Ask to Study - Ask your questions about online degrees

Information Systems Computer Security Management - Strayer University-Delaware

Ask your questions about this Campus Master program from Strayer University-Delaware




Information Systems Computer Security Management Master from Strayer University-Delaware details


Program Format: Campus Program Level: Master

Information Systems Computer Security Management from Strayer University-Delaware is a Campus Master Computer and Information Science degree that prepares you for a IT career. The Master of Science in Information Systems (MSIS) is designed to provide students with the technical and management skills needed to set strategy and deploy computer-based systems that support modern organizations. Students will develop both the theoretical foundation and the practical skills needed to specify, design, implement, and manage systems that possess qualities such as portability, scalability, and interoperability. By strengthening strategic planning and communication skills, and deepening their knowledge of business functions and operations, students will prepare for career advancement in the rapidly expanding information systems field. Key Learning Objectives Operate and manage the systems development process for business applications. Perform software engineering processes that support business applications. Develop and manage IT architecture for business organizations. Develop communications architecture for business organizations. Formulate the processes for enterprise resource systems. Computer Security Management The Computer Security Management concentration develops skills to manage the security operations of an enterprise-level network. Students will learn to develop and implement computer security policies, procedures, and controls to protect business operations, analyze security issues and take corrective actions. Computer Security Management concentration graduates will gain additional competencies necessary for managing security operations in both common and complex computing environments. These skills include conducting risk assessments and business impact analyses, auditing computer security operations, developing security policies and guidance, and developing business continuity plans and disaster recovery plans. Graduates of this program may be interested in roles such as: Information security officer, Information security manager, IT risk and assurance manager or Chief Information Security Officer (CISO). View more details on Strayer University-Delaware . Ask your questions and apply online for this program or find other related Computer and Information Science courses.

If you are interested in appling online for this Information Systems Computer Security Management degree, this Google search for Strayer University-Delaware might help.

Strayer University-Delaware details


Strayer University-Delaware address is 240 Continental Dr Ste 108, Newark, Delaware 19713. You can contact this school by calling (888) 378-7293 or visit the college website at www.strayeruniversity.edu .
This is a 4-year, Private for-profit, according to Carnegie Classification. Religion Affiliation is Not applicable and student-to-faculty ratio is 16 to 1. The enrolled student percent that are registered with the office of disability services is 3% or less .
Awards offered by Strayer University-Delaware are as follow: Less than one year certificate One but less than two years certificate Associate's degree Bachelor's degree Postbaccalaureate certificate Master's degree.
With a student population of 422 (335 undergraduate) and set in a Suburb: Large, Strayer University-Delaware services are: Remedial services Academic/career counseling service . Campus housing: No.
Tuition for Strayer University-Delaware is . Type of credit accepted by this institution Credit for life experiences . Most part of the informations about this college comes from sources like National Center for Education Statistics


More Resources:

Here you have more valuable resources related to this Strayer University-Delaware program. You can discover more about Information Systems Computer Security Management or other closely related Computer and Information Science topics on the next external pages :

Ups, we didn't find any question about Information Systems Computer Security Management on our external sources. Why don't you ask one yourself?