B.S. in Cybersecurity: Information Assurance Specialization

Program Overview

Stand between attackers and our most critical data.

Data is one of a company's most important and strategic resources. As years pass, that importance will only increase, with The Economist projecting 180 zettabytes of data will be created and copied annually by 2025.1

Data is one of a company's most important and strategic resources. As years pass, that importance will only increase, with The Economist projecting 180 zettabytes of data will be created and copied annually by 2025.1

Defend Against the Next Breach

Unfortunately, today's information systems are ill-equipped to protect data, and high-profile breaches regularly make headlines—from Quora and Marriott to Equifax, Target, and Yahoo. During the next decade, such large-scale cyberattacks and data breaches are among the top risks to data.2

Whether cyberattackers are advancing a political agenda, gaining a business advantage, or hacking for pleasure, Utica College's online Bachelor of Science with the Information Assurance specialization prepares you to stop these criminals in their tracks, prevent future attacks, and protect this critical resource.

Utica College is a leader in cybersecurity education, designated as a National Center of Academic Excellence by the Department of Homeland Security and the National Security Agency.

 
Request More Information

We'd love to get to know you and hear more about your educational and professional goals. If you'd like to learn more about one of our programs, fill out this form and we'll be in touch:

          I consent to receiving SMS/MMS messages generated by an autodialer from Utica College or its representatives at the mobile number I provided. Consent is not required to receive information. Message & data rates may apply. Send STOP to 35254 to unsubscribe. Send HELP to 35254 for help. Click here for Terms & Conditions and Privacy Policy
          Yes! I'd like to schedule an appointment with an admissions counselor.If this option is not selected, an admission specialist will still contact you at a time of their choosing.
          CAPTCHA
          This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

          Career Outlook

          "It takes 20 years to build a reputation and few minutes of cyber incident to ruin it." – Stephane Nappo, Societe Generale Chief Information Security Officer

          Demand for information assurance (IA) and IA professionals is high, all over the world. The field's driven by both the threat of attacks and by consumers who demand protection, who want to feel secure when they buy products and use services that require their personal data.

          Companies worldwide are responding by investing in information assurance:

          • 87% will invest in cybersecurity to build trust with customers3

          • 46% in the financial sector will increase their investment in encryption4

          • 46% will boost investment in biometrics and advanced authentication4

          And yet, ISACA's State of Cybersecurity 2018 report5 shows there is a startling skills gap:

          • 60% of organizations had open cybersecurity positions due to a lack of qualified candidates

          • 51% of organizations report it takes 3–6 months to hire for a cybersecurity position

          • Security engineers and information security analysts were most in need

          That investment in information assurance translates into job opportunities, and job security, for you. Our specialized bachelor's in cybersecurity can give you the skills you need to address this hiring gap and find success in information assurance.

          Career Spotlight: Information Security Analysts

          $95,510/year

          As an information security analyst, you'd be charged with protecting computer networks and systems. You would actively monitor for security breaches, create innovative solutions to prevent attackers from accessing data, investigate violations, and minimize risks when attacks do occur. You would also develop information assurance standards, update best practices, and more. This position has a median annual salary of $95,510, with 28 percent projected growth in job opportunities by 2026.6

          Other titles you may qualify for:

          • Corporate and Industrial Security
          • Law Enforcement
          • Government Intelligence Services, including the FBI, CIA, NSA
          • Homeland Security
          • Banking and Finance
          • Healthcare

          JOBS AND INCOME

          Curriculum: Leading-Edge Methods and Practices

          Through four elective courses, you'll learn to protect an organization's data, as well as its facilities, systems, and networks for processing, storing, and transmitting that data.

          Gain hands-on experience to excel in information assurance, minimize risk after intrusions, and prevent cybercrime. Focus on skills and topics specific to defending computer systems and networks, including such technical aspects as object-oriented programming, computer arithmetic, and Boolean algebra.

          You'll learn a systematic approach to establish, manage, and operate an effective IA program with the latest methodologies and practices available to protect critical-information systems.

          Course Spotlight: CYB 339 – Cyber Operations Tools

          Develop, run, and analyze the output of computer programs and scripts for cyber operations, cybersecurity, and computer forensics applications and develop a virtualized computing environment that's used to work with cyber operations tools.

          EXPLORE COURSES

          Course Spotlight: CYB 438 – System Vulnerability Assessments

          Become aware of the threats to information systems and learn the processes for performance of audits, penetration tests, and architecture reviews. Use the latest tools to gain practical experience conducting assessments and preparing reports.

          More Options for Your Degree

          Frequently Asked Questions

          Advancing your life and career with an online degree comes with lots of questions, and we want to ensure your search for answers is effortless. If you have a question we haven't covered, call (866) 295-3106 to speak with a program manager.

          You can earn your bachelor's degree in approximately three years by taking one class every 8 weeks in each 16-week semester. With Program Director permission, you can complete the program in a shorter time frame by taking more credits per semester.

          Opportunities abound in this incredible field. There will be 3.5 million unfilled jobs in cybersecurity by 2021 and it's projected cybercrime will cost organizations worldwide $6 trillion.

           

          Companies desperately need qualified information security experts. 100,000 new jobs were posted in 2016 alone, and the median pay for entry-level Information Security Analysts was $95,510 in 2017.

           

          Learn more about your career outlook in cybersecurity.

           

          You don't need a background in cybersecurity or computer science to apply to this program. Learn more about the admission requirements for this program.

          This 60–63-credit program (variable based on your specialization and senior project) costs $475 per credit hour. Before including fees and other education costs, your tuition estimate is $28,500–$29,925.

          Learn more about tuition for this program.

          It's up to you. We've designed our program to fit into the lives of students as they maintain full-time employment. As such, a typical course load is one class every eight weeks in each 16-week semester. This is considered full-time for financial aid purposes.

          To begin with, you'll take classes that give you a solid foundation of cybersecurity and computer science knowledge and skills. You will also focus your coursework through one of four specializations:

          • Network Forensics and Intrusion Investigation
          • Information Assurance
          • Cybercrime and Fraud Investigation
          • Cyber Operations

          Learn more about how our cybersecurity curriculum prepares you to guard private information, identify network weaknesses, and defend against threats from hackers, malware, and other cyberthreats.

          SOURCES:

          1The Economist (2017, May 6). Data is giving rise to a new economy. The Economist. Retrieved on December 5, 2018, from https://www.economist.com/briefing/2017/05/06/data-is-giving-rise-to-a-new-economy
          2Collins, A. (2018). The Global Risks Report 2018. Retrieved from http://www3.weforum.org/docs/WEF_GRR18_Report.pdf
          3PricewaterhouseCoopers (2018). PwC, 21st CEO Survey. The Anxious Optimist in the Corner Office. Retrieved on December 5, 2018, from https://www.pwc.com/gx/en/ceo-agenda/ceosurvey/2018/gx
          4PricewaterhouseCoopers (2018). Revitalizing privacy and trust in a data-driven world. Key findings from The Global State of Information Security® Survey 2018. Retrieved on December 5, 2018, from https://www.pwc.com/us/en/services/consulting/cybersecurity/library/information-security-survey.html
          5ISACA (Information Systems Audit and Control Association) (2018). State of Cybersecurity 2018. Retrieved on December 5, 2018, from https://cybersecurity.isaca.org/state-of-cybersecurity
          6Bureau of Labor Statistics. (2018, April 13). Information Security Analysts. Retrieved on December 5, 2018, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm