Time: < 1 minute

Get More Information

  • Receive personalized details about this course.
  • Learn about scholarships, tuition, and more.
Balkis N. — Class of 2019 inspects a server room

Bachelor of Science in Cybersecurity

computer icon for 4 week courses

4-week Courses

Start sooner and finish faster with our innovative course design.

calendar icon for year round enrollment

Year-Round ENrollment

Our admissions team reviews applications year-round.

graduation cap icon for alumni community

230K+ Alumni Worldwide

Become a member of NU’s global community.

Home » Programs » Bachelor of Science in Cybersecurity

Take the first step in your National University Journey

Monthly Class Starts

Request Information

Bachelor of Science in Cybersecurity

The growing and imperative need to protect sensitive personal and financial data from being shared widely online is why many career seekers consider pursuing a cybersecurity degree a worthwhile investment in their future.

National University’s Bachelor of Science in Cybersecurity program prepares students to become top security analysts, network defenders, and computer incident responders with coursework that gives them a comprehensive understanding of information technology management and security processes. Our curriculum is taught by expert faculty with real-world experience so you can gain the competencies needed in the field. Each course is only four weeks long, so the program can be completed in a shorter time frame than a traditional bachelor’s degree.

Secure Your Future Protecting Computer Networks from Unauthorized Activity

NU’s BS in Cybersecurity also offers career-focused concentrations in Computer Network DefenseDigital Forensics, or Information Technology Management. A concentration can expand your knowledge in a given area and help make you more competitive in the job market. If you are interested in a job with potential for growth, long-term security, and a good salary, a career in cybersecurity could be an excellent option.

National Center of Academic Excellence icon
National Center of Academic Excellence (NCAE) in Cybersecurity icon

The National Security Agency (NSA) has designated National University as a National Center of Academic Excellence (NCAE) in Cyber Defense (CAE-CD) through 2028. More information on the National Center of Academic Excellence (NCAE) in Cybersecurity program can be found here: https://www.nsa.gov/Academics/Centers-of-Academic-Excellence/

WASC icon

The Western Association of Schools and Colleges (WASC) accredits public and private schools, colleges, and universities in the U.S.

graduate icon

95% of graduates with a Bachelor’s in Cybersecurity are employed in their related field.

Course Details

Foundation Technologies

  • 6 courses; 27 quarter units

This course provides an introduction to basic network concepts including local area networks, wireless networks, and wide area networks. Network security concepts are also introduced. Students will explore secure router configurations.

An introduction to the basic architecture and functions of an operating system. Computer hardware and software integration will be explored. Basic design and functionality of the Windows and Linux operating systems will be explored. In addition, core aspects of securing operating systems are covered.

An introductory survey course that explores the fundamental concepts of cybersecurity. Coverage includes the concepts of confidentiality, integrity, and availability, cybersecurity policy, and the ethical and legal aspects of cybersecurity.

Prerequisite: CYB 206

The principles of data security are introduced. Students will learn how to protect data in transit and at rest. The technical aspects of implementing encryption, authentication, and access control to protect data will be covered along with the development and implementation of associated policy. Basic database security concepts and guidelines will be covered.

PrerequisiteCYB 202; CYB 204

This course introduces the fundamental concepts of cloud computing and virtualization. The core cloud deployment and service models will be covered. A comparison of public and private cloud deployments will be conducted. The concepts of devops and continuous integration will be introduced.

PrerequisiteCYB 215

This course introduces the fundamental concepts of programming for cybersecurity professionals. A survey of program tools will be conducted. The use of PowerShell, scripting, and python to implement system security will be covered in this class.

First Core Sequence

  • 5 courses; 22.5 quarter units

Provides instruction and practice on the writing skills needed to create clear and concise technical documents. Students will understand how to explain technical topics to non-technical leadership. The Project planning and management concepts will be introduced.

PrerequisiteCYB 216

This course covers the secure administration of Linux based systems. Students will learn how to implement and assess standards based security measures on the Linux operating systems. Automating the implementation and assessment of security measures will be a core component of the class. Legal and ethical aspects of system administration will also be covered.

This course covers the secure administration of Windows based Desktop and server systems. Students will learn how to implement and assess standards based security measures on Windows based operating systems. Automating the implementation and assessment of security measures will be a core component of the class. Legal and ethical aspects of system administration will also be covered.

PrerequisiteCYB 331; CYB 332

This course builds on CYB 216 and covers advanced topics in security automation. Students will learn how to manage security related code in a software repository. Students will write integrated scripts to implement and assess system security. Use of devops automation tools to securely manage infrastructure will also be covered.

PrerequisiteCYB 333

An explanation of the development and design of system architectures that meet cybersecurity requirements. Students will examine methods to translate technology and environmental conditions (e.g., law and regulation) into system and security design.

Second Course Sequence

  • 6 courses; 27 quarter units

Recommended: Prior completion ofCYB 340 At least 13.5 units of the first core sequence must be completed before this course.

An examination of the various tools and frameworks to conduct a system/network security audit or assessment. Various IT audit frameworks, government and non-government, will be covered. Legal and ethical aspects of IT auditing and assessment will be covered.

PrerequisiteCYB 340

An exploration of the tools and techniques to collect and analyze cyber threat information. The class will cover the collection and analysis of log data, threat intelligence data, and Indicators of Compromise to detect malicious activity.

PrerequisiteCYB 340

An examination of the tools and methods for incident response. Topics include preparation data collection, incident analysis preserving data, and recovery. The legal and ethical aspects of incident response will also be covered.

PrerequisiteCYB 340

This course examines common ethical hacking methods along with hands-on application of security tools to test network and systems security. The planning and execution of a penetration test will be covered. The legal and ethical aspects of penetration testing will be discussed.

A detailed examination on the concepts of network defense and the various tools to protect and monitor a network. Students will learn how to implement an Intrusion Detection System, conduct network monitoring traffic analysis, and honeypots. Development of associated policy will also be covered.

PrerequisiteCYB 340

A detailed examination on the development of organizational cybersecurity policy that meet an organization’s compliance requirements and business goals. The creation of a cost benefit analysis when developing policy and system requirements.

Project

  • 3 courses; 13.5 quarter units

Students must complete all core and concentration requirements prior to beginning the project course sequence.

PrerequisiteCYB 460; CYB 461; CYB 462; CYB 463, or CYB 470; CYB 471; CYB 472; CYB 473, or CYB 480; CYB 481; CYB 482; CYB 483

A capstone project focused on applying the knowledge and concepts learned through this program. Students will work as an individual or in a team to complete a practical or research related cybersecurity project. Grading is H, S or U only.

PrerequisiteCYB 499A

This course is a continuation of CYB 499A and continues the application of knowledge in the selected topic. Grading is H, S or U only.

PrerequisiteCYB 499B

This course is a continuation of CYB 499B and continues the application of knowledge in the selected topic. Students will present their findings to a panel of academic and business professionals. Grading is H, S or U only.

Requirements for the Concentration:

  • 4 courses; 18 quarter units

PrerequisiteCYB 420 and completion of all core CYB classes before starting the concentration; CYB 450; CYB 451; CYB 452; CYB 453; CYB 454

An advanced examination of securing Windows and Linux operating systems. Detecting and preventing operating system attack will also be covered. The course will focus on the use of security automation tools to secure and monitor multiple operating systems.

Prerequisite: CYB 460

An advanced examination of wireless and mobile security. Students will learn how to secure a wireless network against a common baseline. Planning and implementation of the secure deployment of mobile device in an enterprise will be covered. An examination of wireless attack methods and mobile malware will be conducted.

Prerequisite: CYB 460

An advanced examination of cloud and virtualization security concepts. Students will learn common hypervisor security tools and techniques. Security issues related to the different cloud service models will be covered. Hypervisor threats and attacks will be examined. Students will secure images in a public cloud environment.

Prerequisite: CYB 460

Students will learn advanced techniques for network defense including the use of intrusion detection systems, intrusion prevention systems, firewalls, and virtual private networks. Design and integration of different network defense tools will also be covered.

Concentration in Digital Forensics

Requirements for Concentration:

  • 4 courses; 18 quarter units

PrerequisiteCYB 420 and completion of all core CYB classes before starting the concentration; CYB 450; CYB 451; CYB 452; CYB 453; CYB 454

Introduction of computer forensic principles. The class explores the concepts of admissibility of electronic evidence, preparing for e-evidence collection, and conducting a digital forensic examination of computers. Legal and ethical requirements of a digital investigator are also covered.

Prerequisite: CYB 470

This course provides an overview for collecting digital evidence from a Windows, Linux, and Mac operating systems. Operating specific tools and techniques for collecting file information, log information, data artifacts, web history and computer memory are explored.

Prerequisite: CYB 470

In this class, students learn the tools and techniques to collect and analyze network data to support a digital investigation. Students will gain practical experience by analyzing network traffic captures. Legal and ethical requirements of a network forensics investigation are also covered. Correlation of data from other sources will also be examined.

PrerequisiteCYB 470

Students will learn how to collect and analyze digital evidence from mobile devices. The tools and techniques that are unique for mobile device forensics like acquisition, physical isolation, sim cards, and file system recovery will be covered. Extraction of geolocation data and other cellular data will also be explored.

