Overview
Cybersecurity is an increasingly important field, as organizations of all types and sizes rely on information technology to conduct their operations. Information security breaches can result in significant financial and reputational damage, making cybersecurity a critical concern for businesses, governments, and individuals. Cybersecurity involves the use of various technologies, processes, and practices to ensure the confidentiality, integrity, and availability of data and information.
Graduates of this program are prepared to work in various roles, such as cybersecurity analysts, IT project managers, information systems auditors, and business analysts, among others. They play a critical role in helping organizations protect their sensitive data and ensure the effective use of technology to support business goals.
The Information Systems Security Concentration within Cybersecurity focuses on protecting information systems and the data they contain. Information systems are the collection of hardware, software, data, and people that make up an organization's information technology infrastructure. These systems are used to store, process, and transmit sensitive information such as financial data, intellectual property, and personal information. The Information Systems Security Concentration focuses on protecting information systems and data, helping to ensure the confidentiality, integrity, and availability of critical information.
In addition to technical controls, the Information Systems Security Concentration also involves developing and implementing policies, procedures, and training programs to ensure that employees understand their roles and responsibilities in protecting information systems and data.
Management Information Systems is a concentration within the broader information technology field that focuses on using computer systems and technology to manage business operations, processes, and data. It combines business and technology skills to help organizations use technology effectively to achieve their goals.
A Cybersecurity - Management Information Systems Concentration combines the two fields of cybersecurity and MIS to provide students with a comprehensive understanding of how to protect computer systems and data while also managing and utilizing technology to support business operations. Students learn about topics such as network security, risk management, data privacy, computer forensics, business analysis, project management, and information systems design and implementation.
Prior Experiential Learning
Cybersecurity Prior Experiential Learning Policy
PEL credit can be used to replace many required courses in the Cybersecurity program, but not CYBR 4370 Senior Project.
Students may earn up to 12 hours of PEL credit. PEL credit will be awarded on a case-by-case basis consistent with the university’s Credit for Prior Experiential Learning Policy.
The recommended Cybersecurity course-certification equivalency chart:
Course
|
Certification
|
CYBR-1320
|
CIW Web Security Associate |
CYBR-1330
|
CompTIA A+ exams |
CYBR-2315
|
Microsoft 365 Certified: Modern Desktop Administrator Associate certification examination. |
CYBR-2340
|
CompTIA Network+ |
CYBR-2350
|
CompTIA Project+ |
CYBR-3330
|
CompTIA Linux+ certification exams. |
CYBR-3340
|
Cisco Certified Entry Networking Technician (CCENT) certification. |
CYBR-3370
|
Exam AZ-800: Administering Windows Server Hybrid Core Infrastructure |
CYBR-4315
|
EC-Council Certified Incident Handling and Response certification. |
CYBR-4317
|
CompTIA IT Fundamentals |
CYBR-4319
|
CompTIA Cloud Essentials+
|
CYBR-4330
|
EC-Council Certified Ethical Hacker certification. |
CYBR-4360
|
CompTIA Security+ |
CYBR-4360
|
EC-Council Certified Network Defender certification |
Notes:
- The certification list above is subject to change based on curriculum changes and the change in the scope of the certification exams.
- Other certifications may be eligible depending on the scope of the certification as it maps to the courses.
- New certifications in the Cybersecurity industry are continuously created, which will add other options to the certifications identified above.