Overview
Key Features
Computers have revolutionized our businesses, our society, and our way of life. But the information systems that provide so many benefits are vulnerable to errors and misfortune, and are even, as we know all too well, vulnerable to hostile acts.
Majors in Computer Science with Cybersecurity at Loyola University New Orleans will be completing an internship giving them practical experience, but in addition, our program’s curriculum includes core courses from computer science and related disciplines for a solid foundation in computer science.
Here’s a sample of what you can expect to learn and do:
Introduction to CybersecurityIntroduction to Cybersecurity is a broad survey course intended for undergraduate students in any major. Cybersecurity is, indeed, a broad field; this course will provide students with a road map for approaching this field from multiple standpoints—computer science, business administration, criminal justice, or other disciplines. They will learn the fundamental qualities of information security and the critical mechanisms needed for it. The course will present security for personal systems, enterprise systems, and internet use. Students will be able to delineate the many different types of threats and vulnerabilities, and to characterize noteworthy recent failures in information security.
Cybersecurity StrategyCybersecurity is as much a set of human practices as technical ones. Responsible handling of information assets—let alone ethical handling—demands a consistent approach whether an organization is a transnational corporation or a sole proprietorship. This course teaches students to implement security policies to support organizational goals. We discuss methodologies for identifying, quantifying, mitigating, and controlling security risks, as well as disaster recovery. The student will also learn about laws, regulations, and standards relating to information security and privacy, and how they affect IT organizations.
Cryptography and Its ApplicationsCryptography is a science of unpredictability and unintelligibility—hiding information in ways an adversary can neither anticipate nor discover. In this course, we will cover the various forms of cryptography: symmetric, asymmetric, and one-way cryptography and review algorithms of each form. The course will address the use of cryptography in information security, not only for confidentiality, but also for data integrity. We will explore the mathematical principles behind deriving cryptographic algorithms and those behind validating them, including secure random-number generation. The course will present the applications of cryptography from the block ciphers of antiquity through the incipient field of quantum cryptography. The course will also focus on public-key infrastructure and blockchain/distributed ledger as important implementations of cryptography.
Ethical Hacking/Penetration TestingThis course is a hands-on lab in 'ethical hacking' and other forms of penetration testing for the purpose of finding and resolving vulnerabilities in computer systems and networks. The course is founded on absorbing the Mitre ATT&CK framework as a means of understanding adversarial behavior. From there students will perform penetration tests on specially configured target systems, which may include externally-managed cyber-ranges. Students will also learn how to participate in bug bounties, and will be able to articulate and practice responsible disclosure of cybersecurity vulnerabilities. Upon completion, students will be prepared for the Certified Ethical Hacker qualification test.
Digital ForensicsThe increasing dependence in everyday life on computer information systems has led to a corresponding increase in criminal activity through and against such systems. In addition, benign use of information systems has grown to the extent that such systems are now routinely part of discovery in civil and criminal legal proceedings. In this course, students will learn the techniques of digital forensics that are used to investigate cybersecurity incidents, legal disputes, and crimes. We will develop approaches that can be used on desktop personal computers and servers. The course will also emphasize the importance of controls and verification of digital evidence and the critical necessity of preserving and documenting a chain of custody for that evidence.
Programme Structure
Courses include:
- Cybersecurity
- Cybersecurity Strategy
- Cryptography and Its Applications
- Ethical Hacking/Penetration Testing
- Digital Forensics
Key information
Duration
- Full-time
- 48 months
Start dates & application deadlines
- Starting
- Apply before
-
Language
Prepare for Your English Test
AI-powered IELTS feedback. Clear, actionable, and tailored to boost your writing & speaking score. No credit card or upfront payment required.
- Trusted by 300k learners
- 98 accuracy using real exam data
- 4.9/5 student rating
Credits
Delivered
Campus Location
- New Orleans, United States
Disciplines
Computer Sciences Cyber Security View 478 other Bachelors in Cyber Security in United StatesWhat students do after studying
Academic requirements
We are not aware of any specific GRE, GMAT or GPA grading score requirements for this programme.
English requirements
Prepare for Your English Test
AI-powered IELTS feedback. Clear, actionable, and tailored to boost your writing & speaking score. No credit card or upfront payment required.
- Trusted by 300k learners
- 98 accuracy using real exam data
- 4.9/5 student rating
Other requirements
General requirements
- Complete Loyola’s free online application or the Common Application
- Submit official original secondary school transcripts
- Submit official TOEFL, IELTS, Duolingo English Test (DET), SAT**, or ACT** scores
- Submit one letter of recommendation
- An affidavit of financial support and copy of passport will be required
Tuition Fees
-
International Applies to you
Applies to youNon-residents51664 USD / year≈ 51664 USD / year - Out-of-State51664 USD / year≈ 51664 USD / year
-
Domestic
Applies to youIn-State51664 USD / year≈ 51664 USD / year
Living costs
New Orleans
The living costs include the total expenses per month, covering accommodation, public transportation, utilities (electricity, internet), books and groceries.
Funding
Need help with your student visa?
Get personalized guidance from a certified VFS Global advisor and save 20% through Studyportals.
- Avoid common visa mistakes and delays
- Know exactly what documents you need
- Get a clear checklist tailored to your situation
In order for us to give you accurate scholarship information, we ask that you please confirm a few details and create an account with us.
Scholarships Information
Below you will find Bachelor's scholarship opportunities for Computer Science with Cybersecurity.
Available Scholarships
You are eligible to apply for these scholarships but a selection process will still be applied by the provider.
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility