Skip to content

Bachelor of Science in Cybersecurity: Curriculum

Curriculum Details

120 TOTAL CREDITS REQUIRED

Build a solid foundation of computer science and cybersecurity expertise in our Bachelor of Science in Cybersecurity, then focus your learning in one of three specializations.

Our cybersecurity curriculum draws on expertise from leading institutions, including the Secret Service, U.S. Postal Inspection Service, and Securities and Exchange Commission, as well as private companies like Deloitte, Prudential, and K2 Intelligence.

You’ll learn best practices and complete cybersecurity courses in:

  • Information security
  • Criminal justice
  • Computer hardware and software
  • Systems threats
  • Malware analysis
  • Cryptography

Cybersecurity Curriculum and Program of Study

In this program, students complete or transfer core coursework requirements (34–55 credits) in math, English, foreign language, quantitative reasoning, written and oral communication, humanities, natural sciences, and social sciences.

You’ll also complete:

  • Major course requirements (28 credits)
  • Professional development courses (6–9 credits)
  • Major related course requirements (15 credits)
  • Specialization courses (21 credits)
  • Sufficient elective courses to earn the minimum credit hours required for this degree

At least 60 credit hours of the 120 required must be in the liberal arts and sciences.

The cybersecurity curriculum course abstracts on this page are meant to provide a high-level course overview and are subject to change based on term, faculty, and/or institutional requirements. View the official course descriptions as written in the Utica University Academic Catalog and in adherence to regional compliance. Select the appropriate Undergraduate Catalog from the dropdown.

MAJOR COURSE REQUIREMENTS

The purpose of this course is to introduce students to the basic concepts of cybersecurity including cryptography, data hiding, steganography, computer forensics, and cyber investigations. Delivery methods include lectures and demonstrations. Assessment will include individual hands-on assignments, team exercises, and tests. The course culminates with presentations from students based on a combined team activity blending concepts learned throughout the course.

Computer hardware and peripherals and other digital media used in commission of cyber-crimes. Hands-on examination of devices, including building, configuring, upgrading, troubleshooting, diagnosis, and repair.

This course provides fundamental instruction on the application of programming languages relevant to the cybersecurity domain. The course explores the impact that computer code has on the implementation, monitoring, and securing of computer systems against attacks and unauthorized access from a cybersecurity professional’s perspective. Students will design, apply, and execute relevant tasks through hands-on assignments. Students will use both the Windows and Linux operating system platforms to perform these tasks.

Explore the foundations of software and technology for cybersecurity and information assurance.

Examine the protection of proprietary information in both the corporate and government sectors. You’ll explore topics including information as a resource, legal issues, policy formulation, administrative and technical remedies, and case studies.

Study of the technology, laws, regulations, ethics and procedures for conducting computer network investigations.

Prerequisite: CYB 333

The purpose of this course is to provide students with a basic ability to understand where and how cryptography is applied in both public and private organizations. The course will cover basic codes and ciphers along with modern and advanced cryptographic techniques. Topics to be covered in this course include: symmetric and asymmetric cryptography, public key cryptography, file hashing, digital signatures, wireless encryption techniques and steganography.

Prerequisite: CYB 333

Explore the methods and motives of cybersecurity incident perpetrators, study the countermeasures used to prevent and detect incidents, and examine the ethical obligations of security professionals.

MAJOR RELATED COURSE REQUIREMENTS

CRJ 335 – Cybercrime Law and Investigations (3)
Cybercrimes, including computer crimes, Internet fraud, e-commerce, and threats to the national infrastructure. Policies, legal issues, and investigative techniques and strategies, and implications for investigation and enforcement on a global scale.

OR

POL 341 – Jurisprudence of the Criminal Law (3)
Criminal law as process for dispute settlement and maintenance of order by the state. Emphasis on legal reasoning, legal process, and necessity to maintain historical continuity and doctrinal consistency.

PHI 107 Ethics
A critical and historical study of the major ethical theories from the period of Plato to the present. Analysis also of problems present in the construction of ethical theories, the nature of moral judgment, and moral evaluation.

OR

PHI 108 Professional Ethics
This course examines ethical dilemmas encountered by professionals at work. Journalism, health care, law, education, computer science/information technology and public relations all provide examples.

PSY/SOC 211 Statistics in the Behavioral Sciences
Application of statistical methods in psychological research. Descriptive statistics, tests of significance, correlation, simple analysis of variance, chi-square, and some nonparametric methods. Students may not also take ECN 241, MAT 112 for credit towards Core Goal 4: Quantitative Reasoning. Same as SOC 211. Prerequisite(s); if any: MAT 107, MAT 124, MAT 143, MAT 151, MAT 201, or a math placement score of 2 to 4, or a 3C test score of 070 to100.

