Attackers and Our
Most Critical Data
Stop Cybercriminals in Their Tracks
Fill the Cybersecurity Skills Gap
Learn More Today
Complete the form to learn more about this program.
Defend Against the Next Breach
Data is one of a company’s most important and strategic resources. As years pass, that importance will only increase, with The Economist projecting 180 zettabytes of data will be created and copied annually by 2025.1
Unfortunately, today’s information systems are ill-equipped to protect data, and high-profile breaches regularly make headlines—from Quora and Marriott to Equifax, Target, and Yahoo. During the next decade, such large-scale cyberattacks and data breaches are among the top risks to data.2
Whether cyberattackers are advancing a political agenda, gaining a business advantage, or hacking for pleasure, Utica College’s online Bachelor of Science with the Information Assurance specialization prepares you to stop these criminals in their tracks, prevent future attacks, and protect this critical resource.
Utica College is a leader in cybersecurity education, designated as a National Center of Academic Excellence by the Department of Homeland Security and the National Security Agency.
“It takes 20 years to build a reputation and few minutes of cyber incident to ruin it.” – Stephane Nappo, Societe Generale Chief Information Security Officer
Demand for information assurance (IA) and IA professionals is high, all over the world. The field’s driven by both the threat of attacks and by consumers who demand protection, who want to feel secure when they buy products and use services that require their personal data.
Companies worldwide are responding by investing in information assurance:
- 87% will invest in cybersecurity to build trust with customers3
- 46% in the financial sector will increase their investment in encryption4
- 46% will boost investment in biometrics and advanced authentication4
And yet, ISACA’s State of Cybersecurity 2018 report5 shows there is a startling skills gap:
- 60% of organizations had open cybersecurity positions due to a lack of qualified candidates
- 51% of organizations report it takes 3–6 months to hire for a cybersecurity position
- Security engineers and information security analysts were most in need
That investment in information assurance translates into job opportunities, and job security, for you. Our specialized bachelor’s in cybersecurity can give you the skills you need to address this hiring gap and find success in information assurance.
CAREER SPOTLIGHT: INFORMATION SECURITY ANALYSTS
As an information security analyst, you’d be charged with protecting computer networks and systems. You would actively monitor for security breaches, create innovative solutions to prevent attackers from accessing data, investigate violations, and minimize risks when attacks do occur. You would also develop information assurance standards, update best practices, and more. This position has a median annual salary of $95,510, with 28 percent projected growth in job opportunities by 2026.6
Other titles you may qualify for:
- Corporate and Industrial Security
- Law Enforcement
- Government Intelligence Services, including the FBI, CIA, NSA
- Homeland Security
- Banking and Finance
Curriculum: Leading-Edge Methods and Practices
Through four elective courses, you’ll learn to protect an organization’s data, as well as its facilities, systems, and networks for processing, storing, and transmitting that data.
Gain hands-on experience to excel in information assurance, minimize risk after intrusions, and prevent cybercrime. Focus on skills and topics specific to defending computer systems and networks, including such technical aspects as object-oriented programming, computer arithmetic, and Boolean algebra.
You’ll learn a systematic approach to establish, manage, and operate an effective IA program with the latest methodologies and practices available to protect critical-information systems.
Course Spotlight: CYB 339 – Cyber Operations Tools
Develop, run, and analyze the output of computer programs and scripts for cyber operations, cybersecurity, and computer forensics applications and develop a virtualized computing environment that’s used to work with cyber operations tools.Explore Courses
Course Spotlight: CYB 438 – System Vulnerability Assessments
Become aware of the threats to information systems and learn the processes for performance of audits, penetration tests, and architecture reviews. Use the latest tools to gain practical experience conducting assessments and preparing reports.
More Options for Your Degree
Frequently Asked Questions
Advancing your life and career with an online degree comes with lots of questions, and we want to ensure your search for answers is effortless. If you have a question we haven’t covered, call (866) 295-3106 to speak with an enrollment counselor.
You can earn your bachelor’s degree in approximately three years by taking one class every 8 weeks in each 16-week semester. With Program Director permission, you can complete the program in a shorter time frame by taking more credits per semester.
Opportunities abound in this incredible field. There will be 3.5 million unfilled jobs in cybersecurity by 2021 and it’s projected cybercrime will cost organizations worldwide $6 trillion.
Companies desperately need qualified information security experts. 100,000 new jobs were posted in 2016 alone, and the median pay for entry-level Information Security Analysts was $95,510 in 2017.
Learn more about your career outlook in cybersecurity.
You don’t need a background in cybersecurity or computer science to apply to this program. Learn more about the admission requirements for this program.
This 60–63-credit program (variable based on your specialization and senior project) costs $475 per credit hour. Before including fees and other education costs, your tuition estimate is $28,500–$29,925.
Learn more about tuition for this program.
It’s up to you. We’ve designed our program to fit into the lives of students as they maintain full-time employment. As such, a typical course load is one class every eight weeks in each 16-week semester. This is considered full-time for financial aid purposes.
To begin with, you’ll take classes that give you a solid foundation of cybersecurity and computer science knowledge and skills. You will also focus your coursework through one of four specializations:
- Network Forensics and Intrusion Investigation
- Information Assurance
- Cybercrime and Fraud Investigation
- Cyber Operations
Learn more about how our cybersecurity curriculum prepares you to guard private information, identify network weaknesses, and defend against threats from hackers, malware, and other cyberthreats.
- The Economist (2017, May 6). Data is giving rise to a new economy. The Economist. Retrieved on December 5, 2018, from https://www.economist.com/briefing/2017/05/06/data-is-giving-rise-to-a-new-economy
- Collins, A. (2018). The Global Risks Report 2018. Retrieved from http://www3.weforum.org/docs/WEF_GRR18_Report.pdf
- PricewaterhouseCoopers (2018). PwC, 21st CEO Survey. The Anxious Optimist in the Corner Office. Retrieved on December 5, 2018, from https://www.pwc.com/gx/en/ceo-agenda/ceosurvey/2021.html
- PricewaterhouseCoopers (2018). Revitalizing privacy and trust in a data-driven world. Key findings from The Global State of Information Security® Survey 2018. Retrieved on December 5, 2018, from https://www.pwc.com/us/en/services/consulting/cybersecurity/library/information-security-survey.html
- ISACA (Information Systems Audit and Control Association) (2018). State of Cybersecurity 2018. Retrieved on December 5, 2018, from https://cybersecurity.isaca.org/state-of-cybersecurity
- Bureau of Labor Statistics. (2018, April 13). Information Security Analysts. Retrieved on December 5, 2018, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm