Online Master of Science in Information Systems Computer Forensic Management
this may take a few seconds...
Stop cybercriminals in their tracks
How can you chase the criminal when a crime is committed online? Cyber forensics professionals help spearhead the critical work that drives the discovery, investigation and solution of digital theft, sabotage – even terrorism. The computer forensic management concentration of our MS in Information Systems program puts you on the front lines of the battle for data security, privacy and protection.
Spring classes start on April 5
Program at a glance
11-week courses in the program
Cost per course
Earn your degree online with Strayer
Help protect and serve your business interests
Dig into the methods that solve cybercrimes and keep new crimes from happening – leading computer forensic investigations, protecting digital data, identifying network vulnerabilities and developing countermeasure strategies to prevent information and data breaches.
Build your skills
- Understand and apply the control objectives for information and related technology framework to perform IT audits.
- Describe information technology general controls based on the Information Technology Infrastructure Library best practices.
- Identify the computer investigation process.
- Compare the various types of cybersecurity tools.
- Demonstrate the ability to develop procedural techniques in crime and incident scenes.
1:1 attention you deserve
Our professors promise you a personalized learning experience that keeps you connected, engaged and moving forward.
A real student community
Experience online and live discussions, receive mentoring, expand your professional networks and create lifelong friendships.
The high-quality higher education you deserve
Affording your degree
At Strayer, you’ll find plenty of ways to make your tuition affordable, so you can worry less about your budget and get down to business.
cost per course
degree conferral (one-time only)
technology fee (one per term)
Ways to reduce your cost
Transfer up to 4 classes toward your master's degree.
Save up to 25% off the cost of select master’s degrees. Eligibility rules apply.
Capture cloud-based criminals
When you earn an online computer forensic management degree at Strayer University, you’ll learn how forensic experts identify, track and catch cybercriminals, while honing your eye to detect weak spots that allow these troublemakers into private data caches. View all courses.
This course focuses on establishing the framework to audit, secure and ensure internal controls in an information technology environment. Topics include the technical and professional issues in the context of technology-driven audits, security, privacy, business continuity, legislative and governance changes.
This course presents typical cyber operations including access and control, where ethical dilemmas arise and provides tools for legal and ethical decision making. Topics include various stages of a cyber operation, U.S. regulations and ethical implications of granting access and control. Students will explore the authorities, roles and steps associated with ethical cyber operations.
This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab, investigating computer and cybercrime, tools, techniques and methods used to perform forensic investigations and concepts for collecting, analyzing, recovering and preserving forensic evidence.
This course provides an integrated approach to system analysis and design processes. Students will explore advanced topics to evaluate and select system development methodologies and design system solutions. The role of effective interpersonal communication techniques and integration practices with users and user systems is emphasized.
This course covers the concepts, issues, principles and techniques for managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Emphasis will be placed on the application and strategic use of database systems.
This course is an integrative capstone course for the Master of Science in Information Systems program. Students will examine and address real-world projects and problems and apply project management techniques to create practical solutions. The course takes an integrative and senior management approach to address the integration of a broad range of technologies inclusive of databases, security, networking, computer infrastructure and human computer interaction.
Master’s admission requirements
Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
We welcome more than 1,200 international students from more than 110 countries.
Experience the Strayer difference
Make every credit count
Strayer makes it easy to transfer college credits you already have, up to 28 bachelor’s classes, to help save time and money.