Bachelor of Science in Cybersecurity

Online or In-Person

Flexible options

Finish in 40 months

Average completion time

Next start date
February

Year-round enrollment

Home » Programs » Bachelor of Science in Cybersecurity

Bachelor of Science in Cybersecurity

Degree:

Bachelor of Science in Cybersecurity Degree

Application:

$0 application fee. No essays/exams.

The growing and imperative need to protect sensitive personal and financial data from being shared widely online is why many career seekers consider pursuing a cybersecurity degree a worthwhile investment in their future.

National University’s Bachelor of Science in Cybersecurity program prepares students to become top security analysts, network defenders, and computer incident responders with coursework that gives them a comprehensive understanding of information technology management and security processes. Our curriculum is taught by expert faculty with real-world experience so you can gain the competencies needed in the field. Each online bachelor of cybersecurity course is only four weeks long, so the program can be completed in a shorter time frame than a traditional bachelor’s degree.

Secure Your Future Protecting Computer Networks from Unauthorized Activity

NU’s BS in Cybersecurity also offers career-focused concentrations in Computer Network DefenseDigital Forensics, or Information Technology Management. A concentration can expand your knowledge in a given area and help make you more competitive in the job market. If you are interested in a job with potential for growth, long-term security, and a good salary, a career in cybersecurity could be an excellent option.

Degree Requirements

To receive a Bachelor of Science in Cybersecurity, students must complete at least 180 quarter units, 45 of which must be completed in residence at National University, 81 of which must be completed at the upper-division level, and a minimum 69 units of the University General Education requirements. In the absence of transfer credit, additional general electives may be necessary to satisfy total units for the degree. Students should refer to the section on undergraduate admission procedures for specific information on admission and evaluation. All students receiving an undergraduate degree in Nevada are required by State Law to complete a course in Nevada Constitution.

National University awards credit in quarter units, with each academic year divided into four 12-week quarters. 

Each quarter is made up of three 4-week classes, with one class per month. Under the current policy, 4.5 units of credit are awarded for courses.

The following courses are specific degree requirements. Students may need to take additional general electives to satisfy the total units for the degree.

Foundation Technologies

6 Courses

4.5 Quarter Units

This course provides an introduction to basic network concepts including local area networks, wireless networks, and wide area networks. Network security concepts are also introduced. Students will explore secure router configurations.

4.5 Quarter Units

An introduction to the basic architecture and functions of an operating system. Computer hardware and software integration will be explored. Basic design and functionality of the Windows and Linux operating systems will be explored. In addition, core aspects of securing operating systems are covered.

4.5 Quarter Units

An introductory survey course that explores the fundamental concepts of cybersecurity. Coverage includes the concepts of confidentiality, integrity, and availability, cybersecurity policy, and the ethical and legal aspects of cybersecurity.

4.5 Quarter Units

Prerequisite: CYB 206

The principles of data security are introduced. Students will learn how to protect data in transit and at rest. The technical aspects of implementing encryption, authentication, and access control to protect data will be covered along with the development and implementation of associated policy. Basic database security concepts and guidelines will be covered.

4.5 Quarter Units

Prerequisite: CYB 202; CYB 204

This course introduces the fundamental concepts of cloud computing and virtualization. The core cloud deployment and service models will be covered. A comparison of public and private cloud deployments will be conducted. The concepts of devops and continuous integration will be introduced.

4.5 Quarter Units

Prerequisite: CYB 215

This course introduces the fundamental concepts of programming for cybersecurity professionals. A survey of program tools will be conducted. The use of PowerShell, scripting, and python to implement system security will be covered in this class.

First Core Sequence

5 Courses

4.5 Quarter Units

Prerequisite: CYB 216

This course covers the secure administration of Linux based systems. Students will learn how to implement and assess standards based security measures on the Linux operating systems. Automating the implementation and assessment of security measures will be a core component of the class. Legal and ethical aspects of system administration will also be covered.

4.5 Quarter Units

This course covers the secure administration of Windows based Desktop and server systems. Students will learn how to implement and assess standards based security measures on Windows based operating systems. Automating the implementation and assessment of security measures will be a core component of the class. Legal and ethical aspects of system administration will also be covered.

4.5 Quarter Units

Prerequisite: CYB 331; CYB 332

This course builds on CYB 216 and covers advanced topics in security automation. Students will learn how to manage security related code in a software repository. Students will write integrated scripts to implement and assess system security. Use of devops automation tools to securely manage infrastructure will also be covered.

4.5 Quarter Units

Provides instruction and practice on the writing skills needed to create clear and concise technical documents. Students will understand how to explain technical topics to non-technical leadership. The Project planning and management concepts will be introduced.

4.5 Quarter Units

Prerequisite: CYB 333

An explanation of the development and design of system architectures that meet cybersecurity requirements. Students will examine methods to translate technology and environmental conditions (e.g., law and regulation) into system and security design.

Second Course Sequence

6 Courses

4.5 Quarter Units

Recommended: Prior completion of: CYB 340 At least 13.5 units of the first core sequence must be completed before this course.

An examination of the various tools and frameworks to conduct a system/network security audit or assessment. Various IT audit frameworks, government and non-government, will be covered. Legal and ethical aspects of IT auditing and assessment will be covered.

4.5 Quarter Units

Prerequisite: CYB 340

An exploration of the tools and techniques to collect and analyze cyber threat information. The class will cover the collection and analysis of log data, threat intelligence data, and Indicators of Compromise to detect malicious activity.

4.5 Quarter Units

Prerequisite: CYB 340

An examination of the tools and methods for incident response. Topics include preparation data collection, incident analysis preserving data, and recovery. The legal and ethical aspects of incident response will also be covered.

4.5 Quarter Units

Prerequisite: CYB 340

This course examines common ethical hacking methods along with hands-on application of security tools to test network and systems security. The planning and execution of a penetration test will be covered. The legal and ethical aspects of penetration testing will be discussed.

4.5 Quarter Units

A detailed examination on the concepts of network defense and the various tools to protect and monitor a network. Students will learn how to implement an Intrusion Detection System, conduct network monitoring traffic analysis, and honeypots. Development of associated policy will also be covered.

4.5 Quarter Units

Prerequisite: CYB 340

A detailed examination on the development of organizational cybersecurity policy that meet an organization’s compliance requirements and business goals. The creation of a cost benefit analysis when developing policy and system requirements.

Project

3 Courses

Students must complete all core and concentration requirements prior to beginning the project course sequence.

4.5 Quarter Units

Prerequisite: CYB 460; CYB 461; CYB 462; CYB 463, or CYB 470; CYB 471; CYB 472; CYB 473, or CYB 480; CYB 481; CYB 482; CYB 483

A capstone project focused on applying the knowledge and concepts learned through this program. Students will work as an individual or in a team to complete a practical or research related cybersecurity project. Grading is H, S or U only.

4.5 Quarter Units

Prerequisite: CYB 499A

This course is a continuation of CYB 499A and continues the application of knowledge in the selected topic. Grading is H, S or U only.

4.5 Quarter Units

Prerequisite: CYB 499B

This course is a continuation of CYB 499B and continues the application of knowledge in the selected topic. Students will present their findings to a panel of academic and business professionals. Grading is H, S or U only.


Concentration in Computer Network Defense

Requirements for the Concentration

4 Courses

4.5 Quarter Units

Prerequisite: CYB 420 and completion of all core CYB classes before starting the concentration; CYB 450; CYB 451; CYB 452; CYB 453; CYB 454

An advanced examination of securing Windows and Linux operating systems. Detecting and preventing operating system attack will also be covered. The course will focus on the use of security automation tools to secure and monitor multiple operating systems.

4.5 Quarter Units

Prerequisite: CYB 460

An advanced examination of wireless and mobile security. Students will learn how to secure a wireless network against a common baseline. Planning and implementation of the secure deployment of mobile device in an enterprise will be covered. An examination of wireless attack methods and mobile malware will be conducted.

