Loading…
Philosophy
Everything we do in our day-to-day activities somehow relies on the Internet. As customers, we rely on this connectivity in our daily lives to shop, manage our bank accounts, communicate and have fun. Businesses succeed on their ability to use data and Internet connectivity in novel and efficient ways. However, whereas the Internet is a boon to customers and businesses alike, it has also proven to be a powerful tool for cyber criminals. Unchecked, a business can be ruined by a data breach and lives can be ruined through identity theft. The power of the Internet goes beyond national borders and has become a key component of the military arsenal. To protect themselves, government, industry and the military seek professionals with the strongest security credentials possible.
The B.S. in Cybersecurity program (formerly Computer & Network Security B.S.) provides a firm foundation in cybersecurity while also providing the flexibility for students to customize their degree according to their specific areas of interest. As an example, students may earn a Digital Forensics Concentration by choosing six Security Elective Courses. While the Security Core and Security Electives provide a technical foundation for the student, the General Education and Support cores provide the student with the soft skills necessary for a well rounded education.
Purpose
Information Security is listed among the fastest growing occupations by the US Department of Labor Statistics (BLS). According to the BLS, the number of people employed as information security analysts is projected to increase by 33% between 2020 and 2030, "much faster than the average for all occupations". To put it in perspective, that is two and a half times more than the projected growth for computer occupations and more than quadruple the projected growth rate for all occupations.
See for more details.
The workforce need was further highlighted by cyberseek.org, which listed 597,767 job openings nationwide in cybersecurity-related positions as of February 2022.
For more information on cybersecurity career paths and a heat map showing supply and demand for cybersecurity jobs, see https://www.cyberseek.org
Center of Academic Excellence (CAE)
The Cybersecurity Bachelor of Science program has been designated as a National Center of Academic Excellence in Cyber Defense Education through academic year 2028 by the National Security Agency and the Department of Homeland Security.
This is a nationally recognized designation that Â鶹ÊÓƵ’s B.S. in Cybersecurity curricula, faculty, outreach and academic activities meet the rigorous standards established by the National Security Agency and the Department of Homeland Security. The goal of the National Centers of Academic Excellence designation program is to promote higher education in Information Assurance (IA) and Cyber Defense (CD) and prepare a growing number of IA/CD professionals to meet the need to reduce vulnerabilities in the Nation’s information systems.
Highly Ranked Program
Whereas the Cybersecurity B.S. program is offered both face-to-face and online, Â鶹ÊÓƵ's online Cybersecurity B.S. program is ranked in the top twenty on several websites including:
Program Competencies
Students completing the Cybersecurity B.S. program will be able to:
What You Will Learn
In addition to becoming well-prepared for the technical aspects of a career in cybersecurity, students will develop soft skills. Critical thinking skills are needed to understand cybersecurity problems, risks and solutions. Good written and oral communications skills are needed to put technical problems in terms that worker bees can understand and appreciate so that they can stay out of harm’s way. Most importantly, non-technical decision makers in charge of the budget need to understand the risks and the ramifications of not properly investing in cybersecurity.
The Cybersecurity Bachelor of Science degree will provide students with credentials specializing in information security and will also help prepare students to “sit” for the following industry recognized certifications:
What You Can Do With this Degree
The categories of jobs involving cybersecurity are very broad. The federal government initiated an effort called the National Cybersecurity Framework a few years ago to help provide some clarity and structure. The following sample job titles are taken from this framework () and are among the roles for which the Cybersecurity B.S. program helps prepare students:
Experiential Learning
The Office of Experiential Learning takes a 360â—¦ approach to experiential learning. Whether you come to Â鶹ÊÓƵ with a vast amount of professional experience and are awarded Credit for Prior Learning (CPL), or you participate in a Work-Integrated Learning (WIL) opportunity (Internships or Cooperative Education) embedded in your curriculum for credit, we provide a pathway to completing your degree.
Cooperative Education Option
The Cooperative Education Option is an alternative to Cybersecurity Internship - SEC 490 and SEC 491 – for a total of six credit hours. Each co-op assignment is one semester long and normally the two co-op assignments span two consecutive semesters with the same employer. In order to be eligible, students must first have at least 60 credits, plus a GPA of 2.5 or higher. Students must contact the Office of Work-Integrated Learning and their Program Chair one semester before they would like to begin a co-op assignment. For additional information on cooperative education, please visit: /coel/work-integrated-learning.aspx
Minimum Grade Policy
The B.S. in Cybersecurity program has set a minimum passing grade of “C-” for Security Core and Security Elective and College of Technology Elective courses. Students receiving a grade lower than “C-” in any of these courses must retake that course.
Accelerated Graduate Certificate Option
Students in the Cybersecurity B.S. degree program may choose an accelerated option with:
Students selecting this option can complete both their undergraduate degree and the graduate certificate by completing 120 credits (105 undergraduate credits and 15 graduate credits). The five graduate courses (15 credits) needed for the graduate certificate count as five courses (15 credits) towards undergraduate electives in your degree.
Students who complete the SCADA Cybersecurity Graduate Certificate also receive the benefit of completing 4-5 graduate level courses that count towards a Master’s degree in Cybersecurity. Students selecting this option are not required to pursue the Cybersecurity M.S. degree.
