Cybersecurity Bachelor of Science
Leading to a Bachelor of Science Degree in Cybersecurity
Students in Cybersecurity (BSCY) learn how systems, devices, and networks operate and how to identify potential security vulnerabilities in those environments. Students will experience the entire security process from incident response and forensics, to offensive and defensive security, to policy and management. Electives allow students to dive deeper into areas of cybersecurity that they are most interested in. Students also apply these skills directly in the work environment through two required co-op work semesters beginning junior year.
Program Educational Objectives
Within three to five years of graduation:
- Graduates are able to regard cybersecurity across domains of people, process, policy, and technology.
- Graduates are able to define solutions that integrate cybersecurity concepts from the design phase through implementation.
- Graduates are able to apply security principles and practices to the environment, hardware, software, and human aspects of a system.
- Graduates are able to analyze and evaluate systems with respect to maintaining operations in the presence of risks and threats.
- Graduates are able to apply necessary oversight of systems based on legal, compliance, regulatory, or governance requirements.
- Graduates are able to define privacy, trust, confidentiality, and security as it relates to people, personnel, and organizations.
Graduates of the program will have an ability to:
- Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
- Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
- Communicate effectively in a variety of professional contexts.
- Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
- Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
- Apply security principles and practices to maintain operations in the presence of risks and threats.
Total credits for degree: 125
This is a four-year program, starting in the fall semester of the student’s first year and planned to end in the summer semester of the student’s fourth year. The courses are as follows:
|COMP1000||COMPUTER SCIENCE I||4|
|INTRODUCTION TO NETWORKS
or NETWORK PROGRAMMING
|COMP1050||COMPUTER SCIENCE II||4|
or DIGITAL LOGIC
|MATH2860||LINEAR ALGEBRA & MATRIX THEORY||4|
|COOP3000||PRE CO-OP WORK TERM (OPTIONAL)|
|MATH/SCI Math or Science Elective 2||4|
|COOP3500||COOP EDUCATION 1||0|
|MATH2100||PROBABILITY & STATISTICS FOR ENGINEERS||4|
|COMP Cryptography Elective||4|
|COOP4500||COOP EDUCATION 2||0|
|COMP Cybersecurity Elective 6||3 or 4|
|COMP Computer Science Elective 3||4|
|COMP4550||INCIDENT RESPONSE & BUSINESS CONTINUITY||4|
|COMP Cybersecurity Elective 6||3-4|
|MATH/SCI Math or Science Elective 2||4|
Students must take two math or science electives total. Of these, at least one must be a 3-2-4 science elective with the exception of PHYS1000, and PHYS1500. Math electives include any Applied Math minor course.
Cybersecurity students take a total of four computer science electives: two cybersecurity electives, one cryptography elective and one computer science.
Students are required to complete:
- At least one course in Humanities: CSAS, HSSI, HIST, HUMN, LITR and PHIL
- At least one course in the Social Sciences: CSAS, HSSI, COMM, ECON, ENVM, POLS, PSYC and SOCL
- The remaining course from either the Humanities or Social Sciences category.
Students with a three English course sequence may use the third English course to satisfy a Humanities requirement.
A minimum of 20 credits total, including English, humanities, and social science credit, is required to complete the humanities and social sciences graduation requirement.
Of the three listed humanities and social science electives BSCY students must include a Directed Elective:
- An Ethics elective
Math Placement may alter the course schedule above.
The Cryptography Electives: select one course from following list
Cybersecurity Electives: select two courses from the following list
|COMP3575||SCRIPTING FOR CYBERSECURITY AND FORENSICS||4|
|COMP3800||SPECIAL TOPICS IN COMPUTER NETWORKING OR COMPUTER SCIENCE (require School approval to satisfy Cybersecurity Elective)||4|
|COMP4590||PUBLIC KEY CRYPTOGRAPHY||4|
|ELEC3800||SPECIAL TOPICS IN ELECTRONICS (require School approval to satisfy Cybersecurity Electives)|
|MATH3800||SPECIAL TOPICS IN APPLIED MATHEMATICS (require School approval to satisfy Cybersecurity Electives)|
Computer Science Electives: select one course from the following list
|COMP1150||ROUTING AND SWITCHING||4|
|COMP3125||DATA SCIENCE FUNDAMENTALS||4|
|COMP3450||PARALLEL COMPUTING AND DISTRIBUTED COMPUTING||4|
|COMP3660||MOBILE APP DEVELOPMENT||4|
|COMP3750||INTRODUCTION TO BIOSTATISTICS||4|
|COMP3800||SPECIAL TOPICS IN COMPUTER NETWORKING OR COMPUTER SCIENCE (require School approval to satisfy Computing Elective)||4|
|COMP4150||ADVANCED SYSTEM ADMINISTRATION||4|