and other abuses that are present in the cyber realm. Topics include identifying the bad actors in cyberspace, examining how they used the internet for criminal activity, and evaluating techniques in preventing crime and abuse. Students will explore different types of cyberattacks and their characteristics. PREREQUISITE: CIS 502
This course provides an integrated approach to system analysis and design processes. Students will explore advanced topics to evaluate and select system development methodologies and design system solutions. The role of effective interpersonal communication techniques and integration practices with users and user systems is emphasized.
This course covers the concepts, issues, principles and techniques for managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Emphasis will be placed on the application and strategic use of database systems.
This course is an integrative capstone course for the Master of Science in Information Systems program. Students will examine and address real-world projects and problems and apply project management techniques to create practical solutions. The course takes an integrative and senior management approach to address the integration of a broad range of technologies inclusive of databases, security, networking, computer infrastructure and human computer interaction.
What can you do with an MSIS, Computer Security Management degree?
Your education can help you pursue your professional and personal goals. While Strayer cannot guarantee that a graduate will secure any specific career outcome, such as a job title, promotion or salary increase, we encourage you to explore the potential impact you can have in the information systems field.
Versatile skills for your future
The computer security management concentration can provide the skills to help you safeguard computer network systems against malware, intruders and other threats.
In addition, students who complete this concentration will be prepared to:
- Verify the functionality of data processing activities and security measures by conducting risk assessments and tests on data processing systems.
- Create documentation for computer security and emergency measures policies, procedures and tests.
- Manage data file use and control access to computer files to protect information.
- Conduct analyses of web service network traffic or waveforms to identify anomalies.
- Develop computer information resources, support data security, strategic computing and disaster recovery.
- Meet with users, management, vendors and technicians to evaluate computing needs and system requirements.
- Review an organization’s technology use and suggest enhancements, including hardware and software upgrades.
- Determine project feasibility and requirements based on data processing proposals.
MSIS admission requirements
Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
International MSIS students
We welcome international students.