Protect Critical Information Systems

The Bachelor of Science in Cybersecurity and Information Assurance is specifically designed for students seeking to enter the highly in-demand field of cybersecurity, which the U.S. Bureau of Labor Statistics projects will grow 28 percent from 2016 to 2026. The program will prepare you to assess and investigate the misuse of data and information systems.

The BS in Cybersecurity program offers flexible learning options, including on-site and online courses that can be completed at your own pace. You can complete this bachelor’s degree in as little as two years and can apply to the program with a minimum of a high school diploma or GED.

CityU was designated a National Center of Academic Excellence in Cyber Defense Education by the National Security Agency and Department of Homeland Security.

The Bachelor of Science in Cybersecurity and Information Assurance was developed with guidance from data security leaders and hiring managers in the public and private sectors. The degree combines the governance, risk, and compliance (GRC) skills employers are seeking with those that students will need to be successful now and in the future. Through the study of technology, investigative processes, and cyber-related offenses, you will be prepared to address corporate risks and enter the field as a specialist on data security and cybercrime.

Learning Outcomes

Throughout the cybersecurity bachelor’s program, you’ll learn:

  • Networking protocol for OSI and IP networking
  • The tools, processes, and procedures to secure computer networks
  • How modern computer systems work with data across multiple systems
  • Internet technology, including physical devices and networks, protocols, and services
  • Information systems taxonomies and general applications
  • An overview of the field including the objectives of information security
  • The tools and techniques that security professionals use to implement, monitor, and evaluate security on computer systems
  • An introduction to programming using Python
  • An introduction to programming using the Standard C++ programming language

Lower-Division Requirements (90)

College Composition: 5 credits
College Mathematics: 5 credits
Humanities: 15 credits
Social Science: 15 credits
Natural Science/Mathematics: 15 credits

Program Requirements

Preparatory Courses

AC 215

Fundamentals of Accounting (5)

This course emphasizes the preparation and recording of accounting information and is intended for students majoring in accounting. Students will learn about the accounting cycle, the measuring process and the classification of data, and the accounting terminology that is essential to the preparation and effective use of financial principles that apply to statements. This course introduces basic accounting concepts and techniques; fundamentals of the accounting process and preparation of basic financial statements; accounting principles involved in the measurement and reporting of assets and liabilities; elements of consolidated statements and statement of cash flows; and using and interpreting financial statements for decision-making. Prerequisites: Strong math and algebra skills in addition to logical thinking are required to succeed in this course.

CS 225

Introduction to Web Design (5)

The course develops a student’s understanding and skills in web development and script programming to create dynamic websites. This is an introductory course and builds a fundamental working knowledge of web technology and the ability to create a website. Students will apply knowledge of computer operation and basic symbolic logic to create a dynamic website. Students completing this course will have an understanding of the operation and construction of a dynamic website.

— CHOOSE 2 OF THE FOLLOWING —

CJ 240

Research Methods and Practice (5)

This course will introduce students to applied research techniques relevant to the empirical study of crime and organizational decision making. Students will apply the scientific method to collect data and analyze relevant practical or theoretical questions. Basic applied quantitative modeling skills will be applied to public policy questions.

HUM 210

Justice and Ethics (5)

Ethical, philosophical, and moral dilemmas while pursuing justice are at the heart of the course. Students are exposed to both classical and modern models of ethics and decision-making analysis. Students will hone their skills using real case studies to evaluate challenges in policing, forensics, and corporate justice practices.

SSC 204

Criminal Procedural Law (5)

Through case law and constitutional analysis, this course examines a range of procedural criminal law topics, such as: arrests, search and seizure, post-conviction treatment, origin, development, philosophy, and constitutional basis of evidence. Students will assess degrees of evidence and rules governing admissibility, judicial decisions interpreting individual rights, and an analysis of case studies from arrest through final appeal.

SSC 220

Principles of Microeconomics (5)

This course is an introduction of microeconomic theory with real world applications. Topics include: How households, firms, and governments make decisions of what goods and services to produce, how to produce the goods and for whom to produce them. This course will help you apply the skills and tools learned from theory to current world events.