4.5 Quarter Units

Prerequisite: CYB 460

An advanced examination of cloud and virtualization security concepts. Students will learn common hypervisor security tools and techniques. Security issues related to the different cloud service models will be covered. Hypervisor threats and attacks will be examined. Students will secure images in a public cloud environment.

4.5 Quarter Units

Prerequisite: CYB 460

Students will learn advanced techniques for network defense including the use of intrusion detection systems, intrusion prevention systems, firewalls, and virtual private networks. Design and integration of different network defense tools will also be covered.


Concentration in Digital Forensics

Requirements for Concentration

4 Courses

4.5 Quarter Units

Prerequisite: CYB 420 and completion of all core CYB classes before starting the concentration; CYB 450; CYB 451; CYB 452; CYB 453; CYB 454

Introduction of computer forensic principles. The class explores the concepts of admissibility of electronic evidence, preparing for e-evidence collection, and conducting a digital forensic examination of computers. Legal and ethical requirements of a digital investigator are also covered.

4.5 Quarter Units

Prerequisite: CYB 470

This course provides an overview for collecting digital evidence from a Windows, Linux, and Mac operating systems. Operating specific tools and techniques for collecting file information, log information, data artifacts, web history and computer memory are explored.

4.5 Quarter Units

Prerequisite: CYB 470

In this class, students learn the tools and techniques to collect and analyze network data to support a digital investigation. Students will gain practical experience by analyzing network traffic captures. Legal and ethical requirements of a network forensics investigation are also covered. Correlation of data from other sources will also be examined.

4.5 Quarter Units

Prerequisite: CYB 470

Students will learn how to collect and analyze digital evidence from mobile devices. The tools and techniques that are unique for mobile device forensics like acquisition, physical isolation, sim cards, and file system recovery will be covered. Extraction of geolocation data and other cellular data will also be explored.


Concentration in Information Technology Management

Requirements for Concentration

4 Courses

4.5 Quarter Units

Prerequisite: CYB 420; CYB 450; CYB 451; CYB 452; CYB 453; CYB 454

This course provides an understanding of the internal and external components of an information technology (IT) system. The course contains an overview of internal components and broadens out to an entire IT system. Students will be introduced to the proper installation, security, and administration of components of an IT system. In addition, network, mobile, IoT, and printer terminology, concepts, troubleshooting, and security fundamentals are also covered.

4.5 Quarter Units

Prerequisite: CYB 480

An in-depth exploration of various tools and controls designed to preserve and protect data and databases against compromises of their confidentiality, integrity, and availability. Included is an introduction to how databases are created, populated, administered, and secured.

4.5 Quarter Units

Prerequisite: CYB 481

This course expands on the skills and knowledge needed to administer, maintain, and secure an organizations LAN/WAN infrastructure. Topics include identifying threats, vulnerabilities, and assets that facilitate in planning, risk analysis, and implementation of security policies. In addition, legal, ethical, and professional challenges are examined.

4.5 Quarter Units

Prerequisite: CYB 482

Introduction to cloud management from both a business and technical perspective. The focus will be on the management of cloud networks, including data storage, processing, and management. Topics include cloud services, architecture, deployment strategies, administration, security, and legal, ethical, and professional challenges.

Bachelor of Science in Cybersecurity, Digital Forensics

The Bachelor of Science in Cybersecurity (BSCYB) program prepares those who wish to meet the increasing demand for cybersecurity professionals in nearly all modern organizations. The coursework provides you with an understanding of basic information technology management concepts, fundamental security skills, and the legal and ethical issues associated with cybersecurity. The Digital Forensics specialization provides a greater focus on investigation and analysis of computer systems and networks. Upon completing this program, you’ll be prepared to work in positions such as security analyst, computer network defender, and computer incident responder.

