Bachelor of Science in Cybersecurity
Online or In-Person
Flexible options
Finish in 40 months
Average completion time
Next start date
February
Year-round enrollment
Bachelor of Science in Cybersecurity
Degree:
Bachelor of Science in Cybersecurity Degree
Application:
$0 application fee. No essays/exams.
The growing and imperative need to protect sensitive personal and financial data from being shared widely online is why many career seekers consider pursuing a cybersecurity degree a worthwhile investment in their future.
National University’s Bachelor of Science in Cybersecurity program prepares students to become top security analysts, network defenders, and computer incident responders with coursework that gives them a comprehensive understanding of information technology management and security processes. Our curriculum is taught by expert faculty with real-world experience so you can gain the competencies needed in the field. Each online bachelor of cybersecurity course is only four weeks long, so the program can be completed in a shorter time frame than a traditional bachelor’s degree.
Secure Your Future Protecting Computer Networks from Unauthorized Activity
NU’s BS in Cybersecurity also offers career-focused concentrations in Computer Network Defense, Digital Forensics, or Information Technology Management. A concentration can expand your knowledge in a given area and help make you more competitive in the job market. If you are interested in a job with potential for growth, long-term security, and a good salary, a career in cybersecurity could be an excellent option.
Degree Requirements
To receive a Bachelor of Science in Cybersecurity, students must complete at least 180 quarter units, 45 of which must be completed in residence at National University, 81 of which must be completed at the upper-division level, and a minimum 69 units of the University General Education requirements. In the absence of transfer credit, additional general electives may be necessary to satisfy total units for the degree. Students should refer to the section on undergraduate admission procedures for specific information on admission and evaluation. All students receiving an undergraduate degree in Nevada are required by State Law to complete a course in Nevada Constitution.
National University awards credit in quarter units, with each academic year divided into four 12-week quarters.
Each quarter is made up of three 4-week classes, with one class per month. Under the current policy, 4.5 units of credit are awarded for courses.
The following courses are specific degree requirements. Students may need to take additional general electives to satisfy the total units for the degree.
Foundation Technologies
6 Courses
Introduction to Networking
4.5 Quarter Units
This course provides an introduction to basic network concepts including local area networks, wireless networks, and wide area networks. Network security concepts are also introduced. Students will explore secure router configurations.
Operating System Fundamentals
4.5 Quarter Units
An introduction to the basic architecture and functions of an operating system. Computer hardware and software integration will be explored. Basic design and functionality of the Windows and Linux operating systems will be explored. In addition, core aspects of securing operating systems are covered.
Introduction to Cybersecurity
4.5 Quarter Units
An introductory survey course that explores the fundamental concepts of cybersecurity. Coverage includes the concepts of confidentiality, integrity, and availability, cybersecurity policy, and the ethical and legal aspects of cybersecurity.
Data Fundamentals for Cybersecurity
4.5 Quarter Units
Prerequisite: CYB 206
The principles of data security are introduced. Students will learn how to protect data in transit and at rest. The technical aspects of implementing encryption, authentication, and access control to protect data will be covered along with the development and implementation of associated policy. Basic database security concepts and guidelines will be covered.
Fund of Virt and Cloud Comp
4.5 Quarter Units
Prerequisite: CYB 202; CYB 204
This course introduces the fundamental concepts of cloud computing and virtualization. The core cloud deployment and service models will be covered. A comparison of public and private cloud deployments will be conducted. The concepts of devops and continuous integration will be introduced.
Programming for Cybersecurity
4.5 Quarter Units
Prerequisite: CYB 215
This course introduces the fundamental concepts of programming for cybersecurity professionals. A survey of program tools will be conducted. The use of PowerShell, scripting, and python to implement system security will be covered in this class.
First Core Sequence
5 Courses
Secure Linux System Admin
4.5 Quarter Units
Prerequisite: CYB 216
This course covers the secure administration of Linux based systems. Students will learn how to implement and assess standards based security measures on the Linux operating systems. Automating the implementation and assessment of security measures will be a core component of the class. Legal and ethical aspects of system administration will also be covered.
Secure Windows Administration
4.5 Quarter Units
This course covers the secure administration of Windows based Desktop and server systems. Students will learn how to implement and assess standards based security measures on Windows based operating systems. Automating the implementation and assessment of security measures will be a core component of the class. Legal and ethical aspects of system administration will also be covered.
Security Automation
4.5 Quarter Units
Prerequisite: CYB 331; CYB 332
This course builds on CYB 216 and covers advanced topics in security automation. Students will learn how to manage security related code in a software repository. Students will write integrated scripts to implement and assess system security. Use of devops automation tools to securely manage infrastructure will also be covered.
