A woman working

Bachelor of Science in Cybersecurity

Request Information
Programs > Bachelor of Science in Cybersecurity
  • $30 Million in Scholarships Explore NU's scholarship opportunities. Eligibility requirements apply.
  • YEAR ROUND ENROLLMENT Our team reviews applications year-round.
  • 180K Alumni Worldwide Become a part of NU's global alumni community.
Programs > Bachelor of Science in Cybersecurity

Be a Leader in the Field of Cybersecurity

Gain in-demand skills and prepare for exciting career paths in the field of cybersecurity with the Bachelor of Science in Cybersecurity. The need for cybersecurity expertise continues to grow, and this program will prepare you to seek entry into the field with confidence.

The BS in Cybersecurity program is taught by expert faculty with real-world experience so you can gain the competencies needed in the field. Four-week classes are designed to help you to fit school into your busy schedule, so you can complete your assignments around your work and personal responsibilities. Plus, you'll gain the skills you need to be successful in the field as you complete one class at a time, one month at a time.

Once you complete the core cybersecurity classes, you'll have the opportunity to take a four-class concentration in either Computer Network Defense or Digital Forensics. In the Computer Network Defense concentration, you'll focus in on actions taken to defend against unauthorized activity within computer networks. In the Digital Forensics concentration, you'll study the recovery and investigation of materials found in digital devices. A concentration can expand your knowledge in a given area and help make you more competitive in the job market.

Request Information

Course Details

Course Listings

Introduction

  • 1 course; 4.5 quarter units
    CYB 200 Introduction to Cybersecurity

Foundation Technologies

  • 6 course; 27 quarter units

Course Name

This course provides an introduction to basic network concepts including local area networks, wireless networks, and wide area networks. Network security concepts are also introduced. Students will explore secure router configurations.

An introduction to the basic architecture and functions of an operating system. Computer hardware and software integration will be explored. Basic design and functionality of the Windows and Linux operating systems will be explored. In addition, core aspects of securing operating systems are covered.

An introductory survey course that explores the fundamental concepts of cybersecurity. Coverage includes the concepts of confidentiality, integrity, and availability, cybersecurity policy, and the ethical and legal aspects of cybersecurity.

The principles of data security are introduced. Students will learn how to protect data in transit and at rest. The technical aspects of implementing encryption, authentication, and access control to protect data will be covered along with the development and implementation of associated policy. Basic database security concepts and guidelines will be covered.

This course introduces the fundamental concepts of cloud computing and virtualization. The core cloud deployment and service models will be covered. A comparison of public and private cloud deployments will be conducted. The concepts of devops and continuous integration will be introduced.

This course introduces the fundamental concepts of programming for cybersecurity professionals. A survey of program tools will be conducted. The use of PowerShell, scripting, and python to implement system security will be covered in this class.

First Core Sequence

  • 5 courses; 22.5 quarter units

Course Name

Provides instruction and practice on the writing skills needed to create clear and concise technical documents. Students will understand how to explain technical topics to non-technical leadership. The Project planning and management concepts will be introduced.

This course covers the secure administration of Linux based systems. Students will learn how to implement and assess standards based security measures on the Linux operating systems. Automating the implementation and assessment of security measures will be a core component of the class. Legal and ethical aspects of system administration will also be covered.

This course covers the secure administration of Windows based Desktop and server systems. Students will learn how to implement and assess standards based security measures on Windows based operating systems. Automating the implementation and assessment of security measures will be a core component of the class. Legal and ethical aspects of system administration will also be covered.

This course builds on CYB 216 and covers advanced topics in security automation. Students will learn how to manage security related code in a software repository. Students will write integrated scripts to implement and assess system security. Use of devops automation tools to securely manage infrastructure will also be covered.

An explanation of the development and design of system architectures that meet cybersecurity requirements. Students will examine methods to translate technology and environmental conditions (e.g., law and regulation) into system and security design.

Second Core Sequence

  • 6 courses; 27 quarter units

Course Name

An examination of the various tools and frameworks to conduct a system/network security audit or assessment. Various IT audit frameworks, government and non-government, will be covered. Legal and ethical aspects of IT auditing and assessment will be covered.

An exploration of the tools and techniques to collect and analyze cyber threat information. The class will cover the collection and analysis of log data, threat intelligence data, and Indicators of Compromise to detect malicious activity.

This course examines common ethical hacking methods along with hands-on application of security tools to test network and systems security. The planning and execution of a penetration test will be covered. The legal and ethical aspects of penetration testing will be discussed.

This course examines common ethical hacking methods along with hands-on application of security tools to test network and systems security. The planning and execution of a penetration test will be covered. The legal and ethical aspects of penetration testing will be discussed.

A detailed examination on the concepts of network defense and the various tools to protect and monitor a network. Students will learn how to implement an Intrusion Detection System, conduct network monitoring traffic analysis, and honeypots. Development of associated policy will also be covered.

A detailed examination on the development of organizational cybersecurity policy that meet an organization's compliance requirements and business goals. The creation of a cost benefit analysis when developing policy and system requirements.

Concentration in Computer Network Defense

  • 4 courses; 18 quarter units

Course Name

An advanced examination of securing Windows and Linux operating systems. Detecting and preventing operating system attack will also be covered. The course will focus on the use of security automation tools to secure and monitor multiple operating systems.

An advanced examination of wireless and mobile security. Students will learn how to secure a wireless network against a common baseline. Planning and implementation of the secure deployment of mobile device in an enterprise will be covered. An examination of wireless attack methods and mobile malware will be conducted.

An advanced examination of cloud and virtualization security concepts. Students will learn common hypervisor security tools and techniques. Security issues related to the different cloud service models will be covered. Hypervisor threats and attacks will be examined. Students will secure images in a public cloud environment.

Students will learn advanced techniques for network defense including the use of intrusion detection systems, intrusion prevention systems, firewalls, and virtual private networks. Design and integration of different network defense tools will also be covered.

Concentration in Digital Forensics

  • 4 courses; 18 quarter units

Course Name

Introduction of computer forensic principles. The class explores the concepts of admissibility of electronic evidence, preparing for e-evidence collection, and conducting a digital forensic examination of computers. Legal and ethical requirements of a digital investigator are also covered.

This course provides an overview for collecting digital evidence from a Windows, Linux, and Mac operating systems. Operating specific tools and techniques for collecting file information, log information, data artifacts, web history and computer memory are explored.

In this class, students learn the tools and techniques to collect and analyze network data to support a digital investigation. Students will gain practical experience by analyzing network traffic captures. Legal and ethical requirements of a network forensics investigation are also covered. Correlation of data from other sources will also be examined.

Students will learn how to collect and analyze digital evidence from mobile devices. The tools and techniques that are unique for mobile device forensics like acquisition, physical isolation, sim cards, and file system recovery will be covered. Extraction of geolocation data and other cellular data will also be explored.

Project

  • 3 courses; 13.5 quarter units

Course Name

A capstone project focused on applying the knowledge and concepts learned through this program. Students will work as an individual or in a team to complete a practical or research related cybersecurity project. Grading is H, S or U only.

This course is a continuation of CYB 499A and continues the application of knowledge in the selected topic. Grading is H, S or U only.

This course is a continuation of CYB 499B and continues the application of knowledge in the selected topic. Students will present their findings to a panel of academic and business professionals. Grading is H, S or U only.

What You Can Do With a Bachelor of Science in Cybersecurity

To receive a Bachelor of Science in Cybersecurity, students must complete at least 180 quarter units, 45 of which must be completed in residence at National University, 81 of which must be completed at the upper-division level, and a minimum 70.5 units of the University General Education requirements.In the absence of transfer credit, additional general electives may be necessary to satisfy total units for the degree. Students should refer to the section on undergraduate admission procedures for specific information on admission and evaluation.

