HANDS-ON LEARNING

Getting a cyber security online degree gives you the skills and direction you need to secure and maintain the security of networks and data in a range of environments. In this program, you’ll: 

  • Prepare for your CompTIA Network+ and ISC2 certification exams
  • Design and implement a multi-computer network
  • Discuss the concepts of ethical hacking, the different types of hacking, and penetration testing techniques
  • Learn how to trace an internet connection, track personal email, identify passwords, and utilize various password identification tools
  • Examine the functions and impacts of malicious programs and their countermeasures
  • Identify the types of Denial of Service attacks and apply countermeasures
  • Explain and apply various hacking technologies and features used to protect networks
  • Discuss and design a computer Demilitarized Zone
  • Describe and perform penetration tests on communication media, including wireless networks, VoIPs, VPNs, Bluetooth, and handheld devices
  • Generate network threat-testing techniques, including denial of service, password identification, application and database penetration, virus and Trojan detection, and log management penetration


This course utilizes official EC-Council authorized curriculum and labs (iLabs). These learning resources and supporting certification exams have been accepted by, and meet the standards of the following organizations. * More Info

AT-A-GLANCE

Summer Classes Start:

July 1

Courses to Complete:

40

Cost Per Course:

$1,465

Campuses Near You:
FIND MY CAMPUS

MORE INFO

 

These learning resources and supporting certification exams have been accepted by, and meet the standards of the following organizations:

 

American National Standards Institute (ANSI) ISO 17024

EC-Council's Certified Ethical Hacker (C|EH) and Computer Hacking Forensics Investigator (C|HFI) certifications are ANSI/ ISO 17024 accredited.

 

 

NICE/NIST

EC-Council's Certified Ethical Hacker (C|EH) and Computer Hacking Forensics Investigator (CHFI) learning resources and certifications map to supporting job roles job roles, Knowledge-Skills-Abilities (KSA's), and Knowledge Units (KU's) within the NICE framework. For a full listing of the EC-Council - NICE framework mapping, please click here.

 

 

Committee on National Security Systems (CNSS)

Certified Ethical Hacker (C|EH) and Computer Hacking Forensics Investigator (CHFI) learning resources and certifications meet the training standards for information security professionals in the federal government.

 

Only the learning resources and exams utilized by Strayer University in the select courses are certified or accredited.  

BACHELOR OF CYBER SECURITY TECHNOLOGY COURSES

COURSES IN CONCENTRATION

  • CIS 332 - Network Server Administration I

    Prepare to install, configure, secure and maintain the Windows server environment in a lab­based setting. Topics include configuring and managing DHCP and DNS; routing and remote access; and file and print services.

  • SEC 420 - Perimeter Defense Techniques

    Address topics in offensive network security, ethical hacking, network defense and countermeasures in a lab setting. Understand the tactics and tools used by hackers and methods to prepare strong countermeasures and defensive systems to protect an organization’s critical infrastructure and information. Topics include perimeter defense techniques, and scanning and attacking simulated networks with a variety of tools, viruses and malware.

  • SEC 435 - Network Penetration Testing

    Explore topics in advanced penetration testing and computer security analysis in a lab setting. Discover methodologies for conducting thorough information security analysis and advanced penetration testing techniques to effectively identify and mitigate risks to the security of an organization’s infrastructure. 

COURSES IN MAJOR

  • CIS 111 - Introduction to Relational Database Management Systems

    Get an introduction to the theory and applied concepts of database design, database management and information management. Focus on identifying organizational information requirements, express those requirements using conceptual data modeling techniques, verify the structural characteristics with normalization techniques and convert conceptual data models into physical database models.

  • CIS 175 - Introduction to Networking

    Discover the fundamentals of networking technology. Focus on networking protocols, topologies, hardware and operating systems. Topics include data communications, telecommunications, infrastructure security, inter/internetworking and the application of networking to multimedia, information storage and distribution.

  • CIS 210 - Systems Analysis and Development

    This course presents the processes, methods, techniques and tools that organizations use to effectively architect computer-based technologies. Topics include a fundamental review of project management and data design followed by the processes required to gather and articulate business requirements. Students will acquire skills to procure, evaluate, test and systematically build systems for integration into an organization.

