The Bachelor of Science in Cybersecurity provides you with both theory and know-how required to strategically assess, plan, design, and implement effective cybersecurity defenses in the public and private sectors. With near-daily reports of large-scale information security breaches and hacking events, this career field is wide open for highly educated and competent forensic investigators and cybersecurity analysts and consultants. The U.S. Bureau of Labor Statistics forecasted a 22 percent growth rate in the cyber security industry through 2020, making now the perfect time to acquire the education you need to meet the demand. Through this online IT bachelor’s program, you’ll learn research, writing, math, and analytical skills, along with an in-depth understanding of cybercrime.

Coursework in this bachelor’s degree aligns to the general objectives of the International Association of Computer Investigative Specialists (IACIS) certification and meets the topical requirements for the Department of Defense Directive 8570.1M Information Assurance Management (IAM) Technical I, Technical II, Technical III, Management I, Management II, and Management III categories.

Degree Program Objectives

In addition to the institutional and general education level learning objectives, the Bachelor of Science in Cybersecurity also seeks the following specific learning outcomes of its graduates:

  • Compare and contrast the various aspects of cybersecurity including the relationship between cyber defense, cyber operations, cyber exploitations, cyber intelligence, cybercrime, and cyber law within federal and state laws.
  • Demonstrate an understanding of the processes and goals of cyber forensics investigations including the importance of search warrants and chain of custody in a forensic investigation of computer-related crimes.
  • Develop strategies and plans for security architecture consisting of tools, techniques, and technologies to detect and prevent network penetration, and to design effective cybersecurity countermeasures.
  • Analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect the security of the cyberspace.

Degree at a Glance

General Education Requirements30
Major Required54
Select one of the following concentrations:15
Final Program Requirements3
Elective Requirements18
Total Semester Hours120

Degree Program Requirements

General Education Requirements (30 semester hours)

Arts and Humanities (6 semester hours) 1
Select 2 courses from the following:6
Art Appreciation
Film and Literature
Image Enhancement using Adobe Photoshop
World Literature through the Renaissance
World Literature since the Renaissance
English Literature: Beowulf to18th Century
English Literature: 18th Century to Present
American Literature before The Civil War
American Literature from The Civil War to Present
Arabic I
Arabic II
French I
French II
German I
German II
Introduction to Japanese
Music Appreciation
Introduction to Philosophy
Critical Thinking
Introduction to Ethics
Philosophy of Science
Introduction to Brazilian Portuguese
Introduction to World Religions
Russian I
Spanish I
Spanish II
Civics, Political and Social Sciences (6 semester hours) 1
Select 2 courses from the following:6
Introduction to Anthropology
Introduction to Cultural Anthropology
Human Sexuality
Social Media and Society
Intercultural Communication
Microeconomics
Macroeconomics
Humane Education: A Global Interdisciplinary Perspective
Introduction to Geography
Practical Food Safety and Awareness
International Relations I
Contemporary World Culture Through Literature
Cultural Diversity in Contemporary American Literature
American Government I
Introduction to Psychology
Introduction to Sociology
Social Problems
American Popular Culture
Communication: Writing, Oral, and Multimedia (8 semester hours)
COMM110Information & Digital Literacy2
ENGL110Making Writing Relevant3
Select 1 course from the following:3
Public Speaking
Effectiveness in Writing
Composition and Literature
Technical Writing
Scientific Writing
Business Writing
Human Relations Communication
Information Literacy and Global Citizenship
Introduction to Information Technology Writing
Human Relations
History (3 semester hours)
Select 1 course from the following:3
American History to 1877
American History since 1877
World Civilization before 1650
World Civilization since 1650
Western Civilization before The Thirty Years War
Western Civilization since The Thirty Years War
African-American History before 1877
African-American History since 1877
History of the American Indian
History of Science
Mathematics and Applied Reasoning (3 semester hours)
MATH110College Algebra3
Natural Sciences with Lab (4 semester hours)
Select 1 course from the following:4
Habitable Worlds Are We Alone with Lab
Introduction to Biology with Lab
Introduction to Chemistry with Lab
Introduction to Human Anatomy & Physiology with Lab
Introduction to Physics with Lab
Introduction to Astronomy with Lab
Introduction to Meteorology with Lab
Introduction to Environmental Science with Lab
Total Semester Hours30
1

All literature courses require successful completion of ENGL101 - Proficiency in Writing or ENGL110 - Making Writing Relevant.

