Cyber Security Bachelor's Degree Program

Cyber security shield with binary code

Our Cyber Security bachelor's degree program prepares individuals for a career as a security professional.

Our Cyber Security major's curriculum prepares students for success in IT Security, Cyber Security, Information Assurance, and Information Systems Security. It is designed for students with some background in computers.

The field of Cyber Security offers many opportunities for workforce employment and career advancement. A description of the various Cyber Security-related job roles, descriptions and competencies can help you select which courses are right for you and assist you in charting your career in this growing field.

  • ITE 102: Introduction to Computer Science
    or
    ITE 101: Management Information Systems

    3 credits
  • ITE 220: Networking and Data Communications

    3 credits
  • ITE 145: Fundamentals of Information Systems Security

    3 credits
  • CSS 146: Legal Issues in Information Security

    3 credits
  • CSS 230: Managing Risk in Information Systems

    3 credits
  • CSS 245: Security Policies & Implementation

    3 credits
  • CSS 345: Auditing IT Infrastructure for Compliance

    3 credits
  • CSS 346: Access Controls, Authentication and PKI

    3 credits
  • CSS 435: Fundamentals of Network Security

    3 credits
  • CSS 436: Systems Forensics, Investigations and Response

    3 credits
  • CSS 437: Hacker Techniques, Tools and Incident Handling

    3 credits
  • CSS 438: Security Strategies for Web Apps and Social Networking

    3 credits
  • Please choose two of the following:
    CSS 347: Security Strategies in Windows OS/Applications
    CSS 348: Security Strategies in Linux OS/Applications
    CSS 448: Cyberwarfare

    6 credits
  • CSS 490: Capstone

    3 credits
  • Total

    45 credits

Michael Goldner

Chris Rose

Pee Vululleh

Tavon Reid

Ricardo Mardales

Outcomes & Pathways

Students who graduate with a major in Cyber Security will be able to:

  1. Explain the landscape, key terms, and concepts related to the many layers of information systems security.
  2. Explore and explain the fields in digital forensics and cyber policy analysis.
  3. Create policies and standard operating procedures for organizations that are ethically, morally, and legally sound while recognizing ethical dilemmas and social responsibilities.
  4. Identify and critically assess issues and concepts related to the protection of information and information systems.
  5. Use risk management principles to assess threats, vulnerabilities, countermeasures and impact contributions at risk in information systems.
  6. Illustrate and explain fundamental architectures of networks and the Internet, as well as their underlying principles.

Why Charter Oak State College?