Online Bachelor’s in Cybersecurity Curriculum
Online Bachelor’s in Cybersecurity Curriculum
Online Bachelor’s in Cybersecurity Curriculum

From personal passwords to massive government or institutional databases, cybersecurity impacts us in countless ways. And while notable breaches, such as the 2017 Equifax breach, or WikiLeaks revelations likely spring to mind when thinking about the term “cybersecurity,” in reality, this field has an impact much closer to home. Cybersecurity keeps your financial information safe, ensures your workplace network can’t be compromised, and protects your personal computer from malware or viruses.

If you’re interested in how security breaches happen — and how to prevent them — you may be interested in a Bachelor of Science in Cybersecurity. The curriculum for this type of degree strives to prepare students for future careers as cybersecurity professionals.

Courses can be completed in just 8 weeks each

100% online coursework

89% of company executives rank cybersecurity as a high priority (Comcast Business)

The global coast of cybercrime in 2020 was nearly $1 trillion (Parachute)

93% increase in ransomware attacks in 2021 (Check Point)

600% increase in phishing attacks (Fintech News)

Maryville University online Bachelor of Science in Cybersecurity curriculum

The online Bachelor of Science in Cybersecurity program at Maryville University aims to prepare students for professional success in the field of cybersecurity.

Learn more about Maryville’s online Bachelor of Science in Cybersecurity course offerings here:

Cybersecurity Major Requirements

Business Core

  • This course covers commonly used software installed on PCs and laptops, web-based technologies, and applications (apps) used on digital devices. Information literacy and database concepts are also covered in this course.

  • In today’s business world, effective communication, whether it is delivered face-to-face or in a written format, is essential. This course increases the ability of students to express themselves effectively through various forms of communications channels. The course is designed to enhance the quality of student’s communication skills.

  • This course focuses on how business events affect financial statements by acquiring a working knowledge of basic accounting theory and concepts. Topics include the role of accounting in decision making; the recording procedures that accountants use to organize information for financial statement preparation; and analytical tools and accounting principles to aid in reading and interpreting financial statements.

  • The concepts of managerial accounting are covered in this course. Emphasis is placed on the preparation and use of financial information for planning, decision making and control. The course will address cost classifications, product and service costing methods and systems, profit planning, measuring performance, and the new manufacturing environment.

  • This course introduces the economic perspective on decisions currently faced by individuals, businesses, and society. Basic economic principles and methods are used to address both microeconomic and macroeconomic topics, with a focus on the modern market economy. Essential content includes the laws of supply and demand; the behavior of consumers and firms; the function of resource markets; macroeconomic measures of economic growth, unemployment, and inflation; the use of fiscal and monetary policy to achieve macroeconomic goals; and an overview of international trade.

  • This course develops business data analysis skills and statistical techniques using spreadsheets. Topics include data collection storage and analysis using descriptive statistics, tables and charts; probability and data distributions, statistical tests, correlation, regression, forecasting, and quality control analysis.

  • This course examines legal rights and ethics, crimes, torts, contracts, personal property, bailments and sales.

  • This course studies the basic theories and concepts of management including the evolution of management, ethics, decision making, organizational structure, motivation, communication, group dynamics and team building, planning, job design, leadership and organizational change.

  • An introduction to the concepts of marketing and their application to those engaged in marketing consumer and industrial goods and services; pricing, product planning, distribution and promotion.

  • Students examine basic financial management of business firms: a) procurement, b) allocation and c) control of funds; corporate financial behavior; financial instruments and markets; and the analysis and interpretation of investment and profit performance.

  • This course examines business operations as they relate to both product and service type components. The course provides techniques of production and operation, as well as techniques for service type organizations.

  • This course focuses on the tools and concepts of strategic management as applied within the business context. Students will develop both the understanding and analytical skills necessary for strategic analysis, formulation and implementation. The course will also involve integration of concepts from prior business core courses.

Cybersecurity Core

  • This course covers analysis and documentation of business processes and the design and use of information systems to automate these processes on the desktop, web and mobile platforms.

  • This course will allow students to implement and audit the Critical Security Controls as documented by the Council on Cyber Security. These Critical Security Controls are rapidly becoming accepted as the highest priority list of what must be done and proven at nearly all organizations.

  • This course covers the business data analysis using spreadsheets and databases. Topics include Excel tables and Pivot tables and the development, administration and management of relational databases. The course uses Microsoft SQLServer and/or MySQL as the primary database management systems with a focus on database design and interaction with other applications.

  • This course is an introduction to designing algorithms and implementing them as programs. Emphasis is placed on analyzing problems, designing solutions that are efficient in both expression and execution, and translating the solutions into well-designed programs. No prior experience with computer programming is expected or required.

  • This course will expose students to Windows, Linux, and Unix operating systems. This also includes a review of popular applications on these platforms and scripting with PowerShell.

  • This course will discuss information security and policies in the private sector related to privacy, incident response, computer crime, intellectual property, and pending/recently decided cases.

Cybersecurity (General) Track

  • This course will involve assessing target networks and hosts for security vulnerabilities. Specific penetration testing and ethical hacking methodologies will be discussed and used on network devices, client machines, and mobile devices.

  • This course builds on ethical hacking and penetration testing techniques learned in ISYS-470. Specific attention is paid on examining web application security.

