Balkis N. — Class of 2019

Bachelor of Science in
Cybersecurity (BSCYB),
Digital Forensics

computer icon

4-week
COURSES

calendar icon

Year-round
enrollment

graduation cap icon

220K+ Alumni Worldwide

Overview

The Bachelor of Science in Cybersecurity (BSCYB) program prepares those who wish to meet the increasing demand for cybersecurity professionals in nearly all modern organizations. The coursework provides you with an understanding of basic information technology management concepts, fundamental security skills, and the legal and ethical issues associated with cybersecurity. The Digital Forensics specialization provides a greater focus on investigation and analysis of computer systems and networks. Upon completing this program, you’ll be prepared to work in positions such as security analyst, computer network defender, and computer incident responder.

Course Details

Foundation Technologies Courses

For the Bachelor of Science in Cybersecurity degree with a specialization in Digital Forensics, you must complete six foundational courses, a core sequence of five courses, a second core sequence of six courses, three project courses, and four specialization courses.

Course Name

An introduction to basic network concepts, including local area networks, network security, wireless networks, wide area networks, and secure router configurations.

This course introduces the basic architecture and functions of an operating system. You’ll explore computer hardware, software integration, design and functionality of Windows and Linux operating systems, and core aspects of operating system security.

An introductory survey of cybersecurity fundamentals. This course covers the concepts of confidentiality, integrity, availability, cybersecurity policy, and the ethical and legal aspects of cybersecurity.

This course explores the foundational concepts and guidelines for protecting data in transit and at rest. You’ll learn the technical aspects of implementing encryption, authentication, access control, and the development and implementation of associated policies.

An introduction to the fundamental concepts of cloud computing and virtualization. This course examines core cloud deployment and service models, compares public and private cloud deployments, and explores the concepts of DevOps and continuous integration.

This course introduces the principles of programming for cybersecurity professionals. Instruction and coursework will survey a variety of program tools, including PowerShell, Python, and scripting to implement system security.

First Core Sequence

Course Name

In this course, you’ll learn and practice the writing skills necessary to create clear and concise technical documents. You’ll explore project planning and project management concepts, and how to explain technical topics to non-technical leadership.

This course covers the secure administration of Linux-based systems. You’ll learn to implement and assess standards-based security measures on Linux operating systems. Automated implementation and assessment of security measures will be a core component of the class, with legal and ethical aspects of system administration also a key topic of study.

An introduction to the secure administration of Windows-based desktop and server systems. You’ll learn to implement and assess standards-based security measures on Windows-based operating systems. Topics of focus include automating the implementation and assessment of security measures, as well as the legal and ethical aspects of system administration.

This course builds on the CYB 216 class, covering advanced skills in security automation. Topics of study include: managing security-related code in a software repository, writing integrated scripts to implement and assess system security, and using DevOps automation tools to securely manage infrastructure.

An examination of system architecture design and development to meet cybersecurity requirements. Instruction and coursework will examine methods to translate technology and environmental conditions (e.g., law and regulation) into system and security design.

Second Core Course Listings

Course Name

An examination of the various tools and frameworks used to conduct a system/network security audit and assessment. You’ll explore various IT audit frameworks, including government and non-government, and the legal and ethical aspects of IT auditing.

An exploration of the tools and techniques used to collect and analyze cyber threat information. Coursework will focus on the collection and analysis of log data, threat intelligence data, and indicators of compromise (IOCs) to detect malicious activity.

An introduction to the tools and methods of incident response. Topics of focus include: preparation for data collection, incident analysis, preserving and recovering data, and the legal and ethical aspects of incident response.

This course examines common, ethical hacking methods along with hands-on application of security tools to test network and systems security. Instruction will focus on the planning, execution, and legal and ethical aspects of penetration testing.

A detailed examination of network defense concepts and the various tools for protecting and monitoring networks. You’ll learn to implement an intrusion detection system, conduct network-monitoring traffic analysis, utilize honeypots, and develop associated network policy.

This course explores the development of cybersecurity policy that meets an organization’s compliance requirements and business goals. Coursework focuses on creating a cost-benefit analysis while developing organizational policy and system requirements.

Second Core Course Listings

Course Name

This capstone project focuses on applying the cybersecurity knowledge and concepts learned in this program. You’ll work as an individual or as part of a team to complete a practical or research-related cybersecurity project. Grading is H, S, or U only.

Part II of this program capstone picks up from the CYB 499A course and continues the application of knowledge in your selected topic. Grading is H, S, or U only.

The final step in this program capstone, this course continues from CYB 499B and will complete your application of knowledge to a selected cybersecurity topic. You’ll present your project findings to a panel of academic and business professionals. Grading is H, S or U only.

Specialization Courses

Course Name

An exploration of computer forensics fundamentals. Topics of focus include: admissibility of electronic evidence, preparing for e-evidence collection, conducting digital forensic examinations of computers, and the legal and ethical requirements of digital investigations.

An overview of how to collect digital evidence from Windows, Linux, and Mac operating systems. Instruction and coursework explore specific tools and techniques for collecting file information, log information, data artifacts, web history, and computer memory.

This course examines the tools and techniques for collecting and analyzing network data in a digital investigation. You’ll gain practical experience at analyzing network traffic captures, correlating data from other sources, and evaluating the legal and ethical requirements of network forensics investigations.

A study of how to collect and analyze digital evidence from mobile devices. You’ll learn the tools and techniques unique to mobile device forensics, including acquisition, physical isolation, SIM cards, file system recovery, and extraction of geolocation and other cellular data.

Learning Outcomes

Students earning the Bachelor of Science in Cybersecurity degree with a Digital Forensics specialization will learn to:

  • Conduct a digital forensics investigation on a server or workstation using commonly accepted standards and tools
  • Demonstrate the ability to preserve digital evidence using federal rules
  • Conduct a digital forensics investigation on a mobile device using commonly accepted standards and tools
  • Examine digital evidence for indications of illegal malicious activity or malfeasance
  • Analyze a system problem and design cybersecurity measures appropriate to its solution
  • Apply best practice concepts in cybersecurity management to enterprise processes
  • Describe the ethical challenges that confront a cybersecurity professional
  • Apply security control principles in the construction of cybersecurity solutions
  • Demonstrate the written and oral communication skills expected of a cybersecurity professional
  • Securely administer a Windows and Linux system using security automation tools and techniques
  • Demonstrate the fundamental concepts of operating systems, networks, and cloud computing
Program Disclosure

Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.

Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.

NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.

All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.

National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.