Online Master of Science in Information Systems Computer Forensic Management
this may take a few seconds...
Stop cybercriminals in their tracks
Internal Server Error
The server encountered an internal error and was unable to complete your request. Either the server is overloaded or there is an error in the application.
Fall classes start on October 6
Program at a glance
11-week courses in the program
Cost per course
Earn your degree online with Strayer
Help protect and serve your business interests
Dig into the methods that solve cybercrimes and keep new crimes from happening – leading computer forensic investigations, protecting digital data, identifying network vulnerabilities and developing countermeasure strategies to prevent information and data breaches.
Build your skills
- Understand and apply the control objectives for information and related technology framework to perform IT audits.
- Describe information technology general controls based on the Information Technology Infrastructure Library best practices.
- Identify the computer investigation process.
- Compare the various types of cybersecurity tools.
- Demonstrate the ability to develop procedural techniques in crime and incident scenes.
1:1 attention you deserve
Our professors promise you a human, personalized learning experience that keeps you connected, engaged and moving forward.
A real student community
Experience online and live discussions, receive mentoring, expand your professional networks and create lifelong friendships.
The high-quality higher education you deserve
Affording your degree
At Strayer, you’ll find plenty of ways to make your tuition affordable, so you can worry less about your budget and get down to business.
cost per course
degree conferral (one-time only)
technology fee (one per term)
Ways to reduce your cost
Transfer up to 4 classes toward your master's degree.
You may be eligible to save $6,000 on your tuition.
Save up to 25% off the cost of select master’s degrees. Eligibility rules apply.
Capture cloud-based criminals
Internal Server Error
The server encountered an internal error and was unable to complete your request. Either the server is overloaded or there is an error in the application.Strayer University, you’ll learn how forensic experts identify, track and catch cybercriminals, while honing your eye to detect weak spots that allow these troublemakers into private data caches. View all courses.
This course focuses on establishing the framework to audit, secure and ensure internal controls in an information technology environment. Topics include the technical and professional issues in the context of technology-driven audits, security, privacy, business continuity, legislative and governance changes.
This course presents the concept of access control to protect information systems and applications from unauthorized viewing, tampering or destruction. This course defines the components of access control, provides a business framework for implementation and discusses legal requirements that impact access control programs. Topics include the risks, threats and vulnerabilities prevalent in information systems and IT infrastructures and how to mitigate these conditions. In addition, security controls for access control including tokens, biometrics and use of public key infrastructures will be covered.
This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab; investigating computer and cyber crime; tools, techniques and methods used to perform forensic investigations; and concepts for collecting, analyzing, recovering and preserving forensic evidence.
This course provides an integrated approach to system analysis and design processes. Students will explore advanced topics to evaluate and select system development methodologies and design system solutions. The role of effective interpersonal communication techniques and integration practices with users and user systems is emphasized.
This course covers the concepts, issues, principles and techniques for managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Emphasis will be placed on the application and strategic use of database systems.
This course is an integrative capstone course for the Master of Science in Information Systems program. Students will examine and address real-world projects and problems and apply project management techniques to create practical solutions. The course takes an integrative and senior management approach to address the integration of a broad range of technologies inclusive of databases, security, networking, computer infrastructure and human computer interaction.
Master’s admission requirements
Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
We welcome more than 1,200 international students from more than 110 countries.
Experience the Strayer difference
Make every credit count
Strayer makes it easy to transfer college credits you already have, up to 28 bachelor’s classes, to help save time and money.