Bachelor of Science in Cybersecurity
Program Description
The Bachelor of Science in Cybersecurity exposes students to the exciting and ever-changing world of cybersecurity. It is designed to help prepare students to be professional, contributing members of the cybersecurity community and to seek opportunities in diverse environments such as corporations, government agencies, public organizations, private companies, and consulting firms. Students will be given the option to explore multiple areas of cybersecurity, including cyber defense, cybercrime, cyberoperations, cyberlaw, and cyberintelligence.
Degree Program Objectives
In addition to the institutional and degree level learning objectives, graduates of this program are expected to achieve these learning outcomes:
- Compare and contrast the various aspects of cybersecurity including the relationship between cyber defense, cyber operations, cyber exploitations, cyber intelligence, cybercrime, and cyber law within federal and state laws.
- Demonstrate an understanding of the processes and goals of cyber forensics investigations including the importance of search warrants and chain of custody in a forensic investigation of computer-related crimes.
- Develop strategies and plans for security architecture consisting of tools, techniques, and technologies to detect and prevent network penetration, and to design effective cybersecurity countermeasures.
- Analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect the security of the cyberspace.
Degree at a Glance
|
General Education Requirements
30
|
|
Major Required
42
|
|
Select one of the following concentrations:
15
|
|
Final Program Requirement
3
|
|
Elective Requirements
30
|
|
Total Semester Hours
120
|
Degree Program Requirements
General Education (30 semester hours)
| Arts & Humanities (6 semester hours) 1 |
|
Select 2 courses from the following:
6 |
|
Arabic I
|
|
Arabic II
|
|
Art Appreciation
|
|
Survey of Photography
|
|
Film and Literature
|
|
Image Enhancement using Adobe Photoshop®
|
|
French I
|
|
French II
|
|
German I
|
|
German II
|
|
Introduction to Japanese
|
|
Literature of American Encounters, Revolution, and Rebellion
|
|
From Abolition to #MeToo: Literature of the American Civil Rights Movement
|
|
Pivotal Figures in Early British Literature
|
|
British Literature from Wordsworth through the Wasteland
|
|
Leadership in World Literature: Antiquity to the Early Modern Period
|
|
Literature of the Newly Globalized World: The Individual’s Struggle to Adapt
|
|
Music Appreciation
|
|
Jazz and Rock
|
|
World Music and Cultures
|
|
Introduction to Philosophy
|
|
Critical Thinking
|
|
Introduction to Ethics
|
|
Philosophy of Science
|
|
Introduction to Brazilian Portuguese
|
|
Introduction to the Study of Religion
|
|
Introduction to World Religions
|
|
Russian I
|
|
Spanish I
|
|
Spanish II
|
|
Thinking and Acting Ethically
|
| Civics, Political & Social Sciences (6 semester hours) 2 |
|
Select 2 courses from the following:
6 |
|
Introduction to Anthropology
|
|
World Archaeology
|
|
Introduction to Cultural Anthropology
|
|
Human Sexuality
|
|
Planning Your Future with Purpose in Security & Global Studies
|
|
Social Media and Society
|
|
Intercultural Communication
|
|
Microeconomics
|
|
Macroeconomics
|
|
Humane Education: A Global Interdisciplinary Perspective
|
|
Introduction to Geography
|
|
Practical Food Safety and Awareness
|
|
International Relations I
|
|
Introduction to Political Science
|
|
American Government I
|
|
Introduction to Psychology
|
|
Death and Dying
|
|
Race & Religion
|
|
Hope and Resilience
|
|
Introduction to Sociology
|
|
Social Problems
|
|
American Popular Culture
|
|
Exploring Society and Cultures via Science Fiction
|
| Communication: Writing, Oral, and Multimedia (9 semester hours) |
|
Information and Digital Literacy
3 |
|
Making Writing Relevant
3 |
|
Select 1 course from the following:
3 |
|
Emerging Technology for College Success
|
|
Public Speaking
|
|
Interpersonal Communications
|
|
Proficiency in Writing
|
|
Argumentation and Rhetoric
|
|
Introduction to Literature
|
|
Technical Writing
|
|
Scientific Writing
|
|
Effective Business Communication
|
|
Human Relations Communication
|
|
Information Literacy and Global Citizenship
|
