Join one of the fastest growing careers with a Bachelor's in Cybersecurity and Networking - online
Cyberattacks seem to be in the news every day, with hackers finding ways to steal valuable info. Get the online Cybersecurity and Networking degree you need to help protect companies and individuals from cybercrimes.
Kickstart your IT career by gaining the valuable knowledge and skills employers want. Your degree in Cybersecurity and Networking will teach you computer information systems operations, administration, and management, including networking, database management, client interface, information security, and information protection.
- Information security specialist
- Network administrator
- Project manager
- Systems analyst
WHAT YOU WILL LEARN
Some of the knowledge and skills you could learn from this online Cybersecurity and Networking degree program include:1
- Information security management
- Ethical hacking
- Computer forensics
- Computer servicing
- Workstation and server administration
- Security concepts
- Cloud and mobile computing
- Network communications
- Operating systems
- Project management
Cybersecurity and Networking
Companies everywhere are in need of professionals with high-tech skills in system security and networking. Become a leader in the IT space by earning your BS in Networking and Information Systems Security.
Advanced Server Administration
This course provides concepts of the installation, configuration, administration of servers, users and groups, and provisioning services and infrastructure to be successful in an enterprise environment. Advanced concepts include server deployment, the maintenance and upgrading network load balancing (NLB), server clusters, disaster recovery, failover, redundancy, and fault tolerance.
Prerequisites: MCS200 or with the consent of the Dean.
Business Computer Fundamentals
This course explores the introductory use of word processing, spreadsheet, and presentation applications. Students will learn computer skills, including document and spreadsheet creation and presentation techniques. Emphasis is on utilization of basic application skills to complete general business tasks.
Students will prepare a formal project proposal and prepare the build foundation and framework in one of the following areas: database programming, web page programming, networking, information security, ethical hacking, or technology-based solutions. Once the proposal is approved, the student will submit an original paper of research and analysis utilizing appropriate APA format. Students will also deliver project build files to support the completion of the project. (Students may select an experiential learning opportunity with Dean approval of both a location and project.)
Cloud and Mobile Computing Concepts
This course introduces students to topics in key concepts and background necessary to provide context on the importance of cloud computing and transforming an organization into an agile, flexible, and operationally efficient business. Students will also be introduced to technologies and software suites the delve into cloud administration and operations by deploying virtual machines and application containers, managing role-based access control, services catalogs, and reporting and chargeback systems.
Students will learn the principles and techniques of computer forensics. Emphasis will be on the investigative process, conducting forensics on multiple computer hardware and software platforms, and creating an attacker profiling scenario. Students will become familiar with the tools used in conducting computer forensics, discuss how to defeat anti-forensics techniques, and demonstrate how to compile and document investigative reports. Students will learn how to conduct forensics analysis on databases, cloud data and information and web attacks.
Students will identify and analyze statutory, regulatory, constitutional, and organizational laws that affect the information technology professional. This course will explore the complex legal issues as they relate to technological advancements. Topics will include the introduction to many of the current laws and acts affecting technologies today including: the Computer Fraud and Abuse Act, the Wiretap Act, the Stored Communications Act and the Cybersecurity Act, and various additional new laws that are enacted.
Cryptographic and Cipher Technologies
Students will be introduced to the many cryptographic and cipher technologies used to protect information a virtual environment. This course will focus on public key cryptography and the RSA algorithm. Students will learn about stream and block cipher algorithms, as well as the advanced encryption standard for symmetric and asymmetric-key encryption. Concepts will include specific security requirements, such as authentication, privacy, confidentiality, integrity and hash functions.
Students are introduced to hacking methodologies and stages, such as foot printing, scanning, and enumeration. This course will focus on the tools and techniques used by the attacker to achieve their goal of gaining and maintaining access to a system. Students will learn about the different techniques used to access a system, privilege escalation, creating and maintaining remote access to a system, different types of rootkits, and how hackers hide the evidence of a system compromise. Students will also learn how to perform and document system hacking penetration testing.
