Bachelor of Science in Cybersecurity Degree

Bachelor of Science in Cybersecurity

Offered By: College of Engineering and Technology

What Is a Bachelor of Science in Cybersecurity?

Grand Canyon University’s Bachelor of Science in Cybersecurity degree program was developed with industry guidance to produce highly skilled, well-equipped cybersecurity professionals. As an increasing number of cyberattacks and information security threats hit our nation, expert cybersecurity professionals are needed by government agencies, small businesses, financial services and institutions and companies in a wide range of industries that handle private data.1

This on-campus or online program cybersecurity degree program responds to this strong industry need by:

  • Exposing students to training and curriculum designed to prepare them for practical situations
  • Instructing students to prevent data breaches, protect against various types of cybercrime and address vulnerabilities
  • Revealing the importance of adapting quickly to changing technology and industry standards
  • Instilling an attitude of continual learning in a fast-evolving digital field

Students will be taught to defend digital spaces, computer environments, networks and sensitive information from malicious software developers and hackers. This cybersecurity bachelor’s degree program teaches and assesses competency in all aspects of defensive cybersecurity, cyber law and cyber ethics.

Get More Information

Loading Form

Areas of study include:

  • Information assurance foundations
  • Digital forensic investigations
  • Malware reverse engineering
  • Wireless security
  • Security architecture design
  • Security frameworks
  • Secure system administration

If you are looking to position yourself for possible career advancement in the IT industry or considering a career change in this field, this degree may be right for you. The cybersecurity bachelor’s degree emphasizes critical thinking, field-based application and practical project management experience. Students further study valuable workplace skills, such as effective communication, teamwork, initiative, strong work ethic, analytical skills, adaptability and self-confidence. GCU’s Christian worldview is also integrated in the program, so students can learn professional and ethical practices associated with cybersecurity.

This bachelor’s degree in cybersecurity at GCU has been designated by the National Center of Academic Excellence in Cyber Defense (NCAE-CD) program. This recognition highlights GCU's commitment to enhancing cyberdefense education and empowering cybersecurity professionals with the expertise to address vulnerabilities effectively.

Explore GCU's accreditation page for additional details on this program and the university's accredited status.

How Long Does It Take to Get a Cybersecurity Bachelor’s Degree?

The BS in Cybersecurity degree requires a total of 120 credits for completion. Most of the classes are 15 weeks in length. If you are participating in the online cybersecurity degree program, the courses are generally seven weeks long. Fill out the form on this page to speak to a university counselor to better understand how long it takes to earn your degree.

On-Campus or Online Cybersecurity Degree Requirements

It is recommended that all students wanting to pursue an on-campus or online cybersecurity degree take ENG-107: Introduction to Writing for the Sciences as a general education course. Some courses in this degree require technical writing and this course supports students with the ability to transfer knowledge of writing across multiple scientific disciplines.

BS in Cybersecurity degree students will be required to have computer operating systems of Windows 10 of better, or the latest Apple OS X operating system, either with at least 16GB of RAM. There are other software costs and required user licenses for certain courses. Please see the University Policy Handbook for a list of the course requirements.

To begin earning your cybersecurity bachelor’s degree, apply to the College of Engineering and Technology by selecting "Request Info" or "Apply Now" at the top of the page. Program applicants will follow the standard application process. Undergraduate Campus and Online Admission Requirements provides more information on degree program requirements and qualifications.

What You Will Be Taught in GCU’s Cybersecurity Bachelor’s Degree Program

  • Platform and Network Technologies
  • Cyberlaw and Privacy in a Digital Age
  • Cybersecurity and Ethical Hacking
  • Cyber Forensic Investigations
  • IT Business Case Planning for Global Enterprise
  • Security Driven Systems Administration
  • Analysis, Design and Management of Secure Corporate Networks

Students will have the opportunity to implement and present a field-based applied research and design project as part of their IT Project course.