Governance, Risk Management, and Compliance Core

CJ 360

Cybercrime, Technology, and Social Change (5)

This course addresses crime, victimization, and criminality associated with modern digital technologies mediating social relationships. Students will investigate the legal, political, and societal changes that result from these technologies and their contexts in a wide array of crimes from cyber-rape to hacktivism.

CJ 361

Cyber and Surveillance Law and Governance (5)

Cyber law and governance are complex and challenged by ever-evolving changes in technologies. Students will gain knowledge in the legal and regulatory aspects of surveillance, data collections, privacy, search and seizure, national security, personal data, and liability. The course will make the legal aspects accessible to the non-attorney whose daily practice is guided by sophisticated legislative and regulatory frameworks.

CJ 362

Investigation of Cyber Crime (5)

This course presents an overview of digital evidence and computer crime by focusing on a systematic approach to investigating a crime based on the scientific method. Students explore the practical realities of investigating wrongdoing in complex technological environments. The course follows the lifecycle of investigation from crime scene to courtroom and covers a range of topics and skills necessary for the investigator to collaborate with forensic specialists, attorneys, and others.

CJ 365

Applied Criminology and Crime Prevention (5)

The course addresses crime prevention in diverse environments such as public spaces, offices, homes, factories, and public transportation. It incorporates theoretical models from community policing and broken windows to situational crime prevention. Case studies are used throughout this course. Students will complete a project where they conduct, analyze, and develop solutions for a crime problem.

CJ 403

Enterprise Risk Management (5)

This course introduces students to the many types of risks all businesses and organizations face. It reviews various categories of risk, including financial, cyber, health, safety and environmental, brand, supply chain, political, strategic risks and many others. It provides a common framework and terminology for managing these risks to build an effective enterprise risk management system with a focus on risk mitigation and prevention.

CJ 424

Homeland Security and Espionage (5)

In this course, students will explore the interconnected responsibilities of the public/private sectors with the national critical infrastructure, governance, and homeland defense. Students will assess a variety of policy domains and topical issues from maritime and port security to WMD and their effects on business and government operations. Particular problems will be examined with respect to corporate and government espionage, intellectual property theft, and cyber war.

IS 464

Policy and Audits (5)

This course investigates the policies that govern information security, and how systems can be audited to ensure compliance with those policies. Policies are the process in which technical controls are codified into standards and practices that a company or a governmental organization will use to define controls, and assess compliance of those controls in the working environment. Auditing is the process in which electronic systems are reviewed for compliance with the policies promulgated by senior management. This course focuses on key aspects of information management policies and auditing to ensure compliance with standards based policies and practices. Students will immediately be able to use the information gained in this course to write policies and audit for information systems compliance.

IS 472

IT Compliance (5)

As IT has become critical to the functioning of business, the importance of information security, accuracy, and availability becomes paramount. In response there has been an increase in the complexity of government and industry mandates from around the world. These regulations on IT direction and management have the ability to disrupt business, but also can elevate the organization to a more mature and secure operational posture where the upside of affirmative safeguards is tremendous and limited only by the organization's ability to execute and adapt. This course will investigate IT compliance regulations including SOX, HIPAA, PCI-DSS, and 21 CFR 11. Students learn techniques for assessing compliance and integrating compliance initiatives into IT strategy, planning and projects.

— CHOOSE 1 OF THE FOLLOWING —

CJ 363

Business Investigation and Fraud Examination (5)

While general criminal investigative techniques are utilized in private sector investigations, the approaches to cases vary in specific and specialized ways in the private sector. Cases can involve a mix of constraints including criminal legislation and administrative or regulatory oversight commissions and boards. This course focuses on applying the role of the investigator and the methods of investigations in complex business environments.

