Bachelor Programs in Cyber Security

Compare 23 Bachelor Programs in Cyber Security

Cyber Security

A Bachelor in Cyber Security program teaches students to identify computer system vulnerabilities, recognize digital exploitation and prevent or repair damage. Graduates are prepared to avert cyber attacks and implement security measures in a wide range of settings that involve computer systems and sensitive data.

What is a Bachelor in Cyber Security?  This undergraduate degree prepares students to prevent, detect and repair computer security exploits. Hackers perform cyber attacks to access or manipulate the sensitive information stored in an organization’s databases. Program participants build a strong knowledge base of network security, cryptography, applications security, e-Commerce and web security, database management and secure hardware systems design. These tools allow students to create protected computing systems for corporations, hospitals, government offices and military bases. Graduates have the skills to find system vulnerabilities while building solutions to prevent malicious attacks and the forensic knowledge to show where attacks have occurred and identify their origins.

Students benefit from exposure to additional specialized security subjects in information systems and hardware besides the core computer science and system administration courses. Participants find this advanced skill set to be beneficial for finding career opportunities in secure networking, e-Commerce, sensitive government or military programs and many other prestigious technology positions.

This bachelor degree program usually lasts three or four years. However, the time and tuition rates vary depending on individual program policies. Individuals interested in the cyber security degree can research each institution to learn more about program duration and tuition costs.

Program graduates have a wide range of career opportunities. Positions that use the specialized knowledge gained from cyber security programs include network security engineers, system analysts, system security consultants, database security administrators and software architects. Specialized cryptographer and digital rights professional positions are also available to graduates. These positions can be found in the public and private sectors, existing in corporate settings and national, state and local agencies.

Individuals interested in cyber security can find the right institution to pursue their degree by searching our extensive database of schools. Search for your program below and contact directly the admission office of the school of your choice by filling in the lead form.

Read More

Bachelor in Cyber Security

Harbour.Space
Campus Full time September 2017 Spain Barcelona

Programme Description As enterprise is becoming focused on the security of its information systems,the demand for cybersecurity specialists continues to expand. The Bs in Cybersecurity prepares students to handle the full variety of threats and challenges faced by the modern enterprise. Students start with foundations in mathematics and computer science,continue with programming and security tools and arrive at the understanding of the full range of current cyber threats, enterprise security architecture as well as legal and ethical aspects of security. [+]

Bachelors in Cyber Security. This program is taught in ENGLISH. As enterprise is becoming focused on the security of its information systems,the demand for cybersecurity specialists continues to expand. The Bachelor in Cyber Security prepares students to handle the full variety of threats and challenges faced by the modern enterprise. Students start with foundations in mathematics and computer science, continue with programming and security tools and arrive at the understanding of the full range of current cyber threats, enterprise security architecture as well as legal and ethical aspects of security. PROGRAMME STRUCTURE Year 1 In the first year, students obtain the foundational theoretical knowledge they need to become cyber security professionals. The programme builds the mathematical basis upon which students will develop understanding of programming, computer networks and enterprise information systems during following years. The courses are mostly given in a form of lectures and takeaway coursework. Modules Combinatorics & Graphs Foundations of programming – 1 Calculus – 1 Foundations of mathematical logic Linear algebra -1 Data structures and algorithms – 1 Combinatorics and graphs – 2 Calculus – 2 Data structures and algorithms – 2 Linear algebra – 2 Computer Organisation and Systems Combinatorics Operating systems Calculus – 3. Captstone Project Seminars & Workshops Year 2 In the second year, students complete the foundations with courses in programming, scripting, machine learning and databases and continue to study security of operating systems and networks. The second year also offers a fundamental courses in cryptography and principles of secure programming. Most... [-]

Bachelor of Cyber Security and Behaviour

Western Sydney University
Campus Full time Part time 3 - 6 years January 2018 Australia Sydney + 1 more

The Bachelor of Cyber Security and Behaviour at Western Sydney University provides you with a unique combination of Information Technology, Psychology and Criminology studies. The degree is tailored for careers in the expanding field of Cyber Safety and Security and includes a full semester internship. [+]

The Bachelor of Cyber Security and Behaviour at Western Sydney University provides you with a unique combination of Information Technology, Psychology and Criminology studies. The degree is tailored for careers in the expanding field of Cyber Safety and Security and includes a full semester internship. This course meets the pressing need for the application of psychological theory and research to understand cyber security issues in the context of decision-making, human errors, social influence, organisational cultures and vulnerable populations. As cyber threats become more sophisticated and damaging across all types of organisations, cyber security has become one of the nation's top priorities. Our students gain a solid grounding in conventional computer and network security concepts and skills. This course meets the pressing need for the application of psychological theory and research to understand cyber security issues in the context of decision-making, human errors, social influence, organisational cultures and vulnerable populations. As cyber threats become more sophisticated and damaging across all types of organisations, cyber security has become one of the nation’s top priorities. Students will gain a solid grounding in conventional computer and network security concepts and skills. This course leads to a range of rewarding career options for graduates. Examples include cyber safety officer, data security, security analyst, risk analytics, cyber policing, cyber intelligence, intelligence analytics and terror-informatics. Admission Applications from Australian and New Zealand citizens and holders of permanent resident visas must be made via the Universities Admissions Centre (UAC). Applicants who have undertaken studies overseas may have to... [-]

Bachelor of Information Technology (with specialisations)

Charles Sturt University
Campus or Online Full time Part time 3 - 6 years January 2018 Australia Albury Melbourne Wagga Wagga + 3 more

CSU’s Bachelor of Information Technology (with specialisations) provides you with essential skills to be at the cutting edge in the rapidly evolving digital economy and take up stimulating employment with national and international industry leaders. [+]

Bachelors in Cyber Security. Join one of today’s fastest evolving industries with CSU's Bachelor of Information Technology. A key element in driving innovation and the transformation of organisations, information technology is at the forefront of enabling and enhancing a range of both longstanding and emerging industries. As a result, demand for highly-skilled IT workers has never been greater, offering a diverse and stimulating career path with global demand. CSU’s Bachelor of Information Technology (with specialisations) provides you with essential skills to be at the cutting edge in the rapidly evolving digital economy and take up stimulating employment with national and international industry leaders. In recent University Reviews rankings, CSU was rated one of Australia’s top universities for computer science in 2016. Why study this course? Equipping you with the skills and attributes you need to become a dynamic and highly regarded IT professional, CSU’s course is designed and delivered with flexibility in mind. You can choose between full-time, part-time and online study options to match your work and lifestyle commitments. You may: study at a CSU campus, a CSU Study Centre or online from almost anywhere in the world speed up or slow down your study pace to meet your changing professional and personal needs combine your studies at CSU with study at TAFE or the Canberra Institute of Technology (CIT) reduce the overall length and cost of your course by obtaining recognition of prior study. As well as covering the core components of the information systems and computing discipline—such... [-]

Bachelor in Cyber Security

Narxoz University
Campus Full time 4 years September 2017 Kazakhstan Almaty

The educational program "Cyber Security" of Narxoz University at the bachelor level is aimed at training specialists in the field of information security. [+]

The educational program "Cyber Security" of Narxoz University at the bachelor level is aimed at training specialists in the field of information security. The program is focused on the study of such special problems as cryptography, software and hardware information security, methods of software implementations analysis of protection algorithms, etc. Graduates of the program are mostly in demand in the executive authorities, IT departments dealing with security of information systems and data of state institutions, state corporations, financial institutions, IT companies. Advantages of the program: Study of information security standards in financial organizations; Study of methods, principles and assessment of information risks; Study of processes, methods and tools for obtaining data related to computer crimes Using Big Data to prevent cybercrime Protection and administration of computer networks to reduce the vulnerability and control of cyber-attacks. The main profiling disciplines of the educational program "Cybersecurity": «Cybersecurity Fundamentals», «Computer Forensics», «Cybersecurity Risk Management», «Network security», etc. For more information, please contact: Shakirt Makilenov T.: +7 707 136 66 77 email: shakirt.makilenov@narxoz.kz [-]

