Online Bachelor of Science in Information Technology Cybersecurity
Why earn a cybersecurity degree from Strayer?
Who knows where the cyber threat will come from, and who will suffer from an attack? If you want to be one of the good guys guarding important data, consider earning a BS in Information Technology, Cybersecurity from Strayer University. You’ll build skills in conducting digital forensics, learn how to help protect data and networks, and defend against a digital onslaught, whatever its source.
- Program details
- Cost & savings
Is a BS in Information Technology, Cybersecurity good to have? It depends on what you learn.
In this bachelor’s program, you’ll learn how to maintain the security of networks and data. You’ll explore network defense, offensive network security and countermeasures to shut hackers off from accessing important data. And you’ll find out what ethical (and unethical) hacking looks like.
- Learn how to maintain the security of networks in a range of environments.
- Study different types of hacking (both ethical and unethical).
- Perform penetration tests and information security analysis.
- Study offensive network security, ethical hacking, network defense and their countermeasures.
Class size varies based on course objectives and the teaching demands of the subject matter. In general, Strayer University aims to keep the student-to-instructor ratio low.
How long does it take to get a degree in information technology?
- There are 40 11-week courses in this program.
- How many courses you take at a time will determine how long the overall program will be.
- Strayer University credits are expressed in quarter hours.
- One quarter hour of credit is granted for the successful completion of 10 contact hours per course.
- The standard requirement for a 4.5 credit hour is for students to spend 10 to 14 hours in weekly work, including in- and out-of-classroom work. Strayer’s course design uses this requirement to meet applicable regulatory standards.
3 out of 4 Strayer Bachelor of Science in Information Technology alumni agree that their degree was a worthwhile investment.
Strayer Alumni Survey, 2021
Estimate the cost of your degree
How much does a bachelor’s in cybersecurity cost?
Estimate the cost of your degree
How much does a bachelor’s in cybersecurity cost?
*Student is required to take two courses per quarter during disbursement period
PREPARING YOUR RESULTS
Calculate the approximate time commitment of your degree.
|Course load||... courses/term|
|Classroom time||... hours/week|
|Terms per year||... terms|
|Terms to graduation||... terms|
Calculate the approximate cost of your degree
|No-cost gen ed||$0|
Program cost breakdown
In most cases, Strayer’s BS program consists of 40 courses, with the price of $1,480 per course. There are additional fees for textbooks and supplies, a $65 technology fee each term, and a one-time $150 degree conferral fee.
Courses from another institution may be eligible for transfer credits to Strayer, which can reduce the number of courses you need to graduate and your overall tuition. BS students can transfer up to 28 classes toward the BS degree (if approved). Strayer’s transfer credit page has more information as well as a tool to estimate how many transfer credits you may be able to apply to your Strayer degree program.
Scholarships and financial aid
There are a number of financial aid options worth exploring on our financial aid page. To apply for federal aid, prospective students should fill out the Free Application for Federal Student Aid (FAFSA) form. Stafford loans are available for graduate study. These are direct unsubsidized loans, not based on financial need. Unlike subsidized loans, Stafford loan interest will accrue while in the program. Making interest payments while in school will help reduce the amount of principal that would otherwise build up.
There are also scholarships and private loans available for Strayer students.
Save up to $14,800 on your Strayer bachelor’s degree by accessing your general education courses through our affiliate, Sophia Learning.*
*Savings assumes transferring 10 courses taken at Sophia. Eligibility rules apply. Connect with us for details.
Transfer up to 28 classes toward your bachelor’s degree.
More than 500 organizations – including corporations and community colleges – invest in their employees by partnering with Strayer University to offer access to discounted education programs. If your employer is a Corporate Alliance Partner, you may qualify for programs that can help you advance in your company and your career.
Non-federal loans may pay the difference between the cost of attendance and the total of loans and grants received from other tuition assistance programs. The terms and conditions of federal loans are often more favorable than private loans and should be considered before exploring private loans.
Military tuition assistance
Scholarships are offered to eligible students currently serving in the military as well as military spouses. Strayer is also approved by Veterans Affairs to accept and process veteran education benefits. Learn more about Strayer’s active military assistance program here.
In addition to participating fully in the Yellow Ribbon Program, Strayer is approved by Veterans Affairs to accept and process veteran education benefits. Student veterans can receive transfer credit for military training and life experiences.
What coursework do you need for a cybersecurity bachelor’s?
As in martial arts, so in cybersecurity: The best offense is often a good defense. Through fundamental coursework and lab-based training, you’ll gain insights into the defensive techniques used to protect against cyber threats and other nefarious activity. View all courses.
What is a minor in college?
A minor is a group of five courses in a select subject area that can add depth to your resume and round out your degree. Pursuing a minor offers you the opportunity to gain knowledge and skills in a secondary area of interest outside of your major and concentration.
How does a minor work?
Since you can use elective courses to complete the minor, in most cases you won’t have to spend extra time and money on additional courses to complete your degree. Keep in mind that courses used to complete your major can’t be applied toward a minor.
Should you get a minor in college?
Getting a minor can give you a professional edge. It demonstrates your forward thinking, self-motivation and organization – all valuable skills in the workplace.
Being an effective communicator is an essential skill for any profession. In this course, you will learn the secrets to writing, listening, and speaking with credibility in order to share your voice with the world.
This course is an integrative capstone course for the Bachelor of Science in Information Technology program. The course takes a senior management approach to examine and solve real-world problems and projects. Students will apply project management techniques to create integrative information technology solutions that include databases, systems analysis, security, networking, computer infrastructure, human-computer interaction and web design.
This is a lab-based course that prepares students to install, configure, secure and maintain the Windows server environment. Topics include configuring and managing DHCP, DNS, routing and remote access, file and print services.
Get the knowledge and skills to identify, track and prosecute cyber criminals. Understand computer forensics; creating a secure lab; and the process for forensic investigation, including first responder response techniques, incident management, and reports used by computer forensic investigators. Cover a broad base of topics designed to detect attacks and collect evidence in a forensically sound manner. Take preparatory steps to identify evidence in computer-related crime and abuse cases and track a hacker’s path through a client system.
This is a lab-based course that covers topics in offensive network security, ethical hacking, network defense and countermeasures. The course provides an understanding of the tactics and tools used by hackers and methods to prepare strong countermeasures and defensive systems to protect an organization’s critical infrastructure and information. Topics include perimeter defense techniques, scanning and attacking simulated networks with a variety of tools, viruses, and malware.
This is a lab-based course that covers topics in advanced penetration testing and information security analysis. Students are exposed to methodologies in conducting thorough information security analysis and advanced penetration testing techniques to effectively identify and mitigate risks to the security of an organization’s infrastructure.
Bachelor’s in IT admission requirements
Before you can pursue your bachelor’s degree, you have to enroll at Strayer. Here’s what you need to get started for admission to the university.
Learn more about the admission process at Strayer. Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
International bachelor's students
We welcome international students from around the globe.