CJ 410

Risk Assessment and Prevention (5)

This course will provide a foundation for Intelligence, risk analysis, and analytic reasoning. It focuses on using the tools of empiricism and science for advanced, applied skills for problems analysis, problem solving and decision-making. It is designed to help the student apply the rigor of the scientific method to strategy and information analysis. The course will draw on the decision sciences to teach students about the strengths and limitations of human judgment and decision-making, and how to mitigate the impact of bias in each. Specifically, the focus will play the role of an intelligence analyst and apply these techniques to a variety of hands-on risk management scenarios concerning business, military, corporate espionage, and public administration.

Cybersecurity Technology Core

CS 330

Network Communications Basics (5)

The initial course in the Networking sequence, this course addresses the OSI and IP networking models and understanding networking protocols. The course examines in depth layer 1 and 2 protocols including common LAN and wireless networks. The student is introduced to tools and techniques for analyzing networks. Course Entry Requirement: IS 306.

CS 481

Network Security (5)

This course examines the tools, processes, and procedures used to secure computer networks. The course reviews network vulnerabilities, common attack vectors, and methods for preventing, detecting and minimizing the effects of network attacks using such tools as Firewalls and Intrusion Detection Systems. Students completing this course will have an understanding of how to secure and defend networks. Prerequisite: CS 330

IS 306

Data Management Communications and Networking (5)

This course develops student understanding of a model of information systems composed of data acquisition, data transport, data manipulation, data storage, and data display. The use of data to develop business intelligence, competitive advantage, and support business operations through lean supply chains, delivery, and oversight has become an increasingly critical component in business success. Students will learn how modern computer systems work with data across multiple systems to deliver relevant time critical information to managers and workers. Students will gain an insight into networked communications in support of business operations. This course prepares the student for working with data in a modern highly connected organization anywhere in the world.

IS 308

Internet Technologies (5)

This course covers Internet technology including: physical devices and networks, protocols and services, and common network operating systems. The course focuses on a broad understanding of how to use and implement networks, including an introduction to physical and logical network design. This course will provide students with an understanding of networking and Internet Protocols (IP) they will use to design small- to mid-sized business networks or expand their knowledge in network-based application programming or network security. Prerequisite: CS 225

IS 330

Information Systems (5)

This course will cover information systems taxonomies and general applications such as CRM, SCM, eCommerce, ERP, business intelligence, knowledge management, finance and accounting, personal productivity, computer supported cooperative work (groupware), and global systems. Future trends and directions of information systems will conclude this course.

IS 345

Information Security (5)

Information security is an increasingly vital concern in today's highly networked digital world. This course provides an overview of the field including the objectives of information security - Confidentiality, Integrity, and Availability (CIA) and the inherent conflicts in these objectives. Students will look at common threats and vulnerabilities and examine the risk management techniques and controls used to address them. Upon completing this course, students will have a solid foundation to study information security in more depth, and include an awareness of the demands of information security consideration in all technology efforts.

IS 468

Tools and Techniques (5)

This course covers the tools and techniques that security professionals use to implement, monitor and evaluate security on computer systems. Students will lock down and monitor computer systems and gain hands-on experience in collecting information about the vulnerabilities of an organization. Based on their experiences in this course, students will be prepared to conduct penetration testing on authorized systems.

— CHOOSE 1 OF THE FOLLOWING —

CS 131

Computer Science I: C++ (5)

This course provides an introduction to programming using the Standard C++ programming language. Students learn the basic concepts of assignment, iteration, and looping. The course includes extensive coverage of objects and the concepts of object-oriented programming. In addition, students will learn how to effectively structure a program.

CS 151

Programming with Python (5)

This course provides an introduction to programming using Python. Students learn the fundamental programming concepts of process, iteration, selection, functions, classes, and objects. Students learn to apply key data structures and algorithms in their programs. Throughout the course students work in an immersive environment creating numerous programs to exercise their knowledge. At the end of the course, students have the ability to apply programming to many common problems and a solid foundation for more advanced programming concepts and challenges.

Required Electives

— CHOOSE 2 OF THE FOLLOWING —

BSC 403

Legal Issues in the Workplace (5)

This course focuses on the legal environment of business. The course covers major issues for any business, including contracts, torts, business organizations, and the regulatory environment, including issues arising from expansion internationally. Employee issues such as labor law, employee relationships, and discrimination are also examined. Students will be able to identify legal and regulatory issues and know how to solve the problems that they present.