Bachelor of Information Technology

University of South Australia
Campus or Online Full time Part time 3 years January 2018 Australia Adelaide + 1 more

The Division of Information Technology, Engineering and the Environment is a world-leader in information technology teaching and research situated in Technology Park, a world-class location nestled among 80 companies creating the perfect environment for collaboration and innovation... [+]

Bachelors in Cyber Security. The Division of Information Technology, Engineering and the Environment is a world-leader in information technology teaching and research situated in Technology Park, a world-class location nestled among 80 companies creating the perfect environment for collaboration and innovation. In 2015, 97 per cent of our University’s research has been assessed at a world-class standard or above by the Excellence in Research for Australia ratings which include the fields of artificial intelligence and image processing, disrupted computing and information systems. This program builds upon UniSA’s flagship programs as an ‘all round’ degree that enables graduates to move into rewarding careers as IT professionals. The Bachelor of Information Technology provides you with the passport to a career in computing, software development and the information services industries. You will be exposed to real world applications and the latest research developments and technologies through industry placements, internships and research projects with industry partners, providing you with greater employment prospects after graduation. In this program you get the choice to select either two minors within the IT school or one IT minor as well as another minor in a different discipline within the University. This allows you to diversify your skill set and enhance your employability in areas such as business, healthcare or education. You will also have access to UniSA’s IT Innovation Studio and IT Development Studio. These facilities will prepare you for a career in IT by combining real-life experience with the knowledge to succeed. This program is also available... [-]

Bachelor of Cybersecurity

Felician University
Campus Full time 4 years September 2017 USA Rutherford

Students can major in Cybersecurity and receive a Bachelor of Science degree in Cybersecurity. You may also major in any other discipline at the university and minor in Cybersecurity. [+]

Major or Minor in Cybersecurity Students can major in Cybersecurity and receive a Bachelor of Science degree in Cybersecurity. You may also major in any other discipline at the university and minor in Cybersecurity. (Examples: Criminal Justice major and Cybersecurity minor, or Graphic Design major and Cybersecurity minor.) Co-Major in Cybersecurity Students in the Teacher Education program may select Cybersecurity as their Arts & Sciences co-major. Double Major Students majoring in Cybersecurity have the option to pursue a double major with any discipline at the university. (Example: Major in both Criminal Justice and Cybersecurity.) Certificate in Cybersecurity If you are majoring in another discipline and have an interest in Cybersecurity, you may receive certification in Cybersecurity by taking six courses through the Computer Science Department. Points of Interest As a Cybersecurity major, you will receive a solid core of instruction in Computer Science, experience state-of-the-art instruction in a dedicated laboratory, and have the opportunity to participate in progressive activities that will bolster your understanding of the subject. Special features of the program include: A foundation of core courses in Computer Science. A hands-on laboratory component in practically all Cybersecurity courses. Opportunities to enroll in specialty courses that are offered periodically, such as Principles of Robotics, Computer Vision, Image Processing, Computer Graphics, Data Mining, Gaming, or Cloud Computing. Opportunities to attend and/or participate in nationally recognized student conferences and student competitions in computer science. Field experiences and club activities. Faculty Qualifications Many of our CS faculty are Ph.D. specialists in the... [-]

Bachelor of Information Technology

Melbourne Polytechnic
Campus Full time 3 years February 2018 Australia Melbourne

Melbourne Polytechnic's Bachelor of Information Technology is a newly accredited degree designed to meet the growing demand for business professionals qualified in the areas of network security, business information systems and software development. [+]

