Learn to defend and protect networks and information systems against cyber attacks with the cyber security concentration in the BS in Information Technologies online degree at Southern New Hampshire University. By specializing with a cyber security degree online, you’ll participate in practical, interactive coursework that covers the analytical and technical skills necessary to educate workers about security, install critical software, monitor networks and respond to cyber attacks.
If you've earned IT certifications through CompTIA, Oracle, or TestOut, you may be eligible to receive credit toward your degree program. If you’re seeking certification, our IT courses will help you prepare for the exams.
In this specialized cyber security degree online program, you'll delve into the ethics, practices, policies and procedures of cyber security and tackle network security defense techniques and countermeasures.
Our BS in IT with a concentration in cyber security focuses on the human factors involved in protecting sensitive data, UNIX/LINUX operating systems, network security and fundamental principles underlying cyber security. In this specialized cyber security degree online program, you'll delve into the ethics, practices, policies and procedures of cyber security and tackle network security defense techniques and countermeasures.
As a private, nonprofit university, SNHU has one mission - to help you see yourself succeed. The benefits of earning your bachelor's in IT at SNHU include:
According to the U.S. Bureau of Labor Statistics, the number of jobs available for information security analysts is expected to increase by 28 percent through 2026. Jobs for network and computer systems administrators are projected to jump 6 percent over the same period.*
As cyber attacks become more and more sophisticated, the need for and the responsibilities of computer security specialists have increased and will continue to do so. A cyber security degree online will position you well for a variety of careers, including cyber security software engineer, information security analyst, information systems security administrator and security policy analyst.
*Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, on the Internet, at Information Security Analysts and Network and Computer Systems Administrators (viewed online November 6, 2017). Cited projections may not reflect local and/or short-term economic or job conditions and do not guarantee actual job growth.
Our unique information technology degree programs are taught by knowledgeable faculty members with years of real-world, hands-on experience.
Learn the fundamentals of programming concepts including data types, variables, decision statements, loops, input and output. Develop simple scripts using common scripting language constructs including lists, literals, and regular expressions. Gain an introduction to programming through hands-on activities that are beginner-friendly.
This course is an introduction to the design, implementation, and understanding of computer programs. The course emphasizes programming as a problem-solving technique in business and engineering applications. Students will write computer code in a logical, structured, and organized manner. The course also covers the key concepts of object orientation, including inheritance, encapsulation, polymorphism and communication with messages. Other topics include classes and objects, base classes and class hierarchies, abstract and concrete classes. Students will learn to write, review and document interactive applications and working with Software Development Kits and Integrated Development Environment tools. This is a programming course and lab intense.
This course offers a broad introduction to the tools and applications students will need to become successful professionals in the IT environment. Students will examine the core information technologies of human-computer interaction, information management, programming, networking, web systems and technologies, as well as information assurance and security.
This course provides the hardware/software technology background for information technology personnel. Hardware topics include CPU architecture, memory, registers, addressing modes, busses, instruction sets and a variety of input/output devices. Software topics include operating system modules, process management, memory and file system management. Also included are basic network components and multi-user operating systems. Offered every year.
This course provides students with the necessary level of information technology education relative to understanding the uses and roles of information systems in business organizations. Students receive instruction on the information concepts and methodologies associated with the development of business information systems, and their effective application to the solution of business problems. Students learn the major issues of managing information technology in the contemporary business environment and the relationship between organizations' structures and information technology. Team approaches are utilized along with structured computer laboratories and cases using spreadsheet and database management tools. Writing intensive course.
Develop database designs using industry-standard modelling tools and techniques. Evaluate user requirements to identify optimal database models that solve common business problems. Examine approaches to structural and object-orient design that consider today's varied data types.
Employ project management strategies specific to IT projects. Examine responsibilities of key stakeholders. Explain project planning with key considerations related to risk management and project tracking.
This course addresses the importance of understanding and advocating for the end user in the development of IT applications and systems. Students will be exposed to Human-Computer Interaction (HCI) fundamentals including user and task analysis, human factors, ergonomics, accessibility standards, and cognitive psychology. Emphasis will be placed on user-centered methodologies in the development, evaluation, and deployment of IT applications and systems.
This course provides an in-depth knowledge of data communications and networking theory, concepts and requirements relative to telecommunications and networking technologies, structures, hardware and software. Emphasis is on the concepts of communications theory and practices, terminology, and the analysis and design of networking applications. Management of telecommunications networks, cost-benefit analysis and evaluation of connectivity options are covered. Students can design, build and maintain a local area network (LAN). Offered as needed.
This course explores the basic concepts in cybersecurity and information assurance. Topics include security policies, models, and mechanisms for secrecy, integrity, and availability of communications and information. The course also covers approaches to prevent, detect and recover from the loss of information, cryptography and its applications, vulnerability scanning, functions of a chief security officer software applications and web services for maintaining information security and security in computer networks and distributed systems.
