Bachelor of Science

Cybersecurity Degree

Protect Organizations from Cyber Threats


Protect Organizations from Cyber Threats

Award badge icon

Ranked in Top 10 Best Online Cybercrime Programs by Best Colleges, 2020

Learn On Campus Or Online

Cybersecurity Degree

Get your cybersecurity degree on your own timeline.

Follow the standard college term schedule, with added flexibility, when you earn your Bachelor's in Cybersecurity in the traditional path at Bellevue University. In this path, you’ll register for courses in any sequence, taking as many courses at a time as you need to best manage your life and your education. And, since our curriculum is designed to welcome complete beginners, you won’t have to navigate multiple prerequisites to start working toward your goals.

Looking to learn faster? Earn the same BS in Cybersecurity degree in an accelerated cohort format.

person typing code on a laptop

What can you do with a bachelor's in cybersecurity?

As technology evolves, so do the career opportunities for those with a cybersecurity bachelor’s degree. In this program, you'll prepare for career growth in a wide range of settings:

  • Government agencies and public service organizations
  • Private sector businesses that handle consumer data
  • National security and intelligence agencies

Expect the best from a nationally designated program.

Center for Academic Excellence Seal
National Security Agency Seal

The National Security Agency and the Department of Homeland Security have designated Bellevue University as a National Center of Academic Excellence in Cyber Defense, (CAE-CD). This designation covers academic years 2022 through 2027.

Learn from experts from the USAF, DoD, NASA and more.

At Bellevue University, our faculty in the cybersecurity degree program have worked at—and continue to work within—some of the most respected intelligence and security organizations in the world. Don’t settle for a one-off professional certificate when you can get the caliber of degree that national security threats require.

Gain in-demand skills in our cybersecurity degree.

You don’t need any previous technology experience to succeed in this comprehensive cybersecurity program. Our courses cover essential skills like:

  • Programming using Python
  • The essential elements of governance, risk, and compliance
  • Application of security controls
  • Web and database security
  • Concepts of penetration testing, forensics, and incident response

Build the skills that matter most in the field. Take the next step.

Courses

What You’ll Learn

Graduates of the traditional Bachelor of Science in Cybersecurity degree will be prepared to:

  • Evaluate fundamental cybersecurity concepts, theories, and strategies as they apply to real world case studies.
  • Explain technical and non-technical security solutions on different types of cyber systems.
  • Apply cyber incident response project plans.
  • Assess risks, vulnerabilities, and threats to sample cyber systems.
  • Identify attributes associated with cybersecurity professionals.

Cybersecurity Degree Courses

Current students please login to BRUIN and select “Academic Progress” for your curriculum requirements.

Requirements (39 credit hours)

(Click a course name below to view course details) Unless noted, all courses are 3 credit hours.

Required courses (33 credit hours)

New course description This course introduces fundamental technologies used in information systems. Students will develop a foundation in cybersecurity by learning the fundamental concepts behind cybersecurity. In addition, students will learn cybersecurity principles used in the design of systems to protect information and assets against persistent and constantly evolving threats.

This course provides an introduction to problem solving and computer programming using the language Python. Students will analyze problems, design and implement solutions and assess the results. Topics include fundamental programming constructs such as variables, expressions, functions, control structures and lists. Emphasis is placed on numerical and data analysis for informed decision making. Prerequisite: None

This course introduces students to the goals, functional processes, tools, and techniques associated with network security. Services such as firewalls, intrusion detection mechanisms and Virtual Private Networks (VPNs) will be studied. Students will develop an understanding of telecommunications and networks security protocols used to prevent, detect, and correct potential vulnerabilities associated with both the outsider and insider threat. Pre-requisite: CYBR 250 recommended

This course provides the student with the basic topics associated with controlling how resources are accessed in an information system. Topics include organizational access control models, security models, and hardware and software controls that can be used to support those models. Additionally, students will learn about access models, securing systems access with passwords, smart cards, and biometric devices to ensure data confidentiality, integrity and availability. This course also explores technologies like remote authentication and Public Key Infrastructure (PKI). Pre-requisite: CYBR 250 recommended