Tech Writing/Proj Mgnt for CYB
4.5 Quarter Units
Provides instruction and practice on the writing skills needed to create clear and concise technical documents. Students will understand how to explain technical topics to non-technical leadership. The Project planning and management concepts will be introduced.
Sys Sec Arch for Cybersec
4.5 Quarter Units
Prerequisite: CYB 333
An explanation of the development and design of system architectures that meet cybersecurity requirements. Students will examine methods to translate technology and environmental conditions (e.g., law and regulation) into system and security design.
Second Course Sequence
6 Courses
Sec Audit and Assessments
4.5 Quarter Units
Recommended: Prior completion of: CYB 340 At least 13.5 units of the first core sequence must be completed before this course.
An examination of the various tools and frameworks to conduct a system/network security audit or assessment. Various IT audit frameworks, government and non-government, will be covered. Legal and ethical aspects of IT auditing and assessment will be covered.
Cyber Threat Intelligence
4.5 Quarter Units
Prerequisite: CYB 340
An exploration of the tools and techniques to collect and analyze cyber threat information. The class will cover the collection and analysis of log data, threat intelligence data, and Indicators of Compromise to detect malicious activity.
Incident Handling/Response
4.5 Quarter Units
Prerequisite: CYB 340
An examination of the tools and methods for incident response. Topics include preparation data collection, incident analysis preserving data, and recovery. The legal and ethical aspects of incident response will also be covered.
Intro to Ethical Hacking
4.5 Quarter Units
Prerequisite: CYB 340
This course examines common ethical hacking methods along with hands-on application of security tools to test network and systems security. The planning and execution of a penetration test will be covered. The legal and ethical aspects of penetration testing will be discussed.
Network Defense
4.5 Quarter Units
A detailed examination on the concepts of network defense and the various tools to protect and monitor a network. Students will learn how to implement an Intrusion Detection System, conduct network monitoring traffic analysis, and honeypots. Development of associated policy will also be covered.
Cybersec Planning and Policy
4.5 Quarter Units
Prerequisite: CYB 340
A detailed examination on the development of organizational cybersecurity policy that meet an organization’s compliance requirements and business goals. The creation of a cost benefit analysis when developing policy and system requirements.
Project
3 Courses
Students must complete all core and concentration requirements prior to beginning the project course sequence.
Cybersecurity Project I
4.5 Quarter Units
Prerequisite: CYB 460; CYB 461; CYB 462; CYB 463, or CYB 470; CYB 471; CYB 472; CYB 473, or CYB 480; CYB 481; CYB 482; CYB 483
A capstone project focused on applying the knowledge and concepts learned through this program. Students will work as an individual or in a team to complete a practical or research related cybersecurity project. Grading is H, S or U only.
Cybersecurity Project II
4.5 Quarter Units
Prerequisite: CYB 499A
This course is a continuation of CYB 499A and continues the application of knowledge in the selected topic. Grading is H, S or U only.
Cybersecurity Project III
4.5 Quarter Units
Prerequisite: CYB 499B
This course is a continuation of CYB 499B and continues the application of knowledge in the selected topic. Students will present their findings to a panel of academic and business professionals. Grading is H, S or U only.
Concentration in Computer Network Defense
Requirements for the Concentration
4 Courses
Operating System Security
4.5 Quarter Units
Prerequisite: CYB 420 and completion of all core CYB classes before starting the concentration; CYB 450; CYB 451; CYB 452; CYB 453; CYB 454
An advanced examination of securing Windows and Linux operating systems. Detecting and preventing operating system attack will also be covered. The course will focus on the use of security automation tools to secure and monitor multiple operating systems.
Wireless and Mobile Security
4.5 Quarter Units
Prerequisite: CYB 460
An advanced examination of wireless and mobile security. Students will learn how to secure a wireless network against a common baseline. Planning and implementation of the secure deployment of mobile device in an enterprise will be covered. An examination of wireless attack methods and mobile malware will be conducted.
Cloud and Virtualization Sec
4.5 Quarter Units
Prerequisite: CYB 460
An advanced examination of cloud and virtualization security concepts. Students will learn common hypervisor security tools and techniques. Security issues related to the different cloud service models will be covered. Hypervisor threats and attacks will be examined. Students will secure images in a public cloud environment.
Advanced Network Defense
4.5 Quarter Units
Prerequisite: CYB 460
Students will learn advanced techniques for network defense including the use of intrusion detection systems, intrusion prevention systems, firewalls, and virtual private networks. Design and integration of different network defense tools will also be covered.
