Earn an Online Cyber Security Degree (Bachelor of Science)

The objective of the Cyber Security degree program is to provide students with the knowledge and skills to enter the workforce and advance in professional cyber security or information security roles. Required coursework builds a foundation and broad base of skills in network protocols, advanced security concepts and operating systems and system architecture. Courses are aligned to the Network+, Security+ and CISSP industry-standard certifications.

The Importance of Cybersecurity Degrees

Cybersecurity is one of the most important security components in society today. Throughout this section, we’ll discuss common security issues in various business sectors in the U.S. The need for new, qualified cybersecurity specialists may even be greater than you might expect.

Healthcare, one of the largest employment fields in the country, has fallen victim to continuous cyberattacks in recent years. During each of these security breaches, countless people may have been affected when their personal data was exploited. Attacks occur within industries and companies of all sizes, and the simple truth is any computer system connected to the internet can be vulnerable to attack.

Another field affected by frequent security breaches in the last decade is consumer banking. Organizations that offer banking services to the public may constantly need cybersecurity experts to help safeguard their systems from financial predators. The implementation of information security experts in the banking field can help protect banks and financial institutions from unwanted attacks, which can increase their quality of service to customers.

Websites of businesses, personal social media accounts and even individual storage clouds have also been breached through cyberattacks. As common websites and social media giants grow more secure using updates and software, hackers typically follow closely behind them. The job of the cybersecurity specialist may be to stay steps ahead of cyber attackers to protect the organizations in which they are employed. Hackers can gain access to personally identifying information through viruses and malware placed in downloads, emails and infected websites.

The work of a cyber criminal can be very technologically advanced and sophisticated. The best weapon to defend against attacks and breaches may be educated and experienced cybersecurity specialists. Through online cybersecurity programs such as our Bachelor of Science in Cybersecurity, you can learn methods to help identify potential risks and thwart breaches by cyber criminals. This degree program can also help you learn about software updates, security programs and personal methods for protecting computer information systems from cyberattacks. As technology continues to advance, the need for educated and dedicated cybersecurity specialists may continue to rise.

As the country progresses into an even more technologically-advanced age, professionals like you may be sought out to take on positions relating to internet and data protection. If you might be interested in a career that includes the use of technology, safeguarding the public from the theft of personal information, and working with some of the top tech agencies in the country, a degree in Cyber Security may be a great option for you to pursue.

This degree program can help you gain the skills necessary to administer safety tools and procedures on computer information systems and other technological devices in an effort to keep private information out of the hands of those with malicious intentions.

Degree programs related to this field may contain similar courses or other elements, making it difficult for you to make the right decision for your future. In this degree comparison, we will take a look at the Bachelor of Science in Cyber Security and Bachelor of Arts in Criminal Justice (with a concentration in Computer Forensic Investigation) to help you highlight the benefits of choosing either path.

Bachelor of Science in Cyber Security

If you are familiar with innovative technologies, social media, and online banking, you know that Cyber Security is a huge concern. People rely on the internet to stay in touch and conduct business. People just like you are using personal and business emails important communications and utilizing websites to manage their finances and personal documents. There are people all around the world that have learned ways to access your personal identifying information and use it in fraudulent ways. This has increased the need for knowledgeable professionals to implement safeguards to protect people from these invasive attacks. One great way for you to learn more about what is involved in this degree program is reviewing the curriculum. We have placed a few example courses below to help you identify some of the topics you could take part in throughout this program.

Operating Systems

Before you ever begin learning about Cyber Security, you may delve into the basics of computer operating systems. This can provide you with the fundamental elements of operating systems currently present in the U.S., as well as a look into the various servers and networking operations commonly used by organizations and individuals.  The hands-on component includes installing a virtual box in order to explore another operating system. This information can be helpful as you build upon this knowledge as you progress through the degree program.

Intro to Information Systems Security

In this day and age, you may find that there is an abundance of safety and security tools for use on computer information systems. This course may begin introducing you to the evolution of information security, as well as look into common security measures used today. The goal of this course is to provide you with enough information in current information security tactics to jumpstart your knowledge of available innovative new security measures.

