Bachelor of Science in Cybersecurity
While cryptographers strive for the best possible solution to a security issue, the implementation of their work is too often restricted by technological limitations, cost restraints and human factors that were not considered as part of the original design process. For effective solutions to gain practical relevance, the end users must be willing and able to use the technology, and the solution must provide a significant economic benefit.
Program Description
The Bachelor of Science in Cybersecurity program is structured to provide students with security expertise within the context of a broad education. A solid education in security requires not only a strong focus in science and computer science in particular but must also incorporate some aspects of engineering and technology management. The program culminates with a project-oriented, two-semester senior capstone course through which you will develop the client-facing and project management skills expected of the modern IT professional.
Program Objectives and Outcomes
These are the professional accomplishments that students are expected to have achieved three years after graduation:
-
Be able to acquire new skills and knowledge on one's own (Skills Development)
-
Be able to create solutions to complex problems in secure system design (Skills Application)
-
Be proficient in both oral and written technical communication (Communication)
-
Be effective as either a member or a leader of a small team (Teamwork)
-
Be able to evaluate the impact of one's work on the intended users and on society (Impact)
Student Objectives and Outcomes
Student outcomes are measurable goals for the learning that takes place during a student's time in the program. These narrow statements describe what students are expected to know and be able to do by the time of graduation, relating to the skills, knowledge, and behaviors that students acquire in the program:
-
An ability to apply knowledge of computing and mathematics appropriate to the discipline (Apply)
-
An ability to analyze a problem and identify and define the cybersecurity requirements appropriate to its solution (Analyze)
-
An ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired cybersecurity needs in the face of current, emerging, and potential threats (Define)
-
An ability to function effectively on teams to accomplish a common goal (Teamwork)
-
An understanding of professional, ethical, legal, security and social issues and responsibilities (Responsibility)
-
An ability to communicate effectively with a range of audiences (Communication)
-
An ability to analyze the local and global impact of cybersecurity on individuals, organizations and society (Impact)
-
Recognition of the need for and an ability to engage in continuing professional development (Professional Development)
-
An ability to use current techniques, skills, and tools necessary for cybersecurity practice (Currency)
-
An ability to apply mathematical foundations, algorithmic principles, and computer science theory in the modeling and design of secure computer-based systems in a way that demonstrates comprehension of the tradeoffs involved in design choices (Tradeoffs)
-
An ability to apply design and development principles in the construction of secure software systems of varying complexity (Construction)
Not only do outcome goals exist for the overall program, but each course has its own outcomes.
Cybersecurity Requirements
The program requires the following courses:
Mathematics
Computer Science
CS 115 | Introduction to Computer Science | 4 |
CS 284 | Data Structures | 4 |
CS 146 | Introduction to Web Programming and Project Development | 3 |
CS 347 | Software Development Process | 3 |
CS 382 | Computer Architecture and Organization | 4 |
CS 385 | Algorithms | 4 |
CS 392 | Systems Programming | 3 |
CS 442 | Database Management Systems | 3 |
CS 485 | Societal Impact of Information Technologies | 1 |
CS 488 | Computer Architecture | 3 |
CS 492 | Operating Systems | 3 |
CS 496 | Principles of Programming Languages | 3 |
CS 511 | Concurrent Programming | 3 |
CS 521 | TCP/IP Networking | 3 |
CS 595 | Information Security and the Law | 3 |
Cybersecurity
CS 503 | Discrete Mathematics for Cryptography | 3 |
| Or | |
MA 503 | Discrete Mathematics for Cryptography | 3 |
| | |
CS 306 | Introduction to IT Security | 4 |
CS 423 | Senior Design I | 3 |
CS 424 | Senior Design II | 3 |
CS 576 | Systems Security | 4 |
CS 578 | Privacy in a Networked World | 3 |
CS 579 | Foundations of Cryptography | 3 |
Other Cybersecurity electives may be approved at the discretion of the program director.
Sample Study Plan
Term I
CAL 103 | Writing and Communications Colloquium | 3 |
CS 115 | Introduction to Computer Science | 4 |
CS 146 | Introduction to Web Programming and Project Development | 3 |
MA 121 | Differential Calculus | 2 |
MA 122 | Integral Calculus | 2 |
| Science I | 3 |
Term II
CAL 105 | CAL Colloquium: Knowledge, Nature, Culture | 3 |
CS 135 | Discrete Structures | 4 |
CS 284 | Data Structures | 4 |
MA 125 | Vectors and Matrices | 2 |
MA 126 | Multivariable Calculus I | 2 |
| Science II | 3 |
| Science Lab | 1 |
Term III
CS 306 | Introduction to IT Security | 4 |
CS 334 | Theory of Computation | 3 |
CS 382 | Computer Architecture and Organization | 4 |
CS 385 | Algorithms | 4 |
HSS 371 | Computers and Society | 3 |
Term IV
CS 392 | Systems Programming | 3 |
CS 496 | Principles of Programming Languages | 3 |
CS 347 | Software Development Process | 3 |
MA 222 | Probability and Statistics | 3 |
| | |
MA 232 | Linear Algebra | 3 |
| Or | |
MA 236 | Introduction Mathematical Logic | 3 |
Term V
CS 503 | Discrete Mathematics for Cryptography | 3 |
CS 442 | Database Management Systems | 3 |
CS 578 | Privacy in a Networked World | 3 |
CS 576 | Systems Security | 4 |
HUM | Humanities | 3 |
Term VI
CS 488 | Computer Architecture | 3 |
CS 492 | Operating Systems | 3 |
CS 579 | Foundations of Cryptography | 3 |
CS 595 | Information Security and the Law | 3 |
HUM | Humanities | 3 |
Term VII
CS 425 | Cybersecurity Capstone I | 3 |
CS 511 | Concurrent Programming | 3 |
CS 485 | Societal Impact of Information Technologies | 1 |
CS | Cybsersecurity Elective | 3 |
CS | CS Elective | 3 |
HUM | Humanities | 3 |
Term VIII
CS 426 | Cybersecurity Capstone II | 3 |
CS 521 | TCP/IP Networking | 3 |
CS | Cybsersecurity Elective | 3 |
CS | Cybsersecurity Elective | 3 |
| General Elective | 3 |
Electives
The program includes one CS electives, two Cybersecurity electives, and one general elective. Students must obtain their advisor’s approval before enrolling in a course to count as CS or general elective. The following courses are approved as Cybersecurity electives. Note that undergraduate students must meet a minimum GPA requirement in order to be allowed to enroll in 600-level courses.
These courses must each be 3 or more credits. No course may duplicate another; specifically, students may not count toward the minor CS 501, CS 515, CS 550, CS 556, CS 570, or CS 590. Also, students may not count toward the minor both courses in each of the following pairs: CS 382 and CS 550, CS 488 and CS 514, CS 492 and CS 520, CS 496 and CS 510, CS 442 and CS 561, SSW 540 and CS 347.
CS 577 | Reverse Engineering and Application Analysis | 4 |
CS 594 | Enterprise and Cloud Security | 3 |
CS 665 | Forensic Analysis | 3 |
CS 693 | Cryptographic Protocols | 4 |
CS 676 | Advanced Topics in Systems and Security | 3 |
CS 696 | Database Security | 3 |
CPE 592 | Computer and Multimedia Network Security | 3 |
EE 584 | Wireless Systems Security | 3 |
FIN 545 | Risk Management for Financial Cybersecurity | 3 |