Curriculum addresses cybersecurity fundamentals. Choose from four tracks of study: Digital Forensics, Cyber Response, Governance & Leadership, and Security Architecture.
What You Will Learn
The 12-course, 34-credit curriculum was designed with input from industry experts to ensure you gain skills that line up with current market demands. Upon graduating you will know how to:
- Analyze and resolve security issues in networks and computer systems to secure an IT infrastructure
- Design, develop, test, and evaluate secure software
- Develop policies and procedures to manage security risks
- Evaluate and communicate the human role in security
- Interpret and forensically investigate security incidents
Four Unique Tracks of Study
Tailor your degree to match your interests and career ambitions through one of the program’s unique tracks of study.
Digital Forensics
Digital forensics uses scientific investigation methods to collect, preserve, and analyze data stored on electronic media so that it can withstand legal review. As a student in this track you will study computer criminology, network forensics, and learn digital evidence investigation techniques.
Cyber response
Cyber response is an organized approach to monitoring, detecting and responding to security events through each stage of their lifecycle. It encompasses both defensive and offensive security strategies—including threat identification, management and prevention. As a student in this track, you will learn about security infrastructure, incident remediation, and active defense techniques.
Governance and Leadership
Cybersecurity governance provides a framework for mitigating risk by assuring that information security strategies align with business objectives, and are consistent with relevant laws and regulations. It includes executive leadership and communication at every level of the organization. As a student in this track, you will take courses in security administration, leadership, and cybersecurity management.
Security Architecture
Security architecture is responsible for system confidentiality, integrity, and availability in relation to an enterprise’s overall system architecture and security process. As a student in this track you will study modern cryptography, the foundations of engineering secure applications, cyber-physical systems, and secure cloud computing.
Demand for Expertise
A ransomware attack occurs every 14 seconds. Nearly 60% of all companies in the U.S. have experienced a security breach. Cybercrime has caused trillions of dollars in losses across the world. This growing number of threats directly impacts the demand for cybersecurity talent. One problem: organizations can’t fill information security positions fast enough.
Between October 2018 and September 2019 there were 270,000 job openings nationwide for Information Security Analysts—a top cybersecurity job. And nearly 60 percent of those openings were brand new positions. There’s no slowing down either in the search for cybersecurity professionals. The Bureau of Labor Statistics predicts a 13 percent increase in cybersecurity-related jobs over the next decade.