IT engineer at work

Bachelor of Science in Information Technology to Master of Science in Cybersecurity (dual degree track)

Transfer up to
132 Credits
A median of 28 credits accepted
No GRE required

Pursue Advanced Cybersecurity Positions with a BS in Information Technology and MS in Cybersecurity Dual Degree Program Online

This fully online bachelor’s in information technology to master’s in cybersecurity dual degree program allows students to earn both degrees in less time than when taking them in sequence.  This curriculum not only allows students to transfer in credit from prior coursework, but also to apply 6 credits to both the undergraduate and graduate requirements.

In the bachelor’s part of the program, students gain job-ready skills in areas such as computer security, object-oriented programming, databases, networking and communications, software analysis and design, and project management. The graduate part of the program provides the advanced skills needed to protect critical information and cyber assets through organizational prevention, detection, countering, and recovery methods. Students are well-prepared for careers in the private sector or with governmental organizations or nonprofit organizations.

The bachelor’s in information technology program is accredited by the Computing Accreditation Commission of ABET, http://www.abet.org.

ABET Computing Accreditation Commission logo
Undergraduate Concentrations

General, Cybersecurity Technology, Network Operations

Graduate Concentrations

General, Information Assurance

Fast Facts:

Top job areas in information technology include cloud computing, data analysis, and information security (Source: BLS)


Employment of cybersecurity professionals is projected to grow 13 percent by 2026 (Source: BLS)


Master’s degree holders earn on average $1 million more over a lifetime than those with only a bachelor's degree (Source: Georgetown Center on Education and the Workforce)


144

credit hours

Online BS in IT to MS in Cybersecurity Program Details

You may receive credits for military and professional training.

Of the 144 credits required for the Bachelor of Science in Information Technology to Master of Science in Cybersecurity dual degree, students must complete 60 credits in the arts and sciences component; 48 credits in the information technology component, of which 15 must be upper level; 6 credits in the bridge component; and 30 credits in the graduate component.

  • Humanities: 15 credits minimum
    • Ethics (3 credits minimum)
    • Communications (9 credits minimum)
      • Written English Requirement (6 credits)
      • Credits to reach minimum of 9 credits
    • Humanities Electives (3 credits minimum)
  • Social Sciences/History: 9 credits minimum
  • Natural Sciences and Mathematics: 12 credits minimum
    • Natural science (3 credits)
    • Math
      • Discrete Mathematics
      • One course in Calculus, Statistics and Probability, Quantitative Methods, Finite Math, or Mathematical Logic
      • Additional college-level credits to reach 12 credits
  • Arts and Sciences Electives: 24 credits

Core Information Technology Courses: 33 Credits

Object-Oriented Programming

This course covers problem solving and algorithm development using the object-oriented programming language Java. Requires basic computer literacy.

Data Communications and Networking

Students learn about the application of the concepts and practices of data communications and networking within a business environment. Topics covered include: data communications models, protocols, standards, and services; networking technologies and communication media; network topology, design and architecture; network management; wireless technologies; network security; and cryptography. Students practice their knowledge and skills through hands-on labs and assignments.

Computer Systems Architecture

The course covers in detail basic Boolean algebra, fundamentals of computer design, instruction set principles, RISC/CISC processors, instruction and processor level parallelism, memory hierarchy, pipelining, assembly language, and parallel computer architectures.

Operating Systems

This introduction to the basic components and structure of a generic operating system considers in detail processes, process management and synchronization, threads, interrupts and interrupt handling, memory management, virtual memory management, and resource allocation. It also introduces students to file systems, protection, and security.

Database Management Systems

This overview course covers basic database concepts, database design principles including E-R diagrams and database normalization, SQL queries, transaction management, distributed databases, data warehousing, and database administration.

Web Design and Development

The course presents the fundamental principles of web programming and formatting. Students learn the difference between client side and server side scripting technologies, and the effective use of web authoring tools and code development. The course cover web design standards and the need for integrating human computer interaction principles in web design.

Human-Computer Interactive Design

This course examines human-computer interaction (HCI) and focuses on all aspects of user interface (UI) and user experience (UX) design. Students will explore the fundamental concepts and methods involved in designing digital products, mobile applications, and websites. Students will be challenged to create a startup digital product in the form of a phone app, tablet app, or Web app/website.

Overview of Computer Security

This in-depth look at operating system security concepts and techniques examines theoretical concepts of computer security. Students explore security strategies, the advancement of security implementation, and timeless problem-solving strategies.

Project Management

Students explore the concepts of system development life cycle (SDLC) and project life cycle to enhance their skills in budget and timeline management, and the use of project management software to design project schedules, using bar charts, PERT and critical path method.

System Administration

Through hands-on lab assignments, learners gain the knowledge and hands-on skills necessary to administer systems and its resources. The course includes such topics as directory services, user account management, file and print services, load balancing, and security and user/client administration. Students set up and manage a fully functioning computer network of systems.

Integrated Technology Assessment (capstone)

In this culminating course in the Bachelor of Science in Information Technology program, students reflect on past academic and professional experiences to develop learning statements supported by evidence. Additionally, students are required to complete an online final examination.

Concentration (Choose One): 15 Credits

Cybersecurity Technology

Focused on providing broad coverage on the technical, operational, and legal dimensions of cybersecurity, students attain a holistic view of implementing effective cybersecurity programs appropriate to the environment. Students learn to use a variety of cybersecurity tools and techniques in protecting information assets in organizations.

  • Computer Forensics
  • Cyber Attacks and Defenses
  • Business Continuity
  • Network and Application Security
  • Organizational Information Security

General Option

Students design their own area of focus by choosing from approved information technology electives. By customizing their concentration, students can build upon their interests and achievements to stay competitive in the job market.

Network Operations

Focused on providing students with critical knowledge and skills in telecommunications and networking, this concentration guides students through the process of planning, designing, and managing security network and telecommunication systems.

  • Advanced Networking
  • Network Operating Systems
  • Wireless Technology
  • Telecommunication Management
  • Network Systems Design and Management
  • Information Literacy: 1 credit
  • Additional college-level credit to reach 6 credits
  • Project Management
  • Foundations of Cybersecurity

Graduate Cybersecurity Requirements: 12 credits

Network and Communication Security

This introduction to network security fundamentals is organized into four parts. The first part covers the basics of private key and public key cryptography, including the common encryption algorithms AES