Admission requirements include:
Note: Students will not be eligible to register for graduate level courses until they have successfully completed at least 60 credits towards their bachelor’s degree and have an approved AOI form. Students must receive their B.S. degree in order to receive the graduate certificate.
Minimum Grade Policy: Students must maintain a 3.0 GPA in their graduate courses in order to earn the certificate.
Computer Applications
Fundamentals of Economics
English Composition I
English Composition II
Public Speaking
Research Writing
Ìý
Contemporary Global Issues
OR
American Politics
Introductory Survey of Mathematics
Introduction to Critical Thinking
Introduction to Psychology
Choose two courses (6 credits) from:
ART, COM 245, CUL, DRA, DSN 110, ETN, HIS 230, HUM, LIT, MUS, PHI, SPA, TEC 215, VFP 313
Pre-Calculus
Inferential Statistics
Ethics for Computer Professionals
Database Foundations
Introduction to Computer Hardware and Operation
Principles and Practice of Information Security
Introduction to Linux
Networks and Telecommunications
Operating System and Computer Systems Security
Introduction to Programming with Python
Cryptography: Algorithms and Applications
Linux for Systems Administrators
Windows Operating Systems and Systems Administration
Web and Data Security
Firewalls and Network Security
Experiential Learning in Cybersecurity
Cybersecurity Internship
Whereas the bulk of the Cybersecurity B.S. degree is devoted to defending against cyber attacks, digital forensics is used in the investigation of a crime or incident. In law enforcement, digital evidence found on computers, phones, laptops, Fitbits, Alexa, smart refrigerators, etc. is used to prosecute crimes. In the corporate world, digital forensics is used to investigate data breaches, intellectual property theft, corporate espionage and malicious employees among other things; sometimes the goal is to prosecute, sometimes not. The intelligence community, on the other hand, is not interested in prosecuting. Instead, the goal is to obtain actionable intel, such as in the pursuit of terrorist organizations and espionage activities by hostile nation states.
The Cybersecurity program has set a minimum passing grade of "C-" for Security Core and Security Elective courses. Students receiving a grade lower than "C-" in any of these courses must retake that course.
Those interested in declaring a Digital Forensics Concentration should select six (6) of the following eight Security Elective courses:
Electronic Discovery
Foundations in Cyber Investigations
Introduction Computer Forensics
Mobile Device Security and Forensics
Advanced Mobile and IoT Forensics
Computer Incident Response Course
Malware Analysis Techniques
Network Forensics
Note: Students interested in declaring a Digital Forensics Concentration but who do not have enough available elective credits may request a waiver on the SEC480/490 requirement.
Students declaring a Digital Forensics Concentration may also earn two certificates: Digital Evidence Discovery and Digital Evidence Investigation by taking three additional courses: LES 330 – Cyber Law, SEC 360 – Advanced Mobile Device, and IoT Forensics and SEC 375 – Malware Analysis Techniques. For more information, see the section on Digital Evidence Discovery and Digital Evidence Investigation Certificates.
Students must complete five (5) Security Electives and one free or College of Technology elective in order to satisfy the requirements of the degree.
Cyberlaw
Psychology of a Cyber Attacker
Breaking Down Cloud Security
Cloud Architecture, Reliability & Economics
Cloud Services & Tools
Cloud Operations & Performance
Cloud Practitioner Certificate (CPC) Exam Review
Data Integrity and Disaster Recovery
Ethical Hacking
Advanced Network Management
Cybersecurity and IoT
Intro to Drone Operations
Drone Design and Maintenance
Security of UAV and UAS Systems
Project and Change Management
IT Policy and Strategy
Industrial Control Systems (ICS) Security
SCADA Architecture
SCADA Risk Management and Auditing
SCADA Security Awareness and Standards
CSC, CTA, GMD, ISM, MIS, SEC, TEC
Students with less than 16 transfer credits are required to take FYE 101 as one of their electives.
A completion degree is a personalized version of a bachelor's degree created exclusively for students who have completed an associate degree at an accredited institution. Completion degrees are available for most Â鶹ÊÓƵ Bachelor of Science degrees. A student who expects to transfer a completed associate degree should communicate with a Â鶹ÊÓƵ academic advisor before registering for courses. A transcript with documentation of the conferred degree must be received by Â鶹ÊÓƵ to confirm eligibility.
Note that a minimum of 120 combined credits are needed to satisfy the Completion Degree requirements, including both transfer credits and credits earned at Â鶹ÊÓƵ.
Note: Students interested in declaring a Digital Forensics concentration and that do not have enough available elective credits may request a waiver on the SEC480/490 requirement.
The following courses or their equivalents are prerequisites for a degree in Computer and Network Security:
CTA 206 Computer Applications
ENG 122 English Composition II
MAT 205 Introductory Survey of Mathematics
SEC 100 Introduction to Computer Hardware and Operation
SEC 210 Principles and Practices of Information Security
SEC 230 Introduction to Linux
SEC 235 Networks and Telecommunication
SEC 250 Operating System and Computer Systems Security
SEC 290 Introduction to Programming with Python
Security Elective
CoT Elective
This information applies to students who enter this degree program during the 2024-2025 Academic Year. If you entered this degree program before the Fall 2023 semester, please refer to the academic catalog for the year you began your degree program.
DESCRIPTION
PREREQUISITES
CROSSLISTING
SYLLABUS