Bellevue University provided a great opportunity to receive a quality, online, accredited education while working full time.
Little Elm, TX
Computer Information Systems
Cybersecurity Degree - Bachelor of Science
Major Requirements (36 credit hours)
(Click a course name below to view course details)
Required courses (30 credit hours)
CYBR 250 Introduction to Cyber Threats, Technologies and Security
This course introduces information technologies and examines methods for protecting them against persistent and constantly evolving threats. Existing and emerging information technologies are discussed including operating environments, computer networking, and data management. Basic methods for managing information systems and technologies are presented from a standpoint of providing sufficient security protections.
CIS 311 Network Security
This course provides an introduction to the goals, functional processes, tools, and techniques associated with network security. Discussion includes devices such as firewalls, intrusion detection mechanisms, and Virtual Private Networks (VPNs). Telecommunications and networks security protocols used to prevent, detect, and correct potential vulnerabilities associated with both the outsider and insider threat are also explored.
CIS 312 Securing Access Control
This course provides an introduction to the concepts associated with configuring identification and authentication. Discussion includes comparison of various access models, and how passwords, smart cards and biometric devices can assist in securing system access and ensure confidentiality, integrity, and availability of data. Other technologies such as remote authentication and Public Key Infrastructure (PKI) are also explored.
CIS 411 Assessments and Audits
This course explores the principles of risk assessment, vulnerability analysis, and auditing. Discussion includes the use of these principles to evaluate the effectiveness of information security controls. Topics include threat and asset identification, countermeasures and safeguards, acceptable risks, and vulnerabilities. The auditing concepts of technical, physical, and administrative controls are also introduced along with how these controls are measured for effectiveness.
CYBR 320 Operational Security
This course focuses on the skills required to operate a security program within an organization. Coverage includes the practical application of security practices in an operational environment. Topics include security structure, leading security projects, policy management, human factors of security, and physical security methods.
CYBR 340 Operating Systems and Mobile Device Security
This course focuses on the skills required to secure base operating systems on server, desktop, virtual, and mobile platforms. Coverage includes the practical application of security tools, utilities, and configurations for protecting computer operating systems at both the user and corporate level. Discussion also includes protecting stand-alone and virtualized servers, cloud computing security, and the protection of mobile platforms such as smart phones, tablets and handheld computers.
CYBR 350 Web, Commerce and Application Security
This course explores securing core technologies that support Internet applications and commerce. Processes for creating and administering Internet web sites to ensure proper protections are introduced. The course also addresses securing applications on Internet websites and mobile platforms, and introduces basic methods for secure development.
CYBR 410 Data/Database Security
This course focuses on the protection of data at rest. Coverage includes the identification, ownership, and protection of data – whether residing in files, folders, or databases. This course also introduces the concept of database security to include: Architecture, Password Policies, Auditing, Privileges, and Roles Administration. Emphasis is placed on areas unique to data and database security.
CYBR 420 Cyber Investigations and Forensics
This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices.
CYBR 450 Advanced Cybersecurity Concepts
This course provides a monitored structure for application of the skills and knowledge acquired throughout the Cybersecurity program. Emphasis is placed on the use of real-world security problems, issues, and situations. Course assignments will require the use of protection, detection, deterrence, and response techniques in addressing threats, vulnerabilities, and risks found in businesses today.
Plus, choose two courses (6 credit hours) from the following:
CIS 242 Introduction to Programming Using Java
This course introduces the concepts of structured programming using Java. The course covers the basics of the Java programming language syntax, to include designing, coding, documenting, and debugging programs. Additional topics covered will be elementary data structures, input/output statements, selection, iteration, methods, and one-dimensional arrays. Students will write programs using all of the before-mentioned topics.
CIS 243 Introduction to Programming Using C#
This course is designed to introduce the concepts of structured programming. How programs and programming languages work, and the purposes and practices of structured programming are discussed. Designing, coding, documenting, and debugging programs using elementary data structures, input/output statements, selection and iteration, functions, and one-dimensional arrays are covered in detail.
CIS 313 Cryptography
This course provides an introduction to the fundamental components of encryption. Topics include the history of cryptography, public key and private key systems, hashing, and digital signatures. Topics also include the development of the Advanced Encryption Standard, the use and functionality of Pretty Good Privacy, and the Secure Socket Layer.
CIS 321 Structured System Analysis and Design
This project-based course focuses on the use of tools and methodologies applied to structured system analysis and design. Emphasis is placed on the traditional approaches, for example, system flow charting and entity relationship diagrams. Students will complete a variety of analysis design specifications and a project implementation plan for a simulated business system.
