Bachelor of Science in Cybersecurity

While cryptographers strive for the best possible solution to a security issue, the implementation of their work is too often restricted by technological limitations, cost restraints and human factors that were not considered as part of the original design process. For effective solutions to gain practical relevance, the end users must be willing and able to use the technology, and the solution must provide a significant economic benefit.

Program Description

The Bachelor of Science in Cybersecurity program is structured to provide students with security expertise within the context of a broad education. A solid education in security requires not only a strong focus in science and computer science in particular but must also incorporate some aspects of engineering and technology management. The program culminates with a project-oriented, two-semester senior capstone course through which you will develop the client-facing and project management skills expected of the modern IT professional.

Program Objectives and Outcomes

These are the professional accomplishments that students are expected to have achieved three years after graduation:

  1. Be able to acquire new skills and knowledge on one's own (Skills Development)

  2. Be able to create solutions to complex problems in secure system design (Skills Application)

  3. Be proficient in both oral and written technical communication (Communication)

  4. Be effective as either a member or a leader of a small team (Teamwork)

  5. Be able to evaluate the impact of one's work on the intended users and on society (Impact)

Student Objectives and Outcomes

Student outcomes are measurable goals for the learning that takes place during a student's time in the program. These narrow statements describe what students are expected to know and be able to do by the time of graduation, relating to the skills, knowledge, and behaviors that students acquire in the program:

  1. An ability to apply knowledge of computing and mathematics appropriate to the discipline (Apply)

  2. An ability to analyze a problem and identify and define the cybersecurity requirements appropriate to its solution (Analyze)

  3. An ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired cybersecurity needs in the face of current, emerging, and potential threats (Define)

  4. An ability to function effectively on teams to accomplish a common goal (Teamwork)

  5. An understanding of professional, ethical, legal, security and social issues and responsibilities (Responsibility)

  6. An ability to communicate effectively with a range of audiences (Communication)

  7. An ability to analyze the local and global impact of cybersecurity on individuals, organizations and society (Impact)

  8. Recognition of the need for and an ability to engage in continuing professional development (Professional Development)

  9. An ability to use current techniques, skills, and tools necessary for cybersecurity practice (Currency)

  10. An ability to apply mathematical foundations, algorithmic principles, and computer science theory in the modeling and design of secure computer-based systems in a way that demonstrates comprehension of the tradeoffs involved in design choices (Tradeoffs)

  11. An ability to apply design and development principles in the construction of secure software systems of varying complexity (Construction)

 

Not only do outcome goals exist for the overall program, but each course has its own outcomes.

Cybersecurity Requirements

The program requires the following courses:

Mathematics

MA 121Differential Calculus

2

MA 122Integral Calculus

2

MA 125Vectors and Matrices

2

MA 126Multivariable Calculus I

2

MA 222Probability and Statistics

3

MA 232Linear Algebra

3

Or

MA 236Introduction Mathematical Logic

3

CS 135Discrete Structures

4

CS 334Theory of Computation

3

Computer Science

CS 115Introduction to Computer Science

4

CS 284Data Structures

4

CS 146Introduction to Web Programming and Project Development

3

CS 347Software Development Process

3

CS 382Computer Architecture and Organization

4

CS 385Algorithms

4

CS 392Systems Programming

3

CS 442Database Management Systems

3

CS 485Societal Impact of Information Technologies

1

CS 488Computer Architecture

3

CS 492Operating Systems

3

CS 496Principles of Programming Languages

3

CS 511Concurrent Programming

3

CS 521TCP/IP Networking

3

CS 595Information Security and the Law

3

Cybersecurity

CS 503Discrete Mathematics for Cryptography

3

Or

MA 503Discrete Mathematics for Cryptography

3

CS 306Introduction to IT Security

4

CS 423Senior Design I

3

CS 424Senior Design II

3

CS 576Systems Security

4

CS 578Privacy in a Networked World

3

CS 579Foundations of Cryptography

3

Other Cybersecurity electives may be approved at the discretion of the program director.

Sample Study Plan

Term I

CAL 103Writing and Communications Colloquium

3

CS 115Introduction to Computer Science

4

CS 146Introduction to Web Programming and Project Development

3

MA 121Differential Calculus

2

MA 122Integral Calculus

2

Science I

3

Term II

CAL 105CAL Colloquium: Knowledge, Nature, Culture

3

CS 135Discrete Structures

4

CS 284Data Structures

4

MA 125Vectors and Matrices

2

MA 126Multivariable Calculus I

2

Science II

3

Science Lab

1

Term III

CS 306Introduction to IT Security

4

CS 334Theory of Computation

3

CS 382Computer Architecture and Organization

4

CS 385Algorithms

4

HSS 371Computers and Society

3

Term IV

CS 392Systems Programming

3

CS 496Principles of Programming Languages

3

CS 347Software Development Process

3

MA 222Probability and Statistics

3

MA 232Linear Algebra

3

Or

MA 236Introduction Mathematical Logic

3

Term V

CS 503Discrete Mathematics for Cryptography

3

CS 442Database Management Systems

3

CS 578Privacy in a Networked World

3

CS 576Systems Security

4

HUM
Humanities

3

Term VI

CS 488Computer Architecture

3

CS 492Operating Systems

3

CS 579Foundations of Cryptography

3

CS 595Information Security and the Law

3

HUM
Humanities

3

Term VII

CS 425Cybersecurity Capstone I

3

CS 511Concurrent Programming

3

CS 485Societal Impact of Information Technologies

1

CS
Cybsersecurity Elective

3

CS
CS Elective

3

HUM
Humanities

3

Term VIII

CS 426Cybersecurity Capstone II

3

CS 521TCP/IP Networking

3

CS
Cybsersecurity Elective

3

CS
Cybsersecurity Elective

3

General Elective

3

Note:

Science I, Science II, and Science Lab: Science Electives: Undergraduate Programs Requirements.

Humanities and HSS 371 or HPL 455: The Humanities courses must have your advisor’s approval prior to enrolling. For details on Humanities courses and requirements please visit Humanities Requirements.

Electives

The program includes one CS electives, two Cybersecurity electives, and one general elective. Students must obtain their advisor’s approval before enrolling in a course to count as CS or general elective. The following courses are approved as Cybersecurity electives. Note that undergraduate students must meet a minimum GPA requirement in order to be allowed to enroll in 600-level courses.

These courses must each be 3 or more credits. No course may duplicate another; specifically, students may not count toward the minor CS 501, CS 515, CS 550, CS 556, CS 570, or CS 590. Also, students may not count toward the minor both courses in each of the following pairs: CS 382 and CS 550, CS 488 and CS 514, CS 492 and CS 520, CS 496 and CS 510, CS 442 and CS 561, SSW 540 and CS 347.

CS 577Reverse Engineering and Application Analysis

4

CS 594Enterprise and Cloud Security

3

CS 665Forensic Analysis

3

CS 693Cryptographic Protocols

4

CS 676Advanced Topics in Systems and Security

3

CS 696Database Security

3

CPE 592Computer and Multimedia Network Security

3

EE 584Wireless Systems Security

3

FIN 545Risk Management for Financial Cybersecurity

3