Online Master of Science in Information Systems Computer Security Management
this may take a few seconds...
Identify online threats to solve real-world problems
If you’re battling cybercrime and hackers, you need a good defense – and a good offense. Earning a Master’s Degree In Computer Security Management from Strayer University will introduce you to the latest network encryption and data monitoring techniques. This program can help prepare you to protect computer network systems from malware, intruders and more.
Spring classes start on April 5
Program at a glance
11-week courses in the program
Cost per course
Earn your degree online with Strayer
It’s not all fun and games online
Email attachments, web-enabled applications, addictive new games – potentially harmless, yet all possible avenues for bad actors to try to gain access to network systems. You can learn how hackers exploit weaknesses to steal and corrupt data, and the ways to fight back with an MS in Information Systems, Computer Security Management concentration.
Build your skills
- Improve your ability to design firewalls and network security systems.
- Analyze system vulnerabilities, counteract and remove Trojans, backdoors and malware.
- Identify network security tools and discuss techniques for developing computer security systems.
- Assess firewall design strategies and design a secure network.
- Explore web application security, including social networking applications.
1:1 attention you deserve
Our professors promise you a personalized learning experience that keeps you connected, engaged and moving forward.
A real student community
Experience online and live discussions, receive mentoring, expand your professional networks and create lifelong friendships.
The high-quality higher education you deserve
Affording your degree
At Strayer, you’ll find plenty of ways to make your tuition affordable, so you can worry less about your budget and get down to business.
cost per course
degree conferral (one-time only)
technology fee (one per term)
Ways to reduce your cost
Transfer up to 4 classes toward your master's degree.
Save up to 25% off the cost of select master’s degrees. Eligibility rules apply.
Protect valuable digital information
Our computer security management master’s coursework can give you a combination of skills to address the risks and threats of web-based apps and social networks. You’ll learn how to identify the security measures necessary to develop effective information safety systems and policies. View all courses.
This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.
This course addresses the risks, threats and vulnerabilities for web-based applications and the people who use them. This course presents security strategies to mitigate the risk associated with web applications and social networking. Topics also include a review of the evolutionary changes that have occurred in computing, communications, and social networking and securing systems against risks, threats and vulnerabilities associated with web-enabled applications.
Examine the landscape, key terms and concepts of computer hackers and the criminals who break into networks, steal information and corrupt data. Topics include the various vulnerabilities of operating systems, software and networks used by hackers to access unauthorized information and resources. Compare incident handling methods to use when information security is compromised.
This course provides an integrated approach to system analysis and design processes. Students will explore advanced topics to evaluate and select system development methodologies and design system solutions. The role of effective interpersonal communication techniques and integration practices with users and user systems is emphasized.
This course covers the concepts, issues, principles and techniques for managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Emphasis will be placed on the application and strategic use of database systems.
This course is an integrative capstone course for the Master of Science in Information Systems program. Students will examine and address real-world projects and problems and apply project management techniques to create practical solutions. The course takes an integrative and senior management approach to address the integration of a broad range of technologies inclusive of databases, security, networking, computer infrastructure and human computer interaction.
Master’s admission requirements
Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
We welcome more than 1,200 international students from more than 110 countries.
Experience the Strayer difference
Make every credit count
Strayer makes it easy to transfer college credits you already have, up to 28 bachelor’s classes, to help save time and money.