Careers With a Bachelor of Science in Cybersecurity Degree

Working in cyber intelligence can be a highly valued, lucrative career with room for potential advancement. A few potential occupations in the field include:

  • Computer and information systems manager
  • Information security analyst
  • Computer network support specialist and architect
  • Network and computer systems administrator
  • Computer systems analysts
  • Computer and information research scientist

To elevate credentials and deepen the experience, BS in Cybersecurity graduates can earn a Master of Science in Cybersecurity from GCU, as well as explore vendor training and professional certifications. These additional credentials help professionals stay ahead of emerging threats, as well as stay updated on current attack vectors, incoming trends and new technologies and techniques.

National Security Agency (NSA) Accreditation

This bachelor’s degree in cybersecurity at GCU holds accreditation from the National Center of Academic Excellence in Cyber Defense (NCAE-CD) program. This recognition highlights GCU's commitment to enhancing cyberdefense education and empowering cybersecurity professionals with the expertise to address vulnerabilities effectively. For further details, please visit our College of Engineering and Technology accreditation page.

BS in Cybersecurity Degree FAQs

A Bachelor of Science in Cybersecurity can be well worth the investment. Similar to cybersecurity roles, information security analysts job growth is projected to grow by an estimated 32% from 2022 to 2032, according to the U.S. Bureau of Labor Statistics.2

A successful cybersecurity student is imaginative, curious and creative. If you figure things out quickly, show motivation to learn, use your skepticism to think like a hacker and are open to new ideas, a BS in Cybersecurity degree is no harder than any other computer information degree. Technology enthusiasts may find that their prior skills come in handy when completing the program as well.

As cybersecurity threats show no sign of slowing down and continue to affect both large and small companies, the stressors placed on cybersecurity bachelor’s degree graduates is high.3 However, if you enjoy the challenge of solving puzzles and seek to advance the defense against cyberattacks, then a cybersecurity job may be a great choice.

Cybersecurity has become a critical component of any modern business. With security breaches making headlines on a regular basis, it’s clear that organizations need more professionals focused on security. The U.S. Bureau of Labor Statistics states that, “about 16,800 openings for information security analysts are projected each year, on average, over the decade” (from 2022 to 2032). Many of those openings are expected to result from the need to replace workers who transfer to different occupations or exit the labor force, such as to retire.2

Cybersecurity is a large industry with potential for much faster than average growth in the coming years.4 While there are many roles to choose from within the industry, most cybersecurity roles pay very well because of the industry’s importance to our society. According to the U.S. Bureau of Labor Statistics, information security analysts have a median annual wage of $120,360 as of May 2023.4

1 Filipkowski, Ben (2023, March 24). What is the future of cybersecurity? Field Effect. Retrieved on July 20, 2023.

COVID-19 has adversely affected the global economy and data from 2020 and 2023 may be atypical compared to prior years. Accordingly, data shown is effective September 2023, which can be found here: U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Information Security Analysts, retrieved on May 3, 2024.

Boehm, J., Dias, D., Lewis, C., Kathleen, L. and Wallace, D. (2022, March 10). Cybersecurity trends: Looking over the horizon. McKinsey & Company. Retrieved on May 14, 2024.

The earnings referenced were reported by the U.S. Bureau of Labor Statistics (BLS) Information Security Analysts, as of May 2023, retrieved on May 3, 2024. Due to COVID-19, data from 2020 to 2023 may be atypical compared to prior years. BLS calculates the median using salaries of workers nationwide with varying levels of education and experience. It does not reflect the earnings of GCU graduates as information security analysts, nor does it reflect the earnings of workers in one city or region of the country or a typical entry-level salary. Median income is the statistical midpoint for the range of salaries in a specific occupation. It represents what you would earn if you were paid more money than half the workers in an occupation, and less than half the workers in an occupation. It may give you a basis to estimate what you might earn at some point if you enter this career. Grand Canyon University can make no guarantees on individual graduates’ salaries. Your employability will be determined by numerous factors over which GCU has no control, such as the employer the graduate chooses to apply to, the graduate’s experience level, individual characteristics, skills, etc. against a pool of candidates.

