Skip to main content

eServices scheduled downtime, July 11–July 13 | Fall 2025 Registration window now open. | Undergraduate Final Deadline is July 28 for fall term

Secure
Professor in front of computers with students

Cybersecurity BS

About The Program

The Bachelor of Science in Cybersecurity prepares students to safeguard critical information systems and respond effectively to the growing complexity of cyber threats. Through a rigorous, lab-intensive curriculum, students gain hands-on experience applying cybersecurity concepts, tools, and technologies to prevent, detect, respond to, and recover from cyberattacks.

The program trains students to assess organizational security needs, implement safeguards, and design comprehensive cyber defense strategies that align with business, legal, and ethical standards. Many core courses are aligned with industry-recognized certifications, allowing students to demonstrate in-demand competencies and enhance their professional marketability—making them immediately competitive for a wide range of cybersecurity roles.

In addition to technical skills, students develop essential soft skills in ethical judgment, professional communication, and collaborative teamwork. The program emphasizes the ability to clearly document and present technical information, engage diverse stakeholders, and lead in complex environments. Students also explore scholarly and professional literature to stay informed on emerging threats and trends, and learn to design secure systems that account for real-world constraints—including economic, environmental, social, and ethical factors. These combined competencies prepare graduates to contribute strategically and responsibly to the protection of digital systems across industries.

Program highlights

  • Lab-intensive, hands-on learning: Emphasizes practical skills in threat detection, incident response, and secure systems design through immersive lab work.
  • Certification-aligned curriculum: Courses are mapped to recognized industry certifications, giving students a competitive edge in the job market.
  • NSA-designated Cyber Defense program: Aligned with the National Center of Academic Excellence in Cyber Defense (NCAE-CD), ensuring adherence to national cybersecurity education standards.
  • Access to advanced infrastructure: Includes IT/OT cyber ranges and cloud-based virtual labs for realistic, scenario-based cybersecurity training.
  • Expert faculty with real-world experience: Courses taught by professionals with extensive backgrounds in government, industry, and military cybersecurity roles.
  • Emphasis on professional skills: Builds leadership, communication, ethics, and teamwork capabilities essential for success in today’s cyber workforce.
  • Future-ready design: Prepares students to navigate evolving cyber threats while designing systems that reflect legal, social, and operational realities.

Learn more about the MS in Cyber Operations program.

Learn more about the accelerated combined (BS + MS) degree in Cybersecurity Operations.

New Fall 2025! Intelligence and Security Analysis Certificate

Seals of the DoD Cyber Academic Engagement Office, National Security Agency, National Centers of Academic Excellence in Cybersecurity, and the Centers of Academic Excellence in Cybersecurity Community, with the CAE-CD and CAE-CO cyber defense and cyber operations submarks

Metro State University is Minnesota’s only institution recognized by the National Security Agency (NSA) with dual designations as a National Center of Academic Excellence in Cyber Defense (NCAE-CD) and Cyber Operations (NCAE-CO).

The Bachelor of Science in Cybersecurity degree is aligned with the NCAE-CD designation, ensuring the program meets rigorous national standards in technical depth, applied learning, and ethical practice. This recognition provides students with a competitive edge in the workforce and validates their readiness to defend critical systems and data in a rapidly evolving cyber landscape.

The Master of Science in Cyber Operations is aligned with the NCAE-CO designation, awarded by the National Security Agency. This elite recognition underscores the program’s focus on the operational side of cybersecurity—emphasizing advanced technical skills, adversarial thinking, and mission-oriented training beyond traditional cybersecurity practices. The NCAE-CO designation affirms that the program meets the nation’s most rigorous standards for preparing professionals to conduct complex cyber operations in support of national defense, critical infrastructure protection, and intelligence missions.

As an active participant in the national CAE community, Metro State continues to lead in cybersecurity workforce development, education, and public service—equipping graduates to protect the digital assets of government, industry, and society.

