Bachelor of Science in Cybersecurity Degree
What Is a Bachelor of Science in Cybersecurity?
Grand Canyon University’s (GCU) Bachelor of Science in Cybersecurity degree program was developed with industry guidance to produce highly skilled, well-equipped cybersecurity professionals. As an increasing number of cyberattacks and information security threats hit our nation, expert cybersecurity professionals are in significant demand by government agencies, defense firms, financial services and companies in a wide range of industries that handle private data.
This on-campus or online program cybersecurity degree program responds to this strong industry demand by:
- Exposing students to training and curriculum designed to prepare them for real-world situations
- Instructing students to prevent data breaches, protect against various types of cybercrime and address vulnerabilities
- Revealing the importance of adapting quickly to changing technology and industry standards
- Instilling an attitude of continual learning in a fast-evolving digital field
Students will gain knowledge in defending digital spaces, computer environments, networks and sensitive information from malicious software developers and hackers. This cybersecurity bachelor’s degree program teaches and assesses competency in all aspects of defensive cybersecurity, cyber law and cyber ethics.
Loading Form
Areas of study include:
- Information assurance foundations
- Digital forensic investigations
- Malware reverse engineering
- Wireless security
- Security architecture design
- Security frameworks
- Secure system administration
If you are looking to advance your career in the IT industry or considering a career change in this field, this degree may be right for you. The cybersecurity bachelor’s degree emphasizes critical thinking, real-world application and practical project management experience. Students further develop valuable workplace skills, such as effective communication, teamwork, initiative, strong work ethic, analytical skills, adaptability and self-confidence. GCU’s Christian worldview is also integrated in the program, so students can learn professional and ethical practices associated with cybersecurity.
The Bachelor of Science in Cybersecurity is a technical degree that incorporates real-world, hands-on application of theoretical concepts. Students have opportunities to participate in cybersecurity competitions to get the necessary training to immediately pursue a high-stakes cybersecurity job.
How Long Does It Take to Get a Cybersecurity Bachelor’s Degree?
Students typically complete the program in four years; however, students may speak with their counselor about fast-track options to graduate earlier by taking summer classes on campus or online. GCU strives to support students in accelerating their time to completion, so they can enter their cybersecurity career or graduate school sooner.
On-Campus or Online Cybersecurity Degree Requirements
It is recommended that all students wanting to pursue an on-campus or online cybersecurity degree take ENG-107: Introduction to Writing for the Sciences as a general education course. Some courses in this degree require technical writing and this course supports students with the ability to transfer knowledge of writing across multiple scientific disciplines.
BS in Cybersecurity degree students will be required to have computer operating systems of Windows 10 of better, or the latest Apple OS X operating system, either with at least 16GB of RAM. There are other software costs and required user licenses for certain courses. Please see the University Policy Handbook for a list of the course requirements.
To begin earning your cybersecurity bachelor’s degree, apply to the College of Science, Engineering and Technology by selecting "Request Info" or "Apply Now" at the top of the page. Program applicants will follow the standard application process. Undergraduate Campus and Online Admission Requirements provides more information on degree program requirements and qualifications.
What You Will Learn in GCU’s Cybersecurity Bachelor’s Degree Program
- Platform and Network Technologies
- Cyberlaw and Privacy in a Digital Age
- Cybersecurity and Ethical Hacking
- Cyber Forensic Investigations
- IT Business Case Planning for Global Enterprise
- Security Driven Systems Administration
- Analysis, Design and Management of Secure Corporate Networks
Students will have the opportunity to implement and present a real-world applied research and design project as part of their IT Project course.
Careers With a Bachelor of Science in Cybersecurity Degree
Working in cyber intelligence is a highly valued, lucrative career with room for advancement. A few potential occupations in the field include:
- Computer and information systems manager
- Information security analyst
- Computer network support specialist and architect
- Network and computer systems administrator
- Computer systems analysts
- Computer and information research scientist
To elevate credentials and deepen the experience, BS in Cybersecurity graduates can earn a Master of Science in Cybersecurity from GCU, as well as explore vendor training and professional certifications. These additional credentials help professionals stay ahead of emerging threats, as well as stay updated on current attack vectors, incoming trends and new technologies and techniques.