Disaster Recovery

As a Cyber Security expert, there may be times that you are forced to intervene after damage has already been done. Some of the skills that you can learn from this course include those relating to general risk assessments, the analysis of damage incurred by cyber-attacks, and the implementation of improvement plans to both correct damage done and prevent future occurrences of attacks.

Bachelor of Arts in Criminal Justice (concentration in Computer Forensic Investigation)

There are many different subfields of Cyber Security that can be great options for you depending on what type of career you would like to have after graduation. One of the most compared degree programs for people interested in Cyber Security is our Bachelor of Arts in Criminal Justice with a concentration in Computer Forensic Investigation. While this degree program is not directly related to securing information systems for private or commercial use, it does require you to have a diverse understanding of computer and network operating systems in order to investigate or research criminal behavior.

A Computer Forensic Investigation degree program can help you learn methods of retrieving data and information from damaged technological devices and gathering electronic evidence for use in criminal proceedings. If you would like to learn more about specific roles or responsibilities in this field in comparison to Cyber Security, take a look at some of the courses listed below:

Search and Seizure of Digital Evidence

In Computer Forensic Investigation, you must take all of the necessary legal and ethical precautions necessary to protect the rights of all people involved. While you are taking this course, you can expect to look more into the laws and regulations associated with performing searches on digital devices, as well as the regulations associated with consent and retrieval. You can review laws regarding search warrants and how to obtain them, as well as proper gathering methods for evidence received during the search process.

Malware Forensics

The increased use of technology in the U.S. may make it necessary for you to consider both the good and the bad implications of computer information systems. Malware can be a destructive resource for criminals interested in a wide variety of illegal activities. It may be up to you as a forensic specialist to identify this type of software and provide safeguards against it. Part of this course may include a look into some of the historical forms of malware and leading into some of the most recent and advanced forms of malware. The goal of this course is to introduce you to malware from a progressive standpoint and provide you with the tools to search for, analyze, and prevent malware attacks throughout your career.

Digital Forensics Investigation Techniques

At the onset of this course, you can indulge in the benefits of digital forensics investigation techniques during the investigation of criminal behavior. From that point, you may take on learning about the different types of methods that can be useful in locating evidence in digital or electronic devices, proper collection regulations, and methods for uncovering hidden or encrypted information within a computers operating system. These tools can assist you in providing a more thorough investigation of the systems you may be processing throughout your career.

What will I learn in this online Cyber Security degree program?

Your curriculum focuses on operating systems, computer architectures, networking protocols and security basics. After graduation, you will possess the knowledge to analyze the role of security within an organization, as well as educate employees within the business about their security responsibilities. Plus, you’ll be prepared to sit for industry-standard certifications in Network+, Security+ and CISSP, where otherwise qualified.

Note: Grantham cannot guarantee successful completion of those exams. In some cases, field experience and/or background checks may be necessary to be eligible to take or successfully pass the exams.

What careers can I pursue with a Cyber Security bachelor’s degree?

You could pursue a number of information security careers, such as information security analyst, network administrator or IT security specialist1.

Other career possibilities include2:

Security Policy Analyst

The security policy analyst may be an important part of a cybersecurity team. Most employers expect security policy analysts to be knowledgeable of information technology, the types of security programs available for use, and methods to deter cyberattacks on personal and business-specific information. Professionals in this position should have extensive knowledge in servers, databases, web applications and virtual storage.

In business and organizations, these professionals may be responsible for analyzing current systems for possible weak points and areas that need improvement. Through a thorough assessment, analysts may be able to provide their clients with a plan of action to help increase the level of security and avoid potential threats.

Security policy analysts can promote a great deal of reliability for the companies they serve. Their job is to provide support and assistance in creating safe systems that contain secure elements to protect information and data within. In the U.S., security analysts can potentially earn $95,510 per year on average. Due to the higher need for security analysts in various organizations, the growth in this field may be must faster than other careers throughout the country. The estimated growth is currently at 15% or higher over the next decade.