The course focuses on the essential oral and written communication tools and strategies used when communicating in technology organizations, emphasizing on how to make information more usable and accessible to multiple audiences. Students will review how to develop functional specifications and proposals, training programs, technical illustrations, and web information architecture.
This course stresses the social and professional context of IT and computing related to ethical codes of conduct. Students will examine the historical, social, professional, ethical, and legal aspects of computing in the 21st century.
This is the first of a two-part capstone course for IT majors which covers the major methodologies used in Systems Analysis, Design, and Implementation. This course focuses mainly on the systems analysis part of the systems development process and emphasizes SDLC (Software Development Life Cycle). Different system development strategies are examined within the broader context of identifying and understanding the detailed stages the make up the systems analysis process. Students will learn how to a perform feasibility analysis, and to create a system proposal. Fact finding techniques used to determine system requirements will be identified and studied. Standard graphical modeling tools used in systems analysis will be covered: process modeling with data flow diagrams; data modeling with entity relationship diagrams; and object-oriented modeling using UML. The basic activities of project management are examined. Students will be assigned a systems development project case with concrete milestones, enabling the practical application of concepts presented in the course. This is a lab intensive course.
This is the second part of the Capstone course for IT majors. The student groups will implement and document the systems project designed in IT 415 using an appropriate computer programming language or database management system. The instructor and students critique all projects weekly. Offered every year.
This capstone course is the culminating experience for the B.S. in Information Technologies program. The aim of the capstone is to assess students' ability to synthesize and integrate the knowledge and skills they have developed throughout their coursework, rather than introducing new concepts. This course is structured to support student success in fulfilling program requirements.
This course emphasizes the algebra and concepts of functions. Students will learn the properties and graphing techniques for different types of functions including: linear, polynomial, rational, trigonometric, exponential, and logarithmic functions. Students will also learn to solve a variety of real world problems that rely on a number of different problem solving strategies and an understanding of these different types of functions. This course is intended for those students who wish to prepare for Calculus.
Examine the applications of differential and integral calculus within the fields of STEM. Learn about limits, continuity, derivatives, differentiation, integration, and the Fundamental Theorem of Calculus. Develop in-depth knowledge of techniques of calculus used to solve application problems encountered in STEM studies.
The human relations skills that managers need to develop interaction skills that contribute directly to effective human resource management and the development of higher productivity are studied. Skill areas include leadership, motivation, communications, group dynamics, organizational development, management by objectives, and stress and time management. Students learn techniques for becoming more effective managers, subordinates, peers and persons. Students are introduced to the international aspects of human relations.
Select four courses from DAD, DAT, IT, GAM or MIS, excluding IT-100
This course introduces students to the human factors present in cyber security related to ethics, integrity, practices, policies and procedures. Using a scenario-based approach, students will examine the human behaviors that could potentially cause a security threat and investigate how organizational policies and procedures can be developed to mitigate them.
This course provides an introduction to the structure and functioning of the UNIX operating system. It is designed to give students a solid foundation in the design and organization of the operating system and to teach the basic set of UNIX commands. Offered as needed.
Gain an overview of network security defense techniques and countermeasures. Develop communication and analytical skills through the discussion and debate of a variety of topics, such as cryptanalysis and attacks, safety of wireless connections, intrusion detection methods, and access control. Engage in assignments designed to provide practical applications of content, such as the design and configuration of firewalls, traffic analysis and filtering, intrusion detection, statistical anomaly detection, and wireless security.
This course will focus on the fundamental principles of information security management from a systems perspective. While other courses will provide the deep dive into specific areas of security, this course will serve as an exploration into how the varying principles of systems-level information security management are employed to achieve secure solutions. Students will examine how security policies, standards, and controls can be reliably implemented to create trustworthy systems that mitigate risk in accordance with organizational security postures. Students will also gain insight into the systems-level security of information over time, touching on organizational, legal, and technological changes that impact the safety, reliability, and validity of information.
Free Elective Credits: 6
Total Credits: 120
CD/DVD drive. External hard drive. Extra power cord. Headphones/earbuds
Some courses may require software purchase or subscription:
Microsoft® Office 365 Pro Plus is available free of charge to all SNHU students and faculty. The Office suite will remain free while you are enrolled at SNHU. Upon graduation, you will need to convert to a paid subscription. Terms are subject to change at Microsoft’s discretion.
Tuition rates for SNHU's online degree programs are among the lowest in the nation. We offer financial aid packages to those who qualify, plus a 30 percent tuition discount for U.S. service members, both full and part time, and the spouses of those on active duty.
*Tuition Rates are subject to change and are reviewed annually.
No Application Fee, $150 Graduation Fee, Course Materials ($ varies by course)
Southern New Hampshire University is a private, nonprofit institution accredited by the New England Association of Schools and Colleges as well as several other accrediting bodies. More...