Online Master of Science in Information Systems (MSIS) Computer Forensic Management
this may take a few seconds...
Why earn a degree in computer forensic management from Strayer?
Cyber forensics professionals help spearhead the critical work that drives the discovery, investigation and solution of digital theft, sabotage and even terrorism. The computer forensic management concentration of our online MS in Information Systems program puts you on the front lines of the battle for data security, privacy and protection.
Spring Classes Start on April 4
Program at a glance
11-week courses in the program
Cost per course
Earn your degree online with Strayer
- Program details
- Cost & savings
Build your cyber forensic skills
When you earn an online computer forensic management degree at Strayer, you’ll learn how forensic experts identify, track and catch cybercriminals. You’ll also hone your eye to detect weak spots that allow these troublemakers into private data caches.
Is an MSIS in computer forensics good to have? It depends on what you learn.
- Understand and apply the control objectives for information and related technology framework to perform IT audits.
- Describe information technology general controls based on the Information Technology Infrastructure Library best practices.
- Identify the computer investigation process.
- Compare the various types of cybersecurity tools.
- Demonstrate the ability to develop procedural techniques in crime and incident scenes.
Class size varies based on course objectives and the teaching demands of the subject matter. In general, Strayer University aims to keep the student-to-instructor ratio low.
How long does it take to get a computer forensic management master’s degree?
- There are 12 11-week courses in this program.
- How many courses you take at a time will determine how long the overall program will be.
- Strayer University credits are expressed in quarter hours.
- One quarter hour of credit is granted for the successful completion of 10 contact hours per course.
- The standard requirement for one course is for students to spend 10 to 14 hours in weekly work, including in- and out-of-classroom work, for a total of 54 hours by the end of the course. Strayer’s course design uses this requirement to meet applicable regulatory standards.
Accredited online university
Strayer University is proud to be certified or accredited by four respected organizations. We’re committed to meeting quality standards, so you can earn an industry-recognized diploma you’re proud to display. View the ACBSP student achievement information.
Strayer University is an accredited institution and a member of the Middle States Commission on Higher Education (MSCHE), www.msche.org. Strayer University’s accreditation status is Accreditation Reaffirmed. MSCHE most recently reaffirmed Strayer University’s accreditation status in June 2017, with the next self-study evaluation scheduled for the 2025–2026 academic year.
MSCHE is an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education Accreditation (CHEA).
Estimate the cost of your degree
How much does an MSIS cost?
Estimate the cost of your degree
How much does an MSIS cost?
Eligibility Rules and Restrictions apply
*Student is required to take two courses per quarter during disbursement period
PREPARING YOUR RESULTS
Calculate the approximate time commitment of your degree.
|Course load||... courses/term|
|Classroom time||... hours/week|
|Terms per year||... terms|
|Terms to graduation||... terms|
Calculate the approximate cost of your degree
|No cost Gen-ed||$0|
Program cost breakdown
Strayer’s MSIS program consists of 12 courses, with the price of $2,490 per course. There are additional fees for textbooks and supplies, a $65 technology fee each term and a one-time $150 degree conferral fee.
Courses from another institution may be eligible for transfer credits to Strayer, which can reduce the number of courses you need to graduate and your overall tuition. You can transfer up to four classes toward your master’s degree. Strayer’s transfer credit page has more information as well as a tool to estimate how many transfer credits you may be able to apply to your Strayer degree program.
Scholarships and financial aid
There are a number of financial aid options worth exploring on our financial aid page. To apply for federal aid, prospective students should fill out the Free Application for Federal Student Aid (FAFSA) form. Stafford loans are available for graduate study. These are direct unsubsidized loans, not based on financial need. Unlike subsidized loans, Stafford loan interest will accrue while in the program. Making interest payments while in school will help reduce the amount of principal that would otherwise build up.
There are also scholarships and private loans available for Strayer students.
More than 500 organizations – including corporations and community colleges – invest in their employees by partnering with Strayer University to offer access to discounted education programs. If your employer is a Corporate Alliance Partner, you may qualify for programs that can help you advance in your company and your career.
Non-federal loans may pay the difference between the cost of attendance and the total of loans and grants received from other tuition assistance programs. The terms and conditions of federal loans are often more favorable than private loans and should be considered before exploring private loans.
Military tuition assistance
Scholarships are offered to eligible students currently serving in the military as well as military spouses. Strayer is also approved by Veterans Affairs to accept and process veteran education benefits. Learn more about Strayer’s active military assistance program here.
In addition to participating fully in the Yellow Ribbon Program, Strayer is approved by Veterans Affairs to accept and process veteran education benefits. Student veterans can receive transfer credit for military training and life experiences.
What coursework do you need to specialize in computer forensics?
Dig into the methods that solve cybercrimes and keep new crimes from happening. This program can show you how to lead computer forensic investigations, protect digital data, identify network vulnerabilities and develop countermeasure strategies to prevent information and data breaches. View all courses.
All MSIS students take a set list of required courses. The remaining credits come from their choice of concentration.
Required MSIS courses
This course focuses on establishing the framework to audit, secure and ensure internal controls in an information technology environment. Topics include the technical and professional issues in the context of technology-driven audits, security, privacy, business continuity, legislative and governance changes.
This course presents typical cyber operations including access and control, where ethical dilemmas arise and provides tools for legal and ethical decision making. Topics include various stages of a cyber operation, U.S. regulations and ethical implications of granting access and control. Students will explore the authorities, roles and steps associated with ethical cyber operations.
This course presents the systematic methods in conducting computer forensic investigations, acquiring digital data and reporting on forensic investigations. Topics include procedures to create a forensics lab, investigating computer and cybercrime, tools, techniques and methods used to perform forensic investigations and concepts for collecting, analyzing, recovering and preserving forensic evidence.
This course provides an integrated approach to system analysis and design processes. Students will explore advanced topics to evaluate and select system development methodologies and design system solutions. The role of effective interpersonal communication techniques and integration practices with users and user systems is emphasized.
This course covers the concepts, issues, principles and techniques for managing organizational data resources. Topics include the strategic information requirements of organizations, modeling those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization and converting the conceptual data models into physical databases. Emphasis will be placed on the application and strategic use of database systems.
This course is an integrative capstone course for the Master of Science in Information Systems program. Students will examine and address real-world projects and problems and apply project management techniques to create practical solutions. The course takes an integrative and senior management approach to address the integration of a broad range of technologies inclusive of databases, security, networking, computer infrastructure and human computer interaction.
MSIS admission requirements
Before you can pursue your master’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
International MSIS students
We welcome international students from around the globe.
We have 50+ campuses to serve you. While most Strayer University campus locations are currently closed due to COVID-19, select campuses have reopened for limited student services. Find an open campus near you.