CAMPUS ALERT

Bellevue University Tops U.S. News Rankings

Bellevue University has given me more than just a great education. Bellevue has allowed me to further develop myself as a person so I can face the world’s challenges with confidence.

Louis A.
South Milwaukee, WI
Investigations

More Student Stories

Cybersecurity Degree - Bachelor of Science

Major Requirements (36 credit hours)

(Click a course name below to view course details)

Required courses (30 credit hours)

  • CYBR 250 Introduction to Cyber Threats, Technologies and Security

    This course introduces information technologies and examines methods for protecting them against persistent and constantly evolving threats. Existing and emerging information technologies are discussed including operating environments, computer networking, and data management. Basic methods for managing information systems and technologies are presented from a standpoint of providing sufficient security protections.
    Course Syllabus

  • CIS 311 Network Security

    This course provides an introduction to the goals, functional processes, tools, and techniques associated with network security. Discussion includes devices such as firewalls, intrusion detection mechanisms, and Virtual Private Networks (VPNs). Telecommunications and networks security protocols used to prevent, detect, and correct potential vulnerabilities associated with both the outsider and insider threat are also explored.
    Course Syllabus

  • CIS 312 Securing Access Control

    This course provides an introduction to the concepts associated with configuring identification and authentication. Discussion includes comparison of various access models, and how passwords, smart cards and biometric devices can assist in securing system access and ensure confidentiality, integrity, and availability of data. Other technologies such as remote authentication and Public Key Infrastructure (PKI) are also explored.
    Course Syllabus

  • CIS 411 Assessments and Audits

    This course explores the principles of risk assessment, vulnerability analysis, and auditing. Discussion includes the use of these principles to evaluate the effectiveness of information security controls. Topics include threat and asset identification, countermeasures and safeguards, acceptable risks, and vulnerabilities. The auditing concepts of technical, physical, and administrative controls are also introduced along with how these controls are measured for effectiveness.
    Course Syllabus

  • CYBR 320 Operational Security

    This course focuses on the skills required to operate a security program within an organization. Coverage includes the practical application of security practices in an operational environment. Topics include security structure, leading security projects, policy management, human factors of security, and physical security methods.
    Course Syllabus

  • CYBR 340 Operating Systems and Mobile Device Security

    This course focuses on the skills required to secure base operating systems on server, desktop, virtual, and mobile platforms. Coverage includes the practical application of security tools, utilities, and configurations for protecting computer operating systems at both the user and corporate level. Discussion also includes protecting stand-alone and virtualized servers, cloud computing security, and the protection of mobile platforms such as smart phones, tablets and handheld computers.
    Course Syllabus

  • CYBR 350 Web, Commerce and Application Security

    This course explores securing core technologies that support Internet applications and commerce. Processes for creating and administering Internet web sites to ensure proper protections are introduced. The course also addresses securing applications on Internet websites and mobile platforms, and introduces basic methods for secure development.
    Course Syllabus

  • CYBR 410 Data/Database Security

    This course focuses on the protection of data at rest. Coverage includes the identification, ownership, and protection of data – whether residing in files, folders, or databases. This course also introduces the concept of database security to include: Architecture, Password Policies, Auditing, Privileges, and Roles Administration. Emphasis is placed on areas unique to data and database security.
    Course Syllabus

  • CYBR 420 Cyber Investigations and Forensics

    This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices.
    Course Syllabus

  • CYBR 450 Advanced Cybersecurity Concepts

    This course provides a monitored structure for application of the skills and knowledge acquired throughout the Cybersecurity program. Emphasis is placed on the use of real-world security problems, issues, and situations. Course assignments will require the use of protection, detection, deterrence, and response techniques in addressing threats, vulnerabilities, and risks found in businesses today.
    Course Syllabus

Plus, choose two courses (6 credit hours) from the following:

  • CIS 242 Introduction to Programming Using Java

    This course introduces the concepts of structured programming using Java. The course covers the basics of the Java programming language syntax, to include designing, coding, documenting, and debugging programs. Additional topics covered will be elementary data structures, input/output statements, selection, iteration, methods, and one-dimensional arrays. Students will write programs using all of the before-mentioned topics.
    Course Syllabus

  • OR
  • CIS 243 Introduction to Programming Using C#

    This course is designed to introduce the concepts of structured programming. How programs and programming languages work, and the purposes and practices of structured programming are discussed. Designing, coding, documenting, and debugging programs using elementary data structures, input/output statements, selection and iteration, functions, and one-dimensional arrays are covered in detail.
    Course Syllabus

