
Cybersecurity
-
Gain Vital IT Skills.
Learn to keep essential data safe from hackers and other external threats.
-
Prepare for Certifications.
Explore concepts that enable you to sit for cybersecurity certifications while enrolled and after graduation.
-
Your schedule, your degree.
Study when and where is right for you with this flexible online cybersecurity degree program.
-
Overview
Develop skills for in-demand roles safeguarding sensitive data for companies across industries.
Securing customer data and protecting IT networks from external threats are top priorities for businesses today. Now, you can gain skills for an in-demand career in information security through the online cybersecurity degree program from Notre Dame College Online.
By earning your bachelor’s degree in cybersecurity, you can qualify for essential IT positions at companies across industries. That includes information security analyst roles, which had a median salary of $98,000 in 2018, according to the Bureau of Labor Statistics.
Earn certifications as you go. You will be prepared to sit for 3 CompTIA certifications as you’re working towards your bachelor’s degree:
- A+
- Network+
- Security+
Topics of Study
- IT security
- Network architecture
- Ethical hacking
- Cloud security
- Data recovery
- Computer forensics
In this program, you will study cybersecurity concepts in courses created with help from professionals with experience in this field. While the program takes place online, students will be able to gain hands-on experience by using simulation technology in a state-of-the-art cybersecurity lab and situation room that will open soon on Notre Dame College’s campus.
You will also explore essential information security concepts through online cyber-range training. Play the role of “cyber attacker” and “cyber defender” as you prepare to safeguard data by learning to think like a hacker.
Learning Outcomes
After you complete the online cybersecurity bachelor’s degree program, you will be prepared to:
- Understand complex cybersecurity problems and apply principles of cybersecurity design and best practices — including intelligence, damage assessment, recovery and computer forensics, risk assessment and management and human factors — to prevent and mitigate cyberattacks.
- Demonstrate foundational knowledge of information technologies and their impact on organizational processes and decision-making.
- Design, implement, administer and evaluate solutions in computer networks and database management systems using cybersecurity best practices.
- Assess and apply security principles and practices to maintain operations and protect information infrastructure in the presence of cyber risks and threats.
- Recognize and analyze professional responsibilities and make informed judgments in cybersecurity practice based on legal and ethical principles.
- Operate and communicate effectively as a member or leader of a cybersecurity team.
This Program Is Designed for:
- Engaged problem-solvers interested in using their abilities to protect company data.
- Individuals who love technology and want to pursue roles that build on that passion.
- Working professionals seeking a flexible program that will help them enter an in-demand field.
-
Courses & Requirements
Your course of study will help you earn the credentials you need to take the next step in your career. Our online Bachelor of Arts in Cybersecurity program requires 70 credit hours within the major. Additionally, all students are required to complete 50 credit hours of foundational studies.
Foundational studies courses offer students a comprehensive introduction to a range of subject areas and help build skills necessary for academic and personal success.
Course Description Credits CY 100 Provides the knowledge necessary to improve security by identifying and prioritizing potential threats and vulnerabilities of a computer network. Introduces policies, legal aspects and compliance. Content: Cyberstalking, fraud and abuse. Denial of service. Hacking techniques. Industrial espionage in cyberspace. Encryption. Network scanning and vulnerability scanning. Cyber terrorism and information warfare. Prerequisite: None.3 CY 150 Covers the fundamentals of IT device installation, configuration, maintenance and networking with thorough instruction built on the CompTIA A+ 220-901 and 220-902 exam objectives. Content: Computer anatomy. BIOS/UEFI tools. Motherboard. RAMs. Expansion cards. Storage. CPUs. Ports and interfaces. Designing and customization. Configurations. Printers and multifunction devices. Networking. Mobile devices. Troubleshooting. Prerequisite: None.4 CY 210 Takes students from an entry-level knowledge in computer networks to advanced concepts in Ethernet and TCP/IP networks, presenting how and why networking technologies are used. Content: Layers. Cabling. Wireless networking. LANs interconnecting. TCP/IP. Router configuration. Switch configuration. Routing protocols. Internet technologies. Troubleshooting. Network security. Cloud computing and virtualization. Codes and standards. Prerequisite: CY 150.4 CY 250 Introduces the concepts, languages, tools and skills required for both client- and server-side programming to develop platform-independent sites using the most current Web development technology. Content: Internet fundamentals. Web. HTML and