Total Credits: 120
Campus: 15 weeks
[More Info]
Online: 7 weeks
[More Info]
Up to 90 credits, only 84 can be lower division
Campus: $8,250 per semester
[Tuition, Fees and Financial Aid]

Online: $485 per credit
[Tuition, Fees and Financial Aid]

Cost of Attendance

Course List

General Education Requirements:
34-40 credits
80 credits
Open Elective Credits:
0-6 credits
Degree Requirements:
120 credits

General Education Requirements

General Education coursework prepares Grand Canyon University graduates to think critically, communicate clearly, live responsibly in a diverse world, and thoughtfully integrate their faith and ethical convictions into all dimensions of life. These competencies, essential to an effective and satisfying life, are outlined in the General Education Learner Outcomes. General Education courses embody the breadth of human understanding and creativity contained in the liberal arts and sciences tradition. Students take an array of foundational knowledge courses that promote expanded knowledge, insight, and the outcomes identified in the University's General Education Competencies. The knowledge and skills students acquire through these courses serve as a foundation for successful careers and lifelong journeys of growing understanding and wisdom.


Upon completion of the Grand Canyon University's University Foundation experience, students will be able to demonstrate competency in the areas of academic skills and self-leadership. They will be able to articulate the range of resources available to assist them, explore career options related to their area of study, and have knowledge of Grand Canyon's community. Students will be able to demonstrate foundational academic success skills, explore GCU resources (CLA, Library, Career Center, ADA office, etc), articulate strategies of self-leadership and management and recognize opportunities to engage in the GCU community.

Course Options

  • UNV-103, University Success: 4
  • UNV-303, University Success: 4
  • UNV-108, University Success in the College of Education: 4


Graduates of Grand Canyon University will be able to construct rhetorically effective communications appropriate to diverse audiences, purposes, and occasions (English composition, communication, critical reading, foreign language, sign language, etc.). Students are required to take 3 credits of English grammar or composition.

Course Options

  • UNV-104, 21st Century Skills: Communication and Information Literacy: 4
  • ENG-105, English Composition I: 4
  • ENG-106, English Composition II: 4


Graduates of Grand Canyon University will be able to express aspects of Christian heritage and worldview. Students are required to take CWV-101/CWV-301.

Course Options

  • CWV-101, Christian Worldview: 4
  • CWV-301, Christian Worldview: 4


Graduates of Grand Canyon University will be able to use various analytic and problem-solving skills to examine, evaluate, and/or challenge ideas and arguments (mathematics, biology, chemistry, physics, geology, astronomy, physical geography, ecology, economics, theology, logic, philosophy, technology, statistics, accounting, etc.). Students are required to take 3 credits of intermediate algebra or higher.

Course Options

  • MAT-154, Applications of College Algebra: 4
  • MAT-144, College Mathematics: 4
  • PHI-105, 21st Century Skills: Critical Thinking and Problem Solving: 4
  • BIO-220, Environmental Science: 4


Graduates of Grand Canyon University will be able to demonstrate awareness and appreciation of and empathy for differences in arts and culture, values, experiences, historical perspectives, and other aspects of life (psychology, sociology, government, Christian studies, Bible, geography, anthropology, economics, political science, child and family studies, law, ethics, cross-cultural studies, history, art, music, dance, theater, applied arts, literature, health, etc.). If the predefined course is a part of the major, students need to take an additional course.

Course Options

  • HIS-144, U.S. History Themes: 4
  • PSY-102, General Psychology: 4
  • SOC-100, Everyday Sociology: 4

Required General Education Courses

Course Description

This course covers an analysis of Cyber warfare in the 21st Century and beyond. Cyberspace is a complex environment that controls every aspect of a country’s Economy, Communication, and Infrastructure. This course will examine cyber warfare from a case-study perspective, applying the battlespace doctrine developed by military cyber operations teams. At the conclusion of this course students will have a fundamental understanding of the cyberspace threatscape, ethical challenges, and be able to strategize and implement cyber warfare operations. Prerequisite: ITT-340 or SWE-310.

Core Courses

Course Description

This course provides a foundation for programming and problem solving using computer programming, as well as an introduction to the academic discipline of IT. Topics include variables, expressions, functions, control structures, and pervasive IT themes: IT history, organizational issues, and relationship of IT to other computing disciplines. The course prepares students for advanced concepts and techniques in programming and information technology, including object-oriented design, data structures, computer systems, and networks. The laboratory reinforces and expands learning of principles introduced in the lecture. Hands-on activities focus on writing code that implements concepts discussed in lecture and on gaining initial exposure to common operating systems, enterprise architectures, and tools commonly used by IT professionals. Prerequisite: MAT-154 or MAT-261.

