Overview
You’ll build skills in conducting digital forensics, learn how to help protect data and networks, and defend against a digital onslaught, whatever its source.
In the Information Technology - Cybersecurity program from Strayer University, you’ll learn how to maintain the security of networks and data. You’ll explore network defense, offensive network security and countermeasures to shut hackers off from accessing important data. And you’ll find out what ethical (and unethical) hacking looks like.
- Learn how to maintain the security of networks in a range of environments.
- Study different types of hacking (both ethical and unethical).
- Perform penetration tests and information security analysis.
- Study offensive network security, ethical hacking, network defense and their countermeasures.
Career
Your education can help you pursue your professional and personal goals. While Strayer cannot guarantee that a graduate will secure any specific career outcome, such as a job title, promotion or salary increase, we encourage you to explore the potential impact you can have in the cybersecurity field.
The cybersecurity concentration can provide the skills to help you secure an organization’s data and operations against cybersecurity concerns.
- Audit network and security systems to reveal potential issues.
- Develop strategies to help clients respond to and recover from security breaches.
- Identify network intruders by analyzing log files and monitoring network traffic for suspicious activity.
- Implement security measures to help safeguard data and information systems.
- Keep digital media compliant with legal policies and procedures.
- Measure security controls and determine their effectiveness, using key performance indicators.
- Modify computer security files and manage individual access requests.
- Monitor networks for data breaches, phishing and other security threats.
- Prepare plans that protect computer files against unauthorized access, modification, destruction or disclosure.
- Regulate access to the files on your network and monitor how people interact with them, to keep data from falling into the wrong hands.
- Secure data transmissions and filter out unwanted intrusions, using encryption and firewall systems.
- Stay on top of the latest computer virus news to better time your security updates.
- Take a proactive and reactive approach to supporting cybersecurity initiatives.
Programme Structure
Courses include:
- Network Server Administration
- Perimeter Defense Techniques
- Network Penetration Testing
- Computer Forensic Technology
- Information Technology
Key information
Start dates & application deadlines
- StartingApply anytime.
- StartingApply anytime.
- StartingApply anytime.
Language
Prepare for Your English Test
AI-powered IELTS feedback. Clear, actionable, and tailored to boost your writing & speaking score. No credit card or upfront payment required.
- Trusted by 300k learners
- 98 accuracy using real exam data
- 4.9/5 student rating
Credits
Delivered
Campus Location
- Herndon, United States
Disciplines
Information Technology (IT) Cyber Security View 671 other Bachelors in Information Technology (IT) in United StatesWhat students do after studying
Academic requirements
We are not aware of any specific GRE, GMAT or GPA grading score requirements for this programme.
English requirements
Prepare for Your English Test
AI-powered IELTS feedback. Clear, actionable, and tailored to boost your writing & speaking score. No credit card or upfront payment required.
- Trusted by 300k learners
- 98 accuracy using real exam data
- 4.9/5 student rating
Other requirements
General requirements
- A completed application and enrollment agreement, as applicable.
- A diploma from an approved high school or its equivalent.
- Official copies of transcripts from all other colleges or universities attended.
- A valid, current and legible government-issued photo ID.
Tuition Fees
-
International Applies to you
Applies to youNon-residents1525 USD / module≈ 1525 USD / module - Out-of-State1525 USD / module≈ 1525 USD / module
-
Domestic
Applies to youIn-State1525 USD / module≈ 1525 USD / module
Additional Details
Cost per course
Funding
In order for us to give you accurate scholarship information, we ask that you please confirm a few details and create an account with us.
Scholarships Information
Below you will find Bachelor's scholarship opportunities for Information Technology - Cybersecurity.
Available Scholarships
You are eligible to apply for these scholarships but a selection process will still be applied by the provider.
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility