Bachelor of Science in Cybersecurity: Curriculum

Curriculum Details

120 TOTAL
CREDITS REQUIRED

Build a solid foundation of computer science and cybersecurity expertise in our Bachelor of Science in Cybersecurity, then focus your learning in one of four specializations.

Our cybersecurity curriculum draws on expertise from leading institutions, including the Secret Service, U.S. Postal Inspection Service, and Securities and Exchange Commission, as well as private companies like Deloitte, Prudential, and K2 Intelligence.

You'll learn best practices and complete cybersecurity courses in:

  • Information security
  • Criminal justice
  • Computer hardware and software
  • Systems threats
  • Malware analysis
  • Cryptography

Cybersecurity Curriculum and Program of Study

In this program, students complete or transfer core coursework requirements (34–55 credits) in math, English, foreign language, quantitative reasoning, written and oral communication, humanities, natural sciences, and social sciences.

You’ll also complete:

  • Major course requirements (19 credits)
  • Professional development courses (6–9 credits)
  • Major related course requirements (15 credits)
  • Specialization courses (21 credits)
  • Sufficient elective courses to earn the minimum credit hours required for this degree

At least 60 credit hours of the 120 required must be in the liberal arts and sciences.

The cybersecurity curriculum course abstracts on this page are meant to provide a high-level course overview and are subject to change based on term, faculty, and/or institutional requirements. View the official course descriptions as written in the Utica College Academic Catalog and in adherence to regional compliance.

Required Courses

Credit Hours

Major Course Requirements Total Hours:

CRJ 101 Seminar in Justice StudiesCredit Hours: 1

Explore criminological research methods and APA, and learn basic research and writing principles as they apply to Justice Studies as a field of study.

CRJ 103 Introduction to Criminal JusticeCredit Hours: 3

Explore the history, theory, and structure of the criminal justice system. This course emphasizes substantive and procedural criminal law with additional examination of police, prosecution, defense, courts, and institutional and community corrections, as well as the juvenile justice subsystem.

CYB 107 or CYB 228Credit Hours: 3

Computer Hardware and Peripherals

OR

Cyber Technologies for Criminal Justice:

CYB 205 Software Foundations for CybersecurityCredit Hours: 3

Explore the foundations of software and technology for cybersecurity and information assurance.

CYB 333 Information SecurityCredit Hours: 3

Examine the protection of proprietary information in both the corporate and government sectors. You'll explore topics including information as a resource, legal issues, policy formulation, administrative and technical remedies, and case studies.

CRJ 335 Cybercrime Law and InvestigationsCredit Hours: 3

Explore topics ranging from computer crimes and e-commerce to internet fraud and threats to the national infrastructure. You'll analyze policies, legal issues, and investigative techniques and strategies, as well as implications for investigation and enforcement on a global scale.

POL 341 Jurisprudence of the Criminal LawCredit Hours: 3

Learn about criminal law as a process for dispute settlement and maintenance of order by the state. You'll focus on legal reasoning, legal process, and necessity to maintain historical continuity and doctrinal consistency.

CYB 362 Information System Threats, Attacks, and DefensesCredit Hours: 3

Explore the methods and motives of cybersecurity incident perpetrators, study the countermeasures used to prevent and detect incidents, and examine the ethical obligations of security professionals.

Major Related Course Requirements Total Hours:

PHI 107 or PHI 108Credit Hours: 3

PHI 107 Ethics

OR

PHI 108 Professional Ethics

MAT 112 or PSY/SOC 211 or ECN 241Credit Hours: 3

PSY/SOC 211 Statistics in the Behavioral Sciences

OR

ECN 241 Statistics

OR

MAT 112 Basic Statistics

SOC 274 CriminologyCredit Hours: 3

Examine crime as a form of deviant behavior and its relationship to social values and social structure. You'll also explore types of criminal behavior, theories of treatment and control, correctional methods, and the administration of criminal justice.

SOC 376 Criminological Research MethodsCredit Hours: 3

Gain an understanding of quantitative methods and their application in crime study. Through the analysis of scientific journals, you'll test hypotheses and evaluate policy, in addition to exploring computer applications in processing data and data analysis.

Prerequisites: SOC 274 and SOC 211 /PSY 211 or MAT 112.

MAT 147 Mathematics for Cyber SecurityCredit Hours: 3

Develop an understanding of set theory, logic, modular arithmetic, cryptography, combinatorics, graph theory, number systems, and algorithms.

Prerequisites: MAT 100 or satisfactory performance in mathematics placement test administered by the mathematics department

Professional Development Total Hours:

CRJ 461 Proseminar in Justice StudiesCredit Hours: 3

This capstone experience will integrate what you've learned in previous classes with a critical analysis of current research literature. You'll develop action projects with fellow seminar members focused on selected topics of current interest.

Prerequisite: Permission of instructor

CRJ 470 OR CRJ 475Credit Hours: 3-6

CRJ 470 Criminal Justice – Internship

OR

CRJ 475 Senior Project

Information Assurance Specialization Total Hours:

CSC 101 Computer Science ICredit Hours: 3

During this overview of computer science, you'll be introduced to algorithms, elementary data structures, and program design. You'll learn how to utilize block structured programming language during this lecture and laboratory course.

CSC 201 Discrete Mathematics ICredit Hours: 4

Begin to explore abstract mathematical structures with an emphasis on material needed for applications to computer science. You'll be introduced to different number systems, data types, and computer arithmetic as well as Boolean algebra, direct and indirect proofs, and mathematical induction. This course has both a lecture and recitation component.

CSC 225 Introduction to the UNIX Operating SystemCredit Hours: 3

Learn the fundamentals of UNIX architecture through lectures and labs. You'll explore organization, file system, process management, UNIX Shells and Shell programming, networking, and security.

Prerequisite: CSC 117

CSC 316 Object-Oriented ProgrammingCredit Hours: 3

During this introduction to the object-oriented paradigm of programming, you'll explore concepts of objects, classes, and inheritance.

Prerequisites: CSC 101 and 102

CYB 348 Information Assurance Risk and ComplianceCredit Hours: 3

Examine the rules, regulations, and issues related to information assurance, compliance, standards, and risk. Topics will include risk assessment and management in health care, finance, privacy, and government.

Prerequisite: CYB 333

CYB 438 System Vulnerability AssessmentCredit Hours: 3

Explore threats to information systems and learn to perform audits, assessments, penetration tests, and architecture reviews. Review the use of tools needed for conducting assessments and preparing reports.

Prerequisite: CYB 333

CSC 323 or CYB 337Credit Hours: 3

CSC 323 Introduction to Networks

OR

CYB 337 Computer Network Investigations

CYB 337 Computer Network InvestigationsCredit Hours: 3

Learn the laws and procedures for conducting computer network investigation, as well as the technology, regulations and ethics of investigation.

Prerequisite: CYB 333

Cybercrime and Fraud Investigation Specialization Total Hours:

CRJ 347 Fraud Prevention and Detection TechnologiesCredit Hours: 3

Get to know the types of proactive technology programs and tools that are used to prevent and detect the occurence of fraudulent face-to-face, e-commerce, and e-business transactions. You'll also examine the development and implementation of business models for creating prevention and detection products and techniques.

CRJ 354 Payment Systems and FraudCredit Hours: 3

Examine modern payment systems from a global perspective. You'll become familiar with opportunities for fraud within payment systems, and learn techniques for preventing, detecting, and investigating fraud.

Prerequisite: CRJ 232 or permission of instructor

CYB 355 Cybercrime Investigations and Forensics ICredit Hours: 3

Along with an introduction to forensic tools, you'll explore computer forensic principles including operating system concepts, registry structures, file system concepts, boot process, and file operations. You'll also learn about intrusion detection methodologies, tools, and approaches to incident response.

Prerequisites: CRJ 103 and CYB 228

CYB 356 Cybercrime Investigations and Forensics IICredit Hours: 3

Explore methods of digital information retrieval. You'll complete exercises for search, recovery, imaging, analysis, and preservation of evidence on disk drives and other storage media.

Prerequisite: CYB 355

CYB 455 Cybercrime Investigation and Forensics IIICredit Hours: 3

You'll learn theories and techniques for tracking attackers across the internet and then undertake practical exercises from case studies of internet-based crimes.

Prerequisite: CRJ 356

CRJ 232 OR CRJ 321Credit Hours: 3

CRJ 232 Economic Crime Theory

OR

CRJ 321 White-Collar Criminology

CYB 338 OR CYB 348Credit Hours: 3

CYB 338 Applied Cryptography

OR

CYB 348 Information Assurance Risk and Compliance

Network Forensics and Incident Response Specialization Total Hours:

CSC 101 Computer Science ICredit Hours: 3

During this overview of computer science, you'll be introduced to algorithms, elementary data structures, and program design. You'll learn how to utilize block structured programming language during this lecture and laboratory course.

CYB 355 Cybercrime Investigations and Forensics ICredit Hours: 3

Along with an introduction to forensic tools, you'll explore computer forensic principles including operating system concepts, registry structures, file system concepts, boot process, and file operations. You'll also learn about intrusion detection methodologies, tools, and approaches to incident response.

Prerequisites: CRJ 103 and CYB 228

CYB 356 Cybercrime Investigations and Forensics IICredit Hours: 3

Explore methods of digital information retrieval. You'll complete exercises for search, recovery, imaging, analysis, and preservation of evidence on disk drives and other storage media.

Prerequisite: CYB 355

CYB 435 Mobile Device ForensicsCredit Hours: 3

Learn to execute a Mobile Forensics investigation, including cellular device data storage; cellular network functionality; evidence collection, preservation, and examination techniques; results verification; and the forensic process. You’ll also evaluate mobile forensic tools through hands-on practical exercises and research presentations.

Prerequisite(s); if any: CYB 333, CYB 355, and CYB 356

CYB 445 Incident Response and Forensic InvestigationsCredit Hours: 3

Learn to execute an incident response and forensic investigation plan, testing security tools and technologies through hands-on practical exercises and research presentations. You will gain a basic understanding of incident response capabilities, evidence handling procedures, and remediation. This course builds foundational knowledge for incident response and network forensics practitioners.

Prerequisite(s); if any: CYB 333, CYB 337, CYB 355, and CYB 356.

CYB 455 Cybercrime Investigation and Forensics IIICredit Hours: 3

You'll learn theories and techniques for tracking attackers across the internet and then undertake practical exercises from case studies of internet-based crimes.

Prerequisite: CRJ 356

CYB 457 Network Forensics Credit Hours: 3

Examine network forensics and its relationship with technology, procedures, laws, regulations, and ethics.

Prerequisites: CYB 355, CYB 356, and CYB 455

CYB 435 Mobile Device ForensicsCredit Hours: 3

Learn to execute a Mobile Forensics investigation, including cellular device data storage; cellular network functionality; evidence collection, preservation, and examination techniques; results verification; and the forensic process. You’ll also evaluate mobile forensic tools through hands-on practical exercises and research presentations.

Prerequisite(s); if any: CYB 333, CYB 355, and CYB 356

Cyber Operations Specialization Total Hours:

CSC 101 Computer Science ICredit Hours: 3

During this overview of computer science, you'll be introduced to algorithms, elementary data structures, and program design. You'll learn how to utilize block structured programming language during this lecture and laboratory course.

CYB 201 Introduction to Cyber OperationsCredit Hours: 3

This course provides introductory guidelines for cyber operations that include examining networks and data under attack, studying the operation of network protocols and services, and analyzing the network infrastructure. Students are introduced to methodologies and techniques used to prevent network access and attacks. Students investigate endpoint vulnerabilities and attacks while identifying network security alerts and analyzing network intrusions. Incident response models used to manage security incidents are discussed.

Prerequisite(s); if any: CYB 107.

CYB 338 Applied CryptographyCredit Hours: 3

Develop a basic understanding of where and how cryptography is applied in both public and private organizations. Learn the basic codes and ciphers along with modern and advanced cryptographic techniques. Explore symmetric, asymmetric, and public key cryptography as well as file hashing, digital signatures, wireless encryption techniques, and steganography.

Prerequisite: CYB 333

CYB 339 Cyber Operations ToolsCredit Hours: 3

Learn how to develop, run, and analyze the output of computer programs and scripts for cyber operations, cybersecurity, and computer forensics applications. Discover how to develop a virtualized computing environment to use with cyber operations tools.

Prerequisites: CSC 101 and CYB 337 or CSC 323

CYB 438 System Vulnerability AssessmentCredit Hours: 3

Explore threats to information systems and learn to perform audits, assessments, penetration tests, and architecture reviews. Review the use of tools needed for conducting assessments and preparing reports.

Prerequisite: CYB 333

CYB 439 Introduction to Malware AnalysisCredit Hours: 3

In this introductory course, you'll examine the basic concepts of malware, how it's constructed, and how to analyze it. You'll also learn the fundamentals of anti-virus technology.

Prerequisites: CSC 101, CYB 333 and CYB 362

CSC 323 or CYB 337Credit Hours: 3

CSC 323 Introduction to Networks

OR

CYB 337 Computer Network Investigations

CYB 337 Computer Network InvestigationsCredit Hours: 3

Learn the laws and procedures for conducting computer network investigation, as well as the technology, regulations and ethics of investigation.

Prerequisite: CYB 333

National Center of Excellence

With cutting-edge programs, Utica College is a nationwide leader in cybersecurity education. We're proud to be designated a National Center of Academic Excellence in Cyber Defense Education (CAE-CD) by the National Security Agency (NSA) and Department of Homeland Security (DHS).

Utica College has met the increased demands of this new designation category with its graduate and undergraduate cybersecurity programs.

The college has also earned designation as a National Center of Digital Forensics Academic Excellence (CDFAE) by the Department of Defense Cyber Crime Center (DC3).

 
Request More Information

We'd love to get to know you and hear more about your educational and professional goals. If you'd like to learn more about one of our programs, fill out this form and we'll be in touch:

          Yes, I do want to communicate with Utica College via SMS. I am providing my consent by leaving the opt-in checked. Message and data rates may apply. Privacy and Terms.
          CAPTCHA
          This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.