This course is intended to introduce students to the principles of risk assessment, vulnerability analysis, and auditing and how they are used to evaluate the effectiveness of information security controls. Students will develop an understanding of threat and asset identification, countermeasures and safeguards, acceptable risks, and vulnerabilities. The auditing concepts of technical, physical, and administrative controls will also be introduced along with how these controls are measured for effectiveness. In addition, students will learn rules, regulations and issues related to compliance with applicable laws and regulations. Pre-requisite: CYBR 320

The major focus of this course will be the relational and NoSQL models of database types. Topics include relational modeling, NoSQL databases and their application, Structured Query Language (SQL), application development using databases, access controls, security principles, common vulnerabilities, mitigations and emerging trends. Students will prepare a small application using a commercial database management system. Pre-requisite: CIS 245, CYBR 250

This course focuses on the knowledge required to operate a security program within an organization. Various components of secure operations, including policies, regulatory compliance, ethics, cryptography, human factors, and risk management are identified and applied to scenarios. Students will practice constructing a comprehensive security program that incorporates those secure operations components and concepts, including contingency plans and security awareness education. Pre-requisite: CYBR 250

This course explores secure base operating systems on server, desktop, virtual, and mobile platforms. Topics include the practical application of security tools, utilities, and configurations for protecting computer operating systems at both the user and corporate level. Course subject is also related to protecting stand-alone and virtualized servers, cloud computing security, and the protection of mobile platforms such as smart phones, tablets and handheld computers. Pre-requisite: CYBR 250

This course explores cybersecurity considerations of web applications, such as how and why web applications are vulnerable, and how to mitigate those weaknesses through secure development and deployment practices using the Open Web Application Security Project (OWASP) Top 10 vulnerabilities as a focus. Students will exploit sample web application vulnerabilities and document the process. Pre-requisite: CYBR 309 and CYBR 340

This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices. Pre-requisite: CYBR 340

This course provides an introduction to penetration testing and incident response tactics, techniques, and procedures. Topics include ethical and legal implications of penetration testing, network information gathering, system vulnerability analysis, common tools and techniques used in penetration testing, traffic analysis, incident response, and related defensive measures. Pre-requisite: CIS 245, CYBR 340

Beyond the Core courses, choose one Emphasis (6 credits) OR choose two Elective Courses (6 credits).

Emphasis Options (6 Credits Each)

Protect and Defend Emphasis

This course provides students with the knowledge and skills related to detecting and analyzing vulnerabilities and threats and taking steps to mitigate associated risks. Topics include incident response plans, managing cybersecurity incidents, log file analysis, anomaly detection, network security monitoring, host based and network-based intrusion detection and prevention, malware analysis and threat intelligence. Prerequisites: CYBR 420, CYBR 430.

This course continues students’ study of intrusion detection and response by providing students with the advanced knowledge and skills related to detecting and analyzing vulnerabilities and threats and responding to cybersecurity incidents. Topics include threat hunting and advanced threat intelligence, security automation, playbooks, machine learning for detection and response, log aggregation and correlation, incident response in the cloud, threat emulation, writing custom intrusion detection system rules and advanced malware analysis. Prerequisites: CYBR 420, CYBR 440.

Securely Provision Emphasis

This course provides an introduction to the fundamental components of encryption. Topics include the history of cryptography, public key and private key systems, hashing, and digital signatures. Topics also include the development of the Advanced Encryption Standard, the use and functionality of Pretty Good Privacy, and the Secure Socket Layer. Pre-requisite: CYBR 250 recommended

A project-based course which focuses on the use of tools and methodologies applied to structured system analysis and design. Emphasis is placed on traditional approaches including enterprise analysis, workflow analysis, data flow analysis, affinity diagram construction and use, system flowcharting and entity relationship diagramming. Students will complete a feasibility analysis, risk analysis, design specifications and a project implementation plan for a simulated business system.