A BS in Cybersecurity degree opens doors in a variety of industries, including finance and insurance, manufacturing, information services, health care, administrative support services, and scientific and technical services. Between 2022 and 2031, the cybersecurity field is expected to grow and each occupation has a median national income exceeding $75,000.* Employers in this field are looking for skills in communications, management, operations, leadership, infrastructure, information technology, innovation, integration, and research.

*Source: Emsi Labor Analyst

With a bachelor's degree from National University, you will be prepared to seek roles in the cybersecurity field such as:

  • Cybersecurity Engineer
  • Cybersecurity Analyst
  • Cybersecurity Manager
  • Cybersecurity Consultant
  • Cybersecurity Specialist
  • Cybersecurity Architect
  • Cyber Crime Analyst
  • IT Auditor
  • Incident & Intrusion Analyst
  • Penetration and Vulnerability Tester

To learn more about career opportunities and benefits of a bachelor's in cybersecurity, read our post: Is a Cybersecurity Degree Worth It?

National University has developed academic pathways that build upon the coursework at various community colleges to help you reach your academic goals, so you can pick up on your bachelor's degree studies right where you left off in your relevant associate degree program.

Learn more about National's Cybersecurity Pathways and see what classes you may qualify to receive credit for, or reach out to speak to an admissions counselor about your specific community college's cybersecurity program today.

Program Learning Outcomes

Upon successful completion of National University's Bachelor's in Cybersecurity program, you will be able to:

  • Analyze a problem and design the cybersecurity measures appropriate to its solution.
  • Apply concepts of best practices in cybersecurity management to enterprise processes.
  • Describe the ethical challenges that confront a cybersecurity professional.
  • Apply security control principles in the construction of cybersecurity solutions.
  • Demonstrate the ability to securely administer a Windows and Linux system using security automation tools and techniques.
  • Demonstrate knowledge of the fundamental concepts of operating systems, networks, and cloud computing.

Our four-week classes and leading professors work with your schedule to get the most out of our BS in Cybersecurity program. You could be starting as soon as next month by reaching out today.

Request Information

Admissions

Enrolling in a university is a big decision. That's why our dedicated admissions team is here to guide you through the admissions process and help you find the right program for you and your career goals.

To that end, we've simplified and streamlined our application process, so you can get enrolled in your program right away. Because we accept and review applications year round, you can begin class as soon as next month, depending on your program and location of choice.

Learn more about undergraduate, graduate, military, and international student admissions, plus admissions information for transfer students. You can also learn more about our tuition rates and financial aid opportunities.

To speak with our admissions team, call (855) 355-6288 or request information and an advisor will contact you shortly. If you're ready to apply, simply start your application today.

Request Information

4-week classes

Our course structure is built to make earning your degree accessible and achievable, one month at a time, so you can start sooner and finish faster.

Why Choose National University

  • Four-Week Classes
  • 75+ Degree Programs
  • Online or On-Site
  • Year-Round Enrollment
  • Military Friendly

We're proud to be a veteran-founded, San Diego-based nonprofit. Since 1971, our mission has been to provide accessible, achievable higher education to adult learners. Today, we educate students from across the U.S. and around the globe, with over 180,000 alumni worldwide.

What our students say
“Being able to assist in my community as well as advocate for those in need has been the biggest reward for me after completing this program.” - Brittney H., Class of 2021

Program Disclosure

Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate's application to sit for any certification, licensure, or related exam for the purpose of professional certification.

Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual's criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.

NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.

All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state's/country's policies and procedures relating to certification/licensure, as those policies are subject to change.

National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.

Read More

Flexible Schedule

We know your life may not happen on a 9-5 schedule, so we offer classes online or on-site at locations across California.
$30 million In new student scholarships

National University is dedicated to making higher education affordable, as well as accessible. Through NU scholarship offerings, eligible students are able to reduce the financial burden of college, start classes sooner, and finish their programs faster while focusing on achieving their goals.

In honor of our students, and in celebration of our 50th anniversary, National University is investing $30 million in new student scholarships. To learn more about our scholarships, how you can apply, and how much you can save, inquire today.

Learn More