2025 Undergraduate Catalog

Bachelor of Science in Cybersecurity

The Bachelor of Science in Cybersecurity exposes students to the exciting and ever-changing world of cybersecurity. It is designed to help prepare students to be professional, contributing members of the cybersecurity community and to seek opportunities in diverse environments such as corporations, government agencies, public organizations, private companies, and consulting firms. Students will be given the option to explore multiple areas of cybersecurity, including cyber defense, cybercrime, cyberoperations, cyberlaw, and cyberintelligence.

Degree Program Objectives

In addition to the institutional and degree level learning objectives, graduates of this program are expected to achieve these learning outcomes:

  • Compare and contrast the various aspects of cybersecurity including the relationship between cyber defense, cyber operations, cyber exploitations, cyber intelligence, cybercrime, and cyber law within federal and state laws.
  • Demonstrate an understanding of the processes and goals of cyber forensics investigations including the importance of search warrants and chain of custody in a forensic investigation of computer-related crimes.
  • Develop strategies and plans for security architecture consisting of tools, techniques, and technologies to detect and prevent network penetration, and to design effective cybersecurity countermeasures.
  • Analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect the security of the cyberspace.

Degree at a Glance

Degree Program Requirements

General Education (30 semester hours)

Major Required (45 semester hours)

Students must choose a concentration for this degree program and may select from a General Concentration, Concentration in Critical Infrastructure, Concentration in Digital Forensics, Concentration in Privacy and Surveillance, or Concentration in Wireless and Mobile Security.

General Concentration (15 semester hours)

A general concentration allows you to take courses across a number of areas of study within your program based on your own interests.

Objectives

This general concentration allows you to choose from a variety of elective courses from homeland security, intelligence, information systems security, and IT project management.

Concentration Requirements (15 semester hours)

Concentration in Critical Infrastructure (15 semester hours)

The Bachelor of Science in Cybersecurity with a concentration in Critical Infrastructure provides you with the knowledge to best understand the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems that run the everyday systems that we depend on from gas, electric, and other utilities to the production of your favorite foods. The concentration will delve into how these systems differ from the devices used by your average computer user, as well as how one can best protect these unique systems from hackers to nation states. You will be exposed to various aspects of systems from Programmable Logic Controllers (PLC) to nuclear power plants. This is a unique field with consistent growth as everyone depends on critical infrastructure virtually nonstop around the clock.

Objectives

Upon successful completion of this concentration, the student will be able to:

  • Evaluate risks of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems.
  • Explore various federal agencies’ roles in protecting the nation’s critical infrastructure.
  • Identify critical infrastructure components.
  • Determine appropriate solutions to mitigate critical infrastructure threats.
Concentration Requirements (15 semester hours)

Concentration in Digital Forensics (15 semester hours)

Bringing cybercriminals to justice requires individuals with computer forensics skill sets who have the ability to quickly collect, analyze, and present cybercrime evidence. Become familiar with digital forensic measures for security incident response with a concentration in Digital Forensics.

Study how to prevent the loss of sensitive proprietary information and deter future cyberattacks. In addition, you’ll learn about common incident response procedures, web attacks, router forensics, email crime, corporate espionage, and steganography in your online courses in digital forensics.

Objectives

Upon successful completion of this concentration, the student will be able to:

  • Demonstrate knowledge of incident response procedures, computer investigation processes, digital forensics lab work, and investigative reports.
  • Illustrate understanding of wireless network attack forensics, wireless internet use security and access procedures, search warrants, and chain of custody.
Concentration Requirements (15 semester hours)

Concentration in Privacy and Surveillance (15 semester hours)

The Privacy and Surveillance concentration provides students with a multifaceted approach not only addressing commonly used tools and methods of surveillance but also privacy considerations. Students will be exposed to how surveillance is both intentional and unintentional. The risk of using various forms of hardware and software will be discussed. Legal and ethical consideration surrounding the impact surveillance has on privacy rights will be addressed.

Objectives

Upon successful completion of this concentration, the student will be able to:

  • Demonstrate knowledge of common surveillance technologies.
  • Illustrate understanding of how technology impacts population segments differently.
Concentration Requirements (15 semester hours)

Concentration in Wireless and Mobile Security (15 semester hours)

This concentration for the Bachelors of Science in Cybersecurity will allow students to specialize in the methodologies used to secure the networks, hardware – devices, software – apps, and the laws and regulations, policies and procedures, and ethical responsibilities for privacy and security of mobile devices using mobile and wireless network infrastructures. The concentration will emphasize countermeasures taken to harden the security of various aspects of mobile technologies associated to government, military, industry, educational, and private enterprises.

Objectives

Upon successful completion of this concentration, the student will be able to:

  • Extrapolate threats and vulnerabilities introduced into the network infrastructures of wireless, mobile, cellular, and satellite technologies.
  • Examine current mobile application models, their security framework, and methodologies on hardening the security to safeguard the devices running them and adapt them to higher privacy standards.
  • Appraise security hardening techniques for wireless or mobile device technologies based on wireless security principles and current industry standards.
  • Investigate forensics of wireless network attacks caused by mobile and wireless peripheral devices, and then evaluate security and access procedures within wireless Internet use of subject search warrants and chain of custody in a forensic investigation.
Concentration Requirements (15 semester hours)

Final Program Requirement (3 semester hours)

Elective Requirements (27 semester hours)

  1. All literature courses require successful completion of ENGL101-Proficiency in Writing or ENGL110-Making Writing Relevant.

  2. All literature courses require successful completion of ENGL101-Proficiency in Writing or ENGL110-Making Writing Relevant.

  3. Prerequisite: Completion of a minimum of 106 hours towards your program including ENGL101 or ENGL110 and should be taken as the last course before graduation.

Overview

If you're ready to move forward, we're ready to take you there.

APPLY TO AMU APPLY TO APU