Student outcomes

After earning the BS in Cybersecurity, students will be able to:

  • Apply knowledge of cybersecurity disciplines, tools, and technologies to prevent, detect, respond to, and recover from cyber incidents.
  • Analyze cybersecurity risks, threats, and countermeasures, and develop strategies to address organizational security needs.
  • Design and implement appropriate security controls to meet organizational requirements while considering legal, economic, environmental, social, and ethical constraints.
  • Communicate technical information effectively through formal reports, documentation, and presentations tailored for diverse audiences, including technical and non-technical stakeholders.
  • Identify, evaluate, and synthesize relevant information from scholarly and professional sources to solve problems and adapt to the evolving threat landscape.
  • Collaborate effectively as a contributing member or leader of a team to address cybersecurity challenges and deliver project-based solutions.
  • Demonstrate sound judgment in recognizing and addressing ethical and legal issues in cybersecurity, adhering to professional standards and responsibilities.

Program educational objectives

The Bachelor of Science in Cybersecurity program is designed to prepare graduates for long-term professional success. Within a few years of completing the program, alumni are expected to:

  • Make meaningful contributions to their communities and the broader field of cybersecurity by applying their knowledge to address current and emerging security challenges, both technical and societal.
  • Advance professionally through demonstrated expertise in cybersecurity principles, practices, and tools across diverse industries and organizational settings.
  • Collaborate effectively in team environments, exhibiting ethical judgment, accountability, and a strong sense of professional responsibility.
  • Integrate cybersecurity practices into a wide range of real-world applications aligned with the core competencies of their undergraduate education.
  • Engage in continuous learning and professional development, maintaining and enhancing their skills in response to evolving technologies, threats, and industry standards.

Program oversight

MN Cyber icon. Train, Test, Detect. Protect.

Housed within the College of Sciences, the MN Cyber Institute is a statewide initiative dedicated to positioning Minnesota as a national leader in cybersecurity education and workforce development. The Institute advances this mission through strategic public-private partnerships, interdisciplinary research, and community engagement.

Oversight of the cybersecurity program is provided by the MN Cyber Advisory Board, which includes representatives from industry, government, and academia. The board offers strategic direction, monitors program performance, and ensures that Metro State’s cybersecurity curriculum remains aligned with real-world workforce needs and evolving industry expectations.

In addition to strong industry alignment, the program is structured to meet the NSA’s Knowledge Units (KUs) required for maintaining Metro State’s prestigious designation as a NCAE-CD institution. This alignment ensures that students receive education grounded in nationally recognized standards of excellence and relevance in the field of cybersecurity.

Career prospects

The demand for cybersecurity professionals continues to surge, with the U.S. Bureau of Labor Statistics projecting a 33% growth in employment for information security analysts over the next decade—more than four times the average for all occupations.

The median annual salary for information security analysts exceeds $124,000, reflecting the high value placed on cybersecurity expertise across all sectors. Entry-level positions such as cybersecurity specialists and incident analysts also offer competitive starting salaries, typically ranging from $80,000 to $92,000 per year.

Graduates of Metro State’s cybersecurity program are well-prepared to pursue a wide range of high-demand roles, including:

  • Security Analyst / Architect / Engineer
  • Penetration Tester
  • Vulnerability Assessor
  • Incident Responder
  • Security Auditor / Manager

With a curriculum aligned to both industry needs and nationally recognized standards, Metro State equips students with the skills, certifications, and ethical foundation required to lead in securing digital systems and infrastructure across government, industry, and nonprofit sectors.

How to enroll

Current students: Declare this program

Once you’re admitted as an undergraduate student and have met any further admission requirements your chosen program may have, you may declare a major or declare an optional minor.

Future students: Apply now

Apply to Metropolitan State: Start the journey toward your Cybersecurity BS now. Learn about the steps to enroll or, if you have questions about what Metropolitan State can offer you, request information, visit campus or chat with an admissions counselor.

Get started on your Cybersecurity BS

Program eligibility requirements

Upon admission to the university, students intending to pursue a Bachelor of Science in Cybersecurity will be granted pre-major status and assigned an academic advisor from the College of Sciences.

To be formally accepted into the Cybersecurity major, students must submit an Undergraduate Program Declaration Form after meeting the following criteria:

  • Achieve a minimum cumulative GPA of 2.5 in ICS 265 and MATH 215, or their approved transfer equivalents;
  • Earn a grade of C- or higher in all major prerequisite courses;
  • Successfully complete the General Education Goal I Writing Requirement; and
  • Demonstrate competency in the C programming language, either through relevant coursework (e.g., ICS 265) or by passing a departmental C Programming Competency Exam.

