180 total credits required
In our online bachelor’s in cybersecurity program, you’ll focus on learning skill sets that have a 32%-164% increase in demand through 2025.1 Our curriculum offers cybersecurity courses that build a strong foundation in computer science with a heavy emphasis on the practical, rather than theoretical, approach to the field.
This means our cybersecurity courses focus more on scripting and variable solutions versus algorithm development, so there’s minimal math coursework required.
Core cybersecurity courses, such as threat analysis, malware analysis and radiofrequency analysis, will prepare you to take on a number of security roles by graduation in small and medium-sized businesses.
EOU is dedicated to offering an affordable, accessible education that gets you into your career of choice sooner and offers a generous transfer policy for course credits.
We offer an Applied Science (A.S.) path for students with an associate degree and accept up to 135 college credits. You could also gain credit for life and work experience. There is no cost to you to have your previous credits reviewed, making it easy to get started now.
All EOU majors require a minimum of 20 EOU credits.
Computer Science – Required Courses:
Introduces basic data representation, branching and iteration, memory management, computer architecture, and the analysis and design of problem solutions.
Note: Online students complete CS 161A/161B in lieu of CS 161.
Introduces some common algorithms for searching and sorting, the analysis of algorithm complexity, exception handling, and file output.
An introduction to the basics of programming as used in C and C++, including selection statements, loops, arrays, string handling, pointers, registers and functions. Practical exercises will require the construction, compilation, debugging, and execution of complete programs that implement given algorithms to solve simple problems. The emphasis in this course will be on the common features of C and C++; however memory allocation and the use of pointers will be discussed.
An introduction to various implementations of commonly used data structures and their applications. Topics include lists, stacks, queues, trees and heaps.
A study of how computers are designed and organized at the hardware level. Topics covered include basic logic circuits, gates, processors, memory, instruction sets and programming in assembly language.
An introductory examination of the Open System Interconnection Reference Model (OSI). Topics covered include network architecture, data flow control, transmission control, path control, recovery, and routing techniques. Prerequisite: CS 162. Student must have at least sophomore standing to register for this course.
Institutional Graduation Requirement – UWR Covers models of software development, with emphasis on the prototyping model, and user interface design. Students will design an interactive product, producing deliverables for each stage of design up to the development of a working prototype.
Cybersecurity – Required Courses:
This class is designed to provide the fundamental skills needed to analyze the internal and external security threats against a network, and to implement security mechanisms to protect an organization’s information. The course helps to evaluate network and Internet security issues and provides security solutions such as designing a security policy, troubleshooting networks, and digital signatures.
A hands-on examination of cyber security concepts that cover both the defensive and offensive arenas. This course provides students with foundational technical cyber security skills needed for success in both a Windows and Linux environment.
A survey of the principal topics across the information security field. This course provides students a broad understanding of the field, the terminology, and the industry standards & laws governing it.
An applied study of how to secure Windows and Linux environments. This course provides students the necessary skills to build defensible environments in order to both limit the likelihood of a breach, as well as detect a security incident. Defensive concepts will be paired with the attack scenarios to aid students in understanding why certain actions are preferred.
A practical examination of how to respond to a security breach and perform system forensics. This course provides students the skills and knowledge necessary to aid during a security breach or malicious activity at an organization. Topics start with the necessary planning preparations and continues through detecting, containing, performing system forensics, and finally documenting and dealing with law enforcement or governing agencies.
A study of reverse engineering applications with a focus on the analysis of malicious software. This course covers a review of assembly languages, the use of a decompiler & debugger, static & behavioral analysis. Students will understand the tools and methodology used to reverse applications, and the techniques used by malware.
A pragmatic study of application security from development through deployment. This course provides students the skills for finding common vulnerabilities in software, identifying deployment and configuration failures, understanding how vulnerable software is exploited and documenting findings for business leaders.
An in-depth examination of the tactics and techniques used by security professionals to assess the defensive posture of an organization, as well as those used by malicious attackers. This course provides students with the necessary skills to perform “red team” and network penetration assessments used in a corporate environment, as well as provide a foundation in threat intelligence.
Get in Touch
We are here to answer any questions you may have. Contact an enrollment counselor at 855-805-5399 or complete the request for information form and we will be in touch.
- Burning Glass Technologies. Protecting the Future: The Fastest-Growing Cybersecurity Skills. October 2020.