BS in Cybersecurity Degree FAQs
Yes, a bachelor of science in cybersecurity is well worth the investment. A recent LinkedIn search for cybersecurity jobs resulted in more than 69,000 search results across the U.S., which puts graduates with a BS in Cybersecurity in high demand.1 If job security, high salaries, career growth and interesting ways to make a difference excite you, an online cybersecurity degree may be very useful to your long-term success.
A successful cybersecurity student is imaginative, curious and creative. If you figure things out quickly, show motivation to learn, use your skepticism to think like a hacker and are open to new ideas, a BS in Cybersecurity degree is no harder than any other computer information degree. Technology enthusiasts may find that their prior skills come in handy when completing the program as well.
As cybersecurity threats show no sign of slowing down and continue to affect both large and small companies, the demand and stressors placed on cybersecurity bachelor’s degree graduates is high.2 However, if you enjoy the challenge of solving puzzles and seek to advance the defense against cyberattacks then a cybersecurity job may be a rewarding career.
Cybersecurity has become a critical component of any modern business. With security breaches making headlines on a regular basis, it’s clear to everyone that organizations need more professionals focused on security. This is positive news for students interested in an online cybersecurity degree. As of September 2021, job growth for information security analysts is on track to grow by an estimated 33% from 2020 to 2030.2
Cybersecurity is a large industry with enormous potential for growth in the coming years. While there are many roles to choose from within the industry, most cybersecurity roles pay very well because of the industry’s importance to our society. According to the U.S. Bureau of Labor Statistics, information security analysts have a median annual wage of $103,590 as of May 2020.3
1Retrieved from LinkedIn in April 2022
2Retrieved from McKinsey & Company, Cybersecurity trends: Looking over the horizon, in July 2022
3COVID-19 has adversely affected the global economy and data from 2020 may be atypical compared to prior years. The pandemic may impact the predicted future workforce outcomes indicated by the U.S. Bureau of Labor Statistics as well. Accordingly, the data shown is based on September 2021, which can be found here: U.S. Bureau of Labor Statistics, Information Security Analysts, retrieved in April 2022.
4The earnings referenced were reported by the U.S. Bureau of Labor Statistics, Information Security Analysts as of May 2020. Due to COVID-19, data from 2020 may be atypical compared to prior years. The pandemic may also impact the predicted future workforce outcomes indicated by the BLS. BLS calculates the median using salaries of workers from across the country with varying levels of education and experience and does not reflect the earnings of GCU graduates as information security analysts. It does not reflect workers’ earnings in one city or region of the country. It also does not reflect a typical entry-level salary. The median income is the statistical midpoint for the range of salaries in a specific occupation. It represents what you would earn if you were paid more money than half the workers in an occupation and less than half the workers in an occupation. It may give you a basis to estimate what you might earn at some point if you enter this career. You may also wish to compare median salaries if you are considering more than one career path.
General Education Requirements
General Education coursework prepares Grand Canyon University graduates to think critically, communicate clearly, live responsibly in a diverse world, and thoughtfully integrate their faith and ethical convictions into all dimensions of life. These competencies, essential to an effective and satisfying life, are outlined in the General Education Learner Outcomes. General Education courses embody the breadth of human understanding and creativity contained in the liberal arts and sciences tradition. Students take an array of foundational knowledge courses that promote expanded knowledge, insight, and the outcomes identified in the University's General Education Competencies. The knowledge and skills students acquire through these courses serve as a foundation for successful careers and lifelong journeys of growing understanding and wisdom.