XHTML. CSS. Dynamic documents. Bootstrap, JavaScript, jQuery, PHP and MySQL. XML. Flash. Ajax. Java web software. ASP.NET. Android Software Development. Prerequisite: CY 150.3 CY 310 Introduces the concepts, terminology, challenges, theory, practices and the essential practical skills needed to conduct reliable security audits. It covers the entire penetration testing lifecycle. Content: Standards. Cryptography. Reconnaissance. Malware. Windows hacking. Mac hacking. Web hacking. Vulnerability scanning. Linux hacking. Kali Linux. General techniques. Metasploit. Metasploit in Ruby. General hacking knowledge. Prerequisite: CY 250.3 CY 325 Presents design issues and fundamental principles in contemporary operating systems, providing a solid understanding of the key structures and mechanisms used in computers and mobile devices. Content: Computer System. Process description and control. Threads. Concurrency. Memory management. Virtual memory. Uniprocessor, multiprocessor, multicore and real-time scheduling. I/O management and disk scheduling. File management. Prerequisite: CY 150.3 CY 350 Introduces several programming languages commonly used to recognize vulnerabilities in an application, how an attacker could exploit those vulnerabilities and how to identify malicious code. Content: AI for cybersecurity. Python for machine learning and data analysis. Metasploit exploits with Ruby on Rails. Assembly. Java apps. Manual control over memory with C. Prerequisite: CY 250.3 CY 360 Covers the essential network security concepts and techniques needed to protect, monitor, analyze, detect and respond to unauthorized activity within the organization’s information systems and computer networks. Content: Attack types. Firewalls. Intrusion detection systems. Encryption fundamentals. Virtual private networks. Operating system hardening. Defending against virus attacks, Trojan horses, spyware and adware. Assessing system security. Prerequisite: CY 210.3 CY 370 Introduces fundamental Linux concepts with a primary focus on security. It also covers basic scripting toward understanding tools for penetration testing and cybersecurity threat detection. Content: Introduction to Linux OS. User and group accounts. File and data storage. Automation. Networks services. Process. Software management and log administration. Security tasks. Security policy development. Prerequisite: Junior standing.4 CY 385 Covers the entire lifecycle of incident response, including preparation, data collection, data analysis and remediation, which are the main activities in incident response and digital forensics. Content: Scope. Windows and Mac operating and file systems. Computer hardware. Acquiring evidence. Online investigations. Investigation documentation. Admissibility of digital evidence. Network and mobile forensics. Prerequisite: Junior standing.3 CY 410 Presents security best practices for multivendor cloud environments, applicable when moving legacy on-premises projects to the cloud or building a new infrastructure from the ground up. Content: Data asset management, identity and access management, vulnerability management, network security and incident response for Amazon Web Services, Microsoft Azure and IBM Cloud. Prerequisite: CY 385.3 CY 420 Describes the targets for attackers, the threats to mobile devices, including annoyance, stealing money, invading privacy, propagation and malicious tools, and the source of attacks. Content: Dangers. Communication attacks. Phone hacking technologies. Password cracking. Attacks on software applications. Attacks on hardware vulnerabilities. Malware. Countermeasures. Providers. Android and iOS security. Mobile forensics. Prerequisite: CY 385.3 CY 430 Provides a comprehensive coverage of web security building a complete understanding of the most common web attacks and their countermeasures, particularly in relation to the client side. Content: Browser security model. Web app vulnerabilities. SQL injection. DoS. TLS attacks. Same-origin policy. Cross-site scripting and request forgery. Authentication and access controls breaking. Information leakage. Prerequisite: CY 2503 CY 450 Provides students with practical work experience, key to the success in the internship, by revisiting the main cybersecurity concepts through a systematic, hands-on approach and preparing students to pass the CompTIA Security+ certification exam. Content: Software and web security. Attacks on TCP/IP and DNS. Packet sniffing and spoofing. Firewall and VPN. Hacking and defense. Cryptography, PKI and TLS programming. CompTIA Security+.4 CY 460 Prepares to master modern information security regulations and frameworks and learn specific best-practice policies for key industry sectors, including finance, healthcare, online commerce and small business. Content: Cybersecurity policy organization, format and styles. Models and frameworks. Governance and risk management. Assets management and data loss preventions. CIA. PCI. NIST. GLBA. HIPAA. FISMA. Prerequisite: Junior status.3 CY 475 Acquaints students with the main mechanisms available to protect digital data, such as sensitive data in a database, from unwanted actions of unauthorized users. Content: Advanced SQL security capabilities. Disk encryption. Software versus hardware-based protection mechanisms. Backups. Data masking. Data erasure. International laws and