Students with pre-major status are not eligible to enroll in 400-level courses within the Cybersecurity major. The Computer Science and Cybersecurity (CSC) Department is responsible for the official admission of students into the major, as well as the evaluation of transfer coursework for equivalency and eligibility.

Courses and Requirements

SKIP TO COURSE REQUIREMENTS

Guidelines for completing the Cybersecurity BS

  • Pre-Major Status and Advising: All newly admitted students will be assigned an academic advisor and granted pre-major status. Students remain in this status until they have fulfilled the program’s eligibility requirements. To be considered for formal admission into the major, students must submit the Undergraduate Program Declaration Form.
  • Academic Standards: All courses required for the major must be completed with a grade of C- or higher. In addition, students must achieve a minimum cumulative GPA of 2.5 in ICS 265 and MATH 215, or their approved transfer equivalents.
  • Residency Requirement: A minimum of 16 credits applicable to the major must be completed at Metro State University.
  • Upper-Division Coursework: The major requires at least 28 credits of upper-division coursework (i.e., courses numbered 300-level or above).
  • Transfer Credit and Prerequisites: Students are expected to read and understand the policies regarding transfer coursework and course prerequisites, as outlined in the General Guidelines section.

Major Requirements

+ Pre - major Foundation (24 credits)

To declare the Cybersecurity major, students must first complete the designated pre-major foundation courses with a minimum grade of C- in each. Additionally, a combined GPA of at least 2.5 is required for ICS 265 and MATH 215, or their approved transfer equivalents. For more information, please refer to the General Guidelines section below.

Complete all of the following six courses:

This course introduces students to the fundamentals of computer hardware, operating systems, networking, and cybersecurity. Students will learn to install, configure, and troubleshoot computer components, mobile devices, operating systems, and software while applying basic security practices. The course covers diagnosing and resolving common technical issues, servicing hardware components, and documenting and communicating technical support solutions. Additionally, students will explore operating system architectures, cloud computing, virtualization, scripting, and multi-OS environments. Through hands-on labs, students will gain practical skills essential for IT support roles and CompTIA A+ certification preparation.

Full course description for IT Infrastructure Fundamentals

This course provides an in-depth exploration of multi-user operating systems, focusing on Linux environment. Students will learn to install, configure, and manage Linux systems, software, storage, and services while ensuring security and performance optimization. The course covers memory management, process handling, disk and file system management, and peripheral operations. Students will develop proficiency in user and group management, authentication methods, access controls, and network security. Hands-on labs will emphasize troubleshooting system performance issues, diagnosing application failures, and resolving hardware-related problems. Additionally, students will gain experience in automating system administration tasks using shell scripting and Git for version control. By the end of the course, students will be able to apply best practices for system security, implement firewalls, manage permissions, and execute system hardening techniques to mitigate cybersecurity risks. The…

Full course description for IT System Administration

This course introduces fundamental concepts in computer programming and the development of computer programs to solve problems across various application domains. Topics include number systems, Boolean algebra, variables, decision-making and iterative structures, lists, file manipulation, and problem deconstruction via modular design approaches. Lab work and homework assignments involving programming using a language such as Python form an integral part of the course.

Full course description for Computational Thinking with Programming

This course is designed to provide a fast-paced exposure to the C programming language for students majoring in a computer-related discipline. The following topics are briefly reviewed using C syntax: looping, selection, variables, scope rules, functions and pass-by-value arguments. New topics include pass-by-address arguments, formatted and unformatted I/O, user defined types (enum, struct, union), preprocessing directives, file handling, pointers, pointer arithmetic, string manipulation and selected library functions.

Full course description for C Programming

This course covers the basic principles and methods of statistics. It emphasizes techniques and applications in real-world problem solving and decision making. Topics include frequency distributions, measures of location and variation, probability, sampling, design of experiments, sampling distributions, interval estimation, hypothesis testing, correlation and regression.

Full course description for Statistics I

+ Core (32 credits)

Upon completion of the pre-major foundation courses, students are required to officially declare Cybersecurity as their major and must successfully complete the subsequent major coursework with a minimum grade of C- in each course.

