Balkis N. — Class of 2019

Bachelor of Science in
Cybersecurity, Computer
Network Defense

Computer icon

4-week
COURSES

Calendar icon

Year-round
enrollment

graduation cap icon

220K+ Alumni Worldwide

Overview

The Bachelor of Science in Cybersecurity (BSCYB) program prepares those who wish to meet the increasing demand for cybersecurity professionals in nearly all modern organizations. The coursework provides you with an understanding of basic information technology management concepts, fundamental security skills, and the legal and ethical issues associated with cybersecurity. The Computer Network Defense specialization takes a specific focus on assessing and addressing the security issues related to computer networks. Upon completing this program, you’ll be prepared to work in positions such as security analyst, computer network defender, and computer incident responder.

Course Details

Foundation Technologies Courses

For the Bachelor of Science in Cybersecurity degree with a specialization in Computer Network Defense, you must complete six foundational courses, a core sequence of five courses, a second core sequence of six courses, three project courses, and four specialization courses.

Course Name

An introduction to basic network concepts, including local area networks, network security, wireless networks, wide area networks, and secure router configurations.

This course introduces the basic architecture and functions of an operating system. You’ll explore computer hardware, software integration, design and functionality of Windows and Linux operating systems, and core aspects of operating system security.

An introductory survey of cybersecurity fundamentals. This course covers the concepts of confidentiality, integrity, availability, cybersecurity policy, and the ethical and legal aspects of cybersecurity.

This course explores the foundational concepts and guidelines for protecting data in transit and at rest. You’ll learn the technical aspects of implementing encryption, authentication, access control, and the development and implementation of associated policies.

An introduction to the fundamental concepts of cloud computing and virtualization. This course examines core cloud deployment and service models, compares public and private cloud deployments, and explores the concepts of DevOps and continuous integration.

This course introduces the principles of programming for cybersecurity professionals. Instruction and coursework will survey a variety of program tools, including PowerShell, Python, and scripting to implement system security.

First Core Sequence

Course Name

In this course, you’ll learn and practice the writing skills necessary to create clear and concise technical documents. You’ll explore project planning and project management concepts, and how to explain technical topics to non-technical leadership.

This course covers the secure administration of Linux-based systems. You’ll learn to implement and assess standards-based security measures on Linux operating systems. Automated implementation and assessment of security measures will be a core component of the class, with legal and ethical aspects of system administration also a key topic of study.

An introduction to the secure administration of Windows-based desktop and server systems. You’ll learn to implement and assess standards-based security measures on Windows-based operating systems. Topics of focus include automating the implementation and assessment of security measures, as well as the legal and ethical aspects of system administration.

This course builds on the CYB 216 class, covering advanced skills in security automation. Topics of study include: managing security-related code in a software repository, writing integrated scripts to implement and assess system security, and using DevOps automation tools to securely manage infrastructure.

An examination of system architecture design and development to meet cybersecurity requirements. Instruction and coursework will examine methods to translate technology and environmental conditions (e.g., law and regulation) into system and security design.

Second Core Course Listings

Course Name

An examination of the various tools and frameworks used to conduct a system/network security audit and assessment. You’ll explore various IT audit frameworks, including government and non-government, and the legal and ethical aspects of IT auditing.

An exploration of the tools and techniques used to collect and analyze cyber threat information. Coursework will focus on the collection and analysis of log data, threat intelligence data, and indicators of compromise (IOCs) to detect malicious activity.

An introduction to the tools and methods of incident response. Topics of focus include: preparation for data collection, incident analysis, preserving and recovering data, and the legal and ethical aspects of incident response.

This course examines common, ethical hacking methods along with hands-on application of security tools to test network and systems security. Instruction will focus on the planning, execution, and legal and ethical aspects of penetration testing.

A detailed examination of network defense concepts and the various tools for protecting and monitoring networks. You’ll learn to implement an intrusion detection system, conduct network-monitoring traffic analysis, utilize honeypots, and develop associated network policy.

This course explores the development of cybersecurity policy that meets an organization’s compliance requirements and business goals. Coursework focuses on creating a cost-benefit analysis while developing organizational policy and system requirements.

Second Core Course Listings

Course Name

This capstone project focuses on applying the cybersecurity knowledge and concepts learned in this program. You’ll work as an individual or as part of a team to complete a practical or research-related cybersecurity project. Grading is H, S, or U only.

Part II of this program capstone picks up from the CYB 499A course and continues the application of knowledge in your selected topic. Grading is H, S, or U only.

The final step in this program capstone, this course continues from CYB 499B and will complete your application of knowledge to a selected cybersecurity topic. You’ll present your project findings to a panel of academic and business professionals. Grading is H, S or U only.

Specialization Courses

Course Name

An advanced examination of securing Windows and Linux operating systems. This course focuses on detecting and preventing operating system attacks and employing security automation tools to secure and monitor multiple operating systems.

An advanced examination of wireless and mobile security. Instruction and coursework will revolve around securing a wireless network against a common baseline, planning and implementing a secure mobile device deployment, and examining wireless attack methods and mobile malware.

An advanced look at cloud and virtualization security concepts. Instruction and coursework will examine issues related to the different cloud service models, including securing images in a public cloud environment. You’ll also learn common hypervisor security tools and techniques, as well as potential threats and attacks.

An exploration of advanced techniques for network defense. Topics of focus include intrusion detection systems, intrusion prevention systems, firewalls, virtual private networks, and defense tool design and integration.

Learning Outcomes

Students earning the Bachelor of Science in Cybersecurity degree with a Computer Network Defense specialization will learn to:

  • Demonstrate the ability to set up, implement, and assess the cybersecurity status of a computer system
  • Apply security controls affecting a virtualized computing environment, a wireless network, and an operating system
  • Analyze a system problem and design cybersecurity measures appropriate to its solution
  • Apply best practice concepts in cybersecurity management to enterprise processes
  • Describe the ethical challenges that confront a cybersecurity professional
  • Apply security control principles in the construction of cybersecurity solutions
  • Demonstrate the written and oral communication skills expected of a cybersecurity professional
  • Securely administer a Windows and Linux system using security automation tools and techniques
  • Demonstrate the fundamental concepts of operating systems, networks, and cloud computing
Program Disclosure

Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.

Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.

NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.

All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.

National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.