An online computer security management degree will give you the knowledge, skills, legal background, and ethical principles necessary to identify threats and develop effective information systems policies. Your Master of Computer Security Management will help you:

  • Improve your ability to design firewalls and network security systems.
  • Analyze system vulnerabilities, counteract and remove Trojans, backdoors, and malware
  • Gain additional competencies necessary to lead, manage, and support the computing security challenges faced by organizations of all sizes
  • Explain the fundamental concepts of network security and associated ethical issues in addressing exploits
  • Describe the impact that malicious exploits and attacks have on computer network security
  • Identify network security tools and discuss techniques for developing computer security systems
  • Assess firewall design strategies and design a secure network
  • Describe computer network security implementation strategies and the roles they play in the computer security systems life cycle
  • Explore web application security, including social networking applications
  • Analyze system vulnerabilities exploited by hackers
  • Design plans that remove Trojans, backdoors, and malware from infected systems
  • Explain the process and related tools of network traffic analysis and sniffing
  • Analyze wireless network vulnerabilities exploited by hackers
  • Examine the appropriate methods for performing incident handling


Transfer with ease

Already have IT certifications? You may be eligible to apply transfer credits toward your degree in three seamless steps. View the certifications we offer transfer credit for.

Get certified for less

Gain the skills you need to take select IT certification exams, including PMI, CompTIA, Microsoft©, and Cisco®. Plus, earn a discounted exam voucher to help cover the cost. 


Summer Classes Start:

July 6

Courses to Complete:


Cost Per Course:




  • CIS 534 - Advanced Network Security Design

    Examine strategies to design networking security, Virtual Private Networks (VPNs), and firewalls for securing a network. Review different types of VPNs for securing data, as well as security-related themes. Topics also include the benefits, architecture and implementation strategies of VPNs and the configuration, administration, utility and limitations of firewalls.

  • CIS 542 - Web Application Security

    Address the risks and threats to and vulnerabilities of Web-based applications and the people who use them. Discuss security strategies to mitigate the risk associated with Web applications and social networking. Topics also include a review of the evolutionary changes that have occurred in computing, communications and social networking; and securing systems against risks, threats and vulnerabilities associated with Web-enabled applications.

  • CIS 552 - Cybercrime Techniques & Response

    Examine the landscape, key terms and concepts of computer hackers and the criminals who break into networks, steal information and corrupt data. Topics include the various vulnerabilities of operating systems, software and networks, and the used by hackers to access unauthorized information and resources. Compare incident handling methods to use when information security is compromised.


  • CIS 500 - Information Systems for Decision Making

    Examine the strategic use and trends of organizational information systems with emphasis on the application of information technology. Study key computing concepts in the strategic context in which information technology is used with emphasis on how information technology enables improvement in quality, timeliness and competitive advantage.

  • CIS 502 - Theories of Security Management

    Prerequisite: CIS 500

    Explore current and emerging theories in security management. Topics include the policies, guidance, technologies and organizational concerns that security managers must address in leading and providing secure computing environments. Discuss topics such as access control, security architecture, cryptography and the CISSP Common Body of Knowledge.


    Discuss trends and topics in computer communications. Use a balance of technical foundations and business practices to develop a managerial level of knowledge in data communications. Topics also include networking, distributed applications, network management, security and network operating systems.

  • CIS 510 - Advanced Systems Analysis and Design

    Get an integrated approach to system analysis and design processes. Explore advanced topics to evaluate and select system development methodologies and design system solutions. Focus on the role of effective interpersonal communication techniques and integration practices with users and user systems.

  • CIS 512 - Advanced Computer Architecture

    Examine the structure and operation of computers in the context of the enterprise solutions. Focus on strategies to select, deploy, integrate and administer platforms or components to support the organizations computing infrastructure. Topics include the framework and strategic trends essential to the administration of hardware; services provided by the operating system; and computer interaction.

  • CIS 515 - Strategic Planning for Database Systems

    Explore the concepts, issues, principles and techniques around managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Focus on the application and strategic use of database systems.

  • CIS 517 - IT Project Management

    Get a practical and theoretical foundation for applying project management techniques to Information Technology projects. The course puts a managerial emphasis on the Project Management Institute Project Management Body of Knowledge (PMBOK) knowledge areas, with practical application of project management tools and software to address information technology opportunities.

  • CIS 524 - Computer Interaction and Design

    Understand the concepts, theory and design behind human-computer interaction (HCI) to address organizational issues. Learn the practical principles and guidelines to develop high quality interface designs that users can understand, predict and control. Topics include a strategic and tactical assessment of expert reviews, usability testing, direct manipulation, menu selection and form design. Address current HCI topics with a balanced emphasis on mobile devices, Web and desktop platforms.

  • CIS 599 - Graduate Information Systems Capstone

    Prerequisite: To be taken last or next to last;a grade of 'B' or higheris required.

    Examine and address real-world projects and problems and apply project management techniques to create practical solutions. Take an integrative and senior management approach to address the integration of a broad range of technologies, including databases, security, networking, computer infrastructure and human computer interaction.


Want to fight cybercrime and hackers? The best offense is an excellent defense. Your computer security management degree from Strayer University prepares you to protect computer network systems from viruses, intruders, and other threats through network encryption and data monitoring techniques.

Your fellow employees love downloading new games and tools. They also spend a lot of company time on social media. You’ll analyze the strategies used to diminish threats and risks related to the Web-enabled applications and social networks that have become integrated into the day-to-day, hour-to-hour workday experience.

Your online program takes you into the known vulnerabilities of various networks and operating systems. You’ll see how hackers exploit those weaknesses to steal and corrupt data, and cause other kinds of digital mayhem.

Information is a valuable asset. Fortunately for your company, so is your Strayer education. Protect the integrity of information systems with your Strayer computer security management degree.



Each online Master of Information Systems Concentration can provide you with skills you’ll be able to apply immediately. You may want to explore these other Master of Information Systems concentrations.

Master of Science in Information Systems


U.S. Military Affiliation

Do you have transfer credits?

You consent to receive autodialed marketing calls or text messages from Strayer University and partner school, Capella University, at the phone number you provided. Consent is not required to purchase goods or services. You can always call us at 1.866.314.3547.


Submitting your information,
this may take a few seconds...