Students who have not yet declared the Cybersecurity major or been formally accepted into it are not permitted to enroll in any 400-level courses within the program. For further details regarding prerequisites, please consult the General Guidelines section below.

This course provides an introduction to the principles, methodologies, and applications of digital forensics, preparing students with the foundational knowledge and hands-on skills required for forensic investigations. Students will learn to identify, collect, preserve, and analyze digital evidence from various storage devices and operating systems while maintaining forensic integrity and chain of custody. Key topics include forensic data acquisition, network and system log analysis, cybercrime investigation techniques, and the classification of digital evidence. Students will explore legal, ethical, and procedural considerations essential to forensic investigations, ensuring compliance with industry regulations and best practices. Through hands-on exercises, students will apply forensic tools to examine digital artifacts, analyze cybercrime trends, and prepare forensic reports. By the end of the course, students will have a strong foundation in digital forensic investigation…

Full course description for Digital Forensics Essentials

This course introduces fundamental cybersecurity principles with hands-on labs, preparing students to protect information assets from evolving threats and vulnerabilities. Covering key security concepts, students will learn to identify, analyze, and mitigate cyber threats while securing hybrid environments like cloud, mobile, IoT, and operational technology. The course explores security architecture, operations, and program management, including risk management, compliance, vulnerability management, incident response, and best practices for securing hardware, software, and data. Students will also develop essential governance, communication, and reporting skills for real-world cybersecurity roles. Aligned with CompTIA Security+ objectives, this course equips students with the technical expertise and industry knowledge needed for entry-level cybersecurity roles, such as Security Analyst, SOC Analyst, and IT Security Administrator.

Full course description for Cybersecurity Principles and Applications

Networks are the backbone of information technology operations within an enterprise and are responsible for a significant portion of an organization's security posture. Cybersecurity professionals are often tasked with securing network operations and responding to network threats which demonstrates the importance to networking knowledge in the cybersecurity industry. As a cybersecurity practitioner, it is imperative that there is an understanding of network operations, protocols, and administration practices. This course focuses on developing skills and taking a deep dive into networking protocols including TCP, UDP, ICMP, and IP, network design and architecture, network administration automation, network analysis, and network protocol and design impacts on security and defense measures. Overlap: ICS 383 Networking Protocols and Analysis

Full course description for Networking Protocols and Analysis

To properly secure any organization's information infrastructure and assets, a periodic assessment of its security posture at various levels of the organization is essential. One key area is the direct assessment of vulnerabilities in the IT infrastructure, systems and applications, followed by targeting and exploitation of the same. This course covers the theoretical bases for cyber threats and vulnerabilities, and delves into selection and application of penetration testing methodologies ranging from reconnaissance to the exploitation of vulnerabilities by probing infrastructure, services and applications. The course places a strong emphasis on the use of these methodologies to demonstrate, document, report on, and provide a clear roadmap for remediation of exposed security issues.

Full course description for Vulnerability Assessment and Penetration Testing

This course provides students with a thorough foundation of applied cryptography for cybersecurity practitioners. As encryption technologies continue to integrate into everyday culture, the importance of cryptography and encryption knowledge of cybersecurity practitioners continues to increase. Students will learn and be able to apply and analyze: the history of cryptography from the earliest ciphers to current encryption methodology, mathematical foundations for cryptography, symmetric and asymmetric algorithms, and applied cryptography pertaining to Virtual Private Networks (VPNs), SSL/TLS, strategies for defense utilizing encryption and cryptography, military applications, steganography, cryptanalysis, and more. Additionally, students will look to the future of cryptography and encryption including a look into quantum cryptography and encryption in cloud environments. Overlap: ICS 483.

Full course description for Cryptography for Cybersecurity Practitioners

Information is an asset that must be protected. Without adequate protection or network security, many individuals, businesses, and governments are at risk of losing that asset. It is imperative that all networks be protected from threats and vulnerabilities so that a business can achieve its fullest potential. Security risks cannot be eliminated or prevented completely; however, effective risk management and assessment can significantly minimize the existing security risks. In order to provide effective protection to the organization's critical infrastructure and services, continuous monitoring as well as various processes, procedures, and technology is required to detect and prevent cyber-attacks, breaches, and security violations. In addition, existence of a comprehensive incident response plan is vitally connected to the survivability of an organization after a severe security breach or compromise of critical business operations. This course focuses on the operational aspect of…