  • This course will examine both network device security and wireless security issues. For wireless security, specific attention will be paid on WiFi and Bluetooth technologies.

  • This course is designed for students to secure their mobile devices by designing, deploying, operating and assessing a well-managed and safe mobile environment. You will learn how to capture and evaluate mobile device network activity, disassemble and analyze mobile code, recognize weaknesses in common mobile applications and conduct full-scale mobile penetration tests.

  • This course will examine SIEM capabilities to facilitate the management of security-related events, by assessing log data and correlating information coming from various sources.

  • Virtualization technologies require planning with regard to access controls, user permissions and traditional security controls. Virtualized infrastructure is being located in the cloud which will dictate policies and processes that will need to be adapted to work within a cloud structure.

  • This course will focus on digital forensic practices, tools, and exercises for the collection of electronic evidence on network, client, and mobile devices. Specific discussion will also include the introduction process of this electronic evidence in civil and criminal cases.

  • In this experience, students will be a security analyst on a team providing cybersecurity services to real-world clients (local non-profits, startups, community organizations, schools, and school districts). Students will work as a consultant, helping the clients of the Maryville University Cyber Fusion Center managed security service provider improve their cybersecurity defenses, with an emphasis on performing vulnerability scans and penetration tests, delivering professional, actionable reports and threat intelligence. Related Courses: ISYS 690 Prerequisite: Any 400 level Cybersecurity course

Cybersecurity (Offense) Track

  • This course will involve assessing target networks and hosts for security vulnerabilities. Specific penetration testing and ethical hacking methodologies will be discussed and used on network devices, client machines, and mobile devices.

  • This course will examine both network device security and wireless security issues. For wireless security, specific attention will be paid on WiFi and Bluetooth technologies.

  • This course is designed for students to secure their mobile devices by designing, deploying, operating and assessing a well-managed and safe mobile environment. You will learn how to capture and evaluate mobile device network activity, disassemble and analyze mobile code, recognize weaknesses in common mobile applications and conduct full-scale mobile penetration tests.

Cybersecurity (Defense) Track

  • This course will examine SIEM capabilities to facilitate the management of security-related events, by assessing log data and correlating information coming from various sources.

  • Virtualization technologies require planning with regard to access controls, user permissions and traditional security controls. Virtualized infrastructure is being located in the cloud which will dictate policies and processes that will need to be adapted to work within a cloud structure.

  • This course will focus on digital forensic practices, tools, and exercises for the collection of electronic evidence on network, client, and mobile devices. Specific discussion will also include the introduction process of this electronic evidence in civil and criminal cases.

To ensure the best possible educational experience for our students, we may update our curriculum to reflect emerging and changing employer and industry trends. Undergraduate programs and certificates are designed to be taken at a part-time pace. Please speak to your advisor for more details.

Ready for your next step?

Get Admission Requirements

Skills, concepts, and opportunities gained with a bachelor’s degree in cybersecurity

A typical bachelor’s in cybersecurity curriculum consists of courses that can give students in-depth knowledge and skills in several aspects of cybersecurity. Many of these cybersecurity courses will cover the following skills and concepts.

  • Digital forensics, incident response, and malware analysis. Cybersecurity professionals possess investigative and analytical skills. When a data leak or other cyber attack occurs, those working in cybersecurity apply those skills to determine what took place, how it happened, and how to prevent it from happening again.
  • Cyber law, policy, and compliance. If a government or organization doesn’t have the proper safeguards in place to protect data, it can risk a number of consequences, including revenue loss, a lack of public or consumer trust, or even regulatory fines and punishments. Students who want to enter the field of cybersecurity should have a handle on the types of laws and policies with which they’ll need to comply once they enter the field.
  • Advanced ethical hacking principles. Ethical hacking is the practice of attempting to penetrate a computer system or network with the objective of finding any vulnerabilities that could be exploited by malicious hackers. Students will learn about the ethical hacking of networks, computers, and mobile devices.
  • The value of cybersecurity to business processes. Increasingly, businesses are treating cybersecurity as a core element of their processes. As such, cybersecurity students need to understand how businesses work. Students will benefit from likely acquiring general business acumen in areas such as accounting, management, business law, and finance.

Common courses for undergraduate degree in cybersecurity students

These are some of the common courses offered for a cybersecurity degree. Though actual course titles may vary depending on the university, many cybersecurity programs offer courses that touch on the following concepts.

  • Ethical Hacking. Students will learn how to approach networks, computers, and mobile devices with the intent of discovering vulnerabilities that could be exploited by malicious hackers.
  • Digital Forensics. Digital forensics encompasses the collection and analysis of electronic evidence on network, client, and mobile devices. Students will also learn how this evidence is introduced in court.
  • Incident Response and Malware Analysis. Malware targets and infects Windows computer systems. In order to defend a network against malware, students learn how to recognize threats, respond to information security incidents, and establish defenses.
  • Cyber Law, Policy, and Compliance. Information leaks can lead to serious consequences for a business or organization. Students will learn about the policies and laws related to privacy, incident response, computer crime, and intellectual property.
  • Business Processes and Information Systems. Students learn about business processes, such as finance or compliance, as well as how information systems are used to automate these processes across desktop, mobile, and web platforms.

Be Brave

Bring us your ambition and we’ll guide you along a personalized path to a quality education that’s designed to change your life.