Master of Science in Information Security and Assurance
The Master of Science in Information Security and Assurance program is an exciting educational option for students looking to increase their understanding, advance their careers and expand their opportunities in the world of information assurance and computing security. The Master of Science in Information Security and Assurance program prepares cybersecurity professionals to provide leadership as organizations provision, operate, protect and defend their information technology systems. Students in the program are exposed to technologies and strategies necessary to administer and maintain effective and efficient information technology system performance and security. Students are likewise exposed to real world cybersecurity case studies, lab settings, and advanced techniques to identify threats, investigate cybersecurity events or crimes and mitigate their impact on information technology systems.
Disclaimers
Students who have not had courses in certain areas may be required to take additional coursework as a prerequisite for completing some of the concentrations.
The Master of Science in Information Security and Assurance program will require computer literacy skills (such as word processing and use of spread sheets or databases) that are expected of information assurance professionals in the technology workplace. Students entering the program are expected to have a good knowledge of MS Office or equivalent.
This program is not available in all states. See www.strayer.edu for the latest information regarding program availability. This program is available in an online only format in Louisiana, Maryland, Mississippi, New Jersey, North Carolina, Oklahoma, Pennsylvania, Virginia and West Virginia.
Credits earned from Strayer University do not automatically qualify the holder to participate in professional licensing examinations to practice certain information systems professions. General information about information systems licensure options is available from vendor-specific websites such as Microsoft, Cisco, Project Management Institute, CompTIA or EC-Council.
The university recognizes that the IT industry uses IT certifications as a means of vetting potential IT professionals in the fields of computer networks, database management, network security, technical support and more. Therefore, a number of carefully chosen courses have embedded IT certification training along with academic rigor in order to prepare students for certification. Review the graduate-level CIS course descriptions in the course descriptions section of this catalog to determine which courses in this program have certification training availability and the requirements associated with each course. Certifications are the best means of validating a student's skills and knowledge.
Requirements
Required Courses
CIS 502 | Theories of Security Management | |
CIS 512 | Advanced Computer Architecture | |
CIS 527 | IT Risk Management | |
CIS 534 | Advanced Network Security Design | |
CIS 542 | Web Application Security | |
CIS 552 | Cybercrime Techniques and Response | |
CIS 560 | Security Access and Control Strategies | |
CIS 562 | Computer Forensics Planning | |
CIS 565 | Cryptography | |
CIS 598 | Graduate Information Assurance Capstone | |
Total Credit Hours: | 45.0 |
All courses are 4.5 quarter credit hours.