Skip to main content

Cyber Security Major

Cyber Security Major

The Bachelor of Science in Cyber Security prepares individuals for a career as a security professional. This curriculum prepares students for success in IT Security, Cyber Security, Information Assurance, and Information Security Systems Security. It is designed for students with some background in computers.

All major requirements must be completed with a grade of 'C' or higher.This major requires a minimum of 45 credits.

Major Requirements

This major contains courses in both Information Technology and Computer Science. Please review those sections for more information on the courses below.

ITE 102: Introduction to Computer Science

or

ITE 101: Management Information Systems

3cr

ITE 220: Networking and Data Communications

3cr

ITE 145: Fundamentals of Information Systems Security

3cr

CSS 146: Legal Issues in Information Security

3cr

CSS 230: Managing Risk in Information Systems

3cr

CSS 245: Security Policies & Implementation

3cr

CSS 345: Auditing IT Infrastrucuture for Compliance

3cr

CSS 346: Access Controls, Authentication and PKI

3cr

CSS 435: Fundamentals of Network Security

3cr

CSS 436: Systems Forensics, Investigations and Response

3cr

CSS 437: Hacker Techniques, Tools and Incident Handling

3cr

CSS 438: Security Strategies for Web Apps and Social Networking

3cr

Please choose two of the following:

  • CSS 347: Security Strategies in Windows OS/Applications
  • CSS 348: Security Strategies in Linux OS/Applications
  • CSS 448: Cyberwarfare

6cr

CSS 490: Capstone

3cr

Student Learning Outcomes

Students who graduate with a major in Cyber Security will be able to:

  1. explain the landscape, key terms, and concepts related to the many layers of information systems security;
  2. explore and explain the fields in digital forensics and cyber policy analysis;
  3. create policies and standard operating procedures for organizations that are ethically, morally, and legally sound while recognizing ethical dilemmas and social responsibilities;
  4. identify and critically assess issues and concepts related to the protection of information and information systems;
  5. use risk management principles to assess threats, vulnerabilities, countermeasures and impact contributions at risk in information systems; and
  6. illustrate and explain fundamental architectures of networks and the Internet, as well as their underlying principles.

Cyber Security Major

The Bachelor of Science in Cyber Security prepares individuals for a career as a security professional. This curriculum prepares students for success in IT Security, Cyber Security, Information Assurance, and Information Security Systems Security. It is designed for students with some background in computers.

All major requirements must be completed with a grade of 'C' or higher.This major requires a minimum of 45 credits.

Major Requirements

This major contains courses in both Information Technology and Computer Science. Please review those sections for more information on the courses below.

ITE 102: Introduction to Computer Science

or

ITE 101: Management Information Systems

3cr

ITE 220: Networking and Data Communications

3cr

ITE 145: Fundamentals of Information Systems Security

3cr

CSS 146: Legal Issues in Information Security

3cr

CSS 230: Managing Risk in Information Systems

3cr

CSS 245: Security Policies & Implementation

3cr

CSS 345: Auditing IT Infrastrucuture for Compliance

3cr

CSS 346: Access Controls, Authentication and PKI

3cr

CSS 435: Fundamentals of Network Security

3cr

CSS 436: Systems Forensics, Investigations and Response

3cr

CSS 437: Hacker Techniques, Tools and Incident Handling

3cr

CSS 438: Security Strategies for Web Apps and Social Networking

3cr

Please choose two of the following:

  • CSS 347: Security Strategies in Windows OS/Applications
  • CSS 348: Security Strategies in Linux OS/Applications
  • CSS 448: Cyberwarfare

6cr

CSS 490: Capstone

3cr

Student Learning Outcomes

Students who graduate with a major in Cyber Security will be able to:

  1. explain the landscape, key terms, and concepts related to the many layers of information systems security;
  2. explore and explain the fields in digital forensics and cyber policy analysis;
  3. create policies and standard operating procedures for organizations that are ethically, morally, and legally sound while recognizing ethical dilemmas and social responsibilities;
  4. identify and critically assess issues and concepts related to the protection of information and information systems;
  5. use risk management principles to assess threats, vulnerabilities, countermeasures and impact contributions at risk in information systems; and
  6. illustrate and explain fundamental architectures of networks and the Internet, as well as their underlying principles.