Learn to defend and protect networks and information systems against cyber attacks with the cyber security concentration in the BS in Information Technologies online degree at Southern New Hampshire University. By specializing with a cyber security degree online, you’ll participate in practical, interactive coursework that covers the analytical and technical skills necessary to educate workers about security, install critical software, monitor networks and respond to cyber attacks.
If you've earned IT certifications through CompTIA, Oracle, or TestOut, you may be eligible to receive credit toward your degree program. If you’re seeking certification, our IT courses will help you prepare for the exams.
In this specialized cyber security degree online program, you'll delve into the ethics, practices, policies and procedures of cyber security and tackle network security defense techniques and countermeasures.
Our BS in IT with a concentration in cyber security focuses on the human factors involved in protecting sensitive data, UNIX/LINUX operating systems, network security and fundamental principles underlying cyber security. In this specialized cyber security degree online program, you'll delve into the ethics, practices, policies and procedures of cyber security and tackle network security defense techniques and countermeasures.
As a private, nonprofit university, SNHU has one mission - to help you see yourself succeed. The benefits of earning your bachelor's in IT at SNHU include:
According to the U.S. Bureau of Labor Statistics, the number of jobs available for information security analysts is expected to increase by 37 percent through 2022. Jobs for network and computer systems administrators are projected to jump 12 percent over the same period.
As cyber attacks become more and more sophisticated, the need for and the responsibilities of computer security specialists have increased and will continue to do so. A cyber security degree online will position you well for a variety of careers, including cyber security software engineer, information security analyst, information systems security administrator and security policy analyst.
Our unique information technology degree programs are taught by knowledgeable faculty members with years of real-world, hands-on experience.
This course is an introduction to the design, implementation, and understanding of computer programs. The course emphasizes programming as a problem-solving technique in business and engineering applications. Students will write computer code in a logical, structured, and organized manner. The course also covers the key concepts of object orientation, including inheritance, encapsulation, polymorphism and communication with messages. Other topics include classes and objects, base classes and class hierarchies, abstract and concrete classes. Students will learn to write, review and document interactive applications and working with Software Development Kits and Integrated Development Environment tools. Offered every year. This is a programming course and lab intense. Prerequisite or Concurrent: IT 100
This course offers a broad introduction to the tools and applications students will need to become successful professionals in the IT environment. Students will examine the core information technologies of human-computer interaction, information management, programming, networking, web systems and technologies, as well as information assurance and security.
This course provides the hardware/software technology background for information technology personnel. Hardware topics include CPU architecture, memory, registers, addressing modes, busses, instruction sets and a variety of input/output devices. Software topics include operating system modules, process management, memory and file system management. Also included are basic network components and multi-user operating systems. Offered every year.
This course provides students with the necessary level of information technology education relative to understanding the uses and roles of information systems in business organizations. Students receive instruction on the information concepts and methodologies associated with the development of business information systems, and their effective application to the solution of business problems. Students learn the major issues of managing information technology in the contemporary business environment and the relationship between organizations' structures and information technology. Team approaches are utilized along with structured computer laboratories and cases using spreadsheet and database management tools. Writing intensive course.
This course develops software systems engineering principles combining object-oriented design principles and methods augmented by computer assisted engineering (CASE) technology. The course involves use of the unified modeling language (UML) and, through the vehicle of a student group project, applies these elements to the system development life cycle. This course is writing intensive, as student project teams are required to submit a comprehensive project report and a PowerPoint presentation. Specialized Systems Development Computer Laboratory intensive and open laboratory intensive. Offered every year. Writing intensive course.
This course covers project management strategies specific to IT projects. These project management strategies include: project initiation, scope definition, planning, execution, control, coordination, closure acceptance, and support.
This course covers the design and implementation of information systems within a database management system environment. Students will demonstrate their mastery of the design process acquired in earlier courses by designing and constructing a physical system using database software to implement logical design. Topics include data models and modeling tools and techniques; approaches to structural and object design; models for databases (relational, hierarchical, networked and object-oriented designs) CASE tools, data dictionaries, repositories and warehouses, Windows/GUI coding and/or implementation, code and application generation, client-server planning, testing and installation, system conversion, end-user training and integration and post-implementation review. Offered every year.
This course addresses the importance of understanding and advocating for the end user in the development of IT applications and systems. Students will be exposed to Human-Computer Interaction (HCI) fundamentals including user and task analysis, human factors, ergonomics, accessibility standards, and cognitive psychology. Emphasis will be placed on user-centered methodologies in the development, evaluation, and deployment of IT applications and systems.
This course provides an in-depth knowledge of data communications and networking theory, concepts and requirements relative to telecommunications and networking technologies, structures, hardware and software. Emphasis is on the concepts of communications theory and practices, terminology, and the analysis and design of networking applications. Management of telecommunications networks, cost-benefit analysis and evaluation of connectivity options are covered. Students can design, build and maintain a local area network (LAN). Offered as needed.
