Earn an Online Cyber Security Degree (Bachelor of Science)

The objective of the Cyber Security degree program is to provide students with the knowledge and skills to enter the workforce and advance in professional cyber security or information security roles. Required coursework builds a foundation and broad base of skills in network protocols, advanced security concepts and operating systems and system architecture. Courses are aligned to the Network+, Security+ and CISSP industry-standard certifications.

The Importance of Cybersecurity Degrees

Cybersecurity is one of the most important security components in society today. Throughout this section, we’ll discuss common security issues in various business sectors in the U.S. The need for new, qualified cybersecurity specialists may even be greater than you might expect.

Healthcare, one of the largest employment fields in the country, has fallen victim to continuous cyberattacks in recent years. During each of these security breaches, countless people may have been affected when their personal data was exploited. Attacks occur within industries and companies of all sizes, and the simple truth is any computer system connected to the internet can be vulnerable to attack.

Another field affected by frequent security breaches in the last decade is consumer banking. Organizations that offer banking services to the public may constantly need cybersecurity experts to help safeguard their systems from financial predators. The implementation of information security experts in the banking field can help protect banks and financial institutions from unwanted attacks, which can increase their quality of service to customers.

Websites of businesses, personal social media accounts and even individual storage clouds have also been breached through cyberattacks. As common websites and social media giants grow more secure using updates and software, hackers typically follow closely behind them. The job of the cybersecurity specialist may be to stay steps ahead of cyber attackers to protect the organizations in which they are employed. Hackers can gain access to personally identifying information through viruses and malware placed in downloads, emails and infected websites.

The work of a cyber criminal can be very technologically advanced and sophisticated. The best weapon to defend against attacks and breaches may be educated and experienced cybersecurity specialists. Through online cybersecurity programs such as our Bachelor of Science in Cybersecurity, you can learn methods to help identify potential risks and thwart breaches by cyber criminals. This degree program can also help you learn about software updates, security programs and personal methods for protecting computer information systems from cyberattacks. As technology continues to advance, the need for educated and dedicated cybersecurity specialists may continue to rise.

What will I learn in this online Cyber Security degree program?

Your curriculum focuses on operating systems, computer architectures, networking protocols and security basics. After graduation, you will possess the knowledge to analyze the role of security within an organization, as well as educate employees within the business about their security responsibilities. Plus, you’ll be prepared to sit for industry-standard certifications in Network+, Security+ and CISSP, where otherwise qualified.

Note: Grantham cannot guarantee successful completion of those exams. In some cases, field experience and/or background checks may be necessary to be eligible to take or successfully pass the exams.

What careers can I pursue with a Cyber Security bachelor’s degree?

You could pursue a number of information security careers, such as information security analyst, network administrator or IT security specialist1.

Other career possibilities include2:

Security Policy Analyst

The security policy analyst may be an important part of a cybersecurity team. Most employers expect security policy analysts to be knowledgeable of information technology, the types of security programs available for use, and methods to deter cyberattacks on personal and business-specific information. Professionals in this position should have extensive knowledge in servers, databases, web applications and virtual storage.

In business and organizations, these professionals may be responsible for analyzing current systems for possible weak points and areas that need improvement. Through a thorough assessment, analysts may be able to provide their clients with a plan of action to help increase the level of security and avoid potential threats.

Security policy analysts can promote a great deal of reliability for the companies they serve. Their job is to provide support and assistance in creating safe systems that contain secure elements to protect information and data within. In the U.S., security analysts can potentially earn $95,510 per year on average. Due to the higher need for security analysts in various organizations, the growth in this field may be must faster than other careers throughout the country. The estimated growth is currently at 15% or higher over the next decade.

Information Systems Security Administrator

The information systems security administrator may be a leading professional in the realm of information security. If you move into a career such as this one, you can review and implement security policies set to protect organizations from cyberattacks. This may include identifying and researching current breaches, presenting resolutions that can stop the breach before massive damage has been incurred, and implementing future policies to protect against such threats.

These management professionals in security administration may also be responsible for overseeing a staff of security personnel, providing training and monitoring their work environment. Throughout the country, security administrators may have the ability to earn $105,610 per year on average. This field may see a growth of 5-9% over the next decade.

