Cybersecurity
Bachelor of Science in Computer and Information Science with a Major in Cyber and Information Security Technology - Cybersecurity Track
- Cybersecurity Overview
-
Living in the age of data means embracing the interconnectedness that allows us to communicate and collaborate in an infinite number of ways. Data can mean a wealth of information and insight at our fingertips, but it can also be detrimental in the wrong hands. With progressively more information traveling over the wires and with increasing threats internationally with cyber terrorism, the need to defend and protect an organization’s assets is critically important.
Do you want to stop cyber-crime before it starts? If preventing, detecting, and battling digital crime is important to you, a career in cyber security may be the perfect fit and a Cyber and Information Security Technology degree could be a great way to start! As a cybersecurity specialist, you could be on the front lines of cyber warfare and defense, protecting vital computer systems against inside and outside threats alike, including social engineering, hackers, malware, spyware, and viruses.
You could earn a Bachelor of Science Degree in Computer and Information Science with a major in Cyber and Information Security Technology and a track in Cybersecurity in as little as 2.5 years.
Our Cyber and Information Security Technology major and Cybersecurity track could teach you how to:
- Protect data and manage personnel conduct in relation to safeguarding data.
- Perform vulnerability analysis/penetration testing of organizations
- Actively monitor and defend networks
- Create basic security policy and procedures
Join an industry where you could make a difference in the lives of so many—contact ECPI University today and learn more about earning your bachelor’s in Computer and Information Science with a major in Cyber and Information Security Technology and a track in Cybersecurity.
- Program Description
-
At ECPI University, your classroom experience is reinforced with practical instruction, using the same kind of technology found in the workplace. Create and build secure networks in Windows, Cisco, and Linux environments, and design and implement network security plans to keep hackers at bay and networks secure. Specifically, ECPI’s major in Cyber and Information Security Technology with a track in Cybersecurity degree program could teach you how to:
- Maintain security hardware and software
- Evaluate problems and monitor network to ensure its availability to system users
- Identify customer needs and use that information to design, interpret, and assess network and security requirements
- Plan, coordinate, and implement network security measures
- Install security software
- Monitor networks for security breaches
- Perform vulnerability analysis and penetration testing
Further develop knowledge in the following areas:
- Ethical and Professional Practices
- Logic and Decision Processes; Troubleshooting; Problem Resolution
- Risk Management and Disaster Recovery
- Customer Service and System Self-Assessment
- Installation and Configuration of Client and Server Operating Systems, Network Services, and Security Tools
- Protection of Sensitive Information by Preventing, Detecting, and Responding to Cyber Security Attacks
ECPI University’s cyber security curriculum aims to prepare graduates to sit for IT certification exams related to CompTIA, ECCouncil, Cisco Systems, and Microsoft.
- Possible Career Track
-
- Technical support and help desks
- Network & Security infrastructure support
- Information security analyst
- Network security analyst
- IT supervision/management
- Information technology solutions providers
- Network Security implementation
- Information Security Engineer
- Curriculum
-
Core Curriculum28 semester credit hours Course ID Course Name Credits BUS121 Introduction to Business 3 PMT472 Applied Project Management 3 PMT472L Applied Project Management Lab 1 CIS126 Introduction to Programming 3 CIS142 Introduction to Cloud Solutions 3 CIS150 Introduction to Networking 3 CIS206 Linux Administration 3 CIS212 Principles of Cybersecurity 3 CIS223 Introduction to Databases 3 CIS123 Introduction to Scripting 3 Arts and Sciences*31 semester credit hours Course ID Course Name Credits CAP480 Arts and Sciences Capstone 3 COM115 Principles of Communication 3 ENG110 College Composition 3 ENG120 Advanced Composition 3 HUM205 Culture and Diversity: Exploring the Humanities 3 MTH131 College Algebra 3 MTH140 Statistics 3 PSY105 Introduction to Psychology 3 PSY220 Positive Psychology 3 ONE LECTURE COURSE AND CORRESPONDING LAB FROM THE FOLLOWING: PHY120 Physics 3 PHY120L Physics Lab 1 BIO122 Environmental Biology 3 BIO122L Environmental Biology Lab 1 *For allowable substitutions of arts and sciences courses, see the Arts & Sciences Department section in the ECPI University Course Catalog.
Self Integration9 semester credit hours Course ID Course Name Credits CIS106 Introduction to Operating Systems 3 CIS108 Office Applications 2 FOR110 Essentials for Success 3 COR191 Career Orientation 1 Cyber and Information Security Technology Major Required Courses37 semester credit hours plus electives Course ID Course Name Credits CIS101 Computer Configuration I 3 CIS123 Introduction to Scripting 3 CIS202 Introduction to Routing and Switching 3 CIS202L Introduction to Routing and Switching Lab 1 CIS204 Intermediate Routing and Switching 3 CIS207L Routing and Switching LAB 1 CIS225 Network Protocols and Services 3 CIS245 Windows Client and Server 3 CIS245L Windows Client and Server Lab 1 CIS251 Advanced Windows Server 3 CIS256 Windows Active Directory 3 CIS256L Windows Active Directory LAB 1 CIS321 Network Scripting 3 CIS403 Ethical Hacking 3 CIS425 Advanced Defense and Countermeasures 3 ONE OF THESE TWO COURSES: CIS495 Cyber and Network Security Capstone 3 CIS490 Bachelor's Externship-CIS 3 Cybersecurity Track15 semester credit hours Course ID Course Name Credits CIS230 Advanced Cybersecurity 3 CIS230L Advanced Cybersecurity Lab 1 CIS305 Advanced Linux Administration 3 CIS335 AI/Machine Learning/Edge Computing 3 CIS335L AI/Machine Learning/Edge Computing LAB 1 CIS411 Ethical Hacking II 3 CIS425L Advanced Defense and Countermeasures Lab 1 CIS403L CIS403L Ethical Hacking Lab 3 Apprenticeship Option Course ID Course Name Credits APP491 APP491 Apprenticeship I 0 APP492 APP491 Apprenticeship II 0 APP493 APP491 Apprenticeship III 0 APP494 APP491 Apprenticeship IV 0 APP495 APP491 Apprenticeship V 0 APP496 APP491 Apprenticeship VI 0 - Possible Outcomes
-
Students in the B.S. in Computer & Information Science program develop planning, design, implementation, and support skills in operating systems, networking, software programs, and security. Students develop additional focused skills based on which major the student pursues. Students also learn principles of excellent customer service in order to assist clients with technical issues.
Upon successful completion of the Bachelor of Science in Computer and Information Science with a major in Cyber and Information Security Technology, graduates are expected to:
Computer and Information Science Outcomes:
- Design, implement, and evaluate computer-based solutions that incorporate the appropriate computing requirements identified through the analysis of specific organizational or computing problems
- Function effectively on teams to establish goals, plan tasks, meet deadlines, manage risk, and produce deliverables
- Apply written, oral, and graphical communication in both technical and non-technical environments
- Evaluate and use appropriate technical literature
- Engage in continuous professional development through user groups, associations, conferences, readings, research, and other channels
- Develop and apply ethical and legal best practices in the maintenance and security of information and systems
Cyber and Information Security Technology Major Outcomes:
- Plan, design, configure and administer a network and security infrastructure
- Maintain, monitor, and troubleshoot a network and security infrastructure
- Assess and implement technical and non-technical security controls to protect an organization from threats and vulnerabilities