Concentration in Digital Forensics
Requirements for Concentration
4 Courses
Intro to Digital Forensics
4.5 Quarter Units
Prerequisite: CYB 420 and completion of all core CYB classes before starting the concentration; CYB 450; CYB 451; CYB 452; CYB 453; CYB 454
Introduction of computer forensic principles. The class explores the concepts of admissibility of electronic evidence, preparing for e-evidence collection, and conducting a digital forensic examination of computers. Legal and ethical requirements of a digital investigator are also covered.
Operating Systems Forensics
4.5 Quarter Units
Prerequisite: CYB 470
This course provides an overview for collecting digital evidence from a Windows, Linux, and Mac operating systems. Operating specific tools and techniques for collecting file information, log information, data artifacts, web history and computer memory are explored.
Network Forensics
4.5 Quarter Units
Prerequisite: CYB 470
In this class, students learn the tools and techniques to collect and analyze network data to support a digital investigation. Students will gain practical experience by analyzing network traffic captures. Legal and ethical requirements of a network forensics investigation are also covered. Correlation of data from other sources will also be examined.
Mobile Device Forensics
4.5 Quarter Units
Prerequisite: CYB 470
Students will learn how to collect and analyze digital evidence from mobile devices. The tools and techniques that are unique for mobile device forensics like acquisition, physical isolation, sim cards, and file system recovery will be covered. Extraction of geolocation data and other cellular data will also be explored.
Concentration in Information Technology Management
Requirements for Concentration
4 Courses
IT Hardware
4.5 Quarter Units
Prerequisite: CYB 420; CYB 450; CYB 451; CYB 452; CYB 453; CYB 454
This course provides an understanding of the internal and external components of an information technology (IT) system. The course contains an overview of internal components and broadens out to an entire IT system. Students will be introduced to the proper installation, security, and administration of components of an IT system. In addition, network, mobile, IoT, and printer terminology, concepts, troubleshooting, and security fundamentals are also covered.
Data/Database Security
4.5 Quarter Units
Prerequisite: CYB 480
An in-depth exploration of various tools and controls designed to preserve and protect data and databases against compromises of their confidentiality, integrity, and availability. Included is an introduction to how databases are created, populated, administered, and secured.
Network Administration
4.5 Quarter Units
Prerequisite: CYB 481
This course expands on the skills and knowledge needed to administer, maintain, and secure an organizations LAN/WAN infrastructure. Topics include identifying threats, vulnerabilities, and assets that facilitate in planning, risk analysis, and implementation of security policies. In addition, legal, ethical, and professional challenges are examined.
Cloud Management
4.5 Quarter Units
Prerequisite: CYB 482
Introduction to cloud management from both a business and technical perspective. The focus will be on the management of cloud networks, including data storage, processing, and management. Topics include cloud services, architecture, deployment strategies, administration, security, and legal, ethical, and professional challenges.
Specializations
Bachelor of Science in Cybersecurity, Digital Forensics
The Bachelor of Science in Cybersecurity (BSCYB) program prepares those who wish to meet the increasing demand for cybersecurity professionals in nearly all modern organizations. The coursework provides you with an understanding of basic information technology management concepts, fundamental security skills, and the legal and ethical issues associated with cybersecurity. The Digital Forensics specialization provides a greater focus on investigation and analysis of computer systems and networks. Upon completing this program, you’ll be prepared to work in positions such as security analyst, computer network defender, and computer incident responder.
Bachelor of Science in Cybersecurity, Computer Network Defense
The Bachelor of Science in Cybersecurity (BSCYB) program prepares those who wish to meet the increasing demand for cybersecurity professionals in nearly all modern organizations. The coursework provides you with an understanding of basic information technology management concepts, fundamental security skills, and the legal and ethical issues associated with cybersecurity. The Computer Network Defense specialization takes a specific focus on assessing and addressing the security issues related to computer networks. Upon completing this program, you’ll be prepared to work in positions such as security analyst, computer network defender, and computer incident responder.
Career Outlook
National University students are encouraged to joint our Cyber Team Nucl3@r. The cyber team apply the knowledge and skills they gain in class by competing in challenging cyber competitions like the Western Regional Collegiate Cyber Defense Competition, Collegiate Pentest Competition, National Cyber League, and Cyberforce Competition. These competitions also allow students to demonstrate their skills to potential employers.