OR

ECN 241 Statistics
Application of statistical methods in management and economics. Descriptive statistics, probability, normal curve sampling, confidence, and regressions. Prerequisite(s); if any: Completion of mathematics and computer requirements in component one of core. Students may not also take PSY 211, SOC 211 or MAT 112 for credit towards Core Goal 4: Quantitative Reasoning.

OR

MAT 112 Basic Statistics
For non-mathematics majors. Probability theory topics, binomial distribution, normal distribution, descriptive statistics, frequency distribution, measures of central tendency, hypothesis testing. Confidence intervals, correlation, and prediction. Prerequisite(s); if any: MAT 100, or satisfactory performance in Mathematics Placement Test administered by mathematics department, or permission of instructor. Students may not also take for credit PSY 211, ECN 241 or SOC 211 for credit towards Core Goal 4: Quantitative Reasoning.

Develop an understanding of set theory, logic, modular arithmetic, cryptography, combinatorics, graph theory, number systems, and algorithms.

Prerequisites: MAT 100 or satisfactory performance in mathematics placement test administered by the mathematics department.

SOC 376 – Criminological Research Methods (3)
Emphasis on reading studies in scientific journals, understanding quantitative methods and their applications in crime study, hypothesis testing and policy evaluations. Computer applications in processing data and data analysis. Prerequisite(s); if any: SOC 274 and SOC 211 /PSY 211 or MAT 112.

OR

CRJ 378 – Research Methods and Data Analysis in Criminal Justice (3)
Data-driven, evidence-based crime policy and practice. Whether responding to incidents as they unfold, trying to determine places and times experiencing a disproportionate amount of crime, or guiding the efficient allocation of limited policing resources, crime analysis now plays a central role in American policing at the local, state, federal, and international levels. This class focuses on pattern identification and problem analysis, focusing on identifying short-term crime problems and understanding long-term problems. Students will learn how to collect, organize, analyze, and interpret quantitative and qualitative data using primary and secondary data sources and research techniques, as well as how to present analytical results effectively.

PROFESSIONAL DEVELOPMENT

This capstone experience will integrate what you’ve learned in previous classes with a critical analysis of current research literature. You’ll develop action projects with fellow seminar members focused on selected topics of current interest.

Prerequisite: Permission of instructor.

CRJ 470 Criminal Justice – Internship
Participation on staff of criminal justice agency under co-supervision of faculty and agency personnel. Field experience, weekly readings, online discussions, and writing assignments designed to combine theory and professional practice. Prerequisite(s); if any: Permission of Instructor.

OR

CRJ 475 Senior Project
Senior level research project on policy issue determined after consultation with faculty supervisor. Prerequisite(s); if any: Permission of advisor is required.

CYBERCRIME AND FRAUD INVESTIGATION SPECIALIZATION

Get to know the types of proactive technology programs and tools that are used to prevent and detect the occurence of fraudulent face-to-face, e-commerce, and e-business transactions. You’ll also examine the development and implementation of business models for creating prevention and detection products and techniques.

Examine modern payment systems from a global perspective. You’ll become familiar with opportunities for fraud within payment systems, and learn techniques for preventing, detecting, and investigating fraud.

Prerequisite: CRJ 232 or permission of instructor.

Explore computer forensic principles including operating system concepts, registry structures, file system concepts, boot process, and file operations. In addition, learn about intrusion detection methodologies, tools, and approaches to incident response.

Prerequisite: CRJ 103 and CYB 228

Explore methods of digital information retrieval. You’ll complete exercises for search, recovery, imaging, analysis, and preservation of evidence on disk drives and other storage media.

Prerequisite: CYB 355

You’ll learn theories and techniques for tracking attackers across the internet and then undertake practical exercises from case studies of internet-based crimes.

Prerequisite: CRJ 356

CRJ 232 Economic Crime Theory
Typology of economic crime. Study of theory, causation, and victimization relating to economic crimes.

OR

CRJ 321 White-Collar Criminology
History, definitions, categories, offenders, victims, trends, theories, policies, and societal reactions to corporate and other forms of white collar crime. Prerequisite(s); if any: CRJ 103.