standards. Auditing. Microsoft, IBM and Oracle recommendations. Prerequisite: Senior status.3 CS 495 All students are required to complete a concluding professional experience. The internship will serve as a working capstone where students will integrate all they have learned within the context of a computer security internship. This internship is to culminate in a critical evaluation of the security environment in which they have been working. The evaluation will be required to discuss weaknesses and causes and offer meaningful solutions to resolve the problem. Prerequisite: Senior status.3 IS 222 Language-independent course introducing the computer program design and development process. Identification and solution of business problems emphasized. Concepts include program structures, decision-making, flow control, algorithm development and arrays. Techniques include structured flow charts, hierarchy charts, and the use of pseudocode in program design. Prerequisite: MA 105 or higher.3 IS 350 A study of problems in managing data as a valuable resource of an organization. Topics include data structures, data models (hierarchical, network, inverted, relational), database management systems, database administration, data dictionaries, database design, and issues related to data management (ownership, integrity, sharing, security, privacy). Exposure to microcomputer database management systems. Prerequisites: IS 222, IS 260 and IS 310.3 IS 330 This course introduces students majoring in Management Information Systems to the concepts and issues of Information Technology infrastructure, particularly, hardware, operating systems, and networking, with an emphasis on how they are selected and used to support business functions. It prepares students to work effectively with both IT professionals in the enterprise and external vendors and to design processes and solutions that depend on that infrastructure. Pre-requisite: BU 2353 IS 310 Introduction to business systems analysis. The phases of the systems analysis and design cycle are examined using an approach that provides the student with a practical method for the application of systems techniques in the analysis, design, implementation, and evaluation of business information systems. Prerequisites: BU 235 and IS 260.3
Admission Requirements
Students applying for the online cybersecurity degree program must meet the following requirements:
- A minimum 2.5 GPA
How to Apply
Students applying for admission to the online cybersecurity degree program must submit the following materials:
- A complete online application
- Official high school transcripts or GED score
- Official transcripts from all previously attended institutions
-
Costs & Financial Aid
Notre Dame College Online features a high-quality education at a price you can afford. See how your past academic credentials can help you make the most of your college education.
Component Requirements Cost Per Credit Hour Total Tuition 120 credit hours $475 $57,000 Transfer Credits 90 credit hours $475 $42,750 Total with transfer credits (up to 90) $14,250 Financial Aid
Discover federal financial aid, U.S. military benefits and other ways to make your education affordable.
Military Students
Notre Dame College is a proud participant in the Yellow Ribbon Program. Learn more about how Notre Dame College Online seeks to help service members make the most of their education.
-
Outcomes & Resources
Careers
Learn more about potential careers available after you graduate. Some include:
- Security analyst
- Security software developer
- Vulnerability assessor
- Cybersecurity technician
- Security engineer
- Programmer analyst
- Clinical informaticist
- Chief security officer
- Chief information officer
Benefits of Learning Online
Learn more about how online learning can provide you with a flexible and convenient way to earn your degree and go further as a professional.
View Benefits -
Frequently Asked Questions
Success as an online student requires self-motivation. Online students practice discipline as they work to meet obligations at school, home and work. Each week, you will dedicate time to coursework, and it is essential to take part in discussions and meet assignment deadlines. If you need information or have questions, be sure to reach out to your advisor.
Yes! Notre Dame College Online recognizes the importance of an affordable education, and we strive to ensure your financial situation is not a boundary when it comes to your career success. Refer to our Financial Aid page to learn more about how to pay for your degree.
The Free Application for Free Student Aid determines your eligibility for financial aid programs, such as loans and grants. It helps identify the types of aid you may receive, such as federal and state grants, work study programs and low interest loans. We strongly recommend you fill out your FAFSA form each year to help identify which financial aid opportunities may be available to you.
The online cybersecurity degree program helps you prepare for a range of roles in IT and information security. Opportunities include information security analyst, cybersecurity technician and security engineer. Additionally, the skills and knowledge that you gain in this program serve as the foundation for executive IT roles, such as chief security officer and chief information officer.