Course Description

This course exposes students to the fundamentals of networks and networking in IT. It then builds deeper understanding of how networks work, including the topics of LANs, WANs, service providers, packets, hubs, routers, switches, and internet protocols. The laboratory reinforces and expands learning of principles introduced in the lecture. Hands-on activities focus on setting up and configuring local and enterprise networks, experimenting with various topologies, and scalability planning with routers and switches.

Course Description

This in an introductory course in algorithm analysis with applications in discrete mathematics. Topics covered include complexity analysis, finite logic, Boolean algebra, sets, functions, counting, finite state machines, automata, regular expressions, and cryptography. Learners will determine how variability affects outcomes and assess the suitability of an algorithm to solve a given problem. Practicum/field experience hours: None. Algorithms and Discrete Mathematics for Cybersecurity. Prerequisites: MAT-154 and CST-111 or ITT-111.

Course Description

In this course students acquire the ability to install, configure, operate, and troubleshoot medium sized routed and switched networks. Students gain the knowledge and skills to make connections to remote sites via a WAN, and mitigate basic security threats. Prerequisite: ITT-116.

Course Description

Students will be introduced to a high level programming language, within a common desktop environment, in the context of IT and Cybersecurity. Students will utilize development tools, programming language syntax, control constructs, loops and decision making, user defined functions, pointers, and memory management. Prerequisite: MAT-154.

Course Description

The Internet Age has introduced myriad legal challenges on a global level. Students will explore the emerging specialty within law that is cyber law. Topics will expose the reality that our legal system has evolved in a physical and visual world, but cyber space is largely invisible and virtual. Students will learn that past legal decisions or legal precedence has been important in our system and reasoning by analogy has been used extensively. In many cases the laws applied in the physical realm do not translate equally well into cyber space. This course will discuss the importance of this area introduce legal issues that need to be addressed.

Course Description

This course introduces students to system administration and maintenance as well as platform technologies. The course surveys operating systems, applications, administrative activities and domains, computer architecture and organization, and computing infrastructures. The laboratory reinforces and expands learning of principles introduced in the lecture. Hands-on activities focus on developing practical skills in configuring computer systems, deploying enterprise applications, managing user permissions, and remote administration. Prerequisite: ITT-116.

Course Description

This course builds upon knowledge already acquired in the areas of system architecture and operating systems and focuses on the core issues of information security. Students learn fundamental concepts of information security including data encryption, security awareness, legal and ethical issues, operational issues, security policies, and attack types; while expanding on the coverage to include security domains, forensics, security services, threat analysis, and vulnerabilities assessments. Prerequisite: ITT-120, or ITT-121 or CST-125 or CST-126 or CST-220 or CST-221.

Course Description

This course is an introduction to assembly language programming. Assembly language topics may include machine representation of data, fixed and floating point, and decimal arithmetic, address modification, bit manipulation, and subroutine linkage. Practicum/field experience hours: None. Low Level Programming. Prerequisite: ITT-310.

Course Description

This course covers advanced topics in networking with an emphasis on securing wireless and IP networks. Students analyze algorithms and protocols, improve existing solutions, and evaluate existing solutions using theoretical analysis and simulations. Students become familiar with modern networking architectures. Prerequisite: ITT-270.

Course Description

This course provides an insight into professional communications and conduct associated with careers in science, engineering and technology. Students learn about the changing modes of communication in these disciplines recognizing the advances in digital communications. They gain practical experience developing and supporting a thesis or position through written, oral, and visual presentations prepared and delivered individually and in groups. Students will explore concepts and issues in professional ethics and conduct such as privacy, discrimination, workplace etiquette, cyber-ethics, network and data security, identity theft, ownership rights and intellectual property. This is a writing intensive course.

