Bachelor of Science in Cybersecurity: Curriculum

Curriculum Details

120 TOTAL
CREDITS REQUIRED

Build yourself a solid foundation of computer science and cybersecurity expertise in our Bachelor of Science in Cybersecurity, then focus your learning in one of four specializations.

You’ll complete or transfer in core coursework requirements (34-55 credits) in Math, English, Foreign Language, Quantitative Reasoning, Written & Oral Communication, Humanities, Natural Sciences, and Social Sciences. You’ll also complete major course requirements (19 credits), professional development courses (6-9 credits), major related course requirements (15 credits), specialization courses (21 credits) and sufficient elective courses to earn at least the minimum credit hours required for this degree. At least 60 credit hours of the 120 required must be in the liberal arts and sciences.

The curriculum draws on expertise from leading institutions, including the U.S. Secret Service, U.S. Postal Inspection Service, and U.S. Securities and Exchange Commission, as well as private companies like Deloitte, Prudential, and K2 Intelligence.

You'll learn best practices in information security, criminal justice, computer hardware and software, systems threats, malware analysis, cryptography, and more.

The curriculum course abstracts on this page are meant to provide a high-level course overview and subject to change based on term, faculty, and/or institutional requirements. View the official course descriptions as written in the Utica College Academic Catalog and in adherence to regional compliance.

Required Courses

Credit Hours

Major Course Requirements Total Hours:

CRJ 101 Seminar in Justice StudiesCredit Hours: 1

Explore criminological research methods and APA, and learn basic research and writing principles as they apply to Justice Studies as a field of study.

CRJ 103 Introduction to Criminal JusticeCredit Hours: 3

Explore the history, theory, and structure of the criminal justice system. This course emphasizes substantive and procedural criminal law with additional examination of police, prosecution, defense, courts, and institutional and community corrections, as well as the juvenile justice subsystem.

CYB 107 Computer Hardware and PeripheralsCredit Hours: 3

Learn about computer hardware, peripherals, and digital media used in cybercrime. During this hands-on examination of devices, you'll get a close look at the different builds and configurations, as well as how to troubleshoot, diagnose issues, and repair them.

CYB 228 Cyber Technologies for Criminal JusticeCredit Hours: 3

Learn the basics of cyber technologies and their relationship to the modern criminal justice organization. You'll become familiar with topics like information technology, cybersecurity, social networking, cloud computing, cryptography, data hiding, anonymity, and surveillance.

CYB 205 Software Foundations for CybersecurityCredit Hours: 3

Explore the foundations of software and technology for cybersecurity and information assurance.

CYB 333 Information SecurityCredit Hours: 3

Examine the protection of proprietary information in both the corporate and government sectors. You'll explore topics including information as a resource, legal issues, policy formulation, administrative and technical remedies, and case studies.

CRJ 335 Cybercrime Law and InvestigationsCredit Hours: 3

Explore topics ranging from computer crimes and e-commerce to internet fraud and threats to the national infrastructure. You'll analyze policies, legal issues, and investigative techniques and strategies, as well as implications for investigation and enforcement on a global scale.

GOV 341 Jurisprudence of the Criminal LawCredit Hours: 3

Learn about criminal law as a process for dispute settlement and maintenance of order by the state. You'll focus on legal reasoning, legal process, and necessity to maintain historical continuity and doctrinal consistency.

CYB 362 Information System Threats, Attacks, and DefensesCredit Hours: 3

Explore the methods and motives of cybersecurity incident perpetrators, study the countermeasures used to prevent and detect incidents, and examine the ethical obligations of security professionals.

Major Related Course Requirements Total Hours:

PSY/SOC 211 Statistics in the Behavioral SciencesCredit Hours: 3

Learn to apply statistical methods in psychological research. You'll gain an understanding of descriptive statistics, tests of significance, correlation, simple analysis of variance, chi-square, and some nonparametric methods.

Students cannot also take ECN 241, MAT 112 for credit towards Core Goal 4: Quantitative Reasoning.

Prerequisite: Core Component I Mathematics

ECN 241 StatisticsCredit Hours: 3

Gain an understanding of how to apply statistical methods to management and economics. Learn about descriptive statistics, probability, normal curve, sampling, confidence, and regression.