- Top Jobs in this field
- Median Salary (USA)
- JOB Openings (USA)
- General and Operations Managers
- $100,934 avg. salary (USA)
- 373,566 job openings (past yr.) past year
Most desired skills
- Operations Management
- Marketing
- Merchandising
- Finance
- Project Management
- Inventory Management
- Profit And Loss (P&L) Management
Top companies hiring for this role
- Unclassified
- CVS Health
- AutoZone
- Buckle
- Walmart
- Enterprise Rent-A-Car
- Menards
- Compliance Officers
- $75,549 avg. salary (USA)
- 38,710 job openings (past yr.) past year
Most desired skills
- Auditing
- Regulatory Compliance
- Project Management
- Risk Analysis
- Risk Management
- Accounting
- Finance
Top companies hiring for this role
- Unclassified
- United States Department of the Treasury
- Humana
- Citigroup
- Wells Fargo
- Amentum
- Wahve Holdings
- Information Security Analysts
- $120,088 avg. salary (USA)
- 20,359 job openings (past yr.) past year
Most desired skills
- Cyber Security
- Auditing
- Vulnerability
- Computer Science
- Incident Response
- Information Systems
- Risk Analysis
Top companies hiring for this role
- Unclassified
- Leidos
- Deloitte
- General Dynamics
- Marriott International
- Mindpoint Group
- ManTech
- Computer Network Architects
- $129,315 avg. salary (USA)
- 13,281 job openings (past yr.) past year
Most desired skills
- Network Engineering
- Network Routing
- Automation
- Firewall
- Computer Science
- Network Switches
- Wide Area Networks
Top companies hiring for this role
- Unclassified
- Leidos
- Marriott International
- Amazon
- TEKsystems
- Lumen Technologies
- Ryder
Program Learning Outcomes
Learn the key skills to help you excel in your field of study.
- Analyze a problem and design the cybersecurity measures appropriate to its solution.
- Apply concepts of best practices in cybersecurity management to enterprise processes.
- Describe the ethical challenges that confront a cybersecurity professional.
- Apply security control principles in the construction of cybersecurity solutions.
- Demonstrate written and oral communication skills expected of a cybersecurity professional.
- Demonstrate the ability to securely administer a Windows and Linux system using security automation tools and techniques.
- Demonstrate knowledge of the fundamental concepts of operating systems, networks, and cloud computing.
Admissions
Next start date: February
Year-round enrollment
Transfer Students Welcome
Enrolling in a university is a big decision. That’s why our dedicated admissions team is here to guide you through the admissions process and help you find the right program for you and your career goals.
To that end, we’ve simplified and streamlined our application process, so you can get enrolled in your program right away. Because we accept and review applications year round, you can begin class as soon as next month, depending on your program and location of choice.
Learn more about undergraduate, graduate, military, and international student admissions, plus admissions information for transfer students. You can also learn more about our tuition rates and financial aid opportunities.
To speak with our admissions team, call (855) 355-6288 or request information and an advisor will contact you shortly. If you’re ready to apply, simply start your application today.
Scholarships and Financial Aid
National University is dedicated to making higher education affordable, as well as accessible. Through NU scholarship offerings, eligible students are able to reduce the financial burden of college, start classes sooner, and finish their programs faster while focusing on achieving their goals.
Accreditations
The Western Association of Schools and Colleges (WASC) accredits public and private schools, colleges, and universities in the U.S.
The National Security Agency (NSA) has designated National University as a National Center of Academic Excellence (NCAE) in Cyber Defense (CAE-CD) through 2028. More information on the National Center of Academic Excellence (NCAE) in Cybersecurity program can be found here: https://www.nsa.gov/Academics/Centers-of-Academic-Excellence/
95% of graduates with a Bachelor’s in Cybersecurity are employed in their related field.
Why Choose the National University Cybersecurity Bachelor’s Program
We’re proud to be a Veteran-founded, San Diego-based nonprofit. Since 1971, our mission has been to provide accessible, achievable higher education to adult learners.
Today, we educate students from across the U.S. and around the globe, with over 240,000 alumni worldwide.
“The bachelor of cybersecurity program was an awesome technical experience! It was great to get actual real-world experience for the skills you are learning, as well as the key business components that relate to the such as project management, presentation, and teamwork.”
Jonathan Race, Class of 2018, Founding Cyber Team Captain
What makes a degree
with National University unique?
Free Tutoring Sessions
Access personalized tutoring sessions at no cost — empowering your learning.
Online and In-Person
Flexibility meets quality education with our online and in-person learning options.
24/7 Support
Get assistance anytime, anywhere with our round-the-clock support services.
Military Friendly
Committed to serving those who serve — diverse resources and support for veterans and family. Military and Veteran Admissions.
