Online Bachelor’s in Cybersecurity Curriculum

Take Your Next Brave Step

Receive information about the benefits of our programs, the courses you'll take, and what you need to apply.

. Which degree track most interests you?
Which degree track most interests you?
We value your privacy.

From personal passwords to massive government or institutional databases, cybersecurity impacts us in countless ways. And while notable breaches, such as the 2017 Equifax breach, or WikiLeaks revelations likely spring to mind when thinking about the term “cybersecurity,” in reality, this field has an impact much closer to home. Cybersecurity keeps your financial information safe, ensures your workplace network can’t be compromised, and protects your personal computer from malware or viruses.

If you’re interested in how security breaches happen — and how to prevent them — you may be interested in a Bachelor of Science in Cybersecurity. The curriculum for this type of degree strives to prepare students for future careers as cybersecurity professionals.

Calendar Icon

Courses can be completed in just 8 weeks each

Computer and Mobile Device Icon

100% online coursework

89% of company executives rank cybersecurity as a high priority (Comcast Business)

World in Hand Icon

The global coast of cybercrime in 2020 was nearly $1 trillion (Parachute)

Cloud lock icon

93% increase in ransomware attacks in 2021 (Check Point)

Siren Icon

600% increase in phishing attacks (Fintech News)

Maryville University online Bachelor of Science in Cybersecurity curriculum

The online Bachelor of Science in Cybersecurity program at Maryville University aims to prepare students for professional success in the field of cybersecurity.

Learn more about Maryville’s online Bachelor of Science in Cybersecurity course offerings here:

Cybersecurity Major Requirements

Business Core

ISYS 100Digital Foundations3 Credits
BUS 150Business Communications3 Credits
ACCT 210Financial Accounting3 Credits
ACCT 211Managerial Accounting3 Credits
ECON 203Principles of Economics3 Credits
BUS 241Business Statistics3 Credits
BUS 280Business Law3 Credits
MGMT 321Principles of Management3 Credits
MKT 360Principles of Marketing3 Credits
FIN 312Principles of Finance3 Credits
BUS 314Operations Management3 Credits
BUS 491Business Policies (Capstone)3 Credits

Cybersecurity Core

ISYS 250Information Technology Concepts & Applications3 Credits
ISYS 280Cybersecurity Principles3 Credits
ISYS 307Database Design3 Credits
ISYS 320Introduction To Programming3 Credits
ISYS 325Applied Operating Systems3 Credits
ISYS 491Cyber Law, Policy, and Compliance3 Credits

Cybersecurity (General) Track

ISYS 470Ethical Hacking3 Credits
ISYS 471Advanced Ethical Hacking3 Credits
ISYS 474Networks and Security3 Credits
ISYS 475Mobile Security3 Credits
ISYS 480Security Information & Event Management3 Credits
ISYS 481Virtualization & Cloud Security3 Credits
ISYS 484Digital Forensics3 Credits
ISYS 490Maryville Security Operations Center3 Credits
ISYS 499Cybersecurity Internship

Cybersecurity (Offense) Track

ISYS 470Ethical Hacking3 Credits
ISYS 474Networks and Security3 Credits
ISYS 475Mobile Security3 Credits

Cybersecurity (Defense) Track

ISYS 480Security Information & Event Management3 Credits
ISYS 481Virtualization & Cloud Security3 Credits
ISYS 484Digital Forensics3 Credits

To ensure the best possible educational experience for our students, we may update our curriculum to reflect emerging and changing employer and industry trends. Undergraduate programs and certificates are designed to be taken at a part-time pace. Please speak to your advisor for more details.

Ready for your next step?

Skills, concepts, and opportunities gained with a bachelor’s degree in cybersecurity

A typical bachelor’s in cybersecurity curriculum consists of courses that can give students in-depth knowledge and skills in several aspects of cybersecurity. Many of these cybersecurity courses will cover the following skills and concepts.

  • Digital forensics, incident response, and malware analysis. Cybersecurity professionals possess investigative and analytical skills. When a data leak or other cyber attack occurs, those working in cybersecurity apply those skills to determine what took place, how it happened, and how to prevent it from happening again.
  • Cyber law, policy, and compliance. If a government or organization doesn’t have the proper safeguards in place to protect data, it can risk a number of consequences, including revenue loss, a lack of public or consumer trust, or even regulatory fines and punishments. Students who want to enter the field of cybersecurity should have a handle on the types of laws and policies with which they’ll need to comply once they enter the field.
  • Advanced ethical hacking principles. Ethical hacking is the practice of attempting to penetrate a computer system or network with the objective of finding any vulnerabilities that could be exploited by malicious hackers. Students will learn about the ethical hacking of networks, computers, and mobile devices.
  • The value of cybersecurity to business processes. Increasingly, businesses are treating cybersecurity as a core element of their processes. As such, cybersecurity students need to understand how businesses work. Students will benefit from likely acquiring general business acumen in areas such as accounting, management, business law, and finance.

Common courses for undergraduate degree in cybersecurity students

These are some of the common courses offered for a cybersecurity degree. Though actual course titles may vary depending on the university, many cybersecurity programs offer courses that touch on the following concepts.

  • Ethical Hacking. Students will learn how to approach networks, computers, and mobile devices with the intent of discovering vulnerabilities that could be exploited by malicious hackers.
  • Digital Forensics. Digital forensics encompasses the collection and analysis of electronic evidence on network, client, and mobile devices. Students will also learn how this evidence is introduced in court.
  • Incident Response and Malware Analysis. Malware targets and infects Windows computer systems. In order to defend a network against malware, students learn how to recognize threats, respond to information security incidents, and establish defenses.
  • Cyber Law, Policy, and Compliance. Information leaks can lead to serious consequences for a business or organization. Students will learn about the policies and laws related to privacy, incident response, computer crime, and intellectual property.
  • Business Processes and Information Systems. Students learn about business processes, such as finance or compliance, as well as how information systems are used to automate these processes across desktop, mobile, and web platforms.