Prerequisites: Completion of mathematics and computer requirements in component one of core.

Students may not also take Psychology/Sociology 211 or Mathematics 112 for credit toward Core Goal 4: Quantitative Reasoning.

MAT 112 Basic StatisticsCredit Hours: 3

Explore statistical competencies as a non-mathematics major. You'll explore probability theory topics, binomial distribution, normal distribution, descriptive statistics, frequency distribution, measures of central tendency, and hypothesis testing. Additionally, you'll learn about confidence intervals, correlation, and prediction.

Prerequisites: MAT 100, or satisfactory performance in Mathematics Placement Test administered by mathematics department, or permission of instructor

Students may not also take PSY 211, ECN 241, or SOC 211 for credit toward Core Goal 4: Quantitative Reasoning

SOC 274 CriminologyCredit Hours: 3

Examine crime as a form of deviant behavior and its relationship to social values and social structure. You'll also explore types of criminal behavior, theories of treatment and control, correctional methods, and the administration of criminal justice.

SOC 376 Criminological Research MethodsCredit Hours: 3

Gain an understanding of quantitative methods and their application in crime study. Through the analysis of scientific journals, you'll test hypotheses and evaluate policy, in addition to exploring computer applications in processing data and data analysis.

Prerequisites: SOC 274 and SOC 211 /PSY 211 or MAT 112.

MAT 147 Mathematics for Cyber SecurityCredit Hours: 3

Develop an understanding of set theory, logic, modular arithmetic, cryptography, combinatorics, graph theory, number systems, and algorithms.

Prerequisites: MAT 100 or satisfactory performance in mathematics placement test administered by the mathematics department

Ethics Total Hours:

PHI 107 EthicsCredit Hours: 3

Take a critical and historical look at the major ethical theories from the period of Plato up to today. Analyze the problems present in the construction of ethical theories, the nature of moral judgment, and moral evaluation.

PHI 108 Professional EthicsCredit Hours: 3

Examine the ethical dilemmas professionals encounter at work. Take a close look at the issues present in industries like journalism, health care, law, education, computer science, information technology, and public relations.

Professional Development Total Hours:

CRJ 461 Proseminar in Justice StudiesCredit Hours: 3

This capstone experience will integrate what you've learned in previous classes with a critical analysis of current research literature. You'll develop action projects with fellow seminar members focused on selected topics of current interest.

Prerequisite: Permission of instructor

CRJ 470 Criminal Justice - InternshipCredit Hours: 6

Gain field experience by joining the staff of a criminal justice agency under co-supervision of school faculty and agency personnel. Your hands-on field experience will be combined with weekly readings, online discussions, and writing assignments designed to pair theory with professional practice.

Prerequisite: Permission of instructor

CRJ 475 Senior ProjectCredit Hours: 3

Consult with a faculty supervisor to select a policy issue and conduct senior-level research.

Prerequisite: Permission of advisor

Information Assurance Specialization Total Hours:

CSC 101 Computer Science ICredit Hours: 3

During this overview of computer science, you'll be introduced to algorithms, elementary data structures, and program design. You'll learn how to utilize block structured programming language during this lecture and laboratory course.

CSC 201 Discrete Mathematics ICredit Hours: 4

Begin to explore abstract mathematical structures with an emphasis on material needed for applications to computer science. You'll be introduced to different number systems, data types, and computer arithmetic as well as Boolean algebra, direct and indirect proofs, and mathematical induction. This course has both a lecture and recitation component.

CSC 225 Introduction to the UNIX Operating SystemCredit Hours: 3

Learn the fundamentals of UNIX architecture through lectures and labs. You'll explore organization, file system, process management, UNIX Shells and Shell programming, networking, and security.

Prerequisite: CSC 117

CSC 316 Object-Oriented ProgrammingCredit Hours: 3

During this introduction to the object-oriented paradigm of programming, you'll explore concepts of objects, classes, and inheritance.

Prerequisites: CSC 101 and 102

CSC 323 Introduction to NetworksCredit Hours: 3

Examine a variety of network-related topics including network types and communication models, hardware components, applications, protocols, standards, inter-networking and routing concepts, as well as OSI Model, TCP/IP, and LAN and WAN networking technologies.

