Master of Science in Information Assurance
The Master of Science in Information Assurance program prepares its students to assess, protect and recommend safeguard solutions for an organization's information assets. Students in the program are exposed to technical leadership strategies in preventing and protecting organizational assets from cyber-attacks and developing strategies to mitigate such attacks. Graduates of the Master of Science in Information Assurance program are likewise exposed to real world information assurance case studies and advanced technologies with exposure to live lab settings.
Students who have not had courses in certain areas may be required to take additional coursework as a prerequisite for completing some of the concentrations.
The Master of Science in Information Assurance program will require computer literacy skills (such as word processing, use of spread sheets or databases) that are expected of information assurance professionals in the technology workplace. Students entering the program are expected to have a good knowledge of MS Office or equivalent.
The Master of Science in Information Assurance program is an exciting educational option for students looking to increase their understanding, advance their careers, and expand their opportunities in the world of information assurance and computing security.
This program is not available in all states. See www.strayer.edu for the latest information regarding program availability.
The university recognizes that the IT industry uses IT certifications as a means of vetting potential IT professionals in the fields of computer networks, database management, network security, technical support, and more. Therefore, a number of carefully chosen courses have embedded IT certification training along with academic rigor in order to prepare student for getting certified. Certifications are the best means of validating a student's skills and knowledge.
The National Security Agency’s (NSA) Committee on National Security Systems (CNSS) has certified that Strayer University’s security curriculum has been reviewed by the Information Assurance Courseware Evaluation Review Committee (IACE) and determined that it meets national training standards for information systems security professionals and system administrators, NSTISSI No. 4011 and 4013.
Area I-Core Component
Required Courses
CIS 500 | Information Systems for Decision-Making | |
CIS 502+ | Theories of Security Management | |
CIS 505 | Communication Technologies | |
| OR | |
CIS 512 | Advanced Computer Architecture | |
CIS 527+ | IT Risk Management | |
CIS 534 | Advanced Network Security Design | |
CIS 542+ | Web Application Security | |
CIS 552 | Cybercrime Techniques & Response | |
CIS 558+ | IT Audit and Control | |
CIS 560 | Security Access & Control Strategies | |
Total Credit Hours: | 40.5 |
Area II-Concentration Component
Components to complete the Master of Science in Information Assurance.
Information Assurance Concentration
CIS 562 | Computer Forensics Planning | |
CIS 565 | Cryptography | |
CIS 598 | Graduate Information Assurance Capstone | |
Total Credit Hours: | 13.5 |
All courses are 4.5 quarter credit hours.
Total Credit Hours: 54.0
Total Credit Hours: 54.0
+Course and certification availability subject to change. Some courses may require pre-requisites first be satisfied through completion of the course at Strayer University, transfer credit or review of previous certifications earned. Contact your Campus Dean, Associate Campus Dean, Dean of Advising, or Success Coach for additional information.