The Bachelor of Science in Cybersecurity provides you with both theory and know-how required to strategically assess, plan, design, and implement effective cybersecurity defenses in the public and private sectors. With near-daily reports of large-scale information security breaches and hacking events, this career field is wide open for highly educated and competent forensic investigators and cybersecurity analysts and consultants. The U.S. Bureau of Labor Statistics forecasted a 22 percent growth rate in the cyber security industry through 2020, making now the perfect time to acquire the education you need to meet the demand. Through this online IT bachelor’s program, you’ll learn research, writing, math, and analytical skills, along with an in-depth understanding of cybercrime.

Coursework in this bachelor’s degree aligns to the general objectives of the International Association of Computer Investigative Specialists (IACIS) certification and meets the topical requirements for the Department of Defense Directive 8570.1M Information Assurance Management (IAM) Technical I, Technical II, Technical III, Management I, Management II, and Management III categories.

Degree Program Objectives

In addition to the institutional and degree level learning objectives, graduates of this program are expected to achieve these learning outcomes:

  • Compare and contrast the various aspects of cybersecurity including the relationship between cyber defense, cyber operations, cyber exploitations, cyber intelligence, cybercrime, and cyber law within federal and state laws.
  • Demonstrate an understanding of the processes and goals of cyber forensics investigations including the importance of search warrants and chain of custody in a forensic investigation of computer-related crimes.
  • Develop strategies and plans for security architecture consisting of tools, techniques, and technologies to detect and prevent network penetration, and to design effective cybersecurity countermeasures.
  • Analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect the security of the cyberspace.

Degree at a Glance

General Education Requirements30
Major Required54
Select one of the following concentrations:15
Final Program Requirements3
Elective Requirements18
Total Semester Hours120

Degree Program Requirements

General Education Requirements (30 semester hours)

Arts and Humanities (6 semester hours) 1
Select 2 courses from the following:6
Art Appreciation
Film and Literature
Image Enhancement using Adobe Photoshop
World Literature through the Renaissance
World Literature since the Renaissance
English Literature: Beowulf to18th Century
English Literature: 18th Century to Present
American Literature before The Civil War
American Literature from The Civil War to Present
Arabic I
Arabic II
French I
French II
German I
German II
Introduction to Japanese
Music Appreciation
Introduction to Philosophy
Critical Thinking
Introduction to Ethics
Philosophy of Science
Introduction to Brazilian Portuguese
Introduction to World Religions
Russian I
Spanish I
Spanish II
Civics, Political and Social Sciences (6 semester hours) 1
Select 2 courses from the following:6
Introduction to Anthropology
Introduction to Cultural Anthropology
Human Sexuality
Social Media and Society
Intercultural Communication
Humane Education: A Global Interdisciplinary Perspective
Introduction to Geography
Practical Food Safety and Awareness
International Relations I
Contemporary World Culture Through Literature
Cultural Diversity in Contemporary American Literature
American Government I
Introduction to Psychology
Introduction to Sociology
Social Problems
American Popular Culture
Communication: Writing, Oral, and Multimedia (9 semester hours)
COMM120Information and Digital Literacy3
ENGL110Making Writing Relevant3
Select 1 course from the following:3
Public Speaking
Effectiveness in Writing
Composition and Literature
Technical Writing
Scientific Writing
Business Writing
Human Relations Communication
Information Literacy and Global Citizenship
Introduction to Information Technology Writing
Human Relations
History (3 semester hours)
Select 1 course from the following:3
American History to 1877
American History since 1877
World Civilization before 1650
World Civilization since 1650
Western Civilization before The Thirty Years War
Western Civilization since The Thirty Years War
African-American History before 1877
African-American History since 1877
History of the American Indian
History of Science
Mathematics and Applied Reasoning (3 semester hours)
MATH110College Algebra3
Natural Sciences (3 semester hours)
Select 1 course from the following:3
Introduction to Biology
Introduction to Human Anatomy and Physiology
Introduction to Chemistry
Introduction to Meteorology
Introduction to Geology
Introduction to Environmental Science
Introduction to Physics
Introduction to Astronomy
Total Semester Hours30

Major Required (54 semester hours)

ENTD261Scripting Languages for the Administrator3
ISSC342Operating Systems: Hardening and Security3
ISSC343Wireless Networks3
ISSC351Computer Forensics3
ISSC361Information Assurance3
ISSC362IT Security: Attack & Defense3
ISSC366IT Security: Cryptography3
ISSC421Computer and Network Security3
ISSC422Information Security3
ISSC431Database Systems Security3
ISSC481IT Security: Planning and Policy3
ITMG481Ethics in Information Technology3
Select 3 courses from the following:9
Law Enforcement Intelligence Applications
Systems Engineering
Database Management Systems
Threat Analysis
Legal Issues in Information Security
IT Security: Physical and Peripheral Defense
Digital Forensics: Investigating Wireless Networks and Devices
Legal and Ethical Issues in Security Management
Total Semester Hours54

Students must choose a concentration for this degree program and may select from the General Concentration or Concentration in Wireless and Mobile Security.

General Concentration (15 semester hours)

A general concentration allows you to take courses across a number of areas of study within your program based on your own interests.

ISSC341Introduction to Networking3
ISSC363IT Security: Risk Management3
ISSC471IT Security: Auditing3
INTL440Cyber Warfare3
ITMG381Cyberlaw and Privacy in a Digital Age3
Total Semester Hours15

Concentration in Wireless and Mobile Security (15 semester hours)

This concentration for the Bachelors of Science in Cybersecurity will allow students to specialize in the methodologies used to secure the networks, hardware – devices, software – apps, and the laws and regulations, policies and procedures, and ethical responsibilities for privacy and security of mobile devices using mobile and wireless network infrastructures. The concentration will emphasize countermeasures taken to harden the security of various aspects of mobile technologies associated to government, military, industry, educational, and private enterprises.


Upon successful completion of this concentration, the student will be able to:

  • Extrapolate threats and vulnerabilities introduced into the network infrastructures of wireless, mobile, cellular, and satellite technologies.
  • Examine current mobile application models, their security framework, and methodologies on hardening the security to safeguard the devices running them and adapt them to higher privacy standards.
  • Appraise security hardening techniques for wireless or mobile device technologies based on wireless security principles and current industry standards.
  • Investigate forensics of wireless network attacks caused by mobile and wireless peripheral devices, and then evaluate security and access procedures within wireless Internet use of subject search warrants and chain of custody in a forensic investigation.

Concentration Requirements (15 semester hours)

ISSC412Mobile Application Security3
ISSC415Mobile Device Security3
ISSC442Wireless and Mobile Network Security3
ISSC456Digital Forensics: Investigating Wireless Networks and Devices3
ITMG381Cyberlaw and Privacy in a Digital Age3
Total Semester Hours15

Final Program Requirements (3 semester hours)

ISSC499Senior Seminar in Cybersecurity (to be taken as the last course before graduation) 13
Total Semester Hours3

Elective Requirements (18 semester hours)

Select any courses that have not been used to fulfill major requirements. Credits applied toward a minor or certificate in an unrelated field may be used to fulfill elective credit for the major.