|
Introduction to Information Technology Writing
|
|
Human Relations
|
| History (3 semester hours) |
|
Select 1 course from the following:
3 |
|
American History to 1877
|
|
American History since 1877
|
|
World Civilization before 1650
|
|
World Civilization since 1650
|
|
Western Civilization before The Thirty Years War
|
|
Western Civilization since The Thirty Years War
|
|
African-American History before 1877
|
|
African-American History since 1877
|
|
History of the American Indian
|
|
History of Science
|
|
The History and Context of STEM
|
| Mathematics and Applied Reasoning (3 semester hours) |
|
College Algebra
3 |
| Natural Sciences (3 semester hours) |
|
Select 1 course from the following:
3 |
|
Introduction to Biology
|
|
Introduction to Human Anatomy and Physiology
|
|
Introduction to Chemistry
|
|
Introduction to Meteorology
|
|
Introduction to Geology
|
|
Introduction to Environmental Science
|
|
Introduction to Physics
|
|
Introduction to Astronomy
|
|
Introduction to STEM Disciplines
|
| Total Semester Hours 30 |
Major Required (42 semester hours)
|
Hardening Operating Systems
3 |
|
Scripting Languages for the Administrator
3 |
|
Networking Concepts
3 |
|
Securing Databases
3 |
|
Law, Privacy, and Digital Data
3 |
|
Red and Blue Team Security
3 |
|
Cryptography Concepts
3 |
|
Biometrics
3 |
|
Computer and Network Security
3 |
|
Information Security
3 |
|
Cybercrime
3 |
|
Cybersecurity
3 |
|
IT Security: Planning and Policy
3 |
|
Cyber Warfare
3 |
| Total Semester Hours 42 |
Students must choose a concentration for this degree program and may select from a General Concentration, Concentration in Critical Infrastructure, Concentration in Digital Forensics, Concentration in Privacy and Surveillance, or Concentration in Wireless and Mobile Security.
General Concentration (15 semester hours)
A general concentration allows you to take courses across a number of areas of study within your program based on your own interests.
Objectives
This general concentration allows you to choose from a variety of elective courses from homeland security, intelligence, information systems security, and IT project management.
Concentration Requirements (15 semester hours)
|
Wireless Networks
3 |
|
Ethics in Information Technology
3 |
|
Database Concepts
3 |
|
IT Security: Physical and Peripheral Defense
3 |
|
Digital Forensics: Investigating Wireless Networks and Devices
3 |
| Total Semester Hours 15 |
Concentration in Critical Infrastructure (15 semester hours)
The Bachelor of Science in Cybersecurity with a concentration in Critical Infrastructure provides you with the knowledge to best understand the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems that run the everyday systems that we depend on from gas, electric, and other utilities to the production of your favorite foods. The concentration will delve into how these systems differ from the devices used by your average computer user, as well as how one can best protect these unique systems from hackers to nation states. You will be exposed to various aspects of systems from Programmable Logic Controllers (PLC) to nuclear power plants. This is a unique field with consistent growth as everyone depends on critical infrastructure virtually nonstop around the clock.
Objectives
Upon successful completion of this concentration, the student will be able to:
- Evaluate risks of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems.
- Explore various federal agencies’ roles in protecting the nation’s critical infrastructure.
- Identify critical infrastructure components.
- Determine appropriate solutions to mitigate critical infrastructure threats.
Concentration Requirements (15 semester hours)
|
Critical Infrastructure Protection
3 |
|
ICS and SCADA Security Architecture
3 |
|
SCADA Risk Management
3 |
|
SCADA Security Standards
3 |
|
Threats to SCADA Networks
3 |
| Total Semester Hours 15 |
Concentration in Digital Forensics (15 semester hours)
Bringing cybercriminals to justice requires individuals with computer forensics skill sets who have the ability to quickly collect, analyze, and present cybercrime evidence. Become familiar with digital forensic measures for security incident response with a concentration in Digital Forensics.