Full course description for Cyber Operations

Covers concepts and methods in the definition, creation and management of databases. Emphasis is placed on usage of appropriate methods and tools to design and implement databases to meet identified business needs. Topics include conceptual, logical and physical database design theories and techniques, such as use of Entity Relationship diagrams, query tools and SQL; responsibilities of data and database administrators; database integrity, security and privacy; and current and emerging trends. Use of database management systems such as MySQL. Coverage of HCI (Human Computer Interaction) topics and development of front ends to databases with application of HCI principles to provide a high level usability experience. Overlap: ICS 311T Database Management Systems.

Full course description for Database Management Systems

+ Capstone Project Sequence (6 credits)

Students are required to complete CYBR 498 and CYBR 499 over the course of at least two semesters.

As the first course in a two-part capstone sequence, CYBR 498 provides students with the foundational framework to conceptualize, research, and plan a rigorous cybersecurity project. This course guides students through the identification and formulation of a well-defined research problem, leveraging current cybersecurity trends, industry challenges, and emerging threats. Students will conduct a comprehensive literature review, synthesizing insights from scholarly research, industry reports, and additional learning resources to support the development of a viable cybersecurity solution. Emphasis is placed on problem definition, scope of work, and research methodology, ensuring that students construct a strong theoretical and practical foundation for their capstone project. In addition to technical research, students will explore legal, ethical, and compliance considerations relevant to cybersecurity research and professional practice. To further enhance career readiness, students will…

Full course description for Cybersecurity Capstone I Concepts, Research and Planning

As the culminating experience of the undergraduate Cybersecurity program, CYBR 499 challenges students to apply their acquired knowledge, technical expertise, and industry best practices in developing a comprehensive security solution. This project-driven course requires students to integrate research, risk assessment, security implementation, and ethical considerations into a capstone project that addresses real-world cybersecurity challenges. Students will conduct independent research, analyzing and synthesizing scholarly and professional cybersecurity literature to support their project development. They will identify, evaluate, and mitigate cybersecurity risks and threats, applying advanced enterprise security strategies to enhance system defenses. Students will develop critical leadership and collaboration skills throughout the course, managing tasks and responsibilities in a high-pressure project environment. Effective communication is emphasized, as students will present their…

Full course description for Cybersecurity Capstone II - Design, Development, and Implementation

+ Electives (4 credits)

Students must complete four elective credits from the list of approved courses below, adhering to the following guidelines: CYBR 490: Special Topics in Cybersecurity offers rotating content that changes each semester. Students may take this course multiple times for elective credit, provided each enrollment covers a distinct topic and prior approval is obtained from either the Cybersecurity Director or the Chair of the Computer Science and Cybersecurity (CSC) Department. An approved cybersecurity internship (CYBR 350I) may also count toward the major elective requirement. Students must obtain prior approval from the Cybersecurity Internship Coordinator before beginning the internship experience.

In this course, students continue not only to learn how to identify and collect digital evidence through forensics search tools, but also to study the emerging data mining techniques. The topics include how to design a plan for a computer crime investigation; how to select a computer software tool to perform the investigation; how to articulate the laws applying to the appropriation of computers for forensics analysis; how to verify the integrity of the evidence being obtained; how to prepare the evidence collected for the use in the court; and how to present the evidence as an expert eyewitness in court. Some hypothetical and real cases are also discussed in class.

Full course description for Digital Evidence Analysis

In this course, students will learn the law relating to computer software, hardware, and the Internet. The areas of the law include intellectual property, cyberspace privacy, copyright, software licensing, hardware patent, and antitrust laws. Legislation and public policies on cyberspace technology, cryptographic method export controls, essential infrastructure protection and economic development are also discussed in class.

Full course description for Computer Laws

This course takes a hands-on approach to provide students with foundational concepts and practical skills in Mobile Device Forensics, which can be leveraged to perform forensically sound investigations against crimes involving the most complex mobile devices currently available in the market. Using modern tools and techniques, students will learn how to conduct a structured investigation process to determine the nature of the crime and to produce results that are useful in criminal proceedings. The course will provide walkthrough on various phases of the mobile forensics process for both Android and iOS based devices including forensically extracting, collecting, and analyzing, data and producing and disseminating reports. The course modules and labs will involve certain specialized hardware and software to perform data acquisition (including deleted data), and the analysis of extracted information.