Learn More

Bachelor of Science in Cybersecurity, Computer Network Defense

The Bachelor of Science in Cybersecurity (BSCYB) program prepares those who wish to meet the increasing demand for cybersecurity professionals in nearly all modern organizations. The coursework provides you with an understanding of basic information technology management concepts, fundamental security skills, and the legal and ethical issues associated with cybersecurity. The Computer Network Defense specialization takes a specific focus on assessing and addressing the security issues related to computer networks. Upon completing this program, you’ll be prepared to work in positions such as security analyst, computer network defender, and computer incident responder.

Learn More

Career Outlook

National University students are encouraged to joint our Cyber Team Nucl3@r. The cyber team apply the knowledge and skills they gain in class by competing in challenging cyber competitions like the Western Regional Collegiate Cyber Defense Competition, Collegiate Pentest Competition, National Cyber League, and Cyberforce Competition. These competitions also allow students to demonstrate their skills to potential employers.

  • Top Jobs in this field
  • Median Salary (USA)
  • JOB Openings (USA)
  • General and Operations Managers
  • $100,934 avg. salary (USA)
  • 373,566 job openings (past yr.) past year
Plan, direct, or coordinate the operations of public or private sector organizations, overseeing multiple departments or locations. Duties and responsibilities include formulating policies, managing daily operations, and planning the use of materials and human resources, but are too diverse and general in nature to be classified in any one functional area of management or administration, such as personnel, purchasing, or administrative services. Usually manage through subordinate supervisors. Excludes First-Line Supervisors.
Median Salary:
$100,934 annual +110% above US average
Job Openings:
373,566 past year
Salary Range:
  • Low
    $46,104
  • Medium
    $100,934
  • High
    $231,855

Most desired skills

  1. Operations Management
  2. Marketing
  3. Merchandising
  4. Finance
  5. Project Management
  6. Inventory Management
  7. Profit And Loss (P&L) Management

Top companies hiring for this role

  • Unclassified
  • CVS Health
  • AutoZone
  • Buckle
  • Walmart
  • Enterprise Rent-A-Car
  • Menards
  • Compliance Officers
  • $75,549 avg. salary (USA)
  • 38,710 job openings (past yr.) past year
Examine, evaluate, and investigate eligibility for or conformity with laws and regulations governing contract compliance of licenses and permits, and perform other compliance and enforcement inspection and analysis activities not classified elsewhere.
Median Salary:
$75,549 annual +57% above US average
Job Openings:
38,710 past year
Salary Range:
  • Low
    $43,596
  • Medium
    $75,549
  • High
    $124,563

Most desired skills

  1. Auditing
  2. Regulatory Compliance
  3. Project Management
  4. Risk Analysis
  5. Risk Management
  6. Accounting
  7. Finance

Top companies hiring for this role

  • Unclassified
  • United States Department of the Treasury
  • Humana
  • Citigroup
  • Wells Fargo
  • Amentum
  • Wahve Holdings
  • Information Security Analysts
  • $120,088 avg. salary (USA)
  • 20,359 job openings (past yr.) past year
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
Median Salary:
$120,088 annual +149% above US average
Job Openings:
20,359 past year
Salary Range:
  • Low
    $68,977
  • Medium
    $120,088
  • High
    $182,679

Most desired skills

  1. Cyber Security
  2. Auditing
  3. Vulnerability
  4. Computer Science
  5. Incident Response
  6. Information Systems
  7. Risk Analysis

Top companies hiring for this role

  • Unclassified
  • Leidos
  • Deloitte
  • General Dynamics
  • Marriott International
  • Mindpoint Group
  • ManTech
  • Computer Network Architects
  • $129,315 avg. salary (USA)
  • 13,281 job openings (past yr.) past year
Design and implement computer and information networks, such as local area networks (LAN), wide area networks (WAN), intranets, extranets, and other data communications networks. Perform network modeling, analysis, and planning, including analysis of capacity needs for network infrastructures. May also design network and computer security measures. May research and recommend network and data communications hardware and software.
Median Salary:
$129,315 annual +169% above US average
Job Openings:
13,281 past year
Salary Range:
  • Low
    $77,509
  • Medium
    $129,315
  • High
    $195,430

Most desired skills

  1. Network Engineering
  2. Network Routing
  3. Automation
  4. Firewall
  5. Computer Science
  6. Network Switches
  7. Wide Area Networks

Top companies hiring for this role

  • Unclassified
  • Leidos
  • Marriott International
  • Amazon
  • TEKsystems
  • Lumen Technologies
  • Ryder

Program Learning Outcomes

Learn the key skills to help you excel in your field of study.