Cybersecurity Software Engineer

One of the most effective methods for keeping computers and other electronic systems safe from cyber criminals is investing in reliable security software. The professionals responsible for creating this software can be an influential part of cybersecurity. Those pursuing a career in this field can assist with analyzing the needs of their clients, creating helpful security software that can meet their needs, and monitoring it for progress.

More responsibilities for software engineers in this field may include reviewing current software for potential improvement, intervening during a cyber threat, and teaming with other security specialists to determine the best methods for deterring cyberattacks. These professionals can earn $101,790 per year on average while employed in the U.S. The growth for this field may be much faster than other career fields involving security, with an expected rate of 15% or more over the next decade.

How long is this online Cybersecurity bachelor’s degree program?

At 120 credit hours, your accredited online cyber security degree program is designed to be completed in 38 months. It could take less time depending on how much transfer credit you receive and how many classes you take every term.

How much will the Cyber Security online degree program cost?

The undergraduate rate is $265 per credit hour. This rate may be lower if you’re a member of the military, a veteran or part of a military family. Additionally, Grantham University offers scholarships and financial aid for students who qualify.

When can I start?

Courses begin monthly, so you may start whenever you are ready.

Call us at (888) 947-2684 to learn more about our accredited degree programs, financial assistance opportunities or enrollment process.

View Program Disclosures

1 O*Net OnLine
2 https://www.bls.gov/

Cyber Security (Bachelor of Science)

Cyber Security Degree Program Outcomes

What is cybersecurity? After successfully completing these cyber security degree programs, you will be able to:

  • Apply knowledge of computing and mathematics appropriate to the discipline
  • Analyze a system, and identify and define the security risks and requirements for secure operation
  • Design, implement and evaluate a computer-based system, process, component or program to meet security needs
  • Address professional, ethical, legal, security and social issues and responsibilities
  • Communicate effectively with a range of audiences
  • Analyze the local and global impact of computing on individuals, organizations and society
  • Recognize the need for and an ability to engage in continuing professional development
  • Use current techniques, skills and tools necessary for computing security practice
  • Identify and analyze security risks of an information system
  • Develop security and recovery policies appropriate to an information system
Core Professional Competencies

Grantham University prepares students to succeed in a diverse array of professional and civic settings by incorporating the following six critical life skills into the curriculum:

  • Communication – Formulating and expressing thoughts and ideas effectively using oral, written and non-verbal communication skills in person, in writing and in a digital world.
  • Distributed Collaboration – Working effectively across distributed locations and asynchronously to achieve a common goal through relationship-building, shared responsibility, empathy and respect.
  • Professional and Social Responsibilities – Engaging in social responsibility through seeking justice, valuing diversity, respecting the environment; demonstrating professionalism through integrity, mutual accountability and ethical behavior. This includes considering the social and global impact of individual and organizational decisions and an awareness of and adherence to regulations, professional standards and industry best practices.
  • Critical thinking/problem solving – Using analytical reasoning when gathering and evaluating relevant information to effectively formulate possible solutions for an issue, problem or a variety of issues. This includes the ability to recognize potential consequences of a decision.
  • Career Management – Identifying knowledge, skills, abilities and personal strengths and experiences necessary to pursue career goals. Recognizing areas for professional growth, how to navigate and explore job options and to self-advocate for opportunities in the workplace.
  • Data Aptitude - Developing information literacy and the capacity to manage data with subsequent finding, structuring, evaluating and interpreting in order to provide meaningful analysis to accomplish a specific purpose.

Cyber Security (Bachelor of Science)

Pursue an online degree in cyber security solutions and prepare for a career as a professional information security specialist or analyst1.

