The Bachelor of Science in Cybersecurity provides you with both theory and know-how required to strategically assess, plan, design, and implement effective cybersecurity defenses in the public and private sectors. With near-daily reports of large-scale information security breaches and hacking events, this career field is wide open for highly educated and competent forensic investigators and cybersecurity analysts and consultants. The U.S. Bureau of Labor Statistics forecasted a 22 percent growth rate in the cyber security industry through 2020, making now the perfect time to acquire the education you need to meet the demand. Through this online IT bachelor’s program, you’ll learn research, writing, math, and analytical skills, along with an in-depth understanding of cybercrime.
Coursework in this bachelor’s degree aligns to the general objectives of the International Association of Computer Investigative Specialists (IACIS) certification and meets the topical requirements for the Department of Defense Directive 8570.1M Information Assurance Management (IAM) Technical I, Technical II, Technical III, Management I, Management II, and Management III categories.
The National Security Agency and the Department of Homeland Security have designated American Public University System as a National Center of Academic Excellence in Cyber Defense Education. Visit the APUS Center for Cyber Defense to learn more.
In addition to the institutional and degree level learning objectives, graduates of this program are expected to achieve these learning outcomes:
- Compare and contrast the various aspects of cybersecurity including the relationship between cyber defense, cyber operations, cyber exploitations, cyber intelligence, cybercrime, and cyber law within federal and state laws.
- Demonstrate an understanding of the processes and goals of cyber forensics investigations including the importance of search warrants and chain of custody in a forensic investigation of computer-related crimes.
- Develop strategies and plans for security architecture consisting of tools, techniques, and technologies to detect and prevent network penetration, and to design effective cybersecurity countermeasures.
- Analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect the security of the cyberspace.