  • CIS 313 Cryptography

    This course provides an introduction to the fundamental components of encryption. Topics include the history of cryptography, public key and private key systems, hashing, and digital signatures. Topics also include the development of the Advanced Encryption Standard, the use and functionality of Pretty Good Privacy, and the Secure Socket Layer.
    Course Syllabus

  • CIS 321 Structured System Analysis and Design

    This project-based course focuses on the use of tools and methodologies applied to structured system analysis and design. Emphasis is placed on the traditional approaches, for example, system flow charting and entity relationship diagrams. Students will complete a variety of analysis design specifications and a project implementation plan for a simulated business system.
    Course Syllabus

  • CIS 351 Networking Structures and Desktop Operating Systems

    This course provides a foundation networking concepts, describing networking hardware and communication terminology and contrasts the different types of networking structures. This class introduces the concepts of address, network traffic, and administration of local and wide area networks.
    Course Syllabus

  • CIS 357 Operating System Administration

    This course provides the knowledge and skills required to administer small to medium-sized networks in server environments. Hands-on demonstration and practical application of administrative tools, utilities, and configurations in server environments will be the most significant feature of the course. Issues dealing with security, troubleshooting, and configuration will be presented, discussed, and applied by the students in the classroom.
    Course Syllabus

  • CIS 433 Information Technology Project Management

    This course provides students with an introduction to program management as it relates to Information Technology. Students develop formal project plans based on actual problems provided by industry. Emphasis is placed on the nine knowledge areas specified by the Project Management Institute (PMI) in the publication, A Guide to Project Management Body of Knowledge (PMBOK®Guide). Both discover-based and team-based activities are used to focus on program management as a discipline.
    Course Syllabus

  • CIS 436 Ethics for IT Professionals

    This course discusses ethical issues inherent in the field of information technology. Topics covered focus on the balance between the individual and society, including computer privacy and security, computer crime, software piracy, intellectual property, patent and copyright law, and social issues such as free speech and expression, as well as netiquette. The course also discusses moral responsibility for computer professionals.
    Course Syllabus

  • CIS 468 Accounting for IT Professionals

    This course is designed to provide an introduction to business issues associated with Information Technology. The course includes an introduction to financial and managerial accounting concepts as they apply to IT issues, including budgeting, costing, budgeting control, and performance evaluation.
    Course Syllabus

  • OR
  • AC 341 Accounting Information Systems

    This course provides an introduction to a systems view of accounting through accounting information systems (AIS) and how technology is used in AIS. Students will examine the process of developing information systems and develop knowledge of computer-based control and audit issues. Also included is the study of the five cycles of AIS and how the cycles are implemented in computer-based systems. Prerequisites: AC 206 and BA 222
    Course Syllabus

  • PS 208 Introduction to National Security

    This course introduces students to national security as a concept, strategy, goal, and challenge. It examines the dangers and threats that exist domestically and internationally and analyzes how the United States attempts to deal with those challenges using strategies that range from diplomacy to military force.
    Course Syllabus

  • PS 209 Foundations in Intelligence and Counterintelligence

    This course introduces students to intelligence and counterintelligence as concepts, processes, and careers. It elaborates on historical and contemporary approaches to intelligence/counter intelligence. The process of intelligence collection, analysis, research dissemination, consumption, and feedback is examined. Students are exposed to the diverse intelligence community and the responsibilities of its various members.
    Course Syllabus

  • PS 210 Ethical Controversies in Security and Intelligence

    This course introduces and engages elements of theoretical and ethical analysis to empirical topics and subject matter. Some of the issues covered will include war, weapons of mass destruction, humanitarian intervention, globalization, and spying. This course explores the deeper underlying philosophical issues within national security.
    Course Syllabus

  • CYBR 433 Cybercrime and Business

    This course focuses on security risk management through the use of real-world security problems, issues, and situations found in businesses today. Particular attention is directed to identifying business risks in cyber systems and managing business policies and practices in the areas of Finance and Accounting in order to comply with cybersecurity laws, regulations, and standards. This course is suitable for students majoring in Cybersecurity, Information Systems or Business, or anyone interested in managing security risks in an organization.
    Course Syllabus

  • CYBR 436 Security for Healthcare

    This course explores the management of security and privacy in the healthcare industry. Coverage includes an extensive study of HIPAA and other applicable laws, and methods for compliance with those laws. Discussion also includes the security of health information systems. This course is suitable for students majoring in Cybersecurity, Information Systems or Healthcare, or anyone interested in learning more about security and privacy in the healthcare industry.
    Course Syllabus

Thanks for your interest in Bellevue University.

When you click the submit button below, our staff will contact you within 48 hours to get you the information you need and answer any questions.

Yes No