BSM 405

Operations Management (5)

This course explores operations management in the manufacturing and service environments. Topics include: cost accounting information for improving efficiency, product and service quality, total quality management, project management, materials resource planning, value creation, supply chain management, and economic value. Students will focus on how to apply these concepts to real world operation functions of both manufacturing and services. It is strongly recommended that College Math and Quantitative Methods be taken prior to this course.

CJ 318

Fundamentals of Criminology (5)

This course is a survey of basic topics and problems related to the discipline of criminology, such as the nature of crime, criminality, criminal statistics, and selected criminological theories, frameworks, and concepts. Students will explore the empirical study of crime prevention, offenders, criminal and deviant behavior, and the criminal justice system.

CJ 363

Business Investigation and Fraud Examination (5)

While general criminal investigative techniques are utilized in private sector investigations, the approaches to cases vary in specific and specialized ways in the private sector. Cases can involve a mix of constraints including criminal legislation and administrative or regulatory oversight commissions and boards. This course focuses on applying the role of the investigator and the methods of investigations in complex business environments.

CJ 422

Organizational and White-Collar Crime (5)

This course explores the types of crimes, criminality, and wrongdoing that are associated with businesses and organizations. Students will explore many concepts, including: waste; fraud; abuse; corruption; malfeasance in the workplace; harassment; discrimination; and workplace violence.

COM 461

Communicating Crisis, Emergency, and Social Change (5)

This course investigates the development and implications of crisis communications in today's world. Students will develop a framework for a communication plan in the event of a crisis or emergency, as well as learn how to manage issues that might develop into a crisis or negative story or event, examine issues of risk management and crisis recognition, and understand how to factor the social and psychological implications of a crisis or emergency into a communications plan. Through case studies and theory, this course helps students develop the critical thinking skills, analysis, and ethical grounding required to handle the communication of crises and emergencies.

IS 350

Systems Analysis and Design (5)

This course covers systems analysis and design using the Software Engineering Body of Knowledge (SWEBOK) as a foundation. Data, process, and network modeling are covered along with frameworks such as the Zachman Framework and The Open Group Architectural Framework (TOGAF). Object technologies will be built into the program along with design patterns. Students will complete the design of a system by the end of this course.

Capstone

CJ 465

Bureaupathology (5)

This course shows relationships between the structures/processes of organizations and the "pathologies" to which organizations are prone. Students learn to apply and sharpen their understanding of the nature and causes of organizational pathology by closely examining case studies on failure to apply those lessons. Students also gain a deeper understanding of how management policy and employee behavior can undermine the efficient, effective, and lawful delivery of goods and services by public and private sector organizations.

The Bachelor of Science in Cybersecurity program will prepare you for a career in the growing field of cybersecurity, including:

  • Data security
  • Corporate investigations
  • Cybercrime
  • Risk analysis
  • Information assurance
  • Related fields

Networking Opportunities

At CityU, you’ll have the opportunity to expand your professional network by connecting with faculty working in your field, students from around the globe, and alumni employed at Seattle’s top companies. Plus, you’ll be part of a supportive community that’s dedicated to helping you reach your career goals.

Tuition Cost

Learn more about tuition and fees for our undergraduate, graduate, and doctoral programs.

Financial Aid Opportunities

At CityU, we’re committed to helping students achieve their academic goals no matter their economic situations. Our financial aid counselors are here to find the resources you need to pay for your education, including grants, loans, work study, and scholarships.

Learn more about financial aid opportunities at CityU, or contact our Financial Aid Team at 800.426.5596, 206.239.4540, or finaid@cityu.edu.

Military Tuition Benefits

As a Yellow Ribbon school, CityU is proud to serve those who have served in the military. We offer military tuition discounts for active-duty servicemembers and their spouses and accept military benefits such as the Post 9/11 GI Bill® and Tuition Assistance.

Learn more about military tuition benefits, VA benefits, and military partnership programs designed to help you reach your military and career goals.

REQUEST INFORMATION