Potential career paths and positions include:

  • Information Security Analyst
  • Data Security Administrator
  • Information Security Officer
  • Information Technology Security Analyst
  • Network Specialist
  • Systems Engineer

Employers can include:

  • Professional, scientific and technical services
  • Multi-National Corporations
  • Financial institutions
  • Large-scale retailers
  • Major manufacturers
  • Government – local, state and federal

Cyber Security (Bachelor of Science)

Grantham University’s 100% online coursework is designed to help you prepare for success in your career. While enrolled in the online cyber security degree program, your curriculum will look like this:

PROGRAM SNAPSHOT:
Program Core Credits: 52
General Education Core Credits: 43
Electives Credits: 25
Total Credit Hours: 120
Accreditation(s): DEAC
Program Core: 52
Course: Title: Credits:
Course: CS340 Title: Operating Systems Credits: 3
  This course introduces operating system fundamentals and compares a variety of operating systems. Servers and networking basics are included.
Course: CS386 Title: Systems Architecture Credits: 4
  This course provides technical knowledge of computer hardware and system software. The material covered in the course presents the background needed for systems analysis, design, configuration, procurement and management.
Course: IS211 Title: Introduction to Information Systems Security Credits: 3
  This course provides a broad overview of the principles, policies and technologies for securing computer and information systems. Topics include a survey of computer system vulnerabilities, cryptographic techniques, access control policies and mechanisms, qualitative and quantitative risk assessment and management, and the implications of security technology in the realm of risk management. Designing and implementing computer security policies and standards, formulating contingency plans and analyzing system security architectures, as well as compliance and ethics are examined.
Course: IS216 Title: Computer Networks Credits: 3
  This course covers fundamental, vendor-independent networking concepts. The course is aligned with the CompTIA Network+ certification exam. Various tools are used to analyze networks.
Course: IS242 Title: Management Information Systems Credits: 3
  This course covers the principles of managing information systems in the context of an enterprise. Topics include coverage of information technology in management, information systems in decision-making, planning of information systems, systems development, controls and security measures, and electronic commerce.
Course: IS311 Title: Security Operations Credits: 3
  This course covers the principles and practices of secure operation and management of information systems. Principles and practices of analysis and monitoring of systems security are also addressed.
Course: IS316 Title: TCP/IP Credits: 3
  This course provides a comprehensive, hands-on look at TCP/IP. Coverage includes the latest TCP/IP stack, as well as SMTP and IPv6. Practical skills are learned with hands-on projects using various tools.
Course: IS320 Title: Database Applications Credits: 3
  This course presents the fundamental concepts of database systems. The course covers the relational model, structured query language (SQL), data modeling, database design and database administration.
Course: IS336 Title: Systems Analysis and Design Credits: 3
  This course introduces the concepts, tools and techniques used in the analysis, design and deployment of information systems which support business requirements. Topics include requirements determination, data and process modeling, various development methodologies, project management, data and user interface design, security, implementation and maintenance, and documentation.
Course: IS355 Title: Risk Management Credits: 3
  This course provides a comprehensive review of industry approaches, practices and standards on how to handle risks to organizations' business-critical assets. Topics include identifying and analyzing threats, qualitative versus quantitative risk management, standards and processes to mitigate risk, risk control and risk policy. Through a practical approach, this course explores key topics that enable students to uncover and remediate potential infractions.
Course: IS360 Title: Disaster Recovery Credits: 3
  This course provides a comprehensive overview of disaster recovery and countermeasures for networks and businesses. Assess risks in the enterprise, determine critical business components, develop an enterprise disaster recovery system, and develop disaster policies, procedures, departmental roles and communication processes for enterprise network. It will provide a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. Learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster. Produce a disaster recovery document of procedures and policies to implement training, testing and rehearsal of a disaster recovery.
Course: IS411 Title: Network Security Credits: 3
  This course introduces the techniques, methodologies and tools used in building and maintaining secure networks. Lab exercises address assessing protocol, network and code vulnerabilities. The course is aligned with the CompTIA Security+ certification examination.
Course: IS440 Title: Human Decision and Security Engineering Credits: 3