Concentration in Information Technology Management

Requirements for Concentration:

  • 4 courses; 18 quarter units

Prerequisite: CYB 420; CYB 450; CYB 451; CYB 452; CYB 453; CYB 454

This course provides an understanding of the internal and external components of an information technology (IT) system. The course contains an overview of internal components and broadens out to an entire IT system. Students will be introduced to the proper installation, security, and administration of components of an IT system. In addition, network, mobile, IoT, and printer terminology, concepts, troubleshooting, and security fundamentals are also covered.

PrerequisiteCYB 480

An in-depth exploration of various tools and controls designed to preserve and protect data and databases against compromises of their confidentiality, integrity, and availability. Included is an introduction to how databases are created, populated, administered, and secured.

PrerequisiteCYB 481

This course expands on the skills and knowledge needed to administer, maintain, and secure an organizations LAN/WAN infrastructure. Topics include identifying threats, vulnerabilities, and assets that facilitate in planning, risk analysis, and implementation of security policies. In addition, legal, ethical, and professional challenges are examined.

PrerequisiteCYB 482

Introduction to cloud management from both a business and technical perspective. The focus will be on the management of cloud networks, including data storage, processing, and management. Topics include cloud services, architecture, deployment strategies, administration, security, and legal, ethical, and professional challenges.

Degree and Course Requirements

To receive a Bachelor of Science in Cybersecurity, students must complete at least 180 quarter units, 45 of which must be completed in residence at National University, 81 of which must be completed at the upper-division level, and a minimum 69 units of the University General Education requirements. In the absence of transfer credit, additional general electives may be necessary to satisfy total units for the degree. Students should refer to the section on undergraduate admission procedures for specific information on admission and evaluation. All students receiving an undergraduate degree in Nevada are required by State Law to complete a course in Nevada Constitution.

Specializations

The Bachelor of Science in Cybersecurity (BSCYB) program prepares those who wish to meet the increasing demand for cybersecurity professionals in nearly all modern organizations. The coursework provides you with an understanding of basic information technology management concepts, fundamental security skills, and the legal and ethical issues associated with cybersecurity. The Digital Forensics specialization provides a greater focus on investigation and analysis of computer systems and networks. Upon completing this program, you’ll be prepared to work in positions such as security analyst, computer network defender, and computer incident responder.

Learn More

The Bachelor of Science in Cybersecurity (BSCYB) program prepares those who wish to meet the increasing demand for cybersecurity professionals in nearly all modern organizations. The coursework provides you with an understanding of basic information technology management concepts, fundamental security skills, and the legal and ethical issues associated with cybersecurity. The Computer Network Defense specialization takes a specific focus on assessing and addressing the security issues related to computer networks. Upon completing this program, you’ll be prepared to work in positions such as security analyst, computer network defender, and computer incident responder.

Learn More

A BS in Cybersecurity degree opens doors in a variety of industries, including finance and insurance, manufacturing, information services, health care, administrative support services, and scientific and technical services.

Cybersecurity is a field that’s rapidly expanding and in need of professionals with up-to-date knowledge and skills. For example, employment of information security analysts is projected to grow 35 percent from 2021 to 2031, which is dramatically faster than the average for all occupations, according to the Bureau of Labor Statistics. It can also be a lucrative career move, with a median annual wage of $102,600 and the top 10 percent earning more than $165,920.*

Employers in the cybersecurity field are looking for workers with skills in communications, management, operations, leadership, infrastructure, information technology, innovation, integration, and research. With a bachelor’s degree from National University, you’ll be prepared to seek a variety of roles in the field of cybersecurity, including:**

  • Cybersecurity Engineer
  • Cybersecurity Analyst
  • Cybersecurity Manager
  • Cybersecurity Consultant
  • Cybersecurity Specialist
  • Cybersecurity Architect
  • Cyber Crime Analyst
  • IT Auditor
  • Incident & Intrusion Analyst
  • Penetration and Vulnerability Tester

To learn more about career opportunities and benefits of a bachelor’s in cybersecurity, read our post: Is a Cybersecurity Degree Worth It?

*SOURCE: https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm

**SOURCE: Emsi Labor Analyst- Report. Emsi research company homepage at https://www.economicmodeling.com/company/ (Report viewed: May 2, 2022). DISCLAIMER: The data provided is for Informational purposes only. Emsi data and analysis utilizes government sources to provide insights on industries, demographics, employers, in-demand skills, and more to align academic programs with labor market opportunities. Cited projections may not reflect local or short-term economic or job conditions and do not guarantee actual job growth. Current and prospective students should use this data with other available economic data to inform their educational decisions.

National University has developed academic pathways that build upon the coursework at various community colleges to help you reach your academic goals, so you can pick up on your bachelor’s degree studies right where you left off in your relevant associate degree program.

Learn more about National’s Cybersecurity Pathways and see which classes you may qualify to receive credit for. You may also wish to speak to an admissions counselor about your specific community college’s cybersecurity program.

