Bachelor of Science in Cybersecurity Major (Online)

Overview

Cybersecurity is an increasingly important field, as organizations of all types and sizes rely on information technology to conduct their operations. Information security breaches can result in significant financial and reputational damage, making cybersecurity a critical concern for businesses, governments, and individuals. Cybersecurity involves the use of various technologies, processes, and practices to ensure the confidentiality, integrity, and availability of data and information.

Graduates of this program are prepared to work in various roles, such as cybersecurity analysts, IT project managers, information systems auditors, and business analysts, among others. They play a critical role in helping organizations protect their sensitive data and ensure the effective use of technology to support business goals.

The Information Systems Security Concentration within Cybersecurity focuses on protecting information systems and the data they contain. Information systems are the collection of hardware, software, data, and people that make up an organization's information technology infrastructure. These systems are used to store, process, and transmit sensitive information such as financial data, intellectual property, and personal information. The Information Systems Security Concentration focuses on protecting information systems and data, helping to ensure the confidentiality, integrity, and availability of critical information.

In addition to technical controls, the Information Systems Security Concentration also involves developing and implementing policies, procedures, and training programs to ensure that employees understand their roles and responsibilities in protecting information systems and data.

Management Information Systems is a concentration within the broader information technology field that focuses on using computer systems and technology to manage business operations, processes, and data. It combines business and technology skills to help organizations use technology effectively to achieve their goals.

A Cybersecurity - Management Information Systems Concentration combines the two fields of cybersecurity and MIS to provide students with a comprehensive understanding of how to protect computer systems and data while also managing and utilizing technology to support business operations. Students learn about topics such as network security, risk management, data privacy, computer forensics, business analysis, project management, and information systems design and implementation.

Degree Requirements

Online Core Curriculum

Required Courses

COLL-1325Academic Success

3

CHST-1301Engaging the Biblical Narrative

3

CHST-1302Integrating a Biblical Worldview

3

ENGL-1310Composition and Rhetoric

3

ENGL-1320Composition and Literature

3

BIOL-1310Scientific Inquiry in a Living World

3

PSYC-2310Introduction to Psychology

3

Communication

Choose one from the list below.
COMM-2300Oral Communication

3

COMM-2308Small Group Communication

3

COMM-2310Interpersonal Communication

3

Civic Awareness

Choose one from the list below.
HIST-1385Western Civ in a Global Context Since 1517

3

HIST-2310United States History to 1865

3

HIST-2320United States History Since 1865

3

PLSC-2310American National Government

3

Humanities and the Arts

Choose one from the list below.
ARTS-1300Engaging the Arts Through Visual Arts

3

MUSC-1300Engaging the Arts Through Music

3

THTR-1300Engaging the Arts Through Theatre

3

ENGL-2300Multicultural Literature

3

Mathematics

 
-
Any 1000-level math course 1310 or higher

3

Total Credit Hours:33

Cybersecurity Major Requirements

CJUS-1310Introduction to Criminal Justice

3

CJUS-4350Cybercrime

3

CYBR-1305Management Information Systems

3

CYBR-1320Introduction to Cybersecurity

3

CYBR-1330Foundations of Computing

3

CYBR-2315Windows Desktop Administration

3

CYBR-2325Mathemetics in IT

3

CYBR-2340Network Fundamentals

3

CYBR-2350Principles of Project Management

3

CYBR-3330Linux Fundamentals

3

CYBR-3340Network Switching and Routing

3

CYBR-3370Windows Server Installation

3

CYBR-4330Ethical Hacking and Systems Defense

3

CYBR-4360Network Security

3

CYBR-4370Senior Project

3

CYBR-4390Internship

3

Total Credit Hours:48

Information Systems Security Concentration

CYBR-4315Incident Handling and Response

3

CYBR-4316Managing Secure Network Systems

3

CYBR-4321Security Analysis and Vulnerability Assessment

3

CYBR-4340Linux Networking and Security

3

Total Credit Hours:12

Management Information Systems Concentration

CYBR-4317Foundations of Info Sys Management

3

CYBR-4318Enterprise Architecture

3

CYBR-4319Cloud Technologies

3

CYBR-4380Systems Analysis and Design

3

Total Credit Hours:12
Total Free Elective Requirements 27
Total Degree Requirements 120

