
Bachelor of Science in Cybersecurity (BSCYB), Information Technology Management
4-week
COURSES
Year-round
enrollment
245K+ Alumni Worldwide
Bachelor of Science in Cybersecurity (BSCYB), Information Technology Management
This 4-course concentration in Information Technology Management (ITM) provides for greater focus on the management of information and technology in regards to a secured networked system.
Course Details
Foundation Technologies Courses
For the Bachelor of Science in Cybersecurity degree with a specialization in Digital Forensics, you must complete six foundational courses, a core sequence of five courses, a second core sequence of six courses, three project courses, and four specialization courses.
Course Name
This course provides an introduction to basic network concepts including local area networks, wireless networks, and wide area networks. Network security concepts are also introduced. Students will explore secure router configurations.
An introduction to the basic architecture and functions of an operating system. Computer hardware and software integration will be explored. Basic design and functionality of the Windows and Linux operating systems will be explored. In addition, core aspects of securing operating systems are covered.
An introductory survey course that explores the fundamental concepts of cybersecurity. Coverage includes the concepts of confidentiality, integrity, and availability, cybersecurity policy, and the ethical and legal aspects of cybersecurity.
Prerequisite: CYB 206
The principles of data security are introduced. Students will learn how to protect data in transit and at rest. The technical aspects of implementing encryption, authentication, and access control to protect data will be covered along with the development and implementation of associated policy. Basic database security concepts and guidelines will be covered.
Prerequisite: CYB 202; CYB 204
This course introduces the fundamental concepts of cloud computing and virtualization. The core cloud deployment and service models will be covered. A comparison of public and private cloud deployments will be conducted. The concepts of devops and continuous integration will be introduced.
Prerequisite: CYB 215
This course introduces the fundamental concepts of programming for cybersecurity professionals. A survey of program tools will be conducted. The use of PowerShell, scripting, and python to implement system security will be covered in this class.
First Core Sequence
Course Name
Provides instruction and practice on the writing skills needed to create clear and concise technical documents. Students will understand how to explain technical topics to non-technical leadership. The Project planning and management concepts will be introduced.
Prerequisite: CYB 216
This course covers the secure administration of Linux based systems. Students will learn how to implement and assess standards based security measures on the Linux operating systems. Automating the implementation and assessment of security measures will be a core component of the class. Legal and ethical aspects of system administration will also be covered.
This course covers the secure administration of Windows based Desktop and server systems. Students will learn how to implement and assess standards based security measures on Windows based operating systems. Automating the implementation and assessment of security measures will be a core component of the class. Legal and ethical aspects of system administration will also be covered.
Prerequisite: CYB 331; CYB 332
This course builds on CYB 216 and covers advanced topics in security automation. Students will learn how to manage security related code in a software repository. Students will write integrated scripts to implement and assess system security. Use of devops automation tools to securely manage infrastructure will also be covered.
Prerequisite: CYB 333
An explanation of the development and design of system architectures that meet cybersecurity requirements. Students will examine methods to translate technology and environmental conditions (e.g., law and regulation) into system and security design.
Second Core Course Listings
Course Name
Recommended: Prior completion of: CYB 340 At least 13.5 units of the first core sequence must be completed before this course.
An examination of the various tools and frameworks to conduct a system/network security audit or assessment. Various IT audit frameworks, government and non-government, will be covered. Legal and ethical aspects of IT auditing and assessment will be covered.
Prerequisite: CYB 340
An exploration of the tools and techniques to collect and analyze cyber threat information. The class will cover the collection and analysis of log data, threat intelligence data, and Indicators of Compromise to detect malicious activity.
Prerequisite: CYB 340
An examination of the tools and methods for incident response. Topics include preparation data collection, incident analysis preserving data, and recovery. The legal and ethical aspects of incident response will also be covered.
Prerequisite: CYB 340
This course examines common ethical hacking methods along with hands-on application of security tools to test network and systems security. The planning and execution of a penetration test will be covered. The legal and ethical aspects of penetration testing will be discussed.
A detailed examination on the concepts of network defense and the various tools to protect and monitor a network. Students will learn how to implement an Intrusion Detection System, conduct network monitoring traffic analysis, and honeypots. Development of associated policy will also be covered.
Prerequisite: CYB 340
A detailed examination on the development of organizational cybersecurity policy that meet an organization’s compliance requirements and business goals. The creation of a cost benefit analysis when developing policy and system requirements.
Second Core Course Listings
Course Name
Prerequisite: CYB 460; CYB 461; CYB 462; CYB 463, or CYB 470; CYB 471; CYB 472; CYB 473, or CYB 480; CYB 481; CYB 482; CYB 483
A capstone project focused on applying the knowledge and concepts learned through this program. Students will work as an individual or in a team to complete a practical or research related cybersecurity project. Grading is H, S or U only.
Prerequisite: CYB 499A
This course is a continuation of CYB 499A and continues the application of knowledge in the selected topic. Grading is H, S or U only.
Prerequisite: CYB 499B
This course is a continuation of CYB 499B and continues the application of knowledge in the selected topic. Students will present their findings to a panel of academic and business professionals. Grading is H, S or U only.
Specialization Courses
Course Name
Prerequisite: CYB 454
This course provides an understanding of the internal and external components of an information technology (IT) system. The course contains an overview of internal components and broadens out to an entire IT system. Students will be introduced to the proper installation, security, and administration of components of an IT system. In addition, network, mobile, IoT, and printer terminology, concepts, troubleshooting, and security fundamentals are also covered.
Prerequisite: CYB 480
An in-depth exploration of various tools and controls designed to preserve and protect data and databases against compromises of their confidentiality, integrity, and availability. Included is an introduction to how databases are created, populated, administered, and secured.
Prerequisite: CYB 481
This course expands on the skills and knowledge needed to administer, maintain, and secure an organizations LAN/WAN infrastructure. Topics include identifying threats, vulnerabilities, and assets that facilitate in planning, risk analysis, and implementation of security policies. In addition, legal, ethical, and professional challenges are examined.
Prerequisite: CYB 482
Introduction to cloud management from both a business and technical perspective. The focus will be on the management of cloud networks, including data storage, processing, and management. Topics include cloud services, architecture, deployment strategies, administration, security, and legal, ethical, and professional challenges.
Learning Outcomes
Students earning the Bachelor of Science in Cybersecurity degree with a Information Technology Management specialization will learn to:
- Demonstrate the ability to manage and secure IT hardware, data, and databases.
- Integrate best practices for administering, managing, securing, and delivering cloud technologies.
Program Disclosure
Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.
Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.
NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.
All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.
National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.