Bachelors in Cyber Security. Melbourne Polytechnic's Bachelor of Information Technology is a newly accredited degree designed to meet the growing demand for business professionals qualified in the areas of network security, business information systems and software development. A course with a distinctive business flavour A career in business-oriented information technology offers the potential for great financial reward and growth, yet also demands a wide range of specialised skills and knowledge. This program has been designed to provide theoretical knowledge and high-level vocational skills in information technology with a business focus, meeting the needs of local and multinational organisations, as well as the broader business community. This course is up-to-date, industry-relevant and consistent with the emerging trends in information technology education. The Bachelor of Information Technology provides: the integration of an academically rigorous program in information technology with the emerging area of network security, business intelligence and cloud application development multi-disciplinary approach to the study of information technology and business the latest information technology practices regarding the introduction of network security standards, recently evolving business intelligence and e-business applications and systems graduate outcomes which are practical, solutions-oriented, showcasing a range of skills in today's information technology enabling business environments. The bachelor program also includes traditional, mainstream information technology subjects such as: networking programming systems analysis database systems Graduates will be able to make a meaningful contribution to the information technology profession and more broadly, the business community. Students who have successfully completed the first two years of the bachelor degree may... [-]

Bachelor Of Computer

Université du Québec à Rimouski UQAR
Campus Full time Part time 27 months September 2017 Canada Rimouski Lévis + 2 more

The Bachelor of Computer aims to train specialists who will work in companies that use IT in their business processes, including e-commerce. [+]

The Bachelor of Computer aims to train specialists who will work in companies that use IT in their business processes, including e-commerce. The program provides a solid background in computing, that allows its graduates to work in all areas of IT and adapt to the change. The training aims specifically the acquisition of software engineering skills in the field of the Internet, databases, networks and IT security. Internships The practical dimension of IT bachelor is provided by internships and integration activities in the workplace and paid by IT development projects. Internships and integration in the workplace activities aim to apply the acquired knowledge and to familiarize themselves with the practical problems of using IT. IT development projects enable students to develop a project corresponding to real needs, after its approval by the program director. The student can perform up to 15 credits of courses, integration activities in the workplace and projects to better reconcile the work-study formula and facilitate immersion and integration in the workplace in the early years his studies. The activities of integration in the workplace occur in parallel courses. These activities and internships are for a duration of 10 to 15 weeks. The internship and final project in computer studies lasting 16 to 25 weeks. Orientation in the Internet Software Engineering The tendency of companies to do business online has created a need for IT professionals who have a good vision of business process and know the new software architectures and new development environments for the Web.... [-]

BEng (Hons) Computer Security and Forensics

Edinburgh Napier University
Campus Full time 4 years September 2017 United Kingdom Edinburgh

Become proficient in computer systems, design and analysis of complex network security requirements by combining theory and practical expertise. [+]

Bachelors in Cyber Security. Become proficient in computer systems, design and analysis of complex network security requirements by combining theory and practical expertise. Course introduction Combining three of the most sought-after streams of computing, this course capitalises on the rising awareness of the importance of network security and is a valuable foundation to a successful and well-paid career. Two years of general computing studies will lead you to the specialty areas of security and forensics, software development and computer networks. After four years, you’ll have the expertise needed to create and analyse effective and secure computer systems. What you'll learn Covering the CCNA syllabus of industry leader Cisco, this course is also accredited by the British Computer Society and will equip you with the tools you need to play a role in the future direction of technologies that support the internet and key communication systems. Initially, you’ll learn the fundamentals of computing, and become proficient in systems, software, data transmission, internet and user integration with systems. You’ll then progress to the design, implementation and maintenance of complex networked systems, plus the development and implementation of complex security and other applications. You’ll develop skills in collecting, preserving, analysing and reporting on security and digital forensic investigations, graduating with a qualification that can include Microsoft and Cisco professional certification. Modules studied in the first two years can help you towards gaining Cisco CCNA accreditation, an industry-recognised qualification. Careers In the computing career market, the demand for security engineers is increasing. As a... [-]

Bachelor’s Degree in Information Technology and Security Systems

Southern Technical College
Campus Full time 176  September 2017 USA Fort Myers Tampa + 1 more

As technology continues to evolve, businesses will find an increasing need for qualified information technology professionals. With an information security degree from Southern Technical College, you can prepare for a challenging career that will keep you on your toes. These IT security degree programs are designed to help you become skilled in the identification of computer security vulnerabilities and develop a... [+]

