

Choose your path:
online bachelor's degree of cybersecurity
Spring term classes start March.
100% online learning.
Earn your degree on your schedule
$459 per credit hour.
$250 military preferred cost per credit
127 total credit hours.
earn your cybersecurity degree on your own schedule.
The Bachelor’s in Cybersecurity program at Bellevue University is designed to help you pursue your degree on a timeline that fits your life. The curriculum welcomes both newcomers and those with prior IT experience—no complex prerequisites required—so you can start building the foundation for your cybersecurity career right away. Recognized for its excellence and value, Bellevue University’s program was ranked among the Top 10 Best Online Cybercrime Programs by Best Colleges (2020).
Learn in a flexible format that fits your goals.
Whether you prefer a steady pace or a more accelerated route, Bellevue University offers options to match your learning style. The traditional format provides maximum scheduling freedom, while the accelerated cohort path allows you to complete the same Bachelor of Science in Cybersecurity degree in a structured, two-course-at-a-time format. Both paths emphasize practical learning, hands-on skill development, and faculty support designed to prepare you for success in the fast-growing cybersecurity field.
Protect data. strengthen systems. advance your career.
As technology continues to evolve, so does the need for cybersecurity professionals across industries. Graduates of this program are prepared to pursue roles in government agencies, national security and intelligence organizations, and private sector businesses that manage consumer and corporate data. With a Bellevue University cybersecurity degree, you’ll develop the technical knowledge and critical-thinking skills needed to help safeguard the systems that power our world.
what you'll learn.
In this program, you’ll gain the technical and analytical skills to protect digital systems, assess threats, and respond effectively to real-world cybersecurity challenges.
upon graduation, students will be able to:
- Evaluate fundamental cybersecurity concepts, theories, and strategies as they apply to real world case studies.
- Explain technical and non-technical security solutions on different types of cyber systems.
- Apply cyber incident response project plans.
- Assess risks, vulnerabilities, and threats to sample cyber systems.
- Identify attributes associated with cybersecurity professionals.
Awards




Bellevue Stories
Cybersecurity degree courses
Current students please login to BRUIN and select “Academic Progress” for your curriculum requirements.
Requirements (39 credit hours)
This course introduces fundamental technologies used in information systems. Students will develop a foundation in cybersecurity by learning the fundamental concepts behind cybersecurity. In addition, students will learn cybersecurity principles used in the design of systems to protect information and assets against persistent and constantly evolving threats.
This course provides an introduction to problem solving and computer programming using the language Python. Students will analyze problems, design and implement solutions and assess the results. Topics include fundamental programming constructs such as variables, expressions, functions, control structures and lists. Emphasis is placed on numerical and data analysis for informed decision making. Prerequisite: None
This course introduces students to the goals, functional processes, tools, and techniques associated with network security. Services such as firewalls, intrusion detection mechanisms and Virtual Private Networks (VPNs) will be studied. Students will develop an understanding of telecommunications and networks security protocols used to prevent, detect, and correct potential vulnerabilities associated with both the outsider and insider threat. Pre-requisite: CYBR 250 recommended
This course provides the student with the basic topics associated with controlling how resources are accessed in an information system. Topics include organizational access control models, security models, and hardware and software controls that can be used to support those models. Additionally, students will learn about access models, securing systems access with passwords, smart cards, and biometric devices to ensure data confidentiality, integrity and availability. This course also explores technologies like remote authentication and Public Key Infrastructure (PKI). Pre-requisite: CYBR 250 recommended
This course is intended to introduce students to the principles of risk assessment, vulnerability analysis, and auditing and how they are used to evaluate the effectiveness of information security controls. Students will develop an understanding of threat and asset identification, countermeasures and safeguards, acceptable risks, and vulnerabilities. The auditing concepts of technical, physical, and administrative controls will also be introduced along with how these controls are measured for effectiveness. In addition, students will learn rules, regulations and issues related to compliance with applicable laws and regulations. Pre-requisite: CYBR 320
The major focus of this course will be the relational and NoSQL models of database types. Topics include relational modeling, NoSQL databases and their application, Structured Query Language (SQL), application development using databases, access controls, security principles, common vulnerabilities, mitigations and emerging trends. Students will prepare a small application using a commercial database management system. Pre-requisite: CIS 245, CYBR 250
This course focuses on the knowledge required to operate a security program within an organization. Various components of secure operations, including policies, regulatory compliance, ethics, cryptography, human factors, and risk management are identified and applied to scenarios. Students will practice constructing a comprehensive security program that incorporates those secure operations components and concepts, including contingency plans and security awareness education. Pre-requisite: CYBR 250
This course explores secure base operating systems on server, desktop, virtual, and mobile platforms. Topics include the practical application of security tools, utilities, and configurations for protecting computer operating systems at both the user and corporate level. Course subject is also related to protecting stand-alone and virtualized servers, cloud computing security, and the protection of mobile platforms such as smart phones, tablets and handheld computers. Pre-requisite: CYBR 250
This course explores cybersecurity considerations of web applications, such as how and why web applications are vulnerable, and how to mitigate those weaknesses through secure development and deployment practices using the Open Web Application Security Project (OWASP) Top 10 vulnerabilities as a focus. Students will exploit sample web application vulnerabilities and document the process. Pre-requisite: CYBR 309 and CYBR 340
This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices. Pre-requisite: CYBR 340
This course provides an introduction to penetration testing and incident response tactics, techniques, and procedures. Topics include ethical and legal implications of penetration testing, network information gathering, system vulnerability analysis, common tools and techniques used in penetration testing, traffic analysis, incident response, and related defensive measures. Pre-requisite: CIS 245, CYBR 340
Beyond the Core courses, choose one Emphasis (6 credits) OR choose two Elective Courses (6 credits).