Oversee and Govern Emphasis

This course provides students with an introduction to project management as it relates to Information Technology. Students develop formal project plans based on actual problems. Emphasis is placed on the knowledge areas of project management. Team-based and discovery-based learning methods are stressed. Where applicable, course topics align with the CompTIA Project+ certification.

This course discusses ethical issues inherent in the field of information technology. Topics covered focus on the balance between the individual and society, including privacy and surveillance, free speech and censorship, fair use and intellectual property, and security and computer crime. The course also discusses professional responsibility netiquette.

Elective Courses - Choose two if not choosing an Emphasis option (6 credit hours):

*Note: students may also choose two courses from any of those emphases as an elective option.

This course introduces students to a variety of advanced Python topics. Students will model, design, and implement solutions for both ASCII based, form based, and web based assignments. Topics include incorporating python built-in dictionary and date-time modules, integrating third party library modules, utilizing APIs, designing and completing code testing, building GUI interfaces, and exploring Django web services. Prerequisites: CSD 205 OR CIS 245

This course introduces the concepts of programming using Java 10. This course will cover the basics of the Java programming language syntax. Additional topics covered will be elementary data structures, input/output statements, selection, iteration, methods, and arrays, principles of Object-Oriented (OO). Topics include the language syntax, OO concepts, and advanced features of the Java programming language. Additional topics are inheritance, polymorphisms, abstracts, exception handling, and basic input and output. Students will write programs using all the above-mentioned topics. Prerequisites: CSD 325

This course provides an in-depth study of basic Linux administrative tools and practices. It is based on the curriculum recommended by the Linux Professional Institute for certification at the LPIC-1 level, and can be used to prepare for certification exams 101 and 102. Topics covered in this course include Linux commands, shell scripts, file systems, networking, security, and troubleshooting.

This course consists of an advanced study of Linux servers, networking, administrative tools and practices. It is based on the curriculum recommended by the Linux Professional Institute for certification at the LPIC-2 level, and can be used to prepare for certification exams 201 and 202. Topics covered in this course include resource utilization, compiling the kernel, Linux Web, DNS, DHCP, email, file, print, and database servers, enterprise networking, shell scripts, file systems, networking, security, and troubleshooting. Prerequisite: CIS 338, or a current LPIC-1 certification, or two years documented experience as a Linux system administrator.

This course is designed to provide students with a monitored structure which can be used to apply the concepts and technologies acquired throughout their course of study to a real-world problem or situation that will be proposed and developed by each student. This can be accomplished by way of a faculty approved project, research study, certification or internship. The faculty sponsor will evaluate and approve a student’s proposal and objectives prior to any work being done. Each student will develop and prepare a plan for completion of the approved component and will document the attainment of the objectives by way of milestones, oral or written reports, specified deliverables or satisfactory reports on completion of objectives by the manager of an intern. Students may accomplish the Service Component when they have completed 24 credit hours of the required major courses.

Accounting Information Systems (AIS) is an applied course focusing on processing data into information. Focus is placed on accounting cycles, source documents, cleaning data, emerging technology, data analysis, data visualization, and internal controls. Students will also become knowledgeable of information technology (IT) terminology, commonly used software applications, and computer-based control issues. Emphasis is placed on IT controls and security. Prerequisite: AC 206 and BA 222

This course introduces students to national security as a concept, strategy, goal, and challenge. It examines the dangers and threats that exist domestically and internationally and analyzes how the United States attempts to deal with those challenges using strategies that range from diplomacy to military force.

This course introduces students to intelligence and counterintelligence as concepts, processes, and careers. It elaborates on historical and contemporary approaches to I/CI. The process of intelligence collection, analysis, research dissemination, consumption, and feedback is examined. Students are exposed to the diverse IC community and the responsibilities of its various members.

This course introduces and engages elements of theoretical and ethical analysis to empirical topics and subject matter. Some of the issues covered will include war, weapons of mass destruction, humanitarian intervention, globalization, and spying. This course explores the deeper underlying philosophical issues within national security.

