
Cyber Security
Protect your future. Fortify the nation鈥檚 future prosperity.
Learn聽to analyze, protect, and improve the crucial networks and processes that power modern life.
High-profile cyber-attacks have highlighted the critical need for well-trained cybersecurity professionals in both the public and private sectors. Our Cyber Security degree blends theoretical knowledge with practical, hands-on experience through labs, real-life projects, and cyber ranges, preparing you for a successful career.聽
Graduates from our program can pursue jobs such as cybersecurity analysts, cybersecurity engineers, cyber threat analysts, threat hunters, ethical hackers, and digital forensic analysts.
Growing Industry
Join one of the fastest growing industries in the nation!聽
Required Courses
- Ethical Hacking
- Information Security
- Network Security
- Computer Systems Security
- Cyber Threat Intelligence
- Digital Forensics
- Cyber Law and Policy
- CIS 100: Introduction to Computer Science (3 credits)
- CIS 200: Linear Data Structures (3 credits)
- CIS 210: Non-Linear Data Structures (3 credits)
- Choose at least two other CIS courses (except CIS 201)
- CIS 100: Introduction to Computer Science (3 credits)
- CIS 160: Introduction to Cyber Security (3 credits)
- CIS 230: Operating Systems (3 credits)
- CIS 260: Computer Communications & Networks (3 credits)
- CIS 261: Information Security (3 credits)
- CIS 360: Computer Systems Security (3 credits)
- CIS 100: Introduction to Computer Science (3 credits)
- STAT 139: Statistics for Social Sciences (3 credits)
- CIS 150: Introduction to Data Science (3 credits)
- CIS 200: Linear Data Structures (3 credits)
- CIS 280: Data Visualization & Communication (3 credits)
- CIS 350: Relational Database Systems (3 credits)
- CIS 352: Big Data Analytics (3 credits)
- CIS 371: Machine Learning (3 credits)
Core Courses:
Plus one of the following courses:
Learning Outcomes
- Describe the fundamental concepts and design principles of the cyber security discipline, including cyber defense tools, methods, and components, as well as apply cyber defense methods to prepare a system to defend against attacks
- Identify the elements of a cryptographic system and describe which cryptographic protocols, tools, and techniques are appropriate for a given situation and how cryptography can be used, strengths and weaknesses, modes of operations, and issues that must be addressed in an implementation (e.g., key management), etc.
- Describe the key concepts of computer networks and network defense, as well as explain how network defense tools are used to defend against attacks and mitigate vulnerabilities
- Program in a high-level language and write scripts to automate cybersecurity tasks
- Describe how to conduct a digital forensic investigation for all aspects of a computer system in a systematic approach. Students will be capable of designing and implementing incident response plans. They will be trained in forensic analysis and investigation techniques for dealing with cybersecurity incidents
- Perform ethical hacking strategies and propose solutions to the discovered problems
- Have a thorough understanding of various cybersecurity frameworks and standards, such as NIST and CIS
- Be prepared for professional certifications from our academic partners Ec-Council and ISC2
- Perform the aforementioned outcomes in an ethical, legal, and professional manner
Find a Career in Cybersecurity
Partners
草榴成人社区 University鈥檚 Cyber Security program is proud to be partnered with EC-Council Academia, allowing our students access to a wealth of resources and certification opportunities at heavily discounted rates, emphasizing our commitment to ensuring our students are not just educated but also career-ready.