Emphasis Options
This course provides students with the knowledge and skills related to detecting and analyzing vulnerabilities and threats and taking steps to mitigate associated risks. Topics include incident response plans, managing cybersecurity incidents, log file analysis, anomaly detection, network security monitoring, host based and network-based intrusion detection and prevention, malware analysis and threat intelligence. Prerequisites: CYBR 420, CYBR 430.
This course continues students' study of intrusion detection and response by providing students with the advanced knowledge and skills related to detecting and analyzing vulnerabilities and threats and responding to cybersecurity incidents. Topics include threat hunting and advanced threat intelligence, security automation, playbooks, machine learning for detection and response, log aggregation and correlation, incident response in the cloud, threat emulation, writing custom intrusion detection system rules and advanced malware analysis. Prerequisites: CYBR 420, CYBR 440.
This course provides an introduction to the fundamental components of encryption. Topics include the history of cryptography, public key and private key systems, hashing, and digital signatures. Topics also include the development of the Advanced Encryption Standard, the use and functionality of Pretty Good Privacy, and the Secure Socket Layer. Pre-requisite: CYBR 250 recommended
A project-based course which focuses on the use of tools and methodologies applied to structured system analysis and design. Emphasis is placed on traditional approaches including enterprise analysis, workflow analysis, data flow analysis, affinity diagram construction and use, system flowcharting and entity relationship diagramming. Students will complete a feasibility analysis, risk analysis, design specifications and a project implementation plan for a simulated business system. Prerequisite: CIS 245 or prior computer programming coursework.
This course introduces students to the Agile project management framework called Scrum. Emphases are placed on understanding and applying the Scrum framework and principles. Throughout the course, students will explore the roles, events, and artifacts of Scrum. Students will learn how to apply them to drive collaboration and deliver value. Real-world application of Scrum in a variety of IT scenarios is explored. Where applicable, course topics align with the Professional Scrum Master (PSM) I certification.
This course discusses ethical issues inherent in the field of information technology. Topics covered focus on the balance between the individual and society, including privacy and surveillance, free speech and censorship, fair use and intellectual property, and security and computer crime. The course also discusses professional responsibility netiquette.
Elective Courses
Choose two if not choosing an Emphasis option (6 credit hours):
*Note: students may also choose two courses from any of those emphases as an elective option.
*Note: CIS 456 may be used to fulfill an elective requirement. It may only be used once to fulfill a degree requirement, and must be approved by the program director and Dean.
This course introduces students to a variety of advanced Python topics. Students will model, design, and implement solutions for both ASCII based, form based, and web based assignments. Topics include incorporating python built-in dictionary and date-time modules, integrating third party library modules, utilizing APIs, designing and completing code testing, building GUI interfaces, and exploring Django web services. Prerequisites: CSD 205 OR CIS 245
This course introduces the concepts of programming using Java 10. This course will cover the basics of the Java programming language syntax. Additional topics covered will be elementary data structures, input/output statements, selection, iteration, methods, and arrays, principles of Object-Oriented (OO). Topics include the language syntax, OO concepts, and advanced features of the Java programming language. Additional topics are inheritance, polymorphisms, abstracts, exception handling, and basic input and output. Students will write programs using all the above-mentioned topics. Prerequisites: CSD 325
This course provides an in-depth study of basic Linux administrative tools and practices. It is based on the curriculum recommended by the Linux Professional Institute for certification at the LPIC-1 level, and can be used to prepare for certification exams 101 and 102. Topics covered in this course include Linux commands, shell scripts, file systems, networking, security, and troubleshooting.
This course consists of an advanced study of Linux servers, networking, administrative tools and practices. It is based on the curriculum recommended by the Linux Professional Institute for certification at the LPIC-2 level, and can be used to prepare for certification exams 201 and 202. Topics covered in this course include resource utilization, compiling the kernel, Linux Web, DNS, DHCP, email, file, print, and database servers, enterprise networking, shell scripts, file systems, networking, security, and troubleshooting. Prerequisite: CIS 338, or a current LPIC-1 certification, or two years documented experience as a Linux system administrator.
This course is designed to provide students with a monitored structure which can be used to apply the concepts and technologies acquired throughout their course of study to a real-world problem or situation that will be proposed and developed by each student. This can be accomplished by way of a faculty approved project, research study, certification or internship. The faculty sponsor will evaluate and approve a student's proposal and objectives prior to any work being done. Each student will develop and prepare a plan for completion of the approved component and will document the attainment of the objectives by way of milestones, oral or written reports, specified deliverables or satisfactory reports on completion of objectives by the manager of an intern. Students may accomplish the Service Component when they have completed 24 credit hours of the required major courses.
