Online Bachelor of Science in Information Technology Cybersecurity
this may take a few seconds...
Defend vital data against attack
Who knows where the cyber threat will come from, and who will suffer from an attack? If you want to be one of the good guys guarding important data, consider earning a BS in Information Technology, Cybersecurity from Strayer University. You’ll build up skills in conducting digital forensics, learn how to help protect data and networks and defend against a digital onslaught, whatever its source.
Winter Classes Start on January 4
Program at a glance
Laptop on usEligibility rules apply
11-week courses in the program
Cost per course
Earn your degree online with Strayer
- Program details
- Cost & savings
Help stop cybercriminals before they strike
In this bachelor’s program, you’ll learn how to maintain the security of networks and data, what ethical (and unethical) hacking looks like, and explore network defense, offensive network security and countermeasures to shut hackers off from accessing important data.
Build your skills
- Learn how to maintain the security of networks and data in a range of environments.
- Study different types of hacking (both ethical and unethical).
- Perform penetration tests on communication media.
- Study different network threat-testing techniques.
- Master the functions and impacts of malicious programs – and their countermeasures.
The high-quality higher education you deserve
Affording your degree
At Strayer, you’ll find plenty of ways to make your tuition affordable, so you can worry less about your budget and get down to business.
cost per course
degree conferral (one-time only)
technology fee (one per term)
Ways to reduce your cost
Access no-cost gen ed courses through Sophia Learning. Then, earn
even more courses, tuition-free, with the Strayer Graduation
Transfer up to 28 classes toward your bachelor’s degree.
Earn one tuition-free class at the end of your program for every three you complete with Graduation Fund. Eligibility rules and restrictions apply. Connect with us for details.
More than 500 organizations – including corporations and community colleges – invest in their employees by partnering with Strayer University to offer access to discounted education programs. If your employer is a Corporate Alliance Partner, you may qualify for programs that can help you advance in your company and your career.
Learn defensive information technology
As in martial arts, so in cybersecurity: the best offense is often a good defense. Through fundamental coursework and lab-based training, you’ll gain insights into the defensive techniques used to protect against cyber threats and other nefarious activity. View all courses.
Being an effective communicator is an essential skill for any profession. In this course, you will learn the secrets to writing, listening, and speaking with credibility in order to share your voice with the world.
This course is an integrative capstone course for the Bachelor of Science in Information Technology program. The course takes a senior management approach to examine and solve real-world problems and projects. Students will apply project management techniques to create integrative information technology solutions that include databases, systems analysis, security, networking, computer infrastructure, human-computer interaction and web design.
This is a lab-based course that prepares students to install, configure, secure and maintain the Windows server environment. Topics include configuring and managing DHCP, DNS, routing and remote access, file and print services.
Get the knowledge and skills to identify, track and prosecute cyber criminals. Understand computer forensics; creating a secure lab; and the process for forensic investigation, including first responder response techniques, incident management, and reports used by computer forensic investigators. Cover a broad base of topics designed to detect attacks and collect evidence in a forensically sound manner. Take preparatory steps to identify evidence in computer-related crime and abuse cases and track a hacker’s path through a client system.
This is a lab-based course that covers topics in offensive network security, ethical hacking, network defense and countermeasures. The course provides an understanding of the tactics and tools used by hackers and methods to prepare strong countermeasures and defensive systems to protect an organization’s critical infrastructure and information. Topics include perimeter defense techniques, scanning and attacking simulated networks with a variety of tools, viruses, and malware.
This is a lab-based course that covers topics in advanced penetration testing and information security analysis. Students are exposed to methodologies in conducting thorough information security analysis and advanced penetration testing techniques to effectively identify and mitigate risks to the security of an organization’s infrastructure.
Bachelor’s admission requirements
Before you can pursue your bachelor’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer. Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
We welcome international students from around the globe.
We have 50+ campuses to serve you. While most Strayer University campus locations are currently closed due to COVID-19, select campuses have reopened for limited student services. Find an open campus near you.