Prerequisite: CSC 101

CYB 337 Computer Network InvestigationsCredit Hours: 3

Learn the laws and procedures for conducting computer network investigation, as well as the technology, regulations and ethics of investigation.

Prerequisite: CYB 333

CYB 348 Information Assurance Risk and ComplianceCredit Hours: 3

Examine the rules, regulations, and issues related to information assurance, compliance, standards, and risk. Topics will include risk assessment and management in health care, finance, privacy, and government.

Prerequisite: CYB 333

CYB 438 System Vulnerability AssessmentCredit Hours: 3

Explore threats to information systems and learn to perform audits, assessments, penetration tests, and architecture reviews. Review the use of tools needed for conducting assessments and preparing reports.

Prerequisite: CYB 333

Cybercrime and Fraud Investigation Specialization Total Hours:

CRJ 232 Economic Crime TheoryCredit Hours: 3

Explore the typology of economic crime and the related theories, causation, and victimization.

CRJ 321 White-Collar CriminologyCredit Hours: 3

A comprehensive look at the history of white-collar crime, including definitions and categories, trends, theories, and policies. You'll also study offenders, victims, and societal reactions to corporate crime and other forms of white-collar crime.

Prerequisite: CRJ 103

CYB 338 Applied CryptographyCredit Hours: 3

Develop a basic understanding of where and how cryptography is applied in both public and private organizations. Learn the basic codes and ciphers along with modern and advanced cryptographic techniques. Explore symmetric, asymmetric, and public key cryptography as well as file hashing, digital signatures, wireless encryption techniques, and steganography.

Prerequisite: CYB 333

CYB 348 Information Assurance Risk and ComplianceCredit Hours: 3

Examine the rules, regulations, and issues related to information assurance, compliance, standards, and risk. Topics will include risk assessment and management in health care, finance, privacy, and government.

Prerequisite: CYB 333

CYB 355 Cybercrime Investigations and Forensics ICredit Hours: 3

Along with an introduction to forensic tools, you'll explore computer forensic principles including operating system concepts, registry structures, file system concepts, boot process, and file operations. You'll also learn about intrusion detection methodologies, tools, and approaches to incident response.

Prerequisites: CRJ 103 and CYB 228

CYB 356 Cybercrime Investigations and Forensics IICredit Hours: 3

Explore methods of digital information retrieval. You'll complete exercises for search, recovery, imaging, analysis, and preservation of evidence on disk drives and other storage media.

Prerequisite: CYB 355

CYB 455 Cybercrime Investigation and Forensics IIICredit Hours: 3

You'll learn theories and techniques for tracking attackers across the internet and then undertake practical exercises from case studies of internet-based crimes.

Prerequisite: CRJ 356

CRJ 347 Fraud Prevention and Detection TechnologiesCredit Hours: 3

Get to know the types of proactive technology programs and tools that are used to prevent and detect the occurence of fraudulent face-to-face, e-commerce, and e-business transactions. You'll also examine the development and implementation of business models for creating prevention and detection products and techniques.

CRJ 354 Payment Systems and FraudCredit Hours: 3

Examine modern payment systems from a global perspective. You'll become familiar with opportunities for fraud within payment systems, and learn techniques for preventing, detecting, and investigating fraud.

Prerequisite: CRJ 232 or permission of instructor

Network Forensics and Intrusion Investigation Specialization Total Hours:

CSC 101 Computer Science ICredit Hours: 3

During this overview of computer science, you'll be introduced to algorithms, elementary data structures, and program design. You'll learn how to utilize block structured programming language during this lecture and laboratory course.

CYB 337 Computer Network InvestigationsCredit Hours: 3

Learn the laws and procedures for conducting computer network investigation, as well as the technology, regulations and ethics of investigation.

Prerequisite: CYB 333

CYB 355 Cybercrime Investigations and Forensics ICredit Hours: 3

Along with an introduction to forensic tools, you'll explore computer forensic principles including operating system concepts, registry structures, file system concepts, boot process, and file operations. You'll also learn about intrusion detection methodologies, tools, and approaches to incident response.

Prerequisites: CRJ 103 and CYB 228

CYB 356 Cybercrime Investigations and Forensics IICredit Hours: 3

Explore methods of digital information retrieval. You'll complete exercises for search, recovery, imaging, analysis, and preservation of evidence on disk drives and other storage media.