Information Systems Security Administrator

The information systems security administrator may be a leading professional in the realm of information security. If you move into a career such as this one, you can review and implement security policies set to protect organizations from cyberattacks. This may include identifying and researching current breaches, presenting resolutions that can stop the breach before massive damage has been incurred, and implementing future policies to protect against such threats.

These management professionals in security administration may also be responsible for overseeing a staff of security personnel, providing training and monitoring their work environment. Throughout the country, security administrators may have the ability to earn $105,610 per year on average. This field may see a growth of 5-9% over the next decade.

Cybersecurity Software Engineer

One of the most effective methods for keeping computers and other electronic systems safe from cyber criminals is investing in reliable security software. The professionals responsible for creating this software can be an influential part of cybersecurity. Those pursuing a career in this field can assist with analyzing the needs of their clients, creating helpful security software that can meet their needs, and monitoring it for progress.

More responsibilities for software engineers in this field may include reviewing current software for potential improvement, intervening during a cyber threat, and teaming with other security specialists to determine the best methods for deterring cyberattacks. These professionals can earn $101,790 per year on average while employed in the U.S. The growth for this field may be much faster than other career fields involving security, with an expected rate of 15% or more over the next decade.

How long is this online Cybersecurity bachelor’s degree program?

At 120 credit hours, your accredited online cyber security degree program is designed to be completed in 38 months. It could take less time depending on how much transfer credit you receive and how many classes you take every term.

How much will the Cyber Security online degree program cost?

The undergraduate rate is $295 per credit hour. This rate may be lower if you’re a member of the military, a veteran or part of a military family. Additionally, Grantham University offers scholarships and financial aid for students who qualify.

When can I start?

Courses begin monthly, so you may start whenever you are ready.

Call us at (888) 947-2684 to learn more about our accredited degree programs, financial assistance opportunities or enrollment process.

View Program Disclosures

1 O*Net OnLine
2 https://www.bls.gov/

Cyber Security (Bachelor of Science)

Cyber Security Degree Program Outcomes

What is cybersecurity? After successfully completing these cyber security degree programs, you will be able to:

  • Apply knowledge of computing and mathematics appropriate to the discipline
  • Analyze a system, and identify and define the security risks and requirements for secure operation
  • Design, implement and evaluate a computer-based system, process, component or program to meet security needs
  • Address professional, ethical, legal, security and social issues and responsibilities
  • Communicate effectively with a range of audiences
  • Analyze the local and global impact of computing on individuals, organizations and society
  • Recognize the need for and an ability to engage in continuing professional development
  • Use current techniques, skills and tools necessary for computing security practice
  • Identify and analyze security risks of an information system
  • Develop security and recovery policies appropriate to an information system
Core Professional Competencies

Grantham University prepares students to succeed in a diverse array of professional and civic settings by incorporating the following six critical life skills into the curriculum:

  • Communication – Formulating and expressing thoughts and ideas effectively using oral, written and non-verbal communication skills in person, in writing and in a digital world.
  • Distributed Collaboration – Working effectively across distributed locations and asynchronously to achieve a common goal through relationship-building, shared responsibility, empathy and respect.
  • Professional and Social Responsibilities – Engaging in social responsibility through seeking justice, valuing diversity, respecting the environment; demonstrating professionalism through integrity, mutual accountability and ethical behavior. This includes considering the social and global impact of individual and organizational decisions and an awareness of and adherence to regulations, professional standards and industry best practices.
  • Critical thinking/problem solving – Using analytical reasoning when gathering and evaluating relevant information to effectively formulate possible solutions for an issue, problem or a variety of issues. This includes the ability to recognize potential consequences of a decision.
  • Career Management – Identifying knowledge, skills, abilities and personal strengths and experiences necessary to pursue career goals. Recognizing areas for professional growth, how to navigate and explore job options and to self-advocate for opportunities in the workplace.
  • Data Aptitude - Developing information literacy and the capacity to manage data with subsequent finding, structuring, evaluating and interpreting in order to provide meaningful analysis to accomplish a specific purpose.

Cyber Security (Bachelor of Science)

Pursue an online degree in cyber security solutions and prepare for a career as a professional information security specialist or analyst1.