  • Analyze a problem and design the cybersecurity measures appropriate to its solution.
  • Apply concepts of best practices in cybersecurity management to enterprise processes.
  • Describe the ethical challenges that confront a cybersecurity professional.
  • Apply security control principles in the construction of cybersecurity solutions.
  • Demonstrate written and oral communication skills expected of a cybersecurity professional.
  • Demonstrate the ability to securely administer a Windows and Linux system using security automation tools and techniques.
  • Demonstrate knowledge of the fundamental concepts of operating systems, networks, and cloud computing.
woman smiling at man taking notes

Admissions

Next start date: February

Year-round enrollment

Transfer Students Welcome

More about transferring to NU.

Enrolling in a university is a big decision. That’s why our dedicated admissions team is here to guide you through the admissions process and help you find the right program for you and your career goals.

To that end, we’ve simplified and streamlined our application process, so you can get enrolled in your program right away. Because we accept and review applications year round, you can begin class as soon as next month, depending on your program and location of choice.

Learn more about undergraduate, graduate, military, and international student admissions, plus admissions information for transfer students. You can also learn more about our tuition rates and financial aid opportunities.

To speak with our admissions team, call (855) 355-6288 or request information and an advisor will contact you shortly. If you’re ready to apply, simply start your application today.

woman smiling at man taking notes

Scholarships and Financial Aid

National University is dedicated to making higher education affordable, as well as accessible. Through NU scholarship offerings, eligible students are able to reduce the financial burden of college, start classes sooner, and finish their programs faster while focusing on achieving their goals.

Accreditations

WASC Senior College and University Commission logo

The Western Association of Schools and Colleges (WASC) accredits public and private schools, colleges, and universities in the U.S.

National Center of Academic Excellence (NCAE) in Cybersecurity icon

The National Security Agency (NSA) has designated National University as a National Center of Academic Excellence (NCAE) in Cyber Defense (CAE-CD) through 2028. More information on the National Center of Academic Excellence (NCAE) in Cybersecurity program can be found here: https://www.nsa.gov/Academics/Centers-of-Academic-Excellence/

graduate icon

95% of graduates with a Bachelor’s in Cybersecurity are employed in their related field.

woman with toddler smiling

Why Choose the National University Cybersecurity Bachelor’s Program

We’re proud to be a Veteran-founded, San Diego-based nonprofit. Since 1971, our mission has been to provide accessible, achievable higher education to adult learners.

Today, we educate students from across the U.S. and around the globe, with over 240,000 alumni worldwide.

headshot of Francisco, class of 2016

“The bachelor of cybersecurity program was an awesome technical experience! It was great to get actual real-world experience for the skills you are learning, as well as the key business components that relate to the such as project management, presentation, and teamwork.”

Jonathan Race, Class of 2018, Founding Cyber Team Captain

What makes a degree
with National University unique?

Free Tutoring Sessions

Access personalized tutoring sessions at no cost — empowering your learning.

Online and In-Person

Flexibility meets quality education with our online and in-person learning options.

24/7 Support

Get assistance anytime, anywhere with our round-the-clock support services.

Military Friendly

Committed to serving those who serve — diverse resources and support for veterans and family. Military and Veteran Admissions.

Mentoring Network

Individual student and alumni career guidance, professional development opportunities, and customized career support.

Transfer Students Welcome

NU makes it easy to get your degree, even if you started it with another university. Learn more about transferring to NU.