Mentoring Network
Individual student and alumni career guidance, professional development opportunities, and customized career support.
Transfer Students Welcome
NU makes it easy to get your degree, even if you started it with another university. Learn more about transferring to NU.
Accelerate Your Career With NU
At National University, you’re part of a family. As a student, you’ll have the support of staff, faculty members, students, and alumni who will be there with you every step of the way, cheering you on as you pursue your goals.
Our network of 240,000 alumni is a large global community that provides our graduates with the professional connections to get a leg up in your new career.
FAQs
A BS in Cybersecurity degree opens doors in a variety of industries, including finance and insurance, manufacturing, information services, health care, administrative support services, and scientific and technical services.
Cybersecurity is a field that’s rapidly expanding and in need of professionals with up-to-date knowledge and skills. For example, employment of information security analysts is projected to grow 35 percent from 2021 to 2031, which is dramatically faster than the average for all occupations, according to the Bureau of Labor Statistics. It can also be a lucrative career move, with a median annual wage of $102,600 and the top 10 percent earning more than $165,920.*
Employers in the cybersecurity field are looking for workers with skills in communications, management, operations, leadership, infrastructure, information technology, innovation, integration, and research. With a bachelor’s degree from National University, you’ll be prepared to seek a variety of roles in the field of cybersecurity, including:**
- Cybersecurity Engineer
- Cybersecurity Analyst
- Cybersecurity Manager
- Cybersecurity Consultant
- Cybersecurity Specialist
- Cybersecurity Architect
- Cyber Crime Analyst
- IT Auditor
- Incident & Intrusion Analyst
- Penetration and Vulnerability Tester
To learn more about career opportunities and benefits of a bachelor’s in cybersecurity, read our post: Is a Cybersecurity Degree Worth It?
*SOURCE: https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
**SOURCE: Emsi Labor Analyst- Report. Emsi research company homepage at https://www.economicmodeling.com/company/ (Report viewed: May 2, 2022). DISCLAIMER: The data provided is for Informational purposes only. Emsi data and analysis utilizes government sources to provide insights on industries, demographics, employers, in-demand skills, and more to align academic programs with labor market opportunities. Cited projections may not reflect local or short-term economic or job conditions and do not guarantee actual job growth. Current and prospective students should use this data with other available economic data to inform their educational decisions.
National University has developed academic pathways that build upon the coursework at various community colleges to help you reach your academic goals, so you can pick up on your bachelor’s degree studies right where you left off in your relevant associate degree program.
Learn more about National’s Cybersecurity Pathways and see which classes you may qualify to receive credit for. You may also wish to speak to an admissions counselor about your specific community college’s cybersecurity program.
The field of cybersecurity is robust and offers numerous pathways to difference-making careers. To provide the industry with highly skilled professionals on the cutting edge of the market’s current and expected needs, National University’s BS in Cybersecurity offers career-focused concentrations. Once you complete the core cybersecurity courses, you’ll have the opportunity to take a four-class concentration in either:
Network Defense – Focus in on actions taken to defend against unauthorized activity within computer networks by learning how to:
- Set up, implement, and assess cybersecurity status of a computer system
- Apply security controls affecting virtualized computing environment, a wireless network, and an operating system
Digital Forensics – Study the recovery and investigation of materials found in digital devices and learn how to:
- Conduct a digital forensics investigation on a server or workstation using commonly accepted standards and tools
- Preserve digital evidence using federal rules of digital evidence
- Conduct a digital forensics investigation on a mobile device using commonly accepted standards and tools
- Examine digital evidence for indications of illegal malicious activity or malfeasance
Information Technology Management – This 4 course concentration in Information Technology Management (ITM) provides for greater focus on the management of information and technology in regards to a secured networked system. Upon successful completion of this program, students will be able to:
- Demonstrate the ability to manage and secure IT hardware, data, and databases.
- Integrate best practices for administering, managing, securing, and delivering cloud technologies.
For degree and specialization requirements, please visit our course catalog.
Useful Links for Skills Exploration and Knowledge
- Is a Cybersecurity Degree Worth It?
- 101 Cybersecurity Statistics and Trends for 2024
- Essential Soft & Hard Skills for Today’s Cybersecurity Professionals
- What is Cybersecurity and Its Importance to Business
- Is Ethical Hacking a Good Career?
- How to Become a Cybersecurity Analyst
- Program-Specific Course Information
- NSA’s Cybersecurity Collaboration Center
Program Disclosure
Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.
Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.
NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.
All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.
National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.
Back to top