Online Master of Science in Information Security and Assurance
this may take a few seconds...
Become a cybersecurity specialist
Complex information systems need defenders who can assess threats, prevent attacks and develop strategies to mitigate risks when they occur. With a Master of Science in Information Assurance, you can expand your knowledge to help safeguard your organization’s data and stay a step ahead of cybercriminals.
Spring classes start on April 5
Program at a glance
11-week courses in the program
Cost per course
Earn your degree online with Strayer
Learn the latest in cyberdefense
Our curriculum covers leading-edge techniques to help you assess and recommend safeguards to protect an organization's information assets. You’ll get hands-on experience defending against cyberattacks. And you’ll learn to wield technology used by hackers and terrorists to beat them at their own game.
Build your skills
- Analyze and identify security vulnerabilities and solutions.
- Design and develop effective user security and assurance plans.
- Evaluate and justify solutions to satisfy organizational needs.
- Analyze the impact of solutions on individuals, organizations, and society.
- Develop effective communication plans.
Aligned to industry certifications
Get on the path to earning your certification in CISSP, CISM, CSSLP and CISA with coursework that’s aligned with the content you’ll be tested on.
1:1 attention you deserve
Our professors promise you a personalized learning experience that keeps you connected, engaged and moving forward.
The high-quality higher education you deserve
Affording your degree
At Strayer, you’ll find plenty of ways to make your tuition affordable, so you can worry less about your budget and get down to business.
cost per course
degree conferral (one-time only)
technology fee (one per term)
Ways to reduce your cost
Transfer up to 4 classes toward your master's degree.
Save up to 25% off the cost of select master’s degrees. Eligibility rules apply.
This course examines the structure and operation of digital computers in the context of providing data and infrastructure security. Emphasis will be placed on strategies to select, deploy, integrate and administer modern computing environments to support the organization's overall security posture. Topics include hardware components of modern computing environments and their deployment in compliance with applicable cybersecurity laws and policies.
This course examines strategies to design, administer and maintain a comprehensive enterprise security infrastructure. Topics related to protection of information technology assets and infrastructure from external and internal threats are included.
This course presents typical cyber operations including access and control, where ethical dilemmas arise and provides tools for legal and ethical decision making. Topics include various stages of a cyber operation, U.S. regulations and ethical implications of granting access and control. Students will explore the authorities, roles and steps associated with ethical cyber operations.
This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab, investigating computer and cybercrime, tools, techniques and methods used to perform forensic investigations and concepts for collecting, analyzing, recovering and preserving forensic evidence.
This course covers cryptography from historical, applied, and theoretical perspectives. Topics include symmetric and asymmetric encryption techniques that include classical and modern algorithms. This course explores the framework and practice of using cryptography in securing information in organizational settings.
In this integrative capstone course, students will examine and solve real-world cybersecurity problems and apply associated techniques to create practical solutions. The course takes an integrative, senior security officer approach to address the policy, risk and control opportunities within cyberspace and IT environments.
Master’s admission requirements
Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
We welcome more than 1,200 international students from more than 110 countries.
A real student community
Experience online and live discussions, receive mentoring, expand your professional networks and create life-long friendships.