Are you an IT professional looking to build management skills and increase your knowledge of technologies relating to information security, privacy, and digital data reporting and investigations? If so, then Strayer University's Master of Science in Information Systems with a concentration in Computer Forensics Management program could deliver the education you are seeking. Continue reading to find out more about this program.
<h2 id="section---FrequentlyAskedQuestions">Frequently Asked Questions</h2>
<h3 id="section---WhatKindOfProgramIsIt">What Kind of Program Is It?</h3>
<p>Courses offered in Strayer University's Master of Science in Information Systems with a concentration in Computer Forensics Management program provide advanced study in various technological concepts and systems in addition to topics in cybersecurity and digital investigative methods. Concentration courses address information systems auditing methods, risk and threat assessment methods, access control strategies, cybercrime investigative tools, data reporting and recovery, forensic evidence collecting, and business continuity planning.
</p>
<p>In core courses, you will have the opportunity to study processes and technologies in telecommunications, systems design, database administration, security architecture, and project management. More extensive exposure to concepts and methods discussed in the curriculum is reached through the development of integrative real-world projects in the program's capstone course.
</p>
<h3 id="section---WhatAreThePrerequisites">What Are the Prerequisites?</h3>
<p>As an aspiring student of the Master of Science in Information Systems with a concentration in Computer Forensics Management program, you should have a bachelor's degree and possess strong analytical, problem solving, and organizational skills. Professional experience in an IT environment is helpful. Applicants to Strayer University's programs should have a high school diploma or equivalent; some programs may have additional requirements.
</p>
<h3 id="section---WhatAreTheCourseRequirements">What Are the Course Requirements?</h3>
<p>You will be required to complete a total of 54 credits to earn the Master of Science in Information Systems with a concentration in Computer Forensics Management. The program includes 40.5 credits in core courses and 13.5 credits in the area of concentration.
</p>
<p><u>Master of Science in Information Systems with a Concentration in Computer Forensics Management Course Requirements</u>
</p>
<p />
<table border="1"><tr><th>AREA I</th><th>CORE COMPONENT</th></tr>
<tr><td>CIS 500</td><td>Information Systems for Decision-Making</td></tr>
<tr><td>CIS 502</td><td>Theories of Security Management</td></tr>
<tr><td>CIS 505</td><td> Communications Technologies</td></tr>
<tr><td>CIS 510</td><td> Advanced Systems Analysis and Design</td></tr>
<tr><td>CIS 512</td><td>Advanced Computer Architecture</td></tr>
<tr><td>CIS 515</td><td>Strategic Planning for Database Systems</td></tr>
<tr><td>CIS 517</td><td>IT Project Management</td></tr>
<tr><td>CIS 524</td><td> Computer Interaction and Design</td></tr>
<tr><td>CIS 599</td><td> Graduate Information Systems Capstone</td></tr>
</table><p />
<table border="1"><tr><th>AREA II</th><th>CONCENTRATION COMPONENT</th></tr>
<tr><td>CIS 558</td><td>IT Audit and Control</td></tr>
<tr><td>CIS 560</td><td>Security Access and Control Strategies</td></tr>
<tr><td>CIS 562</td><td>Computer Forensics Planning</td></tr>
</table><h3 id="section---WhatAreMyPostGraduationOpportunities">What Are My Post-Graduation Opportunities?</h3>
<h4 id="section---CareerOpportunities">Career Opportunities</h4>
<p>Strayer University's Master of Science in Information Systems with a concentration in Computer Forensics Management program is designed to help you prepare for management or directorial positions in a variety of professional settings. Once you have completed this program, you could explore opportunities in corporate IT departments, law enforcement agencies, insurance companies, or government agencies. Positions you could pursue include:
</p>
<ul><li>Data Security Manager
</li><li>Forensics Data Analysis Manager
</li><li>Computer Network Defense Analyst
</li><li>Information Security Forensics Expert</li></ul>