This course explores the basic concepts in cybersecurity and information assurance. Topics include security policies, models, and mechanisms for secrecy, integrity, and availability of communications and information. The course also covers approaches to prevent, detect and recover from the loss of information, cryptography and its applications, vulnerability scanning, functions of a chief security officer software applications and web services for maintaining information security and security in computer networks and distributed systems.
The course focuses on the essential oral and written communication tools and strategies used when communicating in technology organizations, emphasizing on how to make information more usable and accessible to multiple audiences. Students will review how to develop functional specifications and proposals, training programs, technical illustrations, and web information architecture.
This course stresses the social and professional context of IT and computing related to ethical codes of conduct. Students will examine the historical, social, professional, ethical, and legal aspects of computing in the 21st century.
This is the first of a two-part capstone course for IT majors which covers the major methodologies used in Systems Analysis, Design, and Implementation. This course focuses mainly on the systems analysis part of the systems development process and emphasizes SDLC (Software Development Life Cycle). Different system development strategies are examined within the broader context of identifying and understanding the detailed stages the make up the systems analysis process. Students will learn how to a perform feasibility analysis, and to create a system proposal. Fact finding techniques used to determine system requirements will be identified and studied. Standard graphical modeling tools used in systems analysis will be covered: process modeling with data flow diagrams; data modeling with entity relationship diagrams; and object-oriented modeling using UML. The basic activities of project management are examined. Students will be assigned a systems development project case with concrete milestones, enabling the practical application of concepts presented in the course. This is a lab intensive course.
This is the second part of the Capstone course for IT majors. The student groups will implement and document the systems project designed in IT 415 using an appropriate computer programming language or database management system. The instructor and students critique all projects weekly. Offered every year.
This capstone course is the culminating experience for the B.S. in Information Technologies program. The aim of the capstone is to assess students' ability to synthesize and integrate the knowledge and skills they have developed throughout their coursework, rather than introducing new concepts. This course is structured to support student success in fulfilling program requirements.
This course emphasizes the algebra and concepts of functions. Students will learn the properties and graphing techniques for different types of functions including: linear, polynomial, rational, trigonometric, exponential, and logarithmic functions. Students will also learn to solve a variety of real world problems that rely on a number of different problem solving strategies and an understanding of these different types of functions. This course is intended for those students who wish to prepare for Calculus.
The human relations skills that managers need to develop interaction skills that contribute directly to effective human resource management and the development of higher productivity are studied. Skill areas include leadership, motivation, communications, group dynamics, organizational development, management by objectives, and stress and time management. Students learn techniques for becoming more effective managers, subordinates, peers and persons. Students are introduced to the international aspects of human relations.
This course examines leadership as an inter-personal and intra-organizational phenomenon with an emphasis on student leadership development. It includes leadership assessment, leadership development, the leadership process, the contagious nature of leadership, leadership and productivity, motivation, and effective leadership styles and theories. An international perspective is included. Current readings, research, simulations and exercises are used. Offered every year. Team intensive course.
This course introduces students to the human factors present in cyber security related to ethics, integrity, practices, policies and procedures. Using a scenario-based approach, students will examine the human behaviors that could potentially cause a security threat and investigate how organizational policies and procedures can be developed to mitigate them.
This course provides an introduction to the structure and functioning of the UNIX operating system. It is designed to give students a solid foundation in the design and organization of the operating system and to teach the basic set of UNIX commands. Offered as needed.
This course provides an overview of network security defense techniques and countermeasures. Students will develop their communication and analytical skills through the discussion and debate of a variety of topics, such as cryptanalysis and attacks, safety of wireless connections, intrusion detection methods, and access control. They will engage in assignments designed to provide them with practical applications of content, such as the design and configuration of firewalls, traffic analysis and filtering, intrusion detection, statistical anomaly detection, and wireless security.
This course will focus on the fundamental principles of information security management from a systems perspective. While other courses will provide the deep dive into specific areas of security, this course will serve as an exploration into how the varying principles of systems-level information security management are employed to achieve secure solutions. Students will examine how security policies, standards, and controls can be reliably implemented to create trustworthy systems that mitigate risk in accordance with organizational security postures. Students will also gain insight into the systems-level security of information over time, touching on organizational, legal, and technological changes that impact the safety, reliability, and validity of information.
Free Elective Credits: 6
Total Credits: 120
CD/DVD drive. External hard drive. Extra power cord. Headphones/earbuds
Some courses may require software purchase or subscription:
Microsoft® Office 365 Pro Plus is available free of charge to all SNHU students and faculty. The Office suite will remain free while you are enrolled at SNHU. Upon graduation, you will need to convert to a paid subscription. Terms are subject to change at Microsoft’s discretion.
Tuition rates for SNHU's online degree programs are among the lowest in the nation. We offer financial aid packages to those who qualify, plus a 30 percent tuition discount for active-duty service members and their spouses.
*Tuition Rates are subject to change and are reviewed Annually.
No Application Fee, $150 Graduation Fee, Course Materials ($ varies by course)
Southern New Hampshire University is a private, nonprofit institution accredited by the New England Association of Schools and Colleges as well as several other accrediting bodies. More...