Accelerate Your Career With NU

At National University, you’re part of a family. As a student, you’ll have the support of staff, faculty members, students, and alumni who will be there with you every step of the way, cheering you on as you pursue your goals.

Our network of 240,000 alumni is a large global community that provides our graduates with the professional connections to get a leg up in your new career.

man and woman in graduation cap and gown smiling among other graduating students

FAQs

A BS in Cybersecurity degree opens doors in a variety of industries, including finance and insurance, manufacturing, information services, health care, administrative support services, and scientific and technical services.

Cybersecurity is a field that’s rapidly expanding and in need of professionals with up-to-date knowledge and skills. For example, employment of information security analysts is projected to grow 35 percent from 2021 to 2031, which is dramatically faster than the average for all occupations, according to the Bureau of Labor Statistics. It can also be a lucrative career move, with a median annual wage of $102,600 and the top 10 percent earning more than $165,920.*

Employers in the cybersecurity field are looking for workers with skills in communications, management, operations, leadership, infrastructure, information technology, innovation, integration, and research. With a bachelor’s degree from National University, you’ll be prepared to seek a variety of roles in the field of cybersecurity, including:**

  • Cybersecurity Engineer
  • Cybersecurity Analyst
  • Cybersecurity Manager
  • Cybersecurity Consultant
  • Cybersecurity Specialist
  • Cybersecurity Architect
  • Cyber Crime Analyst
  • IT Auditor
  • Incident & Intrusion Analyst
  • Penetration and Vulnerability Tester

To learn more about career opportunities and benefits of a bachelor’s in cybersecurity, read our post: Is a Cybersecurity Degree Worth It?

*SOURCE: https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm

**SOURCE: Emsi Labor Analyst- Report. Emsi research company homepage at https://www.economicmodeling.com/company/ (Report viewed: May 2, 2022). DISCLAIMER: The data provided is for Informational purposes only. Emsi data and analysis utilizes government sources to provide insights on industries, demographics, employers, in-demand skills, and more to align academic programs with labor market opportunities. Cited projections may not reflect local or short-term economic or job conditions and do not guarantee actual job growth. Current and prospective students should use this data with other available economic data to inform their educational decisions.

National University has developed academic pathways that build upon the coursework at various community colleges to help you reach your academic goals, so you can pick up on your bachelor’s degree studies right where you left off in your relevant associate degree program.

Learn more about National’s Cybersecurity Pathways and see which classes you may qualify to receive credit for. You may also wish to speak to an admissions counselor about your specific community college’s cybersecurity program.

The field of cybersecurity is robust and offers numerous pathways to difference-making careers. To provide the industry with highly skilled professionals on the cutting edge of the market’s current and expected needs, National University’s BS in Cybersecurity offers career-focused concentrations. Once you complete the core cybersecurity courses, you’ll have the opportunity to take a four-class concentration in either:

Network Defense – Focus in on actions taken to defend against unauthorized activity within computer networks by learning how to:

  • Set up, implement, and assess cybersecurity status of a computer system
  • Apply security controls affecting virtualized computing environment, a wireless network, and an operating system

Digital Forensics – Study the recovery and investigation of materials found in digital devices and learn how to:

  • Conduct a digital forensics investigation on a server or workstation using commonly accepted standards and tools
  • Preserve digital evidence using federal rules of digital evidence
  • Conduct a digital forensics investigation on a mobile device using commonly accepted standards and tools
  • Examine digital evidence for indications of illegal malicious activity or malfeasance

Information Technology Management – This 4 course concentration in Information Technology Management (ITM) provides for greater focus on the management of information and technology in regards to a secured networked system. Upon successful completion of this program, students will be able to:

  • Demonstrate the ability to manage and secure IT hardware, data, and databases.
  • Integrate best practices for administering, managing, securing, and delivering cloud technologies.

For degree and specialization requirements, please visit our course catalog.

Program Disclosure

Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.

Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.

NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.

All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.

National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.

Back to top