CIS 351 Networking Structures and Desktop Operating Systems
This course provides a foundation networking concepts, describing networking hardware and communication terminology and contrasts the different types of networking structures. This class introduces the concepts of address, network traffic, and administration of local and wide area networks.
CIS 357 Operating System Administration
This course provides the knowledge and skills required to administer small to medium-sized networks in server environments. Hands-on demonstration and practical application of administrative tools, utilities, and configurations in server environments will be the most significant feature of the course. Issues dealing with security, troubleshooting, and configuration will be presented, discussed, and applied by the students in the classroom.
CIS 433 Information Technology Project Management
This course provides students with an introduction to program management as it relates to Information Technology. Students develop formal project plans based on actual problems provided by industry. Emphasis is placed on the nine knowledge areas specified by the Project Management Institute (PMI) in the publication, A Guide to Project Management Body of Knowledge (PMBOK®Guide). Both discover-based and team-based activities are used to focus on program management as a discipline.
CIS 436 Ethics for IT Professionals
This course discusses ethical issues inherent in the field of information technology. Topics covered focus on the balance between the individual and society, including computer privacy and security, computer crime, software piracy, intellectual property, patent and copyright law, and social issues such as free speech and expression, as well as netiquette. The course also discusses moral responsibility for computer professionals.
CIS 468 Accounting for IT Professionals
This course is designed to provide an introduction to business issues associated with Information Technology. The course includes an introduction to financial and managerial accounting concepts as they apply to IT issues, including budgeting, costing, budgeting control, and performance evaluation.
AC 341 Accounting Information Systems
This course provides an introduction to a systems view of accounting through accounting information systems (AIS) and how technology is used in AIS. Students will examine the process of developing information systems and develop knowledge of computer-based control and audit issues. Also included is the study of the five cycles of AIS and how the cycles are implemented in computer-based systems. Prerequisites: AC 206 and BA 222
PS 208 Introduction to National Security
This course introduces students to national security as a concept, strategy, goal, and challenge. It examines the dangers and threats that exist domestically and internationally and analyzes how the United States attempts to deal with those challenges using strategies that range from diplomacy to military force.
PS 209 Foundations in Intelligence and Counterintelligence
This course introduces students to intelligence and counterintelligence as concepts, processes, and careers. It elaborates on historical and contemporary approaches to intelligence/counter intelligence. The process of intelligence collection, analysis, research dissemination, consumption, and feedback is examined. Students are exposed to the diverse intelligence community and the responsibilities of its various members.
PS 210 Ethical Controversies in Security and Intelligence
This course introduces and engages elements of theoretical and ethical analysis to empirical topics and subject matter. Some of the issues covered will include war, weapons of mass destruction, humanitarian intervention, globalization, and spying. This course explores the deeper underlying philosophical issues within national security.
CYBR 433 Cybercrime and Business
This course focuses on security risk management through the use of real-world security problems, issues, and situations found in businesses today. Particular attention is directed to identifying business risks in cyber systems and managing business policies and practices in the areas of Finance and Accounting in order to comply with cybersecurity laws, regulations, and standards. This course is suitable for students majoring in Cybersecurity, Information Systems or Business, or anyone interested in managing security risks in an organization.
CYBR 436 Security for Healthcare
This course explores the management of security and privacy in the healthcare industry. Coverage includes an extensive study of HIPAA and other applicable laws, and methods for compliance with those laws. Discussion also includes the security of health information systems. This course is suitable for students majoring in Cybersecurity, Information Systems or Healthcare, or anyone interested in learning more about security and privacy in the healthcare industry.
Error while processing your submission.
There was an error while trying to process your submission. We are sincerely sorry for the inconvenience.
Please reach out to one of our Admission Counselors and they can answer any questions you have at 1-800-756-7920 (option 1). The Admissions office is open Monday through Thursday 8:00 a.m. to 8:00 p.m. (CST) and Fridays from 8:00 a.m. to 5:00 p.m. (CST).
Congratulations on taking your first step towards earning your degree!
At Bellevue University, our passion is to help you get started and support you all along the way. In fact, we’ve found that many students have benefited from our complimentary “Smarter Measure” Self-Assessment which will help you prepare for success. Again, this is a free service.
Your User Name: ready
Your Password: ready
Just click here to start. Smarter Measure
Thanks again. We look forward to working with you!