Information Security Management
In this course students are introduced to the different elements of information security, from the safeguard of information and information systems that use, store, and transmit information to the unauthorized access, disclosure, alteration and destruction of information. Upon completion of this course students will be able to: describe and understand current security trends, elements of information security, information security threats, hacking concepts and penetration testing processes.
Students will be introduced to common storage networking architecture used by enterprises for business-critical applications. Students will learn methodologies and tools for security, data protections, and disaster recovery. Students will learn to design network storage to remove single points of failure and become highly available and resilient to failures.
Intermediate Networking Concepts
This course introduces internet connectivity, including networking concepts, remote access, and wireless standards. Students will learn the concepts of network policies and procedures, troubleshooting, network vulnerabilities and threats, firewalls, and basic security in small networks and learn to monitor and manage network operations.
Prerequisites: NET100 or with the consent of the Dean.
Intermediate Security Concepts
This course delves into more advanced security measures and functions including those surrounding networks, malware, password attacks, O/S and application hardening, servers, backups, data defenses, vulnerability assessments, penetration testing, logging and audits.
Prerequisites: NET105, or with the consent of the Dean
Introduction to Hardware and Firmware
This course introduces the student to hardware components of a computer system, firmware used in the systems, and mobile devices. Networking cables, connectors and devices are reviewed to properly configure and interconnect computer systems in addition to their peripherals. Safety concepts and procedures are covered, including electrostatic discharge (ESD) and electrical shock hazards. In this course, a student will disassemble a computer then properly identify and be able to correctly troubleshoot all hardware components. The student will then properly assemble the computer and verify proper operation.
Introduction to Networking Concepts
This course provides an introduction to the concepts of networking, networking types and topologies, and devices used for common network services. Students learn vocabulary and network terminology, protocols, and the concept of creating a network.
Introduction to Operating System Installation and Configuration
This course focuses on Windows Operating System installation and proper configuration for use on a network. Students will identify common features and functionality of the Mac and Linux Operating Systems. Students will learn the threats and vulnerabilities to resolve them with common prevention methods. This course focuses on install configure and be able to properly troubleshoot an operating system. Additionally, students will learn appropriate safety procedures, environmental controls of disposal methods, explain privacy, licensing and policy concepts.
Prerequisites: MCS100 or with the consent of the Dean.
Introduction to Operating Systems
This course covers topics including installing and upgrading Windows as well as configuring hardware, applications, and network connectivity. Upon completion, students will be able to perform configuration and support for computers, devices, users, and associated network and security resources, as well as configure and manage advanced network services in a hands-on environment.
Introduction to Security Concepts
This course introduces foundational concepts in IT Security including access control, cryptography/encryption, security policies, hardware and perimeter defenses, including firewalls.
Introduction to Server Administration
In this course, students will learn to install, configure, and administrate servers in a host and compute environments, work with storage solutions, and virtualization Concepts include advanced networking, controlling a work environment or user accounts, PowerShell, and the use of groups of servers that share workloads to prevent single points of failure.
Prerequisites: NET100 or with consent of the Dean
Linux Operating Systems
This course covers the concepts of the Linux operating system. Topics include X Window system, clients, networking, shell and scripting. Students will be able to install, configure, and administer the Linux operating system. Emphasis will be placed on the hardware, management, configuration, security and documentation of the operating system. Upon completion, students will be proficient with all topic areas of a Linux environment.
Prerequisites: OPS105 or with the consent of the Dean.
Network Communications: Architecture, Structure, and Functions
This course covers networking architecture, structure, and functions. The course introduces the principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations to provide a foundation for the curriculum. By the end of the course, students will be able to explain network technologies, how devices access local and remote network resources, describe router hardware, how switching operates in a small to medium-sized business network, design an IP addressing scheme, configure initial settings on a network device, implement basic network connectivity between devices and configure monitoring tools for small to medium-sized business networks.