Plan of Study

All Cybersecurity Majors

Freshman Year - Fall

CYBR-2325Mathemetics in IT

3

CYBR-1320Introduction to Cybersecurity

3

-
Additional Core Curriculum or Other Credits

8-9

Total Credit Hours:14-15

Freshman Year - Spring

CJUS-1310Introduction to Criminal Justice

3

CYBR-1305Management Information Systems

3

CYBR-1330Foundations of Computing

3

-
Additional Core Curriculum or Other Credits

5-6

Total Credit Hours:14-15

Sophomore Year - Fall

CYBR-2315Windows Desktop Administration

3

CYBR-2340Network Fundamentals

3

-
Additional Core Curriculum or Other Credits

8-9

Total Credit Hours:14-15

Sophomore Year - Spring

CYBR-3330Linux Fundamentals

3

CYBR-3370Windows Server Installation

3

-
Additional Core Curriculum or Other Credits

8-9

Total Credit Hours:14-15

Junior Year - Fall

CYBR-4360Network Security

3

CYBR-4330Ethical Hacking and Systems Defense

3

-
Additional Core Curriculum or Other Credits

8-9

Total Credit Hours:14-15

Junior Year - Spring

CYBR-2350Principles of Project Management

3

CJUS-4350Cybercrime

3

-
Additional Core Curriculum or Other Credits

8-9

Total Credit Hours:14-15

Information Systems Security Concentration

Senior Year - Fall

CYBR-3340Network Switching and Routing

3

CYBR-4315Incident Handling and Response

3

CYBR-4390Internship

3

-
Additional Core Curriculum or Other Credits

5-6

Total Credit Hours:14-15

Senior Year - Spring

CYBR-4316Managing Secure Network Systems

3

CYBR-4321Security Analysis and Vulnerability Assessment

3

CYBR-4340Linux Networking and Security

3

CYBR-4370Senior Project

3

-
Additional core curriculum

3

Total Credit Hours:14-15

Management Information Systems Concentration

Senior Year - Fall

CYBR-3340Network Switching and Routing

3

CYBR-4318Enterprise Architecture

3

CYBR-4390Internship

3

-
Additional Core Curriculum or Other Credits

5-6

Total Credit Hours:14-15

Senior Year - Spring

CYBR-4317Foundations of Info Sys Management

3

CYBR-4319Cloud Technologies

3

CYBR-4370Senior Project

3

CYBR-4380Systems Analysis and Design

3

-
Additional core curriculum

3

Total Credit Hours:14-15

Prior Experiential Learning

Cybersecurity Prior Experiential Learning Policy

PEL credit can be used to replace many required courses in the Cybersecurity program, but not CYBR 4370 Senior Project.

Students may earn up to 12 hours of PEL credit. PEL credit will be awarded on a case-by-case basis consistent with the university’s Credit for Prior Experiential Learning Policy.

The recommended Cybersecurity course-certification equivalency chart:

Course
Certification
CYBR-1320
CIW Web Security Associate 
CYBR-1330
CompTIA A+ exams 
CYBR-2315
Microsoft 365 Certified: Modern Desktop Administrator Associate certification examination. 
CYBR-2340
CompTIA Network+ 
CYBR-2350
CompTIA Project+ 
CYBR-3330
CompTIA Linux+ certification exams. 
CYBR-3340
Cisco Certified Entry Networking Technician (CCENT) certification. 
CYBR-3370
Exam AZ-800: Administering Windows Server Hybrid Core Infrastructure 
CYBR-4315
EC-Council Certified Incident Handling and Response certification. 
CYBR-4317
CompTIA IT Fundamentals 
CYBR-4319
CompTIA Cloud Essentials+
CYBR-4330
EC-Council Certified Ethical Hacker certification. 
CYBR-4360
CompTIA Security+ 
CYBR-4360
EC-Council Certified Network Defender certification 

Notes:
- The certification list above is subject to change based on curriculum changes and the change in the scope of the certification exams.
- Other certifications may be eligible depending on the scope of the certification as it maps to the courses.
- New certifications in the Cybersecurity industry are continuously created, which will add other options to the certifications identified above.