Bachelor’s Degree in Information Technology and Security Systems As technology continues to evolve, businesses will find an increasing need for qualified information technology professionals. With an information security degree from Southern Technical College, you can prepare for a challenging career that will keep you on your toes. These IT security degree programs are designed to help you become skilled in the identification of computer security vulnerabilities and develop a level of specialization in information security beyond what is provided by more general programs. This program gives you sufficient time to explore the issues and technologies of computer and network security, and to develop the skills needed to design or troubleshoot an organization’s security systems procedures, standards, protocols and policies, as well as ensure that operational security is in compliance with standards, policies and laws. Many core courses in our information security degree program apply directly to industry standard certifications, such as CompTIA, Microsoft, Cisco and Computer Forensics Investigation. In this program, you can study advanced project management, network security, security systems, computer forensics and investigations, advanced network forensics, client-server network operating systems, digital home technology integration, routers, and network security. If you’re looking at IT security degree programs, consider Southern Technical College. Our experienced instructors and dedicated staff members can help you take your career to the next level! How long will it take me to complete this program? The program is designed to take 176 weeks to complete. Of those that completed the program in 2013-2014, *% finished in... [-]

Baccalaureate - A Fundamental Computer Science And Information Technology

South Ural State University
Campus Full time 4 years September 2017 Russia Chelyabinsk

Educational direction FIIT focused on the training of professional programmers with basic knowledge in the following areas: [+]

Bachelors in Cyber Security. Fundamental science and information technologies (FIIT) Areas of expertise Educational direction FIIT focused on the training of professional programmers fundamental knowledge in the following areas: technology development of software systems; Information Security; supercomputers and parallel programming; Web programming; local and wide area networks; development of computer games; corporate database management systems. Future Career The graduate is prepared to work in companies that develop software and information systems, IT departments of banks, commercial companies, public authorities and other organizations. And he is able to hold the position of the employee department of information technology, programmer, system administrator, system analyst, database administrator, web programmer, an expert consultant on modern information systems, and others. specialized courses Basics of programming Modelling of information processes Algorithms and Complexity Analysis Architecture of Computer Systems Def. the basics of building a computer Programming languages OS Security of information systems Computer networks Intelligent Systems and Technologies Solving problems on a computer Automation of enterprises Geographic Information systems Database Technology Application Packages Software Engineering Intelligent Systems and Technologies Object-oriented programming Introduction to Parallel Programming Functional and Logic Programming Basics of .NET programming technology Introduction to service-oriented architectures analytical information processing technology Basics of web-programming Computer graphics Fundamentals of game development Administration OS UNIX / Linux Web-design IT Project Management Cyberspace and the Digital Universe During the training, students learn a large number of modern programming languages, including: Pascal, C, C ++, C #, Java, Prolog, Ruby, Python, HTML, XML, SQL, UML, and others. equipment used... [-]

Bachelor of Engineering in Information Technology (BEng)

Oulu University of Applied Sciences (OAMK)
Campus Full time 42 months Finland Oulu

The principal aim of the education is to provide students with good skills in programming. A graduate is able to design and program Internet services and applications for pc, linux and mobile environments. Students have essential web development skills related to current Internet technologies and protocols, web graphics and multimedia, web authoring and design and web programming. Courses cover the major... [+]

Bachelor of Engineering in Information Technology (BEng) The principal aim of the Bachelor of Engineering in Information Technology (BEng) programme is to provide students with good skills in programming. A graduate is able to design and program Internet services and applications for pc, linux and mobile environments. Students have essential web development skills related to current Internet technologies and protocols, web graphics and multimedia, web authoring and design and web programming. Courses cover the major server frameworks, databases and associated development environments. They also include client side technologies together with user experience competence. Technical expertise focuses on the technology, applications, and future trends of Internet service development. Students learn to document their work and to manage in different communicative and interactive situations and apply international knowledge and competences in their own field. Foreigners learn basics of the Finnish language. Studies in mathematics and physics support the usage of multimedia tools. Software development skills and business knowledge are gained in real life projects in companies. Professional studies consist mainly of software development, web-technologies, user experience and business studies. This programme encompasses the major frameworks and software architectures on the Internet today. Course work provides comprehensive training for professional working on e-commerce, enterprise applications, and interactive websites. First the students get a basic knowledge of programming, databases, teamwork and communication. Then they are able to participate in a software project. Later they are able to study advanced programming and deepen their knowledge in server programming, mobile application features, different mobile systems, development... [-]