Prerequisite: CYB 355

CYB 438 System Vulnerability AssessmentCredit Hours: 3

Explore threats to information systems and learn to perform audits, assessments, penetration tests, and architecture reviews. Review the use of tools needed for conducting assessments and preparing reports.

Prerequisite: CYB 333

CYB 455 Cybercrime Investigation and Forensics IIICredit Hours: 3

You'll learn theories and techniques for tracking attackers across the internet and then undertake practical exercises from case studies of internet-based crimes.

Prerequisite: CRJ 356

CYB 457 Network Forensics Credit Hours: 3

Examine network forensics and its relationship with technology, procedures, laws, regulations, and ethics.

Prerequisites: CYB 355, CYB 356, and CYB 455

Cyber Operations Specialization Total Hours:

CSC 101 Computer Science ICredit Hours: 3

During this overview of computer science, you'll be introduced to algorithms, elementary data structures, and program design. You'll learn how to utilize block structured programming language during this lecture and laboratory course.

CSC 316 Object-Oriented ProgrammingCredit Hours: 3

During this introduction to the object-oriented paradigm of programming, you'll explore concepts of objects, classes, and inheritance.

Prerequisites: CSC 101 and 102

CYB 339 Cyber Operations ToolsCredit Hours: 3

Learn how to develop, run, and analyze the output of computer programs and scripts for cyber operations, cybersecurity, and computer forensics applications. Discover how to develop a virtualized computing environment to use with cyber operations tools.

Prerequisites: CSC 101 and CYB 337 or CSC 323

CSC 323 Introduction to NetworksCredit Hours: 3

Examine a variety of network-related topics including network types and communication models, hardware components, applications, protocols, standards, inter-networking and routing concepts, as well as OSI Model, TCP/IP, and LAN and WAN networking technologies.

Prerequisite: CSC 101

CYB 337 Computer Network InvestigationsCredit Hours: 3

Learn the laws and procedures for conducting computer network investigation, as well as the technology, regulations and ethics of investigation.

Prerequisite: CYB 333

CYB 338 Applied CryptographyCredit Hours: 3

Develop a basic understanding of where and how cryptography is applied in both public and private organizations. Learn the basic codes and ciphers along with modern and advanced cryptographic techniques. Explore symmetric, asymmetric, and public key cryptography as well as file hashing, digital signatures, wireless encryption techniques, and steganography.

Prerequisite: CYB 333

CYB 438 System Vulnerability AssessmentCredit Hours: 3

Explore threats to information systems and learn to perform audits, assessments, penetration tests, and architecture reviews. Review the use of tools needed for conducting assessments and preparing reports.

Prerequisite: CYB 333

CYB 439 Introduction to Malware AnalysisCredit Hours: 3

In this introductory course, you'll examine the basic concepts of malware, how it's constructed, and how to analyze it. You'll also learn the fundamentals of anti-virus technology.

Prerequisites: CSC 101, CYB 333 and CYB 362

National Center of Excellence

With cutting-edge programs, Utica College is a nationwide leader in cybersecurity education. We're proud to be designated a National Center of Academic Excellence in Cyber Defense Education (CAE-CD) by the National Security Agency (NSA) and Department of Homeland Security (DHS). Utica College has met the increased demands of this new designation category with its Bachelor's and Master's in Cybersecurity programs. The NSA designation academic year 2024.

The college has also earned designation as a National Center of Digital Forensics Academic Excellence (CDFAE) by the Defense Cyber Crime Center (DC3).

 
Request More Information

We'd love to get to know you and hear more about your educational and professional goals. If you'd like to learn more about one of our programs, fill out this form and we'll be in touch:

          I consent to receiving SMS/MMS messages generated by an autodialer from Utica College or its representatives at the mobile number I provided. Consent is not required to receive information. Message & data rates may apply. Send STOP to 35254 to unsubscribe. Send HELP to 35254 for help. Click here for Terms & Conditions and Privacy Policy
          Yes! I'd like to schedule an appointment with an admissions counselor.If this option is not selected, an admission specialist will still contact you at a time of their choosing.
          CAPTCHA
          This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.