Bachelor of Science in
Cybersecurity (BSCYB),
Digital Forensics
4-week
COURSES
Year-round
enrollment
240K+ Alumni Worldwide
Overview
The Bachelor of Science in Cybersecurity (BSCYB) program prepares those who wish to meet the increasing demand for cybersecurity professionals in nearly all modern organizations. The coursework provides you with an understanding of basic information technology management concepts, fundamental security skills, and the legal and ethical issues associated with cybersecurity. The Digital Forensics specialization provides a greater focus on investigation and analysis of computer systems and networks. Upon completing this program, you’ll be prepared to work in positions such as security analyst, computer network defender, and computer incident responder.
Course Details
Foundation Technologies Courses
For the Bachelor of Science in Cybersecurity degree with a specialization in Digital Forensics, you must complete six foundational courses, a core sequence of five courses, a second core sequence of six courses, three project courses, and four specialization courses.
Course Name
This course provides an introduction to basic network concepts including local area networks, wireless networks, and wide area networks. Network security concepts are also introduced. Students will explore secure router configurations.
An introduction to the basic architecture and functions of an operating system. Computer hardware and software integration will be explored. Basic design and functionality of the Windows and Linux operating systems will be explored. In addition, core aspects of securing operating systems are covered.
An introductory survey course that explores the fundamental concepts of cybersecurity. Coverage includes the concepts of confidentiality, integrity, and availability, cybersecurity policy, and the ethical and legal aspects of cybersecurity.
Prerequisite: CYB 206
The principles of data security are introduced. Students will learn how to protect data in transit and at rest. The technical aspects of implementing encryption, authentication, and access control to protect data will be covered along with the development and implementation of associated policy. Basic database security concepts and guidelines will be covered.
Prerequisite: CYB 202; CYB 204
This course introduces the fundamental concepts of cloud computing and virtualization. The core cloud deployment and service models will be covered. A comparison of public and private cloud deployments will be conducted. The concepts of devops and continuous integration will be introduced.
Prerequisite: CYB 215
This course introduces the fundamental concepts of programming for cybersecurity professionals. A survey of program tools will be conducted. The use of PowerShell, scripting, and python to implement system security will be covered in this class.
First Core Sequence
Course Name
Provides instruction and practice on the writing skills needed to create clear and concise technical documents. Students will understand how to explain technical topics to non-technical leadership. The Project planning and management concepts will be introduced.
Prerequisite: CYB 216
This course covers the secure administration of Linux based systems. Students will learn how to implement and assess standards based security measures on the Linux operating systems. Automating the implementation and assessment of security measures will be a core component of the class. Legal and ethical aspects of system administration will also be covered.
This course covers the secure administration of Windows based Desktop and server systems. Students will learn how to implement and assess standards based security measures on Windows based operating systems. Automating the implementation and assessment of security measures will be a core component of the class. Legal and ethical aspects of system administration will also be covered.
Prerequisite: CYB 331; CYB 332
This course builds on CYB 216 and covers advanced topics in security automation. Students will learn how to manage security related code in a software repository. Students will write integrated scripts to implement and assess system security. Use of devops automation tools to securely manage infrastructure will also be covered.
Prerequisite: CYB 333
An explanation of the development and design of system architectures that meet cybersecurity requirements. Students will examine methods to translate technology and environmental conditions (e.g., law and regulation) into system and security design.
Second Core Course Listings
Course Name
Recommended: Prior completion of: CYB 340 At least 13.5 units of the first core sequence must be completed before this course.
An examination of the various tools and frameworks to conduct a system/network security audit or assessment. Various IT audit frameworks, government and non-government, will be covered. Legal and ethical aspects of IT auditing and assessment will be covered.
Prerequisite: CYB 340
An exploration of the tools and techniques to collect and analyze cyber threat information. The class will cover the collection and analysis of log data, threat intelligence data, and Indicators of Compromise to detect malicious activity.
Prerequisite: CYB 340
An examination of the tools and methods for incident response. Topics include preparation data collection, incident analysis preserving data, and recovery. The legal and ethical aspects of incident response will also be covered.
Prerequisite: CYB 340
This course examines common ethical hacking methods along with hands-on application of security tools to test network and systems security. The planning and execution of a penetration test will be covered. The legal and ethical aspects of penetration testing will be discussed.
A detailed examination on the concepts of network defense and the various tools to protect and monitor a network. Students will learn how to implement an Intrusion Detection System, conduct network monitoring traffic analysis, and honeypots. Development of associated policy will also be covered.
Prerequisite: CYB 340
A detailed examination on the development of organizational cybersecurity policy that meet an organization’s compliance requirements and business goals. The creation of a cost benefit analysis when developing policy and system requirements.
Second Core Course Listings
Course Name
Prerequisite: CYB 460; CYB 461; CYB 462; CYB 463, or CYB 470; CYB 471; CYB 472; CYB 473, or CYB 480; CYB 481; CYB 482; CYB 483
A capstone project focused on applying the knowledge and concepts learned through this program. Students will work as an individual or in a team to complete a practical or research related cybersecurity project. Grading is H, S or U only.
Prerequisite: CYB 499A
This course is a continuation of CYB 499A and continues the application of knowledge in the selected topic. Grading is H, S or U only.
Prerequisite: CYB 499B
This course is a continuation of CYB 499B and continues the application of knowledge in the selected topic. Students will present their findings to a panel of academic and business professionals. Grading is H, S or U only.
Specialization Courses
Course Name
Prerequisite: CYB 420 and completion of all core CYB classes before starting the concentration; CYB 450; CYB 451; CYB 452; CYB 453; CYB 454
Introduction of computer forensic principles. The class explores the concepts of admissibility of electronic evidence, preparing for e-evidence collection, and conducting a digital forensic examination of computers. Legal and ethical requirements of a digital investigator are also covered.
Prerequisite: CYB 470
This course provides an overview for collecting digital evidence from a Windows, Linux, and Mac operating systems. Operating specific tools and techniques for collecting file information, log information, data artifacts, web history and computer memory are explored.
Prerequisite: CYB 470
In this class, students learn the tools and techniques to collect and analyze network data to support a digital investigation. Students will gain practical experience by analyzing network traffic captures. Legal and ethical requirements of a network forensics investigation are also covered. Correlation of data from other sources will also be examined.
Prerequisite: CYB 470
Students will learn how to collect and analyze digital evidence from mobile devices. The tools and techniques that are unique for mobile device forensics like acquisition, physical isolation, sim cards, and file system recovery will be covered. Extraction of geolocation data and other cellular data will also be explored.
Learning Outcomes
Students earning the Bachelor of Science in Cybersecurity degree with a Digital Forensics specialization will learn to:
- Conduct a digital forensics investigation on a server or workstation using commonly accepted standards and tools
- Demonstrate the ability to preserve digital evidence using federal rules
- Conduct a digital forensics investigation on a mobile device using commonly accepted standards and tools
- Examine digital evidence for indications of illegal malicious activity or malfeasance
- Analyze a system problem and design cybersecurity measures appropriate to its solution
- Apply best practice concepts in cybersecurity management to enterprise processes
- Describe the ethical challenges that confront a cybersecurity professional
- Apply security control principles in the construction of cybersecurity solutions
- Demonstrate the written and oral communication skills expected of a cybersecurity professional
- Securely administer a Windows and Linux system using security automation tools and techniques
- Demonstrate the fundamental concepts of operating systems, networks, and cloud computing
Program Disclosure
Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.
Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.
NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.
All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.
National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.