Bachelor of ScienceCybersecurity Operations and Management (Online)
The Cybersecurity Operations and Management Bachelor of Science degree program prepares students to become cybersecurity leaders in defending organizations against increasingly more sophisticated cyber threats.
Students learn to secure IT environments and infrastructure, design secure programs, lead forensic investigations across an organization, and manage cyber risks.
The program was developed with national leaders and incorporates the most current thinking and curriculum in cybersecurity. This innovative program positions cybersecurity graduates to immediately step into cybersecurity roles within the private and public sector. The program is multi-disciplinary and integrates computer science and engineering, math, legal, and cyber-management courses.
It is further designed to align with the National Initiative for Cybersecurity Education (NICE) framework which is a partnership between government, private sector, and academia and is focused on education, training, and workforce development, and is led by the National Institute of Standards and Technology (NIST). Courses are also aligned with the National Security Agency’s (NSA) and the Department of Homeland Security’s Center of Academic Excellence (CAE) criteria.
The program allows students to pursue the concentration best suited to their aptitude – this includes an option for a cyber management and leadership track or a cyber operations management track. It also includes extensive hands-on requirements in which you participate in applied and research-based projects, internships, and/or an occupational practicum to gain real-world experience.
The demand in cybersecurity is high. Graduates of the program are prepared for careers in a wide-range of roles. These include: Director of Information Security, Information System Security Officer (ISSO), Cybersecurity Architect, Director/Manager of Governance, Risk, and Compliance, and Risk Manager/Analyst.
Graduates of the Cybersecurity Operations and Management program can:
- Understand modern digital infrastructures and information technology systems;
- Apply risk analysis techniques, skills, and tools necessary for best practice cybersecurity operations;
- Apply critical reasoning techniques to analyze a problem or threat response, and identify and define the business-oriented cybersecurity computing requirements;
- Design, implement and evaluate a secure computer-based system, process, component or program to meet cybersecurity needs;
- Conduct cybersecurity forensic investigations;
- Develop synergy with information technology teams to accomplish business or organizational goals; and,
- Communicate effectively with a wide range of information technology users and business leadership.=
- Cyber Management and Leadership
- Cyber Operations Management
The following 11 courses comprise the required core courses of the Cybersecurity Operations and Management program. The credit value of each course appears in parentheses ( ).
This course provides students with basic concepts of cybersecurity fundamentals. Students receive a basic awareness of threats to information systems, vulnerabilities inherent to modern architectures and the options available to mitigate threats within a system.
This course provides students with an understanding of information security policy and how to apply industry and government best practice rules and guidelines. Students begin to create, implement, and institutionalize organization policies that ensure legal, ethical, privacy and compliance standards which are supported. The course compares and contrasts the role of government versus commercial security, to include funding, culture, stakeholders, and classified information protections.
This course introduces the concepts and techniques of computer programming. Emphasis is placed on developing the student’s ability to apply problem-solving strategies to design algorithms and to implement these algorithms in a modern, structured programming language. Topics include fundamental programming constructs, problem solving techniques, simple data structures, Object-Oriented Programming (OOP), program structure, data types and declarations, control statements, algorithm strategies and algorithm development.
Relating to people, process and technology this course provides students the methods to think through and solve complex global cybersecurity problems. Students are introduced to specific methodologies regarding systems engineering and processes, such as Shewhart cycle, OODA loop, and RPR diagnosis as they apply to networks and cybersecurity.
The student is provided with analytical tools to understand and synthesize the most current applications of theories and concepts in business management and is exposed to the debate on the dynamic of busniess environment, evolving business models, economic systems, and scale of domestic and global competition in the market place.
This course provides students with a basic awareness of the options available to understand and mitigate threats within a system. It demonstrates the methodologies used by threat actors to exploit systems and how cyber security professionals can architect more secure systems that support business imperatives, while mitigating cyber risks. An overview of applications, networks, mobile devices, wireless security, and tool categories such as firewall, SIEM, and vulnerability management tools are discussed.
This course provides students with a basic awareness for building defense in depth architectures and security controls into an organization’s technology processes, workforce considerations and network architectures. As part of this course, students gain a preliminary understanding of cryptography and concepts such as authentication.
This course provides students with foundational knowledge in secure networking concepts, technology, and administration. Network security is an essential requirement in building a secure resilient infrastructure. Students learn technical and administrative components of secure networks, how to apply secure design principles to configure network resources (routers, switches, firewalls, IPSes) and how to securely administer the network. Threats to network security are examined and security controls are designed to appropriately mitigate risks. Network and system administration policies and procedures are examined.
This course is a foundation for database design and database security courses. Systems Analysis and Design is a fundamental, active field in which analysts continually learn new techniques and approaches to develop systems more effectively and efficiently. There is a core set of skills that all analysts need to know no matter what approach or methodology is used. All information systems projects move through the four phases of planning, analysis, design, and implementation; all projects require analysts to gather requirements, model the business needs, and create blueprints for how the systems should be built; and all projects require an understanding of organizational behavior concepts like change managememnt and team building. This course captures the dynamic aspects of the field by keeping the student focused on doing Systems Analysis and Design while presenting the core set of skills that the analysts needs to know.
This course provides students with the design fundamentals of the compliance and management governing of the deployment of cloud services. The technologies and services that enable cloud computing, different types of cloud computing models and the security and legal issues associated with cloud computing are covered.
This course provides an overview of database security concepts and techniques and discusses new directions of database security. Topics covered include database application security models, database and data auditing, XML access control, trust management and privacy protection, encryption methods, virtual private databases, risk assessment and mitigation, vulnerability scanning and user access control. The focus is on the key components of information assurance as it relates to database systems – confidentiality, integrity, and availability, and how these components can be managed and measured. Students conduct security assessments and audits of an existing database.
Cybersecurity Summit 2021
Experts expose solutions to mitigate cyberattacks Phishing is one of the most common methods hackers use to steal information. Artificial…
Registration opens for Shred the System: Driving the Crypto & Blockchain Revolution conference
Cryptocurrency. Bitcoin. Blockchain. Three strange words that strike fear in the hearts of old-schoolers — and joy in the hearts…
Risks with Facebook Encryption
Facebook is jumping on the privacy bandwagon and working to add end-to-end encryption to its Messenger app, but experts say…
Your personal computer could be targeted with ransomware
Several multi-million-dollar ransomware attacks may have you thinking that only big corporations are targeted with this digital weapon, but you…
Are smart devices getting hacked more often?
For millions of Americans, a new hack comprising Peloton bikes means users have something new to worry about. Harrisburg University…
Cybersecurity should be a huge priority
Password leaks and ransomware attacks were the topic of a recent WITF Smart Talk featuring Harrisburg University faculty members Terrill…
Take the Next Step
Get More Information
Questions about our programs? Reach out to a member of our team and get personalized answers.
Create an account and start your free online application to Harrisburg University today.