The field of cybersecurity is robust and offers numerous pathways to difference-making careers. To provide the industry with highly skilled professionals on the cutting edge of the market’s current and expected needs, National University’s BS in Cybersecurity offers career-focused concentrations. Once you complete the core cybersecurity courses, you’ll have the opportunity to take a four-class concentration in either:

Network Defense – Focus in on actions taken to defend against unauthorized activity within computer networks by learning how to:

  • Set up, implement, and assess cybersecurity status of a computer system
  • Apply security controls affecting virtualized computing environment, a wireless network, and an operating system

Digital Forensics – Study the recovery and investigation of materials found in digital devices and learn how to:

  • Conduct a digital forensics investigation on a server or workstation using commonly accepted standards and tools
  • Preserve digital evidence using federal rules of digital evidence
  • Conduct a digital forensics investigation on a mobile device using commonly accepted standards and tools
  • Examine digital evidence for indications of illegal malicious activity or malfeasance

Information Technology Management – This 4 course concentration in Information Technology Management (ITM) provides for greater focus on the management of information and technology in regards to a secured networked system. Upon successful completion of this program, students will be able to:

  • Demonstrate the ability to manage and secure IT hardware, data, and databases.
  • Integrate best practices for administering, managing, securing, and delivering cloud technologies.

For degree and specialization requirements, please visit our course catalog.

National University students are encouraged to joint our Cyber Team Nucl3@r. The cyber team apply the knowledge and skills they gain in class by competing in challenging cyber competitions like the Western Regional Collegiate Cyber Defense CompetitionCollegiate Pentest CompetitionNational Cyber League, and Cyberforce Competition. These competitions also allow students to demonstrate their skills to potential employers.

Program Learning Outcomes

  • Analyze a problem and design the cybersecurity measures appropriate to its solution.
  • Apply concepts of best practices in cybersecurity management to enterprise processes.
  • Describe the ethical challenges that confront a cybersecurity professional.
  • Apply security control principles in the construction of cybersecurity solutions.
  • Demonstrate written and oral communication skills expected of a cybersecurity professional.
  • Demonstrate the ability to securely administer a Windows and Linux system using security automation tools and techniques.
  • Demonstrate knowledge of the fundamental concepts of operating systems, networks, and cloud computing.

Hear From Our Faculty

Watch our video featuring Dr. Ronald Uhlig, Academic Program Director, Department of Engineering.

Prof. William Reid

“This program provides in-depth coverage of the major focus areas within the cybersecurity discipline, along with hands-on practical labs where the student can apply the principles and skills learned through lecture and readings. The program is aimed to provide all students the ability to work on teams focused on protecting information assets of any size enterprise.”

-Prof. William Reid, Academic Program Director, Bachelor of Science in Cybersecurity

Admissions

Enrolling in a university is a big decision. That’s why our dedicated admissions team is here to guide you through the admissions process and help you find the right program for you and your career goals.

To that end, we’ve simplified and streamlined our application process, so you can get enrolled in your program right away. Because we accept and review applications year-round, you can begin class as soon as next month, depending on your program and location of choice.

Learn more about undergraduate, graduate, military, and international student admissions, plus admissions information for transfer students. You can also learn more about our tuition rates and financial aid opportunities.

To speak with our admissions team, call (855) 355-6288 or request information, and an advisor will contact you shortly. If you’re ready to apply, simply start your application today.

Man in a button-down shirt smiles at a young boy in glasses who also wears a backpack
4 WEEK COURSES
Our course structure is built to make earning your degree accessible and achievable, one month at a time, so you can start sooner and finish faster.

Why Choose National University

  • Four-Week Courses
  • 190+ Degree Programs
  • Online or On-Site
  • Year-Round Enrollment
  • Military Friendly

We’re proud to be a Veteran-founded, San Diego-based nonprofit. Since 1971, our mission has been to provide accessible, achievable higher education to adult learners. Today, we educate students from across the U.S. and around the globe, with over 230,000 alumni worldwide.

Jonathan Race headshot

“The MS Cybersecurity program was an awesome technical experience! It was great to get actual real-world experience for the skills you are learning, as well as the key business components that relate to the such as project management, presentation, and teamwork.”

– Jonathan Race, Class of 2018, Founding Cyber Team Captain

A mother sits on a couch with a laptop and smiles at her toddler-aged son, who is looking forward.
FLEXIBLE SCHEDULE
We know your life may not happen on a 9-5 schedule, so we offer courses online or on-site at locations across California.
white scholarship oppotunities icon

The Key Grant Scholarship

Do you qualify for a needs-based scholarship? Learn more about the NU Key Grant Scholarship and other scholarship opportunities to unlock the door to your dreams!

Program Disclosure

Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.

Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.

NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.

All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.

National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.