Online Master of Science in Information Assurance
this may take a few seconds...
Become a cybersecurity specialist
Internal Server Error
The server encountered an internal error and was unable to complete your request. Either the server is overloaded or there is an error in the application.
Fall classes start on October 6
Program at a glance
11-week courses in the program
Cost per course
Earn your degree online with Strayer
Learn the latest in cyberdefense
Our curriculum covers leading-edge techniques to help you assess and recommend safeguards to protect an organization's information assets. You’ll get hands-on experience defending against cyberattacks. And you’ll learn to wield technology used by hackers and terrorists to beat them at their own game.
Build your skills
- Analyze and identify security vulnerabilities and solutions.
- Design and develop effective user security and assurance plans.
- Evaluate and justify solutions to satisfy organizational needs.
- Analyze the impact of solutions on individuals, organizations, and society.
- Develop effective communication plans.
Aligned to industry certifications
Get on the path to earning your certification in CISSP, CISM, CSSLP and CISA with coursework that’s aligned with the content you’ll be tested on.
1:1 attention you deserve
Our professors promise you a human, personalized learning experience that keeps you connected, engaged and moving forward.
The high-quality higher education you deserve
Affording your degree
At Strayer, you’ll find plenty of ways to make your tuition affordable, so you can worry less about your budget and get down to business.
cost per course
degree conferral (one-time only)
technology fee (one per term)
Ways to reduce your cost
Transfer up to 4 classes toward your master's degree.
You may be eligible to save $6,000 on your tuition.
Save up to 25% off the cost of select master’s degrees. Eligibility rules apply.
This course examines the structure and operation of digital computers in the context of the enterprise solutions. Emphasis will be placed on strategies to select, deploy, integrate and administer platforms or components to support the organization's computing infrastructure. Topics include the framework and strategic trends essential to the administration of hardware, services provided by the operating system and computer interaction.
This course examines strategies to design networking security, Virtual Private Networks (VPNs) and firewalls for securing a network. Different types of VPNs for securing data are reviewed as are security-related themes. Topics also include the benefits, architecture and implementation strategies of VPNs and the configuration, administration, utility and limitations of firewalls.
This course presents the concept of access control to protect information systems and applications from unauthorized viewing, tampering or destruction. This course defines the components of access control, provides a business framework for implementation and discusses legal requirements that impact access control programs. Topics include the risks, threats and vulnerabilities prevalent in information systems and IT infrastructures and how to mitigate these
Internal Server Error
The server encountered an internal error and was unable to complete your request. Either the server is overloaded or there is an error in the application.including tokens, biometrics and use of public key infrastructures will be covered.
This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab; investigating computer and cyber crime; tools, techniques and methods used to perform forensic investigations; and concepts for collecting, analyzing, recovering and preserving forensic evidence.
The course covers cryptography from historical, applied and theoretical approaches. Topics include the symmetric and asymmetric encryption techniques that include classical and modern algorithms. This course explores further the framework and practice of using cryptography in securing networks over the Internet and organizational settings. Legal and ethical issues are explored as are techniques that protect computing systems from security threats.
This course is an integrative capstone course for the Master of Science in Information Assurance program. Students will examine and solve real-world information assurance problems and apply associated techniques to create practical solutions. The course takes an integrative and senior security officer approach to address the policy, risk and control opportunities within cyberspace and IT environments.
Master’s admission requirements
Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
We welcome more than 1,200 international students from more than 110 countries.
A real student community
Experience online and live discussions, receive mentoring, expand your professional networks and create life-long friendships.