Call us today! (866) 295-3106

Cybersecurity

Online BS in Cybersecurity Specializations

Five Specializations available to meet your career goals

As the global population becomes more and more "connected," the opportunities for criminals to use the Internet to violate the law are growing, and incidents of cybercrime are touching more and more lives. A study by the Ponemon Institute found that the average cost of cybercrime for companies in the United States climbed to $12.7 million in 2014 from $11.6 million the year before1. The Ponemon Institute also found that the country leads the world in terms of data breaches, with U.S. companies experiencing close to 30,000 compromised records in 20142. What these cybercrime statistics show us is that now, more than ever, the world needs cybersecurity professionals to stem the tide. Utica College can help you answer the call.

Not only does Utica College offer one of the most robust online cybersecurity programs in the country, but we offer specialized areas of study within the BS in Cybersecurity to help students align their education with their personal interests and career goals.

The online Cybersecurity bachelor's degree from Utica College offers five specializations in:

  • ::  Cybercrime and Fraud Investigation
  • ::  Information Assurance
  • ::  Network Forensics and Intrusion Investigation
  • ::  Homeland Security and Emergency Management
  • ::  Cyber Operations

Cybercrime and Fraud Investigation Specialization

While cybercrime was initially limited to financial crimes—which included credit card theft, illegal transactions through online banking, and money laundering—it has now reached new heights and has created new concerns among governments, corporations, and society as a whole.

The Cybercrime and Fraud Investigation specialization combines computer forensics with courses in economic crime, white-collar crime, fraud prevention, and fraud detection to produce well-rounded graduates who are prepared to lead the fight against digital white-collar crimes and the cybercriminals who commit them. Students will learn about computer forensics, cryptography, steganography, compliance, security policy, and various aspects of white-collar crime and fraud investigation, and will have the skills to combat these cybercrimes using digital evidence uncovered through comprehensive digital forensic investigations. Students will also learn techniques to prevent fraud, identity theft, and other types of white-collar crime, which makes our graduates highly desirable among other IT job seekers.

Graduates of the Cybercrime and Fraud Investigation specialization will be well qualified for entry level careers in:

  • ::  AML (anti-money laundering)
  • ::  CFE (certified fraud examiner)
  • ::  Computer forensics examiner
  • ::  E-discovery
  • ::  Risk/compliance
  • ::  Law enforcement
  • ::  Healthcare security and privacy

View the online Cybercrime and Fraud Investigation curriculum

Network Forensics and Intrusion Investigation Specialization

The Network Forensics and Intrusion Investigation specialization combines computer science with computer forensics and vulnerability assessment skills to investigate cyber related incidents and bring internet criminals from across the globe to justice. This specialization addresses the technical aspects of conducting computer network investigations—such as evidence collection, data recovery, and digital imaging—in addition to the legal, ethical, and social aspects of computer forensics. Students learn about Python programming, cybersecurity scripting, network investigations, advanced network forensics, and vulnerability assessment. Students will also learn how to perform information system audits and use incident response tools, two critical cybersecurity skills required of any network forensics professional.

Our curriculum integrates the latest technologies and data available in criminology, criminal justice, financial crime, and computer forensics through an innovative multidisciplinary approach. The result is graduates who are well-prepared for entry-level opportunities in law enforcement, healthcare information security, and corporate/industrial security. This degree will prepare you for careers in:

  • ::  Network security administration
  • ::  Computer forensics investigation
  • ::  IT security consulting
  • ::  Penetration testing
  • ::  Vulnerability assessment
  • ::  Law enforcement
  • ::  Healthcare security and privacy

View the online Network Forensics and Intrusion curriculum

Information Assurance Specialization

Perhaps the most critical and strategic business resource for any organization is its information. Unfortunately, Information Systems are more vulnerable today than ever from cyber miscreants across the globe who are attacking them for pleasure, political purposes, or to gain business/financial advantages. Information Assurance (IA) professionals work to stop those elusive criminals from committing crimes in the first place.