Course Description

In this course students will explore the world of malware through meticulous analysis and binary reverse engineering techniques. This is a skill-based course with hands on labs that focus on both static and dynamic malicious code analysis. Upon successful completion of this course, students will be able to apply the tools and methodologies to safely perform analysis on common malware samples in a control environment. Practicum/field experience hours: None. Malware Analysis. Prerequisite: ITT-310 & ITT-307.

Course Description

This course covers mathematical models for computer security. It analyzes and compares the properties of various models for hardware, software, and database security. The course examines how system designs, network protocols, and software engineering practices can result in vulnerabilities. Students learn to design, evaluate, ethically hack, and implement adequate security measures that can safeguard sensitive information. Prerequisite: ITT-307.

Course Description

Information Assurance is explored from the perspective of frameworks and technical compliance. Students will be exposed to the idea that proper understanding of, and implementation of frameworks and compliance has recently become a requirement for many security careers. Students will perform in-depth analysis of the needs of the system juxtaposed against the requirement to comply with a mandated framework. Practicum/field experience hours: None. Information Assurance. Prerequisite: ITT-307.

Course Description

This course explores how end users can pose a threat to the security of an organization by falling victim to even simple traps. Students will learn that human manipulation creates a whole school of cybercrime opportunities such as phishing, “watering hole attacks” and other social engineering tactics. These threats are directed to the human psyche - not sophisticated malware or technical vulnerabilities, but rather the psychology and behavior of people. Students will see that a malicious actor – or “hacker” - need not be involved; an uneducated or careless employee or an unwieldly procedure can result in sensitive information leaking and potentially falling into the hands of an attacker. Prerequisite: ITT-307.

Course Description

This course covers the processes and goals of cyber forensics investigations. Hands-on activities include using multiple reporting systems to initiate and provide on-going support for information security investigations relating to data privacy, incident management, data loss prevention, and digital forensics. Prerequisite: ITT-307.

Course Description

This course covers the design, management, and maintenance of virtual enterprise and datacenter infrastructure. Students learn to use appropriate tools such as request tracking, monitoring, configuration management, virtualization, and scripting to administer and defend systems using documented, repeatable processes. Emphasis will be placed on volume management, directory services, and network-based authentication and file systems. Students develop automatic procedures for installations and file distribution. Prerequisites: MAT-154 and ITT-307.

Course Description

This course prepares students to plan and implement IT systems that take into account business realities, objectives, and constraints associated with domestic and international business activities. The course exposes the key computational, analytical, and decision-making tools used by businesses. Students also develop an understanding of the social, cultural drivers of successful IT investments, and their effect on business strategy and models. A special emphasis is placed on the symbiotic relationship between information technology and business and on international case studies, as manifested in information pricing, technological lock-in and network effects. Prerequisite: CST-326 or BIT-415 or CYB-220.

Course Description

This course provides students the opportunity to work in teams to tackle real world applied research and design projects in their chosen area of interest. Students develop a project proposal, conduct a feasibility study, learn to protect intellectual property, develop teamwork skills, budgets, and a schedule for completing the project. Students conduct extensive research, integrate information from multiple sources, and work with a mentor through multiple cycles of feedback and revisions. Students implement and present the applied research project. Students use this course to further develop technical writing and business presentation skills. This is a writing intensive course. Prerequisite: ITT-415 or ITT-430.

Course Description

This course covers strategies and plans for development and operation of the Security Operations Center (SOC). Students gain the knowledge and skills to use technologies to detect and prevent network intrusion and implement cybersecurity countermeasures. Prerequisites: ITT-340 and ITT-375.


GCU Campus Student

Join Grand Canyon University’s vibrant and growing campus community, with daytime classes designed for traditional students. Immerse yourself in a full undergraduate experience, complete with curriculum designed within the context of our Christian worldview.

GCU Online Student

Pursue a next-generation education with an online degree from Grand Canyon University. Earn your degree with convenience and flexibility with online courses that let you study anytime, anywhere.

* Please note that this list may contain programs and courses not presently offered, as availability may vary depending on class size, enrollment and other contributing factors. If you are interested in a program or course listed herein please first contact your University Counselor for the most current information regarding availability.

* Please refer to the Academic Catalog for more information. Programs or courses subject to change.