BS in Information Systems - Cyber Security Management
Strayer University has created the Bachelor of Science in Information Systems with a concentration in Cyber Security Management program for aspiring technology professionals who want to first pursue their educational goals.
Official Program Name:
Bachelor of Science in Information Systems with a concentration in Cyber Security Management
School Offering Program:
Students who apply to this program should be analytical thinkers who have an interest in networking and computers. Good mechanical aptitude and mathematical skills could prove equally important. They should have already earned a high school diploma or equivalent; however, graduate or specialized programs may have additional requirements.
This program consists of major, core, and concentration courses as well as general education subjects. The program is designed to teach database design and management concepts as well as inform aspiring information systems professionals how to ensure the security of business computer networks. Not only do students find out how to safeguard sensitive data assets for given companies, they could also explore disaster recovery techniques and crisis management strategies. Topics include system administration and IT investment analysis, along with homeland security practices as they relate to the field of cyberspace security.
Online and Campus-Based
180 quarter credits.
Students enrolled in Strayer University may be eligible for federal grants and loans, employer tuition assistance, military benefits, state grants, institutional scholarships, and private loans.
Tuition, Financial Aid & Start Dates
Since every student is different, there isn't a "one size fits all" for school information. Start dates and tuition often vary between selected programs, and financial aid opportunities are unique to each student's circumstances. to get the most up-to-date and accurate information based on your selected program and circumstances.
Still Have Questions?
Complete and get your answers and advice.
Required Courses for a Bachelor of Science in Information Systems with a concentration in Cyber Security Management:
Program and course requirements are subject to change. Contact Strayer University to confirm the most accurate information before enrolling in a program.
Area I - Core Component Courses (27 credits)
- ACC 100: Accounting I
- BUS 100: Introduction to Business
- CIS 106: Introduction to Information Technology
- CIS 109: Introduction to Management Information Systems
- ENG 115: English Composition
- MAT 104: Algebra with Applications
Area II - Major Component Courses (36 credits)
- CIS 111: Introduction to Relational Database Management Systems
- CIS 175: Introduction to Networking
- CIS 210: Systems Analysis and Development
- CIS 333: Network Security Fundamentals
- CIS 336: Enterprise Architecture
- CIS 348: Information Technology Project Management
- CIS 349: Information Technology Audit & Control
- CIS 499: Undergraduate Information Systems Capstone
Area II - Cyber Security Management Concentration Component Courses (18 credits)
- CIS 359: Disaster Recovery
- CIS 438: Information Security Legal Issues
- CIS 462: Security Strategy & Policy
- SEC 402: Cyber Security
Area III - General Education Component Courses (54 credits)
- ENG 215: Research & Writing
- ENG 315: Professional Communications OR ENG 316: Technical Writing (Required for IS)
- HIS 105: Contemporary U.S. History OR POL 110: U.S. Government
- HUM 111: World Cultures I
- HUM 112: World Cultures II
- MAT 300: Statistics
- PHI 210: Critical Thinking
- PSY 100: Psychology of Adjustment OR PSY 105: Introduction to Psychology
- REL 212: World Religions
- SCI 110: Introduction to Physical Science OR SCI 115: Introduction to Biology
- SOC 100: Introduction to Sociology
- ECO 405: Economic Problems & Issues OR POL 300: Contemporary International Problems OR SOC 300: Sociology of Developing Countries
Area IV - Elective Component Courses (45 credits)
- Enrollees who attend campuses in New Jersey are required to take five of the following General Studies elective courses: Psychology, Foreign Language, English, Economics, Humanities, History, Philosophy, Mathematics, Science, Religion, Sociology, and Political Science.
Furthering Your Education:
Individuals who might want to pursue leadership roles in threat control and data privacy could apply to related master's degree programs. Course topics could include business analytics, risk assessment, wireless security, network security engineering, and project management.
Graduates can research schools with programs such as:
- Master of Science in Information Security
- Master of Science in Management Information Systems
- Master of Science in Information Assurance
With an educational background that includes this degree, job-seekers might be able to pursue various technology-based opportunities. Responsibilities could be sought in such areas as quality assurance, threat assessment, virtual crisis response, or data analysis.
Graduates could explore career titles that include:
- Information Security Officer
- Information Technology Security Analyst
- Information Security Specialist
- Data Security Administrator
- Information Security Manager