Cyber Security Bachelor's Degree Program

Cyber security shield with binary code

Our Cyber Security bachelor's degree program prepares individuals for a career as a security professional.

Our Cyber Security major's curriculum prepares students for success in IT Security, Cyber Security, Information Assurance, and Information Systems Security. It is designed for students with some background in computers.

The field of Cyber Security offers many opportunities for workforce employment and career advancement. A description of the various Cyber Security-related job roles, descriptions and competencies can help you select which courses are right for you and assist you in charting your career in this growing field.

  • CSS 101:  Cybersecurity Fundamentals

    3 credits
  • Operating Systems and Asset Security

    3 credits
  • Incident Response

    3 credits
  • ITE 115:  Program Logic and Design with Python

    3 credits
  • ITE 220: Networking and Data Communications

    3 credits
  • CSS 146: Legal Issues in Information Security

    3 credits
  • CSS 345: Auditing IT Infrastructure for Compliance

    3 credits
  • CSS 346: Access Controls, Authentication and PKI

    3 credits
  • CSS 435: Fundamentals of Network Security

    3 credits
  • CSS 436: Systems Forensics, Investigations and Response

    3 credits
  • CSS 437: Hacker Techniques, Tools and Incident Handling

    3 credits
  • CSS 438: Security Strategies for Web Apps and Social Networking

    3 credits
  • Please choose two of the following:
    CSS 347: Security Strategies in Windows OS/Applications
    CSS 348: Security Strategies in Linux OS/Applications
    CSS 448: Cyberwarfare
    Cyber Security Internship

    6 credits
  • CSS 490: Capstone

    3 credits
  • Total

    45 credits
Photo of Chris Rose
Chris Rose

MBA, MS

Dr. Chris Rose received a Bachelor of Science in Criminal Justice from Florida International University, Miami and an MBA in Management, an MS in Information Systems, a Doctorate in International Management and a Doctoral Specialization in Information Technology Management all from Nova Southeastern University, Ft. Lauderdale, Florida, from both the Graduate School of Computer and Information Sciences and the H. Wayne Huizenga School of Business and Entrepreneurship. Dr. Rose has published dozens of articles in academic journals and refereed conference proceedings and regularly attends international conferences to present papers. Dr. Rose is also a content expert reviewer for both The Handbook of Computer Networks and The Handbook of Technology Management published by John Wiley & Sons, Inc. and has even been an expert witness in Information Technology in court proceedings. His current areas of interest are the Internet of Things and Blockchain.

Photo of Michael Goldner
Michael Goldner

CHFI, CISM, CISSP, MCSE

Michael H. Goldner has been involved in the Information Security arena for over thirty years and has dedicated the last twenty years to developing hands on academic curriculum to help train the worlds future Cyber leaders. He received his Juris Doctorate from Stetson University College of Law and his undergraduate degree from Miami University. He is an active member of the American Bar association and a member of the Cyber Law subcommittee. He is a member of IEEE, ISSA ISC2, ISACA and PMI, and holds a number of industrially recognized certifications, including CISSP, CISM, C|CISO, CEI, C|EH, CHFI,MCT, MCSE/Security, MCSA, Security +, Network +, and A+. He has worked closely with EC-Council and Cengage Learning in the creation of the EC-Council Press series on Information Security and Computer Forensics, as well as serving as and editor and subject matter expert for publishers like John Wiley and Sons, Pearson Learning, and Jones and Bartlett Learning. Dr. Goldner’s multicultural experience of having lived and worked in various cultures throughout the world, combined with extensive business, financial and legal experience, and work in the area of proprietary education has contributed to his passion in creating a viable international leadership corps to guide our electronically connected society into a safe and prosperous future.

Photo of Pee Vululleh
Pee Vululleh

Dr. Pee Vululleh holds a doctorate in information technology and master's degrees in Psychology and information systems from Drexel University. He has been a faculty member and curriculum/course developer at several universities for several years now. He currently serves on the editorial review board for the Journal of Business, Technology, and Leadership." Dr. Vululleh's research interests lie in the study of e-technology acceptance, and he is the author of several e-technology articles on the subject.

Photo of Ricardo Mardales
Ricardo Mardales

Ricardo Mardales has over 20 years of experience in the information technology field. He has a vast expertise providing consultation and managing a wide array of systems and applications. Ricardo has been teaching at Charter Oak State College since 2014. He uses various instructional strategies in his teaching, with emphasis in providing active and experiential learning opportunities. Ricardo holds a M.S. in Computer Science and Engineering, a M.A. in Educational Technology from the University of Connecticut and a B.S. in Computer Science/Mathematics from Central Connecticut State University.

Photo of Tavon Reid
Tavon Reid

MISM, MNCM

Tavon Reid, MISM, MNCM Tavon's areas of experience include the following: IT development, security, and information systems operations; business impact analysis and resiliency planning; network and systems security; disaster recovery and contingency planning; and regulatory adherence and IT governance. Tavon is currently the Director of IT Services and Data Center Operations for the U.S. Social Security Administration. Tavon has over 17 years of professional IT operations and information systems experience, including 15 years spent as an IT leader in the Government and Public Sector industry. Mr. Reid has an extensive background performing a broad range of corporate IT initiatives while participating in planning, analysis and implementation of information technology solutions in direct support of business objectives. He has worked with multiple stakeholders and regulatory/oversight bodies across the federal government, including the White House Office of Management and Budget (OMB) and the Government Accountability Office (GAO) advising on data center optimization initiatives and participating in round tables on leading practices with the Chief Information Officers Council.

Outcomes & Pathways

Students who graduate with a major in Cyber Security will be able to:

  1. Explain the landscape, key terms, and concepts related to the many layers of information systems security.
  2. Explore and explain the fields in digital forensics and cyber policy analysis.
  3. Create policies and standard operating procedures for organizations that are ethically, morally, and legally sound while recognizing ethical dilemmas and social responsibilities.
  4. Identify and critically assess issues and concepts related to the protection of information and information systems.
  5. Use risk management principles to assess threats, vulnerabilities, countermeasures and impact contributions at risk in information systems.
  6. Illustrate and explain fundamental architectures of networks and the Internet, as well as their underlying principles.