Bachelor in Cybersecurity

Slippery Rock University
Campus Full time September 2017 USA Slippery Rock

The Computing major with Cybersecurity concentration provides a comprehensive coverage of technical, legal, and managerial topics in the field. The concentration enables the students to build solid technical foundation with the courses in programming, databases, computer networks, and computer forensics. [+]

Bachelors in Cyber Security. Bachelor in Cybersecurity Build a Solid Foundation in Cybersecurity SRU prepares students with technical and managerial skills needed by technology companies COMPUTING: CYBERSECURITY Offered by: Computer Science The Computing major with Cybersecurity concentration provides a comprehensive coverage of technical, legal, and managerial topics in the field. The concentration enables the students to build solid technical foundation with the courses in programming, databases, computer networks, and computer forensics. The concentration also introduces students to security specific areas such as fraud, risk assessment while providing students with the big picture of security management. Graduates of the concentration will have both technical skills and managerial qualities to work in IT departments or security consulting companies. WHY CHOOSE CYBERSECURITY? You should choose the Cybersecuirty Concentration because of the following reasons: Career opportunities: Employment of Information Security Analyst is projected to grow 18 percent from 2014 to 2024, which is much faster than average. The median of salary was $90, 120 in 2015 (source: Bureau of Labor Statistics) Caring and friendly study environment: all the faculty members have Ph.D. degrees in computer science or related fields. The faculty are committed to provide quality education and to help students succeed; State-of-the-art computing equipment on campus: in addition to smart classrooms and labs for Computing discipline, there is a network lab where the students can utilize virtual servers to practice installation and configuration of operating systems and services, hacking and cracking activities, and perform computer forensic analysis; Internship: Computing majors are regularly placed... [-]

Bachelor - Information Security

Northern (Arctic) Federal University
Campus Full time 4 years September 2017 Russia Arkhangelsk

One of the most valuable commodities today is information. In a highly competitive modern companies are forced to pay increased [+]

Bachelor - Information Security Language teaching subjects: Russian (for students who do not speak Russian language, provided preparatory course)

Dossier of the program:

• One of the most valuable commodities today is information. In a highly competitive modern companies are forced to focus on its safety. In this regard, it is difficult to overestimate the importance of information security specialists.

 

They are directly involved in the creation of information security system, its auditing and monitoring. No staff on information security today can not do any businesses or departmental organization. The program provides training of bachelors who own methods of analysis of information risks, ability to develop and implement measures to prevent them.... [-]


Bachelor in Network Security

Coleman University
Campus Full time September 2017 USA San Diego

You can be on the front line of network defense and cyber security by turning your skills into a career in the Network Security program at Coleman University. [+]

Bachelor in Network Security

You can be on the front line of network defense and cyber security by turning your skills into a career in the Network Security program at Coleman University. Secure networks and reliable transfer of data have become increasingly vital for successful businesses. Network Security professionals are needed to build, manage, maintain a stronger and safer digital world. US News & World Report rated Computer Systems Analyst as #2 overall "Best Jobs of 2014". The Bureau of Labor Statistics forecasts the job outlook (from 2010 to 2020) for Network and Computer Systems Administrators to increase by 28% (faster than average). In the Network Security program at Coleman University, you will learn how to design & build secure networks, recover data after a catastrophe, and remove malware from systems. Using Security by Design (SBD) methods, you will create strong systems and reduce vulnerability. We will even teach you how to hack so you will know how your enemy thinks and acts.... [-]