CYB 338 Applied Cryptography
The purpose of this course is to provide students with a basic ability to understand where and how cryptography is applied in both public and private organizations. The course will cover basic codes and ciphers along with modern and advanced cryptographic techniques. Topics to be covered in this course include: symmetric and asymmetric cryptography, public key cryptography, file hashing, digital signatures, wireless encryption techniques and steganography. Prerequisite(s); if any: CYB 333.

OR

CYB 348 Information Assurance Risk and Compliance
Rules, regulations and issues related to information assurance, compliance, standards, and risk. Topics addressed in the course cover risk assessment and management from healthcare, financial, privacy, and government perspectives. Prerequisite(s); if any: CYB 333.

NETWORK FORENSICS AND INCIDENT RESPONSE SPECIALIZATION

During this overview of computer science, you’ll be introduced to algorithms, elementary data structures, and program design. You’ll learn how to utilize block structured programming language during this lecture and laboratory course.

Explore computer forensic principles including operating system concepts, registry structures, file system concepts, boot process, and file operations. In addition, learn about intrusion detection methodologies, tools, and approaches to incident response.

Prerequisite: CRJ 103 and CYB 228

Explore methods of digital information retrieval. You’ll complete exercises for search, recovery, imaging, analysis, and preservation of evidence on disk drives and other storage media.

Prerequisite: CYB 355

Learn concepts and processes required to develop and execute a Mobile Forensics investigation. Interpret and execute tasks related to cellular device data storage; cellular network functionality; evidence collection, preservation, and examination techniques; results verification; and the forensic process. You will select and evaluate mobile forensic tools through hands-on practical exercises and research presentations. This course constructs foundational knowledge for the digital forensic investigator and practitioner. Prerequisite(s); if any: CYB 333, CYB 355, and CYB 356.

Learn to develop and execute an incident response and forensic investigation plan. Gain a basic understanding of incident response capabilities, evidence handling procedures, and remediation, and test security tools and technologies through hands-on practical exercises and research presentations. This course builds foundational knowledge for incident response and network forensics practitioners.

Prerequisite(s); if any: CYB 333, CYB 337, CYB 355, and CYB 356.

You’ll learn theories and techniques for tracking attackers across the internet and then undertake practical exercises from case studies of internet-based crimes.

Prerequisite: CRJ 356

Examine network forensics and its relationship with technology, procedures, laws, regulations, and ethics.

Prerequisites: CYB 355, CYB 356, and CYB 455

CYBER OPERATIONS SPECIALIZATION

During this overview of computer science, you’ll be introduced to algorithms, elementary data structures, and program design. You’ll learn how to utilize block structured programming language during this lecture and laboratory course.

This course provides introductory guidelines for cyber operations that include examining networks and data under attack, studying the operation of network protocols and services, and analyzing the network infrastructure. Students are introduced to methodologies and techniques used to prevent network access and attacks. Students investigate endpoint vulnerabilities and attacks while identifying network security alerts and analyzing network intrusions. Incident response models used to manage security incidents are discussed.

Prerequisite(s); if any: CYB 107.

The purpose of this course is to provide students with a basic ability to understand where and how cryptography is applied in both public and private organizations. The course will cover basic codes and ciphers along with modern and advanced cryptographic techniques. Topics to be covered in this course include: symmetric and asymmetric cryptography, public key cryptography, file hashing, digital signatures, wireless encryption techniques and steganography.

Prerequisite: CYB 333

Learn how to develop, run, and analyze the output of computer programs and scripts for cyber operations, cybersecurity, and computer forensics applications. Discover how to develop a virtualized computing environment to use with cyber operations tools.

Prerequisites: CSC 101 and CYB 337 or CSC 323

Explore threats to information systems and learn to perform audits, assessments, penetration tests, and architecture reviews. Review the use of tools needed for conducting assessments and preparing reports.

Prerequisite: CYB 333

In this introductory course, you’ll examine the basic concepts of malware, how it’s constructed, and how to analyze it. You’ll also learn the fundamentals of anti-virus technology.

Prerequisites: CSC 101, CYB 333, and CYB 362

CSC 323 Introduction to Networks
Topic include network types and communication models, hardware components, applications, protocols, standards, internetworking and routing concepts, OSI Model, TCP/IP, LAN and WAN networking technologies. Prerequisite(s); if any: CSC 101.

OR

CYB 337 Computer Network Investigations
Study of the technology, laws, regulations, ethics and procedures for conducting computer network investigations. Prerequisite(s); if any: CYB 333.

Request More Information

We’d love to get to know you and hear more about your educational and professional goals. If you’d like to learn more about one of our programs, fill out this form and we’ll be in touch:

Note: All fields required.