Potential career paths and positions include:

  • Information Security Analyst
  • Data Security Administrator
  • Information Security Officer
  • Information Technology Security Analyst
  • Network Specialist
  • Systems Engineer

Employers can include:

  • Professional, scientific and technical services
  • Multi-National Corporations
  • Financial institutions
  • Large-scale retailers
  • Major manufacturers
  • Government – local, state and federal

Cyber Security (Bachelor of Science)

Grantham University’s 100% online coursework is designed to help you prepare for success in your career. While enrolled in the online cyber security degree program, your curriculum will look like this:

PROGRAM SNAPSHOT:
Program Core Credits: 52
General Education Core Credits: 43
Electives Credits: 25
Total Credit Hours: 120
Accreditation(s): DEAC
Program Core: 52
Course: Title: Credits:
Course: CS340 Title: Operating Systems Credits: 3
  This course introduces operating system fundamentals and compares a variety of operating systems. Servers and networking basics are included.
Course: CS386 Title: Systems Architecture Credits: 4
  This course provides technical knowledge of computer hardware and system software. The material covered in the course presents the background needed for systems analysis, design, configuration, procurement and management.
Course: IS211 Title: Introduction to Information Systems Security Credits: 3
  This course provides a broad overview of the principles, policies and technologies for securing computer and information systems. Topics include a survey of computer system vulnerabilities, cryptographic techniques, access control policies and mechanisms, qualitative and quantitative risk assessment and management, and the implications of security technology in the realm of risk management. Designing and implementing computer security policies and standards, formulating contingency plans and analyzing system security architectures, as well as compliance and ethics are examined.
Course: IS216 Title: Computer Networks Credits: 3
  This course covers fundamental, vendor-independent networking concepts. The course is aligned with the CompTIA Network+ certification exam. Various tools are used to analyze networks.
Course: IS242 Title: Management Information Systems Credits: 3
  This course covers the principles of managing information systems in the context of an enterprise. Topics include coverage of information technology in management, information systems in decision-making, planning of information systems, systems development, controls and security measures, and electronic commerce.
Course: IS311 Title: Security Operations Credits: 3
  This course covers the principles and practices of secure operation and management of information systems. Principles and practices of analysis and monitoring of systems security are also addressed.
Course: IS316 Title: TCP/IP Credits: 3
  This course provides a comprehensive, hands-on look at TCP/IP. Coverage includes the latest TCP/IP stack, as well as SMTP and IPv6. Practical skills are learned with hands-on projects using various tools.
Course: IS320 Title: Database Applications Credits: 3
  This course presents the fundamental concepts of database systems. The course covers the relational model, structured query language (SQL), data modeling, database design and database administration.
Course: IS336 Title: Systems Analysis and Design Credits: 3
  This course introduces the concepts, tools and techniques used in the analysis, design and deployment of information systems which support business requirements. Topics include requirements determination, data and process modeling, various development methodologies, project management, data and user interface design, security, implementation and maintenance, and documentation.
Course: IS355 Title: Risk Management Credits: 3
  This course provides a comprehensive review of industry approaches, practices and standards on how to handle risks to organizations' business-critical assets. Topics include identifying and analyzing threats, qualitative versus quantitative risk management, standards and processes to mitigate risk, risk control and risk policy. Through a practical approach, this course explores key topics that enable students to uncover and remediate potential infractions.
Course: IS360 Title: Disaster Recovery Credits: 3
  This course provides a comprehensive overview of disaster recovery and countermeasures for networks and businesses. Assess risks in the enterprise, determine critical business components, develop an enterprise disaster recovery system, and develop disaster policies, procedures, departmental roles and communication processes for enterprise network. It will provide a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. Learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster. Produce a disaster recovery document of procedures and policies to implement training, testing and rehearsal of a disaster recovery.
Course: IS411 Title: Network Security Credits: 3
  This course introduces the techniques, methodologies and tools used in building and maintaining secure networks. Lab exercises address assessing protocol, network and code vulnerabilities. The course is aligned with the CompTIA Security+ certification examination.
