Bachelor of Science in Cybersecurity
The Bachelor of Science in Cybersecurity addresses the critical national need for a highly skilled cybersecurity workforce and provides you the knowledge and skills needed to protect critical cyber infrastructure and information assets. This innovative degree program uses an interdisciplinary approach that draws on solid technical as well as relevant human, policy, legal, ethical and management aspects needed to protect critical information infrastructure. In addition, the program prepares you for well-known cybersecurity related industry certifications that are perfect for increasing career opportunities in the current rapidly growing cybersecurity job market..
Through course work, you will be able to:
- Assess and apply cybersecurity principles, tools and methods to defend information systems against cyber threats.
- Protect an organization's critical information infrastructure by applying cybersecurity design best practices and technologies to prevent and mitigate cyber attacks and vulnerabilities.
- Design, implement and administer networks in a secure manner by integrating network defense technologies, monitoring tools and measures.
- Evaluate the hardware and software components of a computing environment and apply security best practices to install, configure and manage modern operating systems.
- Implement fundamental security principles and techniques in developing secure programs.
- Apply database security models and best practices in the design and development of database management systems.
- Analyze and navigate policy, legal, ethical and compliance aspects of cybersecurity.
|I. General Education Requirements||60|
|A. Intellectual and Practical Skills||15|
|B. Civic and Global Learning||9|
|C. Knowledge of Human Cultures||9|
|D. Understanding the Physical and Natural World||8|
|F. General Education Electives||16|
|II. Cybersecurity Core||54|
|CYB-120: Introduction to Cybersecurity||3|
|ITS-130: Database Fundamentals||3|
|ITS-140: Introduction to Networking||3|
|ITS-150: Computer Programming I||3|
|ITS-160: Fundamentals of Modern Operating Systems||3|
|CYB-220: Defensive Security||3|
|CYB-221: Firewalls and Perimeter Security||3|
|ITS-231: Database Programming||3|
|ITS-240: Routing and Switching Fundamentals||3|
|CYB-320: Ethical Hacking||3|
|CYB-321: Digital Forensics Techniques and Practices||3|
|ITS-340: Wireless and Mobile Networking||3|
|ITS-363: Windows Desktop and Server Configuring||3|
|CYB-420: Critical Infrastructure Security||3|
|CYB-421: Cybersecurity Risk Analysis and Management||3|
|CYB-422: Cybersecurity Policies, Programs and Compliance||3|
|CYB-495: Cybersecurity Capstone||3|
|III. Electives - Students choose one of the following options:||6|
A. Digital Forensics and Cyber Investigation option
B. Cloud Security option
C. Homeland Security option
For more information, please contact:
Dr. Amjad Ali
Associate Dean, School of Applied Science and Technology
Thomas Edison State University
111 W. State Street, Trenton, NJ 08608
Phone: 609-984-1130, ext. 3197; Email: firstname.lastname@example.org
Leverage Your Training
Have you earned a professional license or certification, or acquired college-level technical expertise on the job? If so, it may be worth college credit. The University also offers a variety of other ways to earn credit, including transferring previous college credits, all designed around the needs of adult learners, like you.