Bachelor of Science Degree
The field of cybersecurity is rapidly evolving as new threats emerge. This degree is an inclusive body of knowledge that combines both theory and application of technical and non-technical security skills. Graduates learn how to identify, analyze, mitigate and communicate risks in cyber systems using various tools, techniques and technologies.
Interested in this degree? Start Here
Courses in the major include:
This course introduces the goals, functional processes, tools, and techniques associated with network security. Services such as firewalls, intrusion detection mechanisms and Virtual Private Networks (VPNs) will be studied. Students will develop an understanding of telecommunications and networks security protocols used to prevent, detect, and correct potential vulnerabilities associated with both the outsider and insider threat.
This course provides the student with the basic topics associated with controlling how resources are accessed in an information system. Topics include organizational access control models, security models, and hardware and software controls that can be used to support those models. Additional topics include access models, and securing system access with passwords, smart cards and biometric devices to assist in securing system access and ensure confidentiality, integrity, and availability of data. Technologies such as remote authentication and Public Key Infrastructure (PKI) are also explored.
This course is intended to introduce students to the principles of risk assessment, vulnerability analysis, and auditing and how they are used to evaluate the effectiveness of information security controls. Students will develop an understanding of threat and asset identification, countermeasures and safeguards, acceptable risks, and vulnerabilities. The auditing concepts of technical, physical, and administrative controls will also be introduced along with how these controls are measured for effectiveness.
This course introduces information technologies and examines methods for protecting them against persistent and constantly evolving threats. Existing and emerging information technologies are discussed including operating environments, computer networking, and data management. Basic methods for managing information systems and technologies are presented from a standpoint of providing sufficient security protections.
This course focuses on the skills required to operate a security program within an organization. Coverage includes the practical application of security practices in an operational environment. Topics that comprise this course include security structure, leading security projects, policy management, human factors of security, and physical security methods.
This course explores secure base operating systems on server, desktop, virtual, and mobile platforms. Topics include the practical application of security tools, utilities, and configurations for protecting computer operating systems at both the user and corporate level. Course subject is also related to protecting stand-alone and virtualized servers, cloud computing security, and the protection of mobile platforms such as smart phones, tablets and handheld computers.
This course explores securing core technologies that support Internet applications and commerce. Processes for creating and administering Internet web sites to ensure proper protections are introduced. The course also addresses securing applications on Internet websites and mobile platforms, and introduces basic methods for secure development.
This course focuses on the protection of data at rest. Coverage includes the identification, ownership, and protection of data - whether residing in files, folders, or databases. This course also introduces the concept of database security to include: Architecture, Password Policies, Auditing, Privileges, and Roles Administration. Emphasis is placed on areas unique to data and database security.
This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices.
This course provides a monitored structure for application of the skills and knowledge acquired throughout the Cybersecurity program. Emphasis is placed on the use of real-world security problems, issues, and situations. Course assignments will require the use of protection, detection, deterrence, and response techniques in addressing threats, vulnerabilities, and risks found in businesses today. Students may enter this course when they have completed 24 credit hours of the required major courses. Prerequisite: 24 credit hours of the required major courses.
And two electives from a wide array of courses, including Cryptography, Structured System Analysis and Design, Accounting Information Systems, Cybercrime and Business, Foundations in Intelligence and Counterintelligence, Security for Healthcare, and many more.
This degree can also be taken as a cohort, where you enroll one class at a time, and complete with the same cohort of classmates. The cohort version of the degree includes the classes listed above, plus Cryptography and Penetration Testing and Incident Response.
Your Experience Counts
Bellevue University welcomes the college-level learning you already have and will count it toward your degree. Take advantage of the credits you have. Save time and money.
Real Learning for Real Life
Tracy Zamora graduated from Bellevue University through her employer's partnership with Bellevue University. Now, she directly applies the knowledge and skills she earned from her BS in Behavioral Science to her role. Her colleagues notice and she's their go-to for advice.