Course: IS440 Title: Human Decision and Security Engineering Credits: 3
  Providing an exploration of the human aspects of Cybersecurity, this course will educate students on human motivation and interaction, how security controls may be bypassed by a person's intentional or unintentional acts, and methods for reducing the cyber risks associated with people. Topics include human behavior and interaction, motivation and influence, and social engineering. Emphasis is on the human element of cyber incidents in relation to protecting information and technology assets.
Course: IS450 Title: Security Trends and Legal Issues Credits: 3
  This course examines the legal environment pertinent to security professionals. Topics include the role of government, relevant civil and criminal law, constitutional rights and privacy issues, intellectual property, and compliance. In addition, current trends in cybersecurity are explored.
Course: IS461 Title: Cryptography Credits: 3
  This course explores the ways in which cryptography can be used to protect communications traffic and sensitive data. Course topics include symmetric vs. asymmetric (public-key) ciphers; hash algorithms; message authentication codes; mathematical underpinnings of cryptography; cryptanalysis; public-key infrastructure; and implementation tradeoffs. Students gain hands-on experience in state-of-the-art technologies through completion of weekly lab exercises. The primary focus of the course is on building critical thinking and problem-solving skills.
Course: IS471 Title: Computer Forensics Credits: 3
  This course explores the methods and tools utilized for collecting and preserving electronic digital evidence for the computer forensic process. Topics include the forensic examination, crime categories, analysis, laws governing forensics and report writing. Experience with forensics tools and techniques are provided.
Course: IS499 Title: Security Capstone Credits: 3
  This course provides an integrative experience in the cyber security program through a review and integration of the major security domains. Building on coursework in the program, current trends and a comprehensive view of the field are used to provide a framework for the assessment, interpretation, and evaluation of security scenarios. A broad review of the materials that were presented within the program will be covered through hands-on experiences. A term-long project is a final deliverable of the course.
General Education: 43
Course: Title: Credits:
Course: English Composition Credits: 6
Course: EN261 Title: Fundamentals of Technical Writing Credits: 3
  This course introduces students to the purpose and scope of technical writing. Topics include standard conventions of written English; audience analysis; writing concisely for clarity and thoroughness; and determining how to present information appropriately in different professions (criminal justice, business, education, etc.) NOTE: Credit may not be awarded for both EN261 and EN361.
Course: Math Credits: 12
Course: MA105 Title: College Algebra Credits: 3
  This course is an introduction to the fundamental concepts of algebra. Topics include equations, polynomial and rational functions and graphing and exponential and logarithmic functions. A new textbook may be required in order to ensure needed electronic codes are valid.
Course: MA141 Title: Precalculus Credits: 3
  This course further develops the skills acquired in algebra and trigonometry and prepares students for calculus. Topics include factorization, powers and exponents, radicals, quadratic equations, inequalities and absolute value, progressions, graphing and an introduction to limits and basic trigonometry.
Course: MA230 Title: Mathematical Statistics I Credits: 3
  This course presents methods in making analytical decisions using statistics. The course focuses on the characteristics of numerical and categorical data, methods of presentation, and descriptive statistics. The course also introduces students to basic methods of sampling and of making inferences using one or two independent samples. NOTE: Credit may not be awarded for both MA215 and MA230.
Course: Natural/Physical Science Credits: 3
Course: Computer Science Credits: 7
Course: CS192 Title: Programming Essentials Credits: 3
  This course introduces problem-solving concepts needed for programming. It covers fundamental control structure such as the sequential structure, the selection structure and the repetition structure. The use of logic in designing programs has general application.
Course: CS200 Title: Programming in Java Credits: 4
  This course is devoted to object-oriented programming using Java. Topics include object-oriented programming, classes and instances, looping, arrays, flow control, packages, interfaces, streams, files, Java applet programming and applying advanced graphical user interface elements.
Course: Oral Communication Credits: 3
Course: Humanities and Fine Arts Credits: 3
Course: Social/Behavioral Science Credits: 6
Course: General Education Credits: 3

You may substitute CS265 - Programming in C++ for CS200.
Choose one of the following for the Program Core: 3
IS351,IS475,IS481
IS211 and IS216 must be passed with a "C" or better in order to complete this program.