inline-defaultCreated with Sketch.

This website uses cookies to ensure you get the best experience on our website.

Students
Tuition Fee
Start Date
Medium of studying
Fully Online
Duration
2 months
Program Facts
Program Details
Degree
Masters
Major
Cybersecurity | Network Security | Systems Administration
Area of study
Information and Communication Technologies
Education type
Fully Online
Course Language
English
About Program

Program Overview


The Strayer University MSIS in Computer Security Management program equips students with the skills to protect computer network systems from threats like malware and intruders. Graduates are prepared for careers as Security Analysts, Cybersecurity Specialists, and more in industries like finance and healthcare. The online program offers flexible learning and consists of 12 courses covering topics such as advanced network security design, web application security, and cybercrime techniques.

Program Outline

The program aims to prepare graduates to protect computer network systems from malware, intruders, and other threats.

  • Objectives: The program aims to develop students' abilities to:
  • Design firewalls and network security systems.
  • Analyze system vulnerabilities and counteract threats like Trojans, backdoors, and malware.
  • Identify network security tools and discuss techniques for developing computer security systems.
  • Assess firewall design strategies and design secure networks.

Outline:

  • Content: The program covers a range of topics related to computer security management, including:
  • Advanced Network Security Design
  • Web Application Security
  • Cybercrime Techniques & Response
  • Advanced Systems Analysis and Design
  • Strategic Planning for Database Systems
  • Graduate Information Systems Capstone
  • Structure: The program consists of 12 courses, each lasting 11 weeks.
  • The number of courses taken per term determines the overall program length.
  • Course Schedule: The program is offered online, allowing students to learn on their own terms.
  • CIS 542 - Web Application Security: This course addresses the risks, threats, and vulnerabilities associated with web-based applications and their users.
  • It presents security strategies to mitigate risks and includes a review of changes in computing, communications, and social networking.
  • CIS 552 - Cybercrime Techniques & Response: This course examines threats, crimes, and abuses in the cyber realm.
  • It covers identifying cybercriminals, examining their methods, and evaluating techniques for preventing crime and abuse. Students explore different types of cyberattacks and their characteristics.
  • CIS 510 - Advanced Systems Analysis and Design: This course provides an integrated approach to system analysis and design processes.
  • Students explore advanced topics for evaluating and selecting system development methodologies and designing system solutions. It emphasizes effective communication techniques and integration practices with users and systems. Emphasis is placed on the application and strategic use of database systems. Students examine and address real-world projects and problems, applying project management techniques to create practical solutions. However, it states that the program is offered online, suggesting that online learning methods are employed.

Careers:

  • Potential Career Paths: The program prepares graduates for careers in computer security management, including roles such as:
  • Security Analyst
  • Cybersecurity Specialist
  • Network Security Engineer
  • Penetration Tester
  • Opportunities: Graduates with an MSIS in Computer Security Management can find opportunities in various industries, including:
  • Financial institutions
  • Healthcare organizations
  • Government agencies
  • Technology companies
  • Outcomes: The program aims to equip graduates with the skills and knowledge necessary to:
  • Protect computer network systems from threats.
  • Conduct risk assessments and tests on data processing systems.
  • Analyze network traffic to identify anomalies.
  • Evaluate computing needs and system requirements.
  • Suggest technology enhancements and upgrades.
  • Determine project feasibility and requirements.

Other:

  • Class Size: The context mentions that class size varies based on course objectives and teaching demands.
  • Accreditation: Strayer University is accredited by the Middle States Commission on Higher Education (MSCHE).
SHOW MORE
Admission Requirements

Entry Requirements:

  • A completed application and enrollment agreement, as applicable
  • Proof of a completed baccalaureate degree from an accredited college or university with a cumulative GPA of 2.50 out of 4.0
  • Official copies of transcripts from all other colleges or universities attended
  • A valid, current and legible government-issued photo identification
  • Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Location
How can I help you today?