Full course description for Mobile Device Security and Forensics

This course provides an in-depth exploration of fundamental concepts in Artificial Intelligence (AI) and Machine Learning (ML), with a focus on their applications in cybersecurity. Students will analyze AI principles, classical algorithms, and modern ML techniques, evaluating their role in enhancing security protocols and predicting cyber threats. The course emphasizes ethical considerations, governance frameworks, and the responsible use of AI technologies. Through case studies and hands-on applications, students will apply AI and ML tools to solve complex cybersecurity challenges, developing critical skills for securing digital environments.

Full course description for Fundamentals of AI and ML in Cybersecurity

This course provides students with the practical skills and theoretical knowledge required to proactively hunt for cyber threats and conduct advanced intelligence analysis. Students will explore methods to synthesize complex data into actionable intelligence, leveraging tools for data mining, information gathering, and threat management. Emphasis is placed on understanding and applying Indicators of Compromises (IOCs), adversary Tactics, Techniques, and Procedures (TTPs), and integrating cyber threat intelligence into security operations. Through hands-on exercises, case studies, and projects, participants will gain proficiency in detecting, investigating, and mitigating advanced threats. The course also addresses the ethical and legal dimensions of cyber intelligence, equipping students with the expertise to conduct thorough and effective intelligence operations. This curriculum prepares students to utilize advanced methodologies and technologies to enhance the accuracy and…

Full course description for Cyber Threat Hunting and Intelligence Analysis

Internships offer students opportunities to gain deeper knowledge and skills in their chosen field. Students are responsible for locating their own internship. Metro faculty members serve as liaisons to the internship sites¿ supervisors and as evaluators to monitor student work and give academic credit for learning. Students are eligible to earn 1 credit for every 40 hours of work completed at their internship site. Students interested in internships within the Computer Science and Cybersecurity Department should work with their advisor and/or faculty internship coordinator to discuss the process for your specific major.

Full course description for Cybersecurity Individualized Internship

As medical devices become increasingly interconnected and reliant on digital technologies, they introduce new cybersecurity risks that can impact patient safety and healthcare operations. This course provides an in-depth examination of the security challenges, regulatory requirements, and risk management strategies associated with medical device cybersecurity. Students will explore the evolving landscape of medical device threats and vulnerabilities while analyzing relevant cybersecurity regulations, standards, and best practices. Through case studies, technical labs, and real-world scenarios, students will develop the foundational knowledge necessary to secure medical devices throughout their lifecycle. Topics include threat modeling, security controls, patching strategies, incident response, and emerging technologies such as artificial intelligence (AI), mobile health applications, and wearables. By the end of the course, students will be equipped with practical skills to assess,…

Full course description for Cybersecurity for Medical Devices

The medical device industry faces unique cybersecurity challenges due to the direct impact of security threats on patient health and safety. To address these risks, cybersecurity professionals leverage established control frameworks and risk management methodologies to assess and mitigate potential threats.This course provides an in-depth exploration of cybersecurity risk management in the medical device sector, emphasizing the application of industry-recognized control frameworks such as those developed by the National Institute of Standards and Technology (NIST) and the International Organization for Standardization (ISO). Students will gain hands-on experience in identifying, evaluating, and mitigating cybersecurity risks through threat modeling, security assessments, and the implementation of appropriate security controls. Key topics include cybersecurity risk assessment methodologies, security-by-design principles, technical solutions for securing connected medical devices, and…

Full course description for Risk and Security Controls for Medical Devices

The integration of Internet of Things (IoT) technologies with critical infrastructure has revolutionized essential services such as energy, water, transportation, and healthcare, including medical devices. However, this growing connectivity also introduces significant cybersecurity risks. This course examines the security challenges unique to IoT systems in critical infrastructure and explores effective strategies for protecting these environments from cyber threats. Students will analyze IoT-specific vulnerabilities, assess security risks, and evaluate potential attack vectors targeting critical infrastructure systems. The course covers essential cybersecurity principles, risk assessment methodologies, threat modeling techniques, security protocols, and incident response strategies tailored for IoT environments. Through hands-on labs, case studies, and applied projects, students will develop the technical expertise necessary to design, implement, and manage security measures that…