Prerequisites: NET105 or with consent of the Dean.
Network Communications: Large Networks
This course covers the architecture, components, and operations of routers and switches in larger and more complex networks. Students learn how to configure routers and switches for advanced functionality. By the end of this course, students will be able to configure and troubleshoot routers and switches, resolve common issues with OSPF, EIGRP, and STP in both IPv4 and IPv6 networks, implement a WLAN in a small-to-medium network.
Prerequisites: NET 305 or with consent of the Dean
Network Communications: Network Services
This course discusses the network services required by converged applications in a complex network. By the end of this course, students will be able to configure and troubleshoot network devices, resolve common issues with data link protocols, resolve common issues with OSPF, EIGRP, and STP in both IPv4 and IPv6 networks, implement virtual private network (VPN) operations in a complex network.
Network Communications: Small Networks
This course covers the architecture, components, and operations of routers and switches in a small network. Students learn how to configure a router and a switch for basic functionality. By the end of the course, students will be able to determine how a router will forward traffic, explain how switching operates in a small to medium-sized business network, configure Ethernet switch ports, implement VLANs, implement static routing, implement DHCP on a router, implement network address translation (NAT), implement access control lists (ACLs) to filter traffic.
Prerequisites: NET 300 or with consent of the Dean.
Network Communications: WAN Technologies
This course discusses the WAN technologies required by converged applications in a complex network. The course enables students to understand the selection criteria of network devices and WAN technologies to meet network requirements.
Prerequisites: NET400 or with consent of the Dean
In this course, students apply the techniques and strategies learned within the Psychology of Motivation for more in-depth exploration of relevant employment resources, for the development of documents to submit in job application processes, including resumes, cover letters, reference letters, follow up correspondence, and other written communications. Through the course, students will enhance individual verbal communication and interview skills. Students will also learn how to prioritize job search activities, and to appropriately manage and organize relevant documents and records. Upon completion of this course, students will have completed a portfolio of resources and documents to support their current and future job searches and be more informed about the strategies and processes that can more effectively support such efforts.
Psychology of Motivation
This course introduces students to the skills, characteristics, and habits that will help them be successful in a college environment and future careers. Such a desire for goal-oriented behavior is commonly referred to as motivation, and such motivation can propel students toward accomplishing their academic and vocational goals. Couse topics include time management, problem solving, goal setting, career planning and preparation, and a range of additional student success strategies. Upon course completion, students will be more informed and better prepared to progress in their programs and in their efforts to advance their desired career goals (i.e., students will be more academically prepared in knowledge and practical training within an occupational area and also enhance their abilities to support their job searches and submitting application documents such as documents created using standard writing guideline formats).
Technical Project Management
This course develops a foundation of concepts and solutions that supports the successful completion of a project. Common project management methodologies are introduced including; Agile, Scrum, Lean, Waterfall, PMP, ITIL, Six Sigma and PMI/PMBOK. Emphasis will be placed on project management techniques such as internal and external communication, monitoring, budgeting, scheduling, completion, and project management information systems.
Threat and Defense Mechanisms
In this course students will be provided with comprehensive information on computer and internet session hijacking. Students will be presented with session hijacking concepts at the application and network-levels. They will also learn about the tools and countermeasures used to prevent hijacking and threats, as well as penetration testing steps an ethical hacker should follow while performing a systems security assessment.
Advanced Interpersonal Communication
This course is designed to provide students with the skills they need to be effective communicators. Students will apply interpersonal communication skills theory to various situations in order to understand the clear connections between theory, skills, and life situations they will encounter.
This course covers American history from colonization to the present. Emphasis is on the relevance of cultural, economic, political, and social developments in the United States.
This course covers introductory algebraic expressions, formulas, and solving equations. Students learn graphing, numerical sets, exponents, radicals, and inequalities.