Study how to prevent the loss of sensitive proprietary information and deter future cyberattacks. In addition, you’ll learn about common incident response procedures, web attacks, router forensics, email crime, corporate espionage, and steganography in your online courses in digital forensics.
Objectives
Upon successful completion of this concentration, the student will be able to:
- Demonstrate knowledge of incident response procedures, computer investigation processes, digital forensics lab work, and investigative reports.
- Illustrate understanding of wireless network attack forensics, wireless internet use security and access procedures, search warrants, and chain of custody.
Concentration Requirements (15 semester hours)
|
Digital Forensics: Investigation Procedures and Response
3 |
|
Digital Forensics: Investigating Wireless Networks and Devices
3 |
|
Digital Forensics: Investigating Network Intrusions and Cybercrime Security
3 |
|
Digital Forensics: Investigating Data and Image Files
3 |
|
Digital Forensics: Hard Disc and Operating Systems
3 |
| Total Semester Hours 15 |
Concentration in Privacy and Surveillance (15 semester hours)
The Privacy and Surveillance concentration provides students with a multifaceted approach not only addressing commonly used tools and methods of surveillance but also privacy considerations. Students will be exposed to how surveillance is both intentional and unintentional. The risk of using various forms of hardware and software will be discussed. Legal and ethical consideration surrounding the impact surveillance has on privacy rights will be addressed.
Objectives
Upon successful completion of this concentration, the student will be able to:
- Demonstrate knowledge of common surveillance technologies.
- Illustrate understanding of how technology impacts population segments differently.
Concentration Requirements (15 semester hours)
|
Law and Ethics in Intelligence
3 |
|
IoT Surveillance
3 |
|
Networking Surveillance
3 |
|
Bias in Surveillance
3 |
|
Surveillance Legislation and Policy
3 |
| Total Semester Hours 15 |
Concentration in Wireless and Mobile Security (15 semester hours)
This concentration for the Bachelors of Science in Cybersecurity will allow students to specialize in the methodologies used to secure the networks, hardware – devices, software – apps, and the laws and regulations, policies and procedures, and ethical responsibilities for privacy and security of mobile devices using mobile and wireless network infrastructures. The concentration will emphasize countermeasures taken to harden the security of various aspects of mobile technologies associated to government, military, industry, educational, and private enterprises.
Objectives
Upon successful completion of this concentration, the student will be able to:
- Extrapolate threats and vulnerabilities introduced into the network infrastructures of wireless, mobile, cellular, and satellite technologies.
- Examine current mobile application models, their security framework, and methodologies on hardening the security to safeguard the devices running them and adapt them to higher privacy standards.
- Appraise security hardening techniques for wireless or mobile device technologies based on wireless security principles and current industry standards.
- Investigate forensics of wireless network attacks caused by mobile and wireless peripheral devices, and then evaluate security and access procedures within wireless Internet use of subject search warrants and chain of custody in a forensic investigation.
Concentration Requirements (15 semester hours)
|
Mobile Application Security
3 |
|
Mobile Device Security
3 |
|
Wireless and Mobile Network Security
3 |
|
Digital Forensics: Investigating Wireless Networks and Devices
3 |
|
Digital Forensics: Investigating Network Intrusions and Cybercrime Security
3 |
| Total Semester Hours 15 |
Final Program Requirement (3 semester hours)
|
Senior Seminar in Cybersecurity 3
3 |
| Total Semester Hours 3 |
Elective Requirements (30 semester hours)
|
Select any courses that have not been used to fulfill requirements listed above. Credits applied toward a minor or certificate in an unrelated field may be used to fulfill elective credit for the major. 30 |
| Total Semester Hours 30 |
Loading...
-
All literature courses require successful completion of ENGL101-Proficiency in Writing or ENGL110-Making Writing Relevant.
-
All literature courses require successful completion of ENGL101-Proficiency in Writing or ENGL110-Making Writing Relevant.
-
Prerequisite: Completion of a minimum of 106 hours towards your program including ENGL101 or ENGL110 and should be taken as the last course before graduation.