Prepare for Your MS in Cybersecurity With Bridge Courses
The GCU Bridge Master of Science in Cybersecurity program prepares students with unrelated bachelor’s degrees for graduate work in the IT and cybersecurity fields. Students in the cybersecurity bridge program transition into learning about computer programming and IT. They explore topics such as:
- Networks and IT networking
- System administration
- Maintenance and platform
- Data encryption
- Security awareness
- Operational issues
- Security policies
- Attack types
Because a bridge coursework does not lead to a degree, the program is condensed. By attending just four courses, cybersecurity bridge program students will learn the basic skills and concepts needed to enter a MS in Cybersecurity program.
Benefits of Taking a Cybersecurity Bridge Program
The following four courses make up the cybersecurity bridge program:
- Introduction to Computer Science and Information Technology
- Platforms and Network Technologies
- System Administration and Maintenance
- Cybersecurity Foundations
These four courses lead students into the GCU graduate program. In this cybersecurity bridge program, students will use the Hackers-with-Halos methodology and gain intensive hands-on experiences. They’ll build comprehensive security programs within virtual environments and learn how to address the primary areas of concern within cybersecurity.
Cybersecurity is a growing field. According to the Bureau of Labor Statistics, it is growing at a rate of 28 percent over the next 10 years. Students looking for a career change or growth will benefit from learning the IT and cybersecurity skills in this bridge program.
What Comes After a Bridge Program in Cybersecurity?
The cybersecurity bridge program gives graduates the academic foundation to transition into the Master of Science in Cybersecurity program. In the bridge program, the introductory skills such as securing data, assessing virtual environments and managing infrastructures are highlighted.
Completion of these four courses helps you to take the next step of your education and pursue potential career opportunities in IT and cybersecurity after earning your master’s degree. You might find work in position like:
- Corporate information security officer (CISO)
- Corporate security officer (CSO)
- Director of security
- Senior security engineer/architect
- Security manager
- Information security analyst
If you have aspirations to further your education in the growing field of cybersecurity, the Bridge to MS in Cybersecurity program at GCU can help. You’ll acquire the knowledge and skills needed to lead in a high-demand field.
Program Core Courses
This course provides a foundation for programming and problem solving using computer programming, as well as an introduction to the academic discipline of IT. Topics include variables, expressions, functions, control structures, and pervasive IT themes: IT history, organizational issues, and relationship of IT to other computing disciplines. The course prepares students for advanced concepts and techniques in programming and information technology, including object-oriented design, data structures, computer systems, and networks. The laboratory reinforces and expands learning of principles introduced in the lecture. Hands-on activities focus on writing code that implements concepts discussed in lecture and on gaining initial exposure to common operating systems, enterprise architectures, and tools commonly used by IT professionals. Prerequisite: MAT-154 or MAT-261.
This course exposes students to the fundamentals of networks and networking in IT. It then builds deeper understanding of how networks work, including the topics of LANs, WANs, service providers, packets, hubs, routers, switches, and Internet protocols. The laboratory reinforces and expands learning of principles introduced in the lecture. Hands-on activities focus on setting up and configuring local and enterprise networks, experimenting with various topologies, and scalability planning with routers and switches. Prerequisite: CST-111 or CST-105.
This course introduces students to system administration and maintenance as well as platform technologies. The course surveys operating systems, applications, administrative activities and domains, computer architecture and organization, and computing infrastructures. The laboratory reinforces and expands learning of principles introduced in the lecture. Hands-on activities focus on developing practical skills in configuring computer systems, deploying enterprise applications, managing user permissions, and remote administration. Prerequisite: ITT-116.
This course builds upon knowledge already acquired in the areas of system architecture and operating systems and focuses on the core issues of information security. Students learn fundamental concepts of information security including data encryption, security awareness, legal and ethical issues, operational issues, security policies, and attack types; while expanding on the coverage to include security domains, forensics, security services, threat analysis, and vulnerabilities assessments. Prerequisite: ITT-120, or ITT-121 or CST-125 or CST-126 or CST-220 or CST-221.
Pursue a next-generation education with an online degree from Grand Canyon University. Earn your degree with convenience and flexibility with online courses that let you study anytime, anywhere. GCU offers the most experienced leadership in delivering online degree programs. Full-time faculty members and fully trained adjunct instructors, equipped with strong academic backgrounds and practical experience in their fields, support you every step of the way. Designed with the career-oriented professional in mind, our online classes provide an intimate environment that stimulates engaging and challenging discussions. Choose from programs across our distinct colleges, in high-demand employment areas. Classes begin frequently.
* Please note that this list may contain programs that are not presently offered as program availability may vary depending on class size, enrollment and other contributing factors. If you are interested in a program listed herein please first contact your University Counselor for the most current information regarding availability of the program.
* The Department of Education defines how an institution must calculate a program's On-Time Completion rate for federal disclosure purposes. The On-Time Completion rate is based on a program's published required number of months to complete all degree requirements as provided in the institution's catalog. Completion statistics are updated every January and are based on the cohort of students who started the program in the same year and then graduated within the published program length.Online and Evening program disclosures (8 months)
* Please refer to the Academic Catalog for more information. Program subject to change.