Major Required (54 semester hours)

ENTD261Scripting Languages for the Administrator3
ISSC325Biometrics3
ISSC342Operating Systems: Hardening and Security3
ISSC343Wireless Networks3
ISSC351Computer Forensics3
ISSC361Information Assurance3
ISSC362IT Security: Attack & Defense3
ISSC366IT Security: Cryptography3
ISSC421Computer and Network Security3
ISSC422Information Security3
ISSC431Database Systems Security3
ISSC452Cybersecurity3
ISSC481IT Security: Planning and Policy3
ITMG481Ethics in Information Technology3
MATH302Statistics3
Select 3 courses from the following:9
Law Enforcement Intelligence Applications
Systems Engineering
Database Management Systems
Threat Analysis
Legal Issues in Information Security
IT Security: Physical and Peripheral Defense
Cybercrime
Digital Forensics: Investigating Wireless Networks and Devices
Legal and Ethical Issues in Security Management
Total Semester Hours54

Students must choose a concentration for this degree program and may select from the General Concentration or Concentration in Wireless and Mobile Security.

General Concentration (15 semester hours)

A general concentration allows you to take courses across a number of areas of study within your program based on your own interests.

ISSC341Introduction to Networking3
ISSC363IT Security: Risk Management3
ISSC471IT Security: Auditing3
INTL440Cyber Warfare3
ITMG381Cyberlaw and Privacy in a Digital Age3
Total Semester Hours15

Concentration in Wireless and Mobile Security (15 semester hours)

This concentration for the Bachelors of Science in Cybersecurity will allow students to specialize in the methodologies used to secure the networks, hardware – devices, software – apps, and the laws and regulations, policies and procedures, and ethical responsibilities for privacy and security of mobile devices using mobile and wireless network infrastructures. The concentration will emphasize countermeasures taken to harden the security of various aspects of mobile technologies associated to government, military, industry, educational, and private enterprises.

Objectives

Upon successful completion of this concentration the student will be able to:

  • Extrapolate threats and vulnerabilities introduced into the network infrastructures of wireless, mobile, cellular, and satellite technologies.
  • Examine current mobile application models, their security framework, and methodologies on hardening the security to safeguard the devices running them and adapt them to higher privacy standards.
  • Appraise security hardening techniques for wireless or mobile device technologies based on wireless security principles and current industry standards.
  • Investigate forensics of wireless network attacks caused by mobile and wireless peripheral devices, and then evaluate security and access procedures within wireless Internet use of subject search warrants and chain of custody in a forensic investigation.

Concentration Requirements (15 semester hours)

ISSC412Mobile Application Security3
ISSC415Mobile Device Security3
ISSC442Wireless and Mobile Network Security3
ISSC456Digital Forensics: Investigating Wireless Networks and Devices3
ITMG381Cyberlaw and Privacy in a Digital Age3
Total Semester Hours15

Final Program Requirements (3 semester hours)

ISSC499Senior Seminar in Cybersecurity (to be taken as the last course before graduation) 13
Total Semester Hours3
1

Prerequisite: Completion of a minimum of 106 hours towards your program including ENGL101 or  ENGL110.

Elective Requirements (18 semester hours)

Select any courses that have not been used to fulfill major requirements. Credits applied toward a minor or certificate in an unrelated field may be used to fulfill elective credit for the major.