  • CIS 273 - Web Design and Development

    This course presents students the design, implementation and testing of web-based applications including related software, databases, scripting techniques, interfaces and digital media. It also covers social, ethical and security issues arising from the web, e-commerce and social networking software applications.

  • CIS 312 - Computer Architecture

    Discover the concepts and essential skills necessary to administer operating systems, networks, software, file systems, file servers, web systems, database systems, system documentation, policies and procedures. Topics include the methods required to select, deploy, integrate and administer computing platforms or components that support an organizations information technology infrastructure. Explore the fundamentals of hardware and software, as well as how they integrate to form essential components of systems.

  • CIS 333 - Networking Security Fundamentals

    Study computer information system security principles, challenges, vulnerabilities and countermeasure strategies. Topics include definition of security terms, concepts, elements, and goals. Explore industry standards and practices that focus on the availability, integrity and confidentiality aspects of information systems security.

  • CIS 375 - Human Computer Interaction

    Explore user-centered methodologies in the development, evaluation and deployment of information technology applications and systems. Study evolving technologies and devices and learn to design interactive products that enhance the way people communicate, interact and work with computers. Topics include user and task analysis, human factors, ergonomics, accessibility standards and cognitive psychology.

  • MAT 200 - Precalculus

    Review algebraic techniques. Selected advanced topics include matrices and determinants as techniques for solving linear systems in three or more variables, elementary concepts of analytic geometry, and logarithms. Focus on business-related word problems.

  • CIS 498 - Information Technology Capstone

    Take a senior management approach to examine and solve real-world problems and projects. Apply project management techniques to create integrative information technology solutions that include databases, systems analysis, security, networking, computer infrastructure, human/computer interaction and web design.

  • CIS 255 - Operating Systems

    Students can take either CIS 329, CIS 337, OR CIS 255

    Covers the development and execution of structured shell programs including scripts, menus, I/O redirection, pipes, variables, and other UNIX and Windows commands. Operating systems administration techniques also are covered including electronic mail, editors, online help, and file and directory techniques.

  • CIS 337 - Internetworking Basics

    Students can take either CIS 329, CIS 337, OR CIS 255

    Get an introduction to LAN, WAN and WLAN concepts and connectivity in an internetworking environment. Use command-line interface commands to secure, configure and troubleshoot router and switch operating systems. Topics include an overview of networking devices that operate at the OSI or TCP/IP stack, IP addressing and subnetting, collision and broadcast domains.

Strayer University is a proud recipient of the Academia Partner Circle of Excellence Award by EC-Council, a global leader in cybersecurity. Strayer's program now offers students Certified Ethical Hacker and Certified Hacking Forensics Investigator certifications.

SECURE YOUR CAREER IN A GROWING FIELD

Data protection is a key concern for businesses and organizations operating in a digital environment that is constantly tested by bad actors looking for ways to be where they shouldn’t. Protect valuable information and cut digital criminals off at the pass when you earn your cyber security online bachelor’s degree from Strayer University.

The online Bachelor of Science in Information Technology cyber security technology concentration at Strayer preps students to wear the white hat in the digital world.  We’ll give you the education you need to understand concepts like ethical hacking, network defense, offensive network security, and 

countermeasures against hackers that shut them out of your network — and shut them down.

You’ll learn to think like a hacker, understanding how these black-hat programmers breach network systems as you’re trained how to implement defense systems that protect data.

Security is the most pressing role in the information technology field. Jump onto the front lines in the fight against hackers when you earn your cyber security online bachelor's degree from Strayer.

OTHER BACHELOR OF INFORMATION TECHNOLOGY CONCENTRATIONS

EXPAND YOUR OPTIONS

Each Bachelor of Science in Information Technology concentration can provide you with skills you’ll be able to apply immediately. You may want to explore these other Bachelor of Science in Information Technology concentrations.

Bachelor of Science in Information Technology

REQUEST INFORMATION

U.S. Military Affiliation

Do you have transfer credits?

You consent to receive autodialed marketing calls or text messages from Strayer University and partner school, Capella University, at the phone number you provided. Consent is not required to purchase goods or services. You can always call us at 1.866.314.3547.

 

Submitting your information,
this may take a few seconds...