MS in Information Systems - Computer Security Management Concentration
Strayer University's Master of Science in Information Systems with a Concentration in Computer Security Management program is designed to teach students management and technological skills for the computer information systems industry. Learn more about Strayer University's Master of Science in Information Systems with a Concentration in Computer Security Management program here.
Official Program Name:
Master of Science in Information Systems with a Concentration in Computer Security Management
School Offering Program:
Students interested in applying to the Master of Science in Information Systems with a Concentration in Computer Security Management program may already have an information technology background or senior management experience. Applicants to Strayer University should have already earned a high school diploma or equivalent; however, graduate or specialized programs may have additional requirements.
The Master of Science in Information Systems with a Concentration in Computer Security Management program at Strayer University offers students the opportunity to learn about computer and network architectures, managing information technology projects, and the various types of information needed at the operational, strategic, and administrative levels. Computer security management coursework covers security management theories, policies and technologies that pose security concerns, methods of providing security in distributed computing environments, and case study analysis. The program also offers students the opportunity to gain skills in research methodology and APA writing and requires a directed research project.
Online and Campus-Based
Total Credits Required:
Students enrolled in Strayer University may be eligible for federal grants and loans, employer tuition assistance, military benefits, state grants, institutional scholarships, and private loans.
Required Courses for a Master of Science in Information Systems with a Concentration in Computer Security Management:
Degree program and course requirements are subject to change. Contact Strayer University to confirm the most accurate information before enrolling in a program.
Area I - Core Component (18 credits)
- ACC 557: Financial Accounting
- CIS 500: Information Systems for Decision-Making
- ECO 550: Managerial Economics and Globalization
- MAT 540: Quantitative Methods
Area II - Major Component (22.5 credits)
- CIS 512: Enterprise Architecture
- CIS 517: IT Project Management
- CIS 532: Network Architecture and Analysis
- CIS 590: Directed Research Project
- RES 531: Research Methods
Area III - Concentration Component (13.5 credits)
- CIS 502: Theories of Security Management
- CIS 523: Security in Distributed Computing
- CIS 550: Case Studies in the Management of Information Security
After successful completion of the Master of Science in Information Systems with a Concentration in Computer Security Management program at Strayer University, graduates may choose to seek several positions in the information security field. Examples of positions graduates may wish to pursue include:
- Information Security Manager
- Senior Systems Analyst
- Network Architect
- Network Engineer
Tuition, Financial Aid & Start Dates
Since every student is different, there isn't a "one size fits all" for school information. Start dates and tuition often vary between selected programs, and financial aid opportunities are unique to each student's circumstances. to get the most up-to-date and accurate information based on your selected program and circumstances.
Still have questions?
Complete and get your answers and advice.