Requirements
Upon completion of the Grand Canyon University's University Foundation experience, students will be able to demonstrate competency in the areas of academic skills and self-leadership. They will be able to articulate the range of resources available to assist them, explore career options related to their area of study, and have knowledge of Grand Canyon's community. Students will be able to demonstrate foundational academic success skills, explore GCU resources (CLA, Library, Career Center, ADA office, etc), articulate strategies of self-leadership and management and recognize opportunities to engage in the GCU community.
Course Options
- UNV-112, Success in Science, Engineering and Technology & Lab: 4
- UNV-103, University Success: 4
- UNV-303, University Success: 4
- UNV-108, University Success in the College of Education: 4
Requirements
Graduates of Grand Canyon University will be able to construct rhetorically effective communications appropriate to diverse audiences, purposes, and occasions (English composition, communication, critical reading, foreign language, sign language, etc.). Students are required to take 3 credits of English grammar or composition.
Course Options
- UNV-104, 21st Century Skills: Communication and Information Literacy: 4
- ENG-105, English Composition I: 4
- ENG-106, English Composition II: 4
Requirements
Graduates of Grand Canyon University will be able to express aspects of Christian heritage and worldview. Students are required to take CWV-101/CWV-301.
Course Options
- CWV-101, Christian Worldview: 4
- CWV-301, Christian Worldview: 4
Requirements
Graduates of Grand Canyon University will be able to use various analytic and problem-solving skills to examine, evaluate, and/or challenge ideas and arguments (mathematics, biology, chemistry, physics, geology, astronomy, physical geography, ecology, economics, theology, logic, philosophy, technology, statistics, accounting, etc.). Students are required to take 3 credits of intermediate algebra or higher.
Course Options
- MAT-154, Applications of College Algebra: 4
- MAT-144, College Mathematics: 4
- PHI-105, 21st Century Skills: Critical Thinking and Problem Solving: 4
- BIO-220, Environmental Science: 4
Requirements
Graduates of Grand Canyon University will be able to demonstrate awareness and appreciation of and empathy for differences in arts and culture, values, experiences, historical perspectives, and other aspects of life (psychology, sociology, government, Christian studies, Bible, geography, anthropology, economics, political science, child and family studies, law, ethics, cross-cultural studies, history, art, music, dance, theater, applied arts, literature, health, etc.). If the predefined course is a part of the major, students need to take an additional course.
Course Options
- HIS-144, U.S. History Themes: 4
- PSY-102, General Psychology: 4
- SOC-100, Everyday Sociology: 4
Required General Education Courses
Course Description
This course covers an analysis of Cyber warfare in the 21st Century and beyond. Cyberspace is a complex environment that controls every aspect of a country’s Economy, Communication, and Infrastructure. This course will examine cyber warfare from a case-study perspective, applying the battlespace doctrine developed by military cyber operations teams. At the conclusion of this course students will have a fundamental understanding of the cyberspace threatscape, ethical challenges, and be able to strategize and implement cyber warfare operations. Prerequisite: ITT-340 or SWE-310.
Core Courses
Course Description
This course provides a foundation for programming and problem solving using computer programming, as well as an introduction to the academic discipline of IT. Topics include variables, expressions, functions, control structures, and pervasive IT themes: IT history, organizational issues, and relationship of IT to other computing disciplines. The course prepares students for advanced concepts and techniques in programming and information technology, including object-oriented design, data structures, computer systems, and networks. The laboratory reinforces and expands learning of principles introduced in the lecture. Hands-on activities focus on writing code that implements concepts discussed in lecture and on gaining initial exposure to common operating systems, enterprise architectures, and tools commonly used by IT professionals. Prerequisite: MAT-154 or MAT-261.
Course Description
This course exposes students to the fundamentals of networks and networking in IT. It then builds deeper understanding of how networks work, including the topics of LANs, WANs, service providers, packets, hubs, routers, switches, and Internet protocols. The laboratory reinforces and expands learning of principles introduced in the lecture. Hands-on activities focus on setting up and configuring local and enterprise networks, experimenting with various topologies, and scalability planning with routers and switches. Prerequisite: CST-111 or ITT-111 or CST-105 or acceptance into the bootcamp program.