Full course description for IoT and Critical Infrastructure Security

This course focuses on applying Artificial Intelligence (AI) in defensive cybersecurity operations and security assessments. Students will explore AI-driven tools and techniques to enhance threat detection, strengthen defenses, and conduct comprehensive security assessments in a secure and ethical manner. Emphasis is placed on practical applications, critical evaluation of AI methods, and the ethical implications of utilizing AI to protect systems. Through hands-on exercises and case studies, students will develop expertise in employing AI technologies to address modern defensive cybersecurity challenges.

Full course description for Applied AI in Cyber Defense Operations

In the face of escalating cyber breaches and intrusions, organizations seek professionals adept at identifying and responding to security incidents proactively. This course offers an in-depth exploration of Digital Forensics and Incident Response (DFIR) methodologies, emphasizing frameworks such as NIST and US-CERT. Students will learn to effectively detect, analyze, contain, eradicate, and recover from cyber attacks within enterprise networks. Throughout the course, students will develop expertise in identifying threat actors and security breaches, analyzing artifacts and logs, conducting post-mortem analyses, and implementing and refining mitigation strategies. The curriculum aligns with the CompTIA CySA+ objectives, ensuring students are equipped with the competencies required for effective cybersecurity analysis and incident response. By the end of the course, students will be proficient in using industry-standard forensic tools, assessing cyber attack stages, and developing…

Full course description for Cyber Incident Response and Handling

Malware infections have reached epidemic proportions with over 600 million types of infection reported to date. Traditional antivirus techniques are not sufficient to stem the tide. This course will introduce students to the fundamentals of malware analysis techniques which will allow them to recognize, analyze and remediate infections. Basic static analysis techniques using antivirus scanning, hashing, string searching and other automated analysis tools will be reviewed. Dynamic approaches using system and network monitoring will be employed to detect snooping and attempts to exfiltrate data. Students will set up virtual workspaces, download tools and malware and analyze software in a secure environment. Reverse engineering will be introduced. Overlap: ICS 486.

Full course description for Malware Analysis

This course explores specialized and emerging topics in cybersecurity, addressing cutting-edge threats, technological advancements, and evolving best practices not covered elsewhere in the Cybersecurity program. Designed to keep pace with the rapidly changing cybersecurity landscape, this course provides students with opportunities to analyze and evaluate recent developments, apply advanced tools and methodologies, and synthesize scholarly and professional literature to solve real-world cybersecurity challenges. Emphasis is placed on ethical decision-making, professional responsibility, and adherence to legal and industry standards in addressing contemporary cybersecurity issues. The specific topic of study varies by semester, ensuring alignment with current industry trends and demands.

Full course description for Special Topics in Cybersecurity

This course focuses on how to design and establish information services over the Internet from the server side. Topics include advanced concepts and issues on Internet architecture, server-side design strategies, current technologies and Internet security. Through labs and programming projects, students learn how to use current scripting and markup languages to build nontrivial state-of-the-art applications.

Full course description for Internet Application Development

+ General Guidelines
Transfer Courses

The evaluation of transfer coursework equivalency is conducted by the Computer Science and Cybersecurity (CSC) Department. This process is initiated at the time of admission, with any resulting determinations reflected in the student’s DARS (Degree Audit Reporting System) report. When transferring coursework, students should be aware that many institutions—universities, community colleges, and technical colleges—offer courses that may be considered equivalent to our Pre-Major requirements. In certain cases, a lower-division course from another institution may be deemed equivalent to one of our upper-division courses, or vice versa. However, for the purpose of satisfying upper-division major electives or university graduation requirements, the classification of the course at the originating institution (i.e., whether it is designated as lower or upper division) is the determining factor.

Prerequisites

Students are responsible for understanding and meeting all prerequisite requirements for the courses in which they enroll. Enrollment in a course is contingent upon successful completion of all prerequisites with a minimum grade of C-. Students who do not meet these requirements will be administratively dropped from the course. While the registration system enforces prerequisites for many courses, discrepancies can occasionally occur. If your DARS report indicates that you have met the prerequisites, but you are unable to register due to a system error, please contact your academic advisor for assistance.