This course provides a monitored structure for application of the skills and knowledge acquired throughout the Cybersecurity program. Emphasis is placed on the use of real-world security problems, issues, and situations. Course assignments will require the use of protection, detection, deterrence, and response techniques in addressing threats, vulnerabilities, and risks found in businesses today. Students may enter this course when they have completed 24 credit hours of the required major courses. Prerequisite: 24 credit hours of the required major courses.

This course presents a sampling of real-world security issues that confront a modern business. In it, students learn practices used in the underworld of cybercrime in order to reduce their risks. One area of particular emphasis is compliance with laws and regulation in the areas of cyber systems and business policies. Another is analyzing business and economic risks associated with cyber systems. This course is suitable for students majoring in cybersecurity, Information Systems or Business, or anyone interested in understanding how, why, when, and where cybercrime may occur.

This course explores the management of security and privacy in the healthcare industry. Coverage includes an extensive study of HIPAA and other applicable laws, and methods for compliance with those laws. Discussion also includes the security of health information systems. This course is suitable for students majoring in Cybersecurity, Information Systems or Healthcare, or anyone interested in learning more about security and privacy in the healthcare industry.

*Note: CIS 456 may be used to fulfill an elective requirement. It may only be used once to fulfill a degree requirement, and must be approved by the program director and Dean.


Kirkpatrick Signature Series Requirements (9 credit hours)

(In addition to the Major Requirements, all Bellevue University students must complete the Kirkpatrick Signature Series)

This course focuses on the political and philosophical traditions of the American republic, especially as embedded in the ideals, values, traditions, founding documents, and institutions of the United States , and considers how these traditions relate to individual citizenship and global society. Prerequisite: 60 Credit Hours

This course focuses on the creative tensions that exist between the forces of tradition and change as the country undergoes social, cultural, and political change. It considers the manner in which change can renew the vitality of a republic. Prerequisite: 60 Credit Hours

This course examines civic engagement in relation to individual freedoms and responsibilities. It fosters engaged citizens, empowered to effect positive change. Prerequisite: 60 Credit Hours

37

Integrative General Education Credits

+
39

Major Requirements Credits

+
51

Elective Credits

= 127 Total Credits*

General Education Courses

Take general education courses that do more than fill a requirement. At Bellevue University, these courses build foundational skills that apply to any career—critical thinking, qualitative reasoning, and ethical leadership. And, you can take courses individually or in course clusters, which connect three courses around one theme, building skills as you go.

About general education requirements >

Elective Courses

Our broad selection of electives allows you to select courses related to your major or expand your perspective in other areas of interest.

University Accreditation

Bellevue University is accredited by the Higher Learning Commission (hlcommission.org).

Whether a college, university, or program is accredited is important to students with financial aid, employers who provide tuition assistance, donors, and the federal government.

This program is considered a non-licensure degree/certificate program and is not intended for those seeking licensure or the practice of licensed profession. This program may be relevant to multiple occupations that do not require licensure and was not designed to meet educational requirements for any specific professional license or certification.

*Consult with an admissions counselor to determine your eligible credits, as well as to verify minimum graduation requirements for this degree. Transfer credits must be from a regionally accredited college or university. Bellevue University makes no promises to prospective students regarding the acceptance of credit awarded by examination, credit for prior learning, or credit for transfer until an evaluation has been conducted.

Get credit for what you’ve earned.
Accelerate your path to earning a degree.

Thanks to our generous credit transfer policy, you can avoid retaking the classes you’ve already completed, and chip away at the credit requirements you need to complete your degree.

  • Already have an associate degree? You could accelerate your bachelor's degree completion. Transfer your full associate degree or even your A.A.S.*
  • You may be able to get credit for your military experience and training.

Finish Faster

See how credit transfer works >

Accelerated Icon

*Acceptance of transfer credits is always subject to official transfer credit evaluation by Bellevue University.

Start the path now to a respected cybersecurity bachelor’s degree.

Format

Work with industry-standard cybertechnology tools in a hands-on virtual environment.