Course Description
This in an introductory course in algorithm analysis with applications in discrete mathematics. Topics covered include complexity analysis, finite logic, Boolean algebra, sets, functions, counting, finite state machines, automata, regular expressions, and cryptography. Learners will determine how variability affects outcomes and assess the suitability of an algorithm to solve a given problem. Practicum/field experience hours: None. Algorithms and Discrete Mathematics for Cybersecurity. Prerequisites: MAT-154 and CST-111 or ITT-111.
Course Description
In this course students acquire the ability to install, configure, operate, and troubleshoot medium sized routed and switched networks. Students gain the knowledge and skills to make connections to remote sites via a WAN, and mitigate basic security threats. Prerequisite: ITT-116.
Course Description
Students will be introduced to a high level programming language, within a common desktop environment, in the context of IT and Cybersecurity. Students will utilize development tools, programming language syntax, control constructs, loops and decision making, user defined functions, pointers, and memory management. Prerequisite: MAT-154.
Course Description
The Internet Age has introduced myriad legal challenges on a global level. Students will explore the emerging specialty within law that is cyber law. Topics will expose the reality that our legal system has evolved in a physical and visual world, but cyber space is largely invisible and virtual. Students will learn that past legal decisions or legal precedence has been important in our system and reasoning by analogy has been used extensively. In many cases the laws applied in the physical realm do not translate equally well into cyber space. This course will discuss the importance of this area introduce legal issues that need to be addressed.
Course Description
This course introduces students to system administration and maintenance as well as platform technologies. The course surveys operating systems, applications, administrative activities and domains, computer architecture and organization, and computing infrastructures. The laboratory reinforces and expands learning of principles introduced in the lecture. Hands-on activities focus on developing practical skills in configuring computer systems, deploying enterprise applications, managing user permissions, and remote administration. Prerequisite: ITT-116.
Course Description
This course builds upon knowledge already acquired in the areas of system architecture and operating systems and focuses on the core issues of information security. Students learn fundamental concepts of information security including data encryption, security awareness, legal and ethical issues, operational issues, security policies, and attack types; while expanding on the coverage to include security domains, forensics, security services, threat analysis, and vulnerabilities assessments. Prerequisite: ITT-120, or ITT-121 or CST-125 or CST-126 or CST-220 or CST-221 or acceptance into the bootcamp program.
Course Description
This course is an introduction to assembly language programming. Assembly language topics may include machine representation of data, fixed and floating point, and decimal arithmetic, address modification, bit manipulation, and subroutine linkage. Practicum/field experience hours: None. Low Level Programming. Prerequisite: ITT-310.
Course Description
This course covers advanced topics in networking with an emphasis on securing wireless and IP networks. Students analyze algorithms and protocols, improve existing solutions, and evaluate existing solutions using theoretical analysis and simulations. Students become familiar with modern networking architectures. Prerequisite: ITT-270.
Course Description
This course provides an insight into professional communications and conduct associated with careers in science, engineering and technology. Students learn about the changing modes of communication in these disciplines recognizing the advances in digital communications. They gain practical experience developing and supporting a thesis or position through written, oral, and visual presentations prepared and delivered individually and in groups. Students will explore concepts and issues in professional ethics and conduct such as privacy, discrimination, workplace etiquette, cyber-ethics, network and data security, identity theft, ownership rights and intellectual property. This is a writing intensive course.
Course Description
In this course students will explore the world of malware through meticulous analysis and binary reverse engineering techniques. This is a skill-based course with hands on labs that focus on both static and dynamic malicious code analysis. Upon successful completion of this course, students will be able to apply the tools and methodologies to safely perform analysis on common malware samples in a control environment. Practicum/field experience hours: None. Malware Analysis. Prerequisite: ITT-310 & ITT-307.
Course Description
This course covers mathematical models for computer security. It analyzes and compares the properties of various models for hardware, software, and database security. The course examines how system designs, network protocols, and software engineering practices can result in vulnerabilities. Students learn to design, evaluate, ethically hack, and implement adequate security measures that can safeguard sensitive information. Prerequisite: ITT-307.
Course Description
Information Assurance is explored from the perspective of frameworks and technical compliance. Students will be exposed to the idea that proper understanding of, and implementation of frameworks and compliance has recently become a requirement for many security careers. Students will perform in-depth analysis of the needs of the system juxtaposed against the requirement to comply with a mandated framework. Practicum/field experience hours: None. Information Assurance. Prerequisite: ITT-307.
Course Description
This course explores how end users can pose a threat to the security of an organization by falling victim to even simple traps. Students will learn that human manipulation creates a whole school of cybercrime opportunities such as phishing, “watering hole attacks” and other social engineering tactics. These threats are directed to the human psyche - not sophisticated malware or technical vulnerabilities, but rather the psychology and behavior of people. Students will see that a malicious actor – or “hacker” - need not be involved; an uneducated or careless employee or an unwieldly procedure can result in sensitive information leaking and potentially falling into the hands of an attacker. Prerequisite: ITT-307.
Course Description
This course covers the processes and goals of cyber forensics investigations. Hands-on activities include using multiple reporting systems to initiate and provide on-going support for information security investigations relating to data privacy, incident management, data loss prevention, and digital forensics. Prerequisite: ITT-307.
Course Description
This course covers the design, management, and maintenance of virtual enterprise and datacenter infrastructure. Students learn to use appropriate tools such as request tracking, monitoring, configuration management, virtualization, and scripting to administer and defend systems using documented, repeatable processes. Emphasis will be placed on volume management, directory services, and network-based authentication and file systems. Students develop automatic procedures for installations and file distribution. Prerequisites: MAT-154 and ITT-307.
Course Description
This course prepares students to plan and implement IT systems that take into account business realities, objectives, and constraints associated with domestic and international business activities. The course exposes the key computational, analytical, and decision-making tools used by businesses. Students also develop an understanding of the social, cultural drivers of successful IT investments, and their effect on business strategy and models. A special emphasis is placed on the symbiotic relationship between information technology and business and on international case studies, as manifested in information pricing, technological lock-in and network effects. Prerequisite: CST-326 or BIT-415 or CYB-220.
Course Description
This course provides students the opportunity to work in teams to tackle real world applied research and design projects in their chosen area of interest. Students develop a project proposal, conduct a feasibility study, learn to protect intellectual property, develop teamwork skills, budgets, and a schedule for completing the project. Students conduct extensive research, integrate information from multiple sources, and work with a mentor through multiple cycles of feedback and revisions. Students implement and present the applied research project. Students use this course to further develop technical writing and business presentation skills. This is a writing intensive course. Prerequisite: ITT-415 or ITT-430.
Course Description
This course covers strategies and plans for development and operation of the Security Operations Center (SOC). Students gain the knowledge and skills to use technologies to detect and prevent network intrusion and implement cybersecurity countermeasures. Prerequisites: ITT-340 and ITT-375.
Join Grand Canyon University’s vibrant and growing campus community, with daytime classes designed for traditional students. Immerse yourself in a full undergraduate experience, complete with curriculum designed within the context of our Christian worldview.
Pursue a next-generation education with an online degree from Grand Canyon University. Earn your degree with convenience and flexibility with online courses that let you study anytime, anywhere.
* Please note that this list may contain programs and courses not presently offered, as availability may vary depending on class size, enrollment and other contributing factors. If you are interested in a program or course listed herein please first contact your University Counselor for the most current information regarding availability.
* Please refer to the Academic Catalog for more information. Programs or courses subject to change.