  Providing an exploration of the human aspects of Cybersecurity, this course will educate students on human motivation and interaction, how security controls may be bypassed by a person's intentional or unintentional acts, and methods for reducing the cyber risks associated with people. Topics include human behavior and interaction, motivation and influence, and social engineering. Emphasis is on the human element of cyber incidents in relation to protecting information and technology assets.
Course: IS450 Title: Security Trends and Legal Issues Credits: 3
  This course examines the legal environment pertinent to security professionals. Topics include the role of government, relevant civil and criminal law, constitutional rights and privacy issues, intellectual property, and compliance. In addition, current trends in cybersecurity are explored.
Course: IS461 Title: Cryptography Credits: 3
  This course explores the ways in which cryptography can be used to protect communications traffic and sensitive data. Course topics include symmetric vs. asymmetric (public-key) ciphers; hash algorithms; message authentication codes; mathematical underpinnings of cryptography; cryptanalysis; public-key infrastructure; and implementation tradeoffs. Students gain hands-on experience in state-of-the-art technologies through completion of weekly lab exercises. The primary focus of the course is on building critical thinking and problem-solving skills.
Course: IS471 Title: Computer Forensics Credits: 3
  This course explores the methods and tools utilized for collecting and preserving electronic digital evidence for the computer forensic process. Topics include the forensic examination, crime categories, analysis, laws governing forensics and report writing. Experience with forensics tools and techniques are provided.
Course: IS499 Title: Security Capstone Credits: 3
  This course provides an integrative experience in the cyber security program through a review and integration of the major security domains. Building on coursework in the program, current trends and a comprehensive view of the field are used to provide a framework for the assessment, interpretation, and evaluation of security scenarios. A broad review of the materials that were presented within the program will be covered through hands-on experiences. A term-long project is a final deliverable of the course.
General Education: 43
Course: Title: Credits:
Course: GU101 Title: Student Success Credits: 3
  This course provides students with the foundation of knowledge and skills needed for today's online college environment. Students will explore their own preparedness for online learning through examination and analysis of their own skills, traits, and behaviors. In addition, students will acclimate to the online college environment through specifically-designed activities which provide opportunities to acquire necessary skills, behaviors, and understandings which are essential for academic success.
Course: English Composition Credits: 6
Course: EN261 Title: Fundamentals of Technical Writing Credits: 3
  This course introduces students to the purpose and scope of technical writing. Topics include standard conventions of written English; audience analysis; writing concisely for clarity and thoroughness; and determining how to present information appropriately in different professions (criminal justice, business, education, etc.) NOTE: Credit may not be awarded for both EN261 and EN361.
Course: Math Credits: 12
Course: MA105 Title: College Algebra Credits: 3
  This course is an introduction to the fundamental concepts of algebra. Topics include equations, polynomial and rational functions and graphing and exponential and logarithmic functions. A new textbook may be required in order to ensure needed electronic codes are valid.
Course: MA141 Title: Precalculus Credits: 3
  This course further develops the skills acquired in algebra and trigonometry and prepares students for calculus. Topics include factorization, powers and exponents, radicals, quadratic equations, inequalities and absolute value, progressions, graphing and an introduction to limits and basic trigonometry.
Course: MA230 Title: Mathematical Statistics I Credits: 3
  This course presents methods in making analytical decisions using statistics. The course focuses on the characteristics of numerical and categorical data, methods of presentation, and descriptive statistics. The course also introduces students to basic methods of sampling and of making inferences using one or two independent samples. NOTE: Credit may not be awarded for both MA215 and MA230.
Course: Natural/Physical Science Credits: 3
Course: Computer Science Credits: 7
Course: CS192 Title: Programming Essentials Credits: 3
  This course introduces problem-solving concepts needed for programming. It covers fundamental control structure such as the sequential structure, the selection structure and the repetition structure. The use of logic in designing programs has general application.
Course: CS200 Title: Programming in Java Credits: 4
  This course is devoted to object-oriented programming using Java. Topics include object-oriented programming, classes and instances, looping, arrays, flow control, packages, interfaces, streams, files, Java applet programming and applying advanced graphical user interface elements.
Course: Oral Communication Credits: 3
Course: Humanities and Fine Arts Credits: 3
Course: Social/Behavioral Science Credits: 6

You may substitute CS265 - Programming in C++ for CS200.
Choose one of the following for the Program Core: 3
IS351,IS475,IS481
IS211 and IS216 must be passed with a "C" or better in order to complete this program.