Graduate well-versed in the technology used by respected cybersecurity professionals. When you study at Bellevue University, you’ll leverage opensource and commercial tools to establish security plans, analyze threats, implement mitigation techniques and conduct digital forensics for cybercrimes.

100% Online learning that works for your life and your goals.

Our flexible online courses are designed to bring quality learning into a format that fits your schedule, without sacrificing meaningful faculty feedback and collaboration with peers across the country. Stay on track with the help of your Student Coach — with you from day one to graduation.

Find out more about the online experience >

On-campus classes offered on a convenient schedule.

If you prefer an in-person learning experience, our Omaha-area campus offers classes that accommodate the working professional’s schedule.

Get the flexibility you need to grow your cybersecurity career.

Tuition & Financial Aid

It’s more affordable than you think.

Earning a degree is an investment in yourself, and we want to help you make sure it’s a wise one with a generous credit transfer policy and competitive tuition rates.

2024 / 2025 Academic Year

Traditional Bachelor's

$449 Online Cost Per Credit $339 In-Class Cost Per Credit (Daytime Residential Only) $250 Military Preferred Cost Per Credit

(Additional fees may apply to individual courses within your major requirements)

Only pay for the credits you need.

Talk to us about our generous credit transfer policy so you can make more of the credits you’ve already earned count toward your degree.

Get help with financial aid.

Our counselors will guide you to find a financial aid plan that works for you. Explore all the ways to help pay for your degree.

Learn more about financial aid >

Military Preferred (Active Duty and Spouses Only)

Degree-seeking active-duty members of the U.S. Military, National Guard, Reserve, and Coast Guard, and their spouses, with proof of status, are eligible for a special tuition rate of $250 per credit hour for all undergraduate, certificate, and certificate of completion programs as they work towards their degree. Not able to be combined with other special rates, Guild or Campus@Work funding.

You want a Cybersecurity degree. We want you to save along the way.

Admissions

Removing barriers to the education you deserve.

College is challenging, but getting in shouldn’t be. We have simplified our requirements for admission and we do not require entrance exam scores like the ACT or SAT—so you can get on track to achieving your goals. Here’s how it will go:

To be admitted to Bellevue University, provide proof of high school completion. We accept the following forms of documentation:

  • Official high school transcript
  • GED certificate
  • Homeschool letter of completion
  • Certificate demonstrating that the student has passed a state authorized examination recognized by the state in which it is awarded — equivalent to a high school diploma.
  • Self-certification on application.

You’ll just need to complete the application and submit the following:

  • Official high school transcripts or proof of high school completion
  • If applicable, official transcripts from any college or university you previously attended
  • A one-time $50 application fee
  • Note:
    • International students must provide a few extra documents. See international student bachelor admissions details.
    • Students applying for a cohort-based major must possess an associate degree or 60 semester hours completed with a grade of "C-" or higher from an accredited institution of higher learning. If you do not meet this requirement, you can build your credits directly with Bellevue University.

Short on time? You can start the application and save your progress as you go. Start your application >

You'll just need to create an account and complete a pre-application to Bellevue University through Guild. Once you receive confirmation that your pre-application to Bellevue University has been approved, you'll need to complete the required steps to get fully accepted and registered. These include:

  • Submitting transcripts from past institutions
  • Completing the FAFSA, per your employer's benefit requirement

If you’re transferring from another institution of higher education, you must submit an official transcript from each accredited institution you previously attended. Here are a few details to note:

  • A transcript can be emailed securely to [email protected] or by mail. It is required to be sent directly from the issuing institution to Bellevue University's Office of the Registrar to be considered an official document. Please check with previous institution for available sending options.
  • Applicants who submit an official transcript which reflects a two-year degree from a regionally accredited postsecondary institution are not required to show proof of high school completion.
  • Transcripts must be submitted even if credits were not earned at the previous institution or if transfer credit is not granted.

Ready to get started?
Reach out to admissions.

  • Get your questions answered about the Cybersecurity Degree
  • Understand your financial aid and scholarship options
  • Map out a schedule that fits with your priorities

STEP 1 of 3