Accounting Information Systems (AIS) is an applied course focusing on processing data into information. Focus is placed on accounting cycles, source documents, cleaning data, emerging technology, data analysis, data visualization, and internal controls. Students will also become knowledgeable of information technology (IT) terminology, commonly used software applications, and computer-based control issues. Emphasis is placed on IT controls and security. Prerequisite: AC 206 and CIS 222
This course introduces students to national security as a concept, strategy, goal, and challenge. It examines the dangers and threats that exist domestically and internationally and analyzes how the United States attempts to deal with those challenges using strategies that range from diplomacy to military force.
This course introduces students to intelligence and counterintelligence as concepts, processes, and careers. It elaborates on historical and contemporary approaches to I/CI. The process of intelligence collection, analysis, research dissemination, consumption, and feedback is examined. Students are exposed to the diverse IC community and the responsibilities of its various members.
This course introduces and engages elements of theoretical and ethical analysis to empirical topics and subject matter. Some of the issues covered will include war, weapons of mass destruction, humanitarian intervention, globalization, and spying. This course explores the deeper underlying philosophical issues within national security.
This course provides a monitored structure for application of the skills and knowledge acquired throughout the Cybersecurity program. Emphasis is placed on the use of real-world security problems, issues, and situations. Course assignments will require the use of protection, detection, deterrence, and response techniques in addressing threats, vulnerabilities, and risks found in businesses today. Students may enter this course when they have completed 24 credit hours of the required major courses. Prerequisite: 24 credit hours of the required major courses.
This course presents a sampling of real-world security issues that confront a modern business. In it, students learn practices used in the underworld of cybercrime in order to reduce their risks. One area of particular emphasis is compliance with laws and regulation in the areas of cyber systems and business policies. Another is analyzing business and economic risks associated with cyber systems. This course is suitable for students majoring in cybersecurity, Information Systems or Business, or anyone interested in understanding how, why, when, and where cybercrime may occur.
This course explores the management of security and privacy in the healthcare industry. Coverage includes an extensive study of HIPAA and other applicable laws, and methods for compliance with those laws. Discussion also includes the security of health information systems. This course is suitable for students majoring in Cybersecurity, Information Systems or Healthcare, or anyone interested in learning more about security and privacy in the healthcare industry.
Kirkpatrick Signature Series Requirements (9 credit hours)
(In addition to the Major Requirements, all Bellevue University students must complete the Kirkpatrick Signature Series)
This course focuses on the political and philosophical traditions of the American republic, especially as embedded in the ideals, values, traditions, founding documents, and institutions of the United States , and considers how these traditions relate to individual citizenship and global society. Prerequisite: 60 Credit Hours
This course focuses on the creative tensions that exist between the forces of tradition and change as the country undergoes social, cultural, and political change. It considers the manner in which change can renew the vitality of a republic. Prerequisite: 60 Credit Hours
This course examines civic engagement in relation to individual freedoms and responsibilities. It fosters engaged citizens, empowered to effect positive change. Prerequisite: 60 Credit Hours
Integrative General Education Credits
Major Requirements Credits
Elective Credits
= 127 total credits*
General Education Courses
Take general education courses that do more than fill a requirement. At Bellevue University, these courses build foundational skills that apply to any career—critical thinking, qualitative reasoning, and ethical leadership. And, you can take courses individually or in course clusters, which connect three courses around one theme, building skills as you go.
About general education requirements >Elective Courses
Our broad selection of electives allows you to select courses related to your major or expand your perspective in other areas of interest.
University Accreditation
Bellevue University is accredited by the Higher Learning Commission ( hlcommission.org ), a regional accreditation agency recognized by the U.S. Department of Education.
Whether a college, university, or program is accredited is important to students receiving financial aid, employers who provide tuition assistance, donors, and the federal government.
This program is considered a non-licensure degree/certificate program and is not intended for those seeking licensure or the practice of licensed profession. This program may be relevant to multiple occupations that do not require licensure and was not designed to meet educational requirements for any specific professional license or certification.
*Consult with an admissions counselor to determine your eligible credits, as well as to verify minimum graduation requirements for this degree. Transfer credits must be from a regionally accredited college or university. Bellevue University makes no promises to prospective students regarding the acceptance of credit awarded by examination, credit for prior learning, or credit for transfer until an evaluation has been conducted.
learn on your own time, from anywhere.
Flexible schedule.
Study on your own time with courses designed to fit your busy life—whether you're working, raising a family, or serving in the military.
Reliable technical support.
Access 24/7 tech support to keep you connected and focused on learning, no matter where you are.
Dedicated online student support.
From coursework access and connectivity issues to tutoring and resume assistance, we've got you covered.
Engaging online learning.
Enjoy interactive courses designed for real-world application, with multimedia content, discussions, and hands-on projects.
Prefer to learn On-Campus?

grow with faculty who’ve been where you are.