Our rigorous online Information Assurance specialization in Cybersecurity gives you a systematic approach to establishing, managing, and operating an effective IA program, equipping you with the latest methodologies, plans, and practices to protect critical information systems. The IA specialization of Utica College’s BS in Cybersecurity program focuses on the skills and topic areas specific to the defense of computer systems and networks, including technical aspects such as object-oriented programming, computer arithmetic, and Boolean algebra.

Information Assurance protocols protect an organization's information, as well as the facilities, systems, and networks that process, store, and transmit that information. Protecting information is vital, sometimes even more vital than protecting other organizational resources, such as money or personnel. That’s why graduates of our Information Assurance specialization track are in high demand across a number of different sectors and industries.

Our Information Assurance curriculum integrates the newest technologies and the latest data protection methodologies in order to prepare you for entry-level, professional opportunities in industries that demand leading-edge skills in investigative science and information assurance, including:

  • ::  Corporate and industrial security
  • ::  Law enforcement
  • ::  Government intelligence services including the FBI or CIA
  • ::  Homeland security
  • ::  Banking and finance
  • ::  and other industries that demand leading edge skills in investigative science

View the Information Assurance curriculum

Homeland Security and Emergency Management Specialization

The Homeland Security and Emergency Management specialization is geared towards students who are interested in a high level overview of cybersecurity in the context of homeland security, counter-terrorism and emergency management. Students will gain an understanding of public administration and technology challenges related to homeland security, as well as the collection and analysis of information from intelligence systems such as the Incident Command System (ICS) and the National Incident Management System (NIMS). Students will also explore the topic of critical infrastructure and learn how to manage security risks and respond to attacks on America’s cyber infrastructure. The curriculum also focuses on intelligence collection and intelligence analysis from the perspective of national security, law enforcement and business.

Graduates of the Homeland Security and Emergency Management specialization will be well qualified for entry level careers in:

  • ::  Department of Homeland Security
  • ::  Emergency management
  • ::  Policy
  • ::  Compliance
  • ::  Risk management
  • ::  Law enforcement

View the Homeland Security and Emergency Management curriculum

Cyber Operations Specialization

The online Cyber Operations specialization addresses one of the hottest cybersecurity topics. Students will learn about defensive and offensive tactics, techniques and procedures. Students will take a number of computer programming and computer science courses, as well as courses on operating systems, vulnerability assessment and penetration testing. Topics such as incident response to system compromise, risk management decision-making, and legal and regulatory analyses are covered. The Cyber Operations specialization is also unique in that it provides students with advanced instruction and training in UNIX, a widely used family of multiuser computer operating systems. Students will gain a deep understanding of systems architecture, process management, shell programming, and other topics specific to the UNIX operating system.

Cyber Operations involves cyber defense strategies, detecting, reporting, and responding to cyber threats; making encryption codes to pass information between systems securely; and embedding security measures directly into the emerging Global Information Grid. The cyber operations curriculum also includes building secure audio and video communications equipment, making tamper protection products, providing trusted microelectronics solutions, and more.

Graduates of the Cyber Operations specialization will be well qualified to protect and defend information and information systems with careers in:

  • ::  Computer Network Defense (CND)
  • ::  Computer Network Attack (CNA)
  • ::  Computer Network Exploitation (CNE)
  • ::  Computer Network Operations (CNO)
  • ::  Penetration testing
  • ::  Vulnerability assessment
  • ::  Military
  • ::  Critical infrastructure

View the Cyber Operations curriculum

Tools, Tips and Other Resources -- Learn More about Cybersecurity

Check out the articles below, as well as the Cybersecurity resources found within the online resource center.

Learn to safeguard vital information infrastructures and stop internet criminals in their tracks with any of the specializations in the online Bachelor of Science in Cybersecurity degree from Utica College. A degree in cybersecurity can open up numerous career opportunities in IT, but earning a specialized cybersecurity degree from Utica College can give you the skills and training necessary to stand out among your peers and land the computer job you really want.

Request More Information or call us today at 315.732.2640 or toll-free at 866.295.3106 to speak with a Program Manager.

1 Ponemon Institute, 2014 Global Report on the Cost of Cybercrime
2 Ponemon Institute, 2014 Cost of Data Breach: Global Analysis