Communication and Public Speaking
This course focuses on the principles of effective public speaking and presentation. Focus is on the preparation, presentation, and critique of various forms of oral communication. Emphasis is placed on development, delivery, presentation aids, and persuasive speaking.
This course is designed as an interdisciplinary approach to critical thinking in a modern world. This course will challenge students to learn how to reflect, identify previous assumptions, and be able to analyze and apply common problem-solving techniques associated with the task of thinking critically and challenging the everyday norms.
English Writing Fundamentals
This course focuses on the principles of effective English composition with a comprehensive review and reinforcement of language arts skills. Emphasis is placed on the four essentials of writing: unity, support, coherence, and sentence skills. Practice in proofreading, editing, revision, and clear thinking is incorporated throughout the course.
This course covers basic microeconomic concepts. Topics include recession and depression, the circular flow of production and consumption, the role of the market in the economy, wage and price movements, the functions of markets in capitalism, and government interference in free markets. Emphasis is placed on students acquiring the critical thinking skills of economics.
Research Application Methods
This course explores real world applications in statistics. Topics covered will be analyzing and creating graphs, survey techniques, preparing surveys and analysis of data. Emphasis will be placed on understanding the use of graphs, surveys and the importance of statistical analysis in a business setting.
This course focuses on the practical skills needed in statistics analysis. Topics include distributions, relationships, randomness, inference, proportions, regression, and variance. Emphasis is placed on understanding the use of statistical methods and the demands of statistical practice.
Prerequisites: MAT 225 or with the consent of the Dean.
To access the Online Cybersecurity and Networking Program Overview click here
Why Choose Independence University?
IU's online and on-campus degree programs can help you prepare for employment in some of today's most rewarding job fields. Our programs are career-focused, without elective courses that you don't want or need, so you can finish your degree fast.
- Employment focused
- Path to a better career
What to Expect with an Online Degree in Cybersecurity and Networking
If you want to become a computer science professional and help guide the future of networking and information systems security, you could be an ideal candidate for an online degree in Cybersecurity and Networking. Many students find that an online degree program is the best way to fit college into a busy schedule because you can do your coursework at any hour and in any location with an internet connection. With a degree from Independence University (IU), you can show that you’re prepared for a potential career in computer networks and cybersecurity.
Start fresh with a new laptop
IU helps you get a fresh technological start by providing you with a new laptop equipped with the software you need in your degree program. It's yours to use in school and keep after graduation.
Four-week modules instead of four-month semesters
At IU, courses are taught in four-week modules, so you can start sooner and focus on fewer courses at a time. You’ll participate online in weekly assignments, assessments, and discussion boards. To further deepen your knowledge and understanding, you'll also complete daily online checkpoints, such as reviewing an article about cybersecurity and then answering a question.
During your online degree program, you’ll develop the skills you need for a possible career in cybersecurity and networking, including how to:
- Handle complex levels of computer information systems operations, administration, and management
- Network computers
- Manage databases
- Interface with clients
- Secure and protect information
You’ll take several essential courses as you pursue your degree, including:
- Ethical Hacking
- Threats and Defense Mechanisms
- Information Security Management
- Introduction to Cryptography
- Computer Law
- Computer Forensics
- Server Administration
- Networking Concepts
- Cloud/Mobile Computing Concepts
When you need extra help as an online student at IU, your instructors and tutors will provide one-on-one support. IU is committed to helping you prepare for success as a professional in the fast-growing field of cybersecurity and networking.
What to expect as you pursue a career
As a graduate of IU’s Cybersecurity and Networking degree program, you can seek entry-level to mid-level positions as a network administrator, project manager, systems analyst, or security expert. You could also use your networking and cybersecurity skills as an entrepreneur.
Independence University is nonprofit, which means we put student needs first. All your courses and tools have been carefully designed to maximize your success. At IU, your educational journey will challenge you but also enrich you as you prepare for future career growth.