Cybersecurity Bridge Program

Bridge (Master of Science in Cybersecurity)

Offered By: College of Science, Engineering, & Technology

Prepare for Your MS in Cybersecurity With Bridge Courses

The GCU Bridge Master of Science in Cybersecurity program prepares students with unrelated bachelor’s degrees for graduate work in the IT and cybersecurity fields. Students in the cybersecurity bridge program transition into learning about computer programming and IT. They explore topics such as:

  • Networks and IT networking
  • System administration
  • Maintenance and platform
  • Data encryption
  • Security awareness
  • Operational issues
  • Security policies
  • Attack types

Because bridge coursework does not lead to a degree, the program is condensed. By attending just four courses, cybersecurity bridge program students will learn the basic skills and concepts needed to enter an MS in Cybersecurity program.

Benefits of Taking a Cybersecurity Bridge Program

The following four courses make up the cybersecurity bridge program:

  • Introduction to Computer Science and Information Technology
  • Platforms and Network Technologies
  • System Administration and Maintenance
  • Cybersecurity Foundations

These four courses lead students into the GCU graduate program. In this cybersecurity bridge program, students will use the Hackers-with-Halos methodology and gain intensive hands-on experiences. They’ll build comprehensive security programs within virtual environments and learn how to address the primary areas of concern within cybersecurity.

Cybersecurity is a growing field. According to the Bureau of Labor Statistics, it is growing at a rate of 28 percent over the next 10 years. Students looking for a career change or growth will benefit from learning the IT and cybersecurity skills in this bridge program.

What Comes After a Bridge Program in Cybersecurity?

The cybersecurity bridge program gives graduates the academic foundation to transition into the Master of Science in Cybersecurity program. In the bridge program, the introductory skills such as securing data, assessing virtual environments and managing infrastructures are highlighted.

Completion of these four courses helps you to take the next step of your education and pursue potential career opportunities in IT and cybersecurity after earning your master’s degree. You might find work in positions like:

  • Corporate information security officer (CISO)
  • Corporate security officer (CSO)
  • Director of security
  • Senior security engineer/architect
  • Security manager
  • Information security analyst

If you have aspirations to further your education in the growing field of cybersecurity, the Bridge to MS in Cybersecurity program at GCU can help. You’ll acquire the knowledge and skills needed to lead in a high-demand field.

Get More Information!

Loading Form

Total Credits: 16
Online: 7 weeks
[More Info]
Up to 90 credits, only 84 can be lower division
Online: $470 per credit [More Info]

Course List

16 credits
Total Degree Requirements:
16 credits

Core Courses

Course Description

This course provides a foundation for programming and problem solving using computer programming, as well as an introduction to the academic discipline of IT. Topics include variables, expressions, functions, control structures, and pervasive IT themes: IT history, organizational issues, and relationship of IT to other computing disciplines. The course prepares students for advanced concepts and techniques in programming and information technology, including object-oriented design, data structures, computer systems, and networks. The laboratory reinforces and expands learning of principles introduced in the lecture. Hands-on activities focus on writing code that implements concepts discussed in lecture and on gaining initial exposure to common operating systems, enterprise architectures, and tools commonly used by IT professionals. Prerequisite: MAT-154 or MAT-261.

Course Description

This course exposes students to the fundamentals of networks and networking in IT. It then builds deeper understanding of how networks work, including the topics of LANs, WANs, service providers, packets, hubs, routers, switches, and Internet protocols. The laboratory reinforces and expands learning of principles introduced in the lecture. Hands-on activities focus on setting up and configuring local and enterprise networks, experimenting with various topologies, and scalability planning with routers and switches. Prerequisite: CST-111 or CST-105 or acceptance into the bootcamp program.

Course Description

This course introduces students to system administration and maintenance as well as platform technologies. The course surveys operating systems, applications, administrative activities and domains, computer architecture and organization, and computing infrastructures. The laboratory reinforces and expands learning of principles introduced in the lecture. Hands-on activities focus on developing practical skills in configuring computer systems, deploying enterprise applications, managing user permissions, and remote administration. Prerequisite: ITT-116.

Course Description

This course builds upon knowledge already acquired in the areas of system architecture and operating systems and focuses on the core issues of information security. Students learn fundamental concepts of information security including data encryption, security awareness, legal and ethical issues, operational issues, security policies, and attack types; while expanding on the coverage to include security domains, forensics, security services, threat analysis, and vulnerabilities assessments. Prerequisite: ITT-120, or ITT-121 or CST-125 or CST-126 or CST-220 or CST-221 or acceptance into the bootcamp program.


GCU Online Student

Pursue a next-generation education with an online degree from Grand Canyon University. Earn your degree with convenience and flexibility with online courses that let you study anytime, anywhere.

* Please note that this list may contain programs and courses not presently offered, as availability may vary depending on class size, enrollment and other contributing factors. If you are interested in a program or course listed herein please first contact your University Counselor for the most current information regarding availability.

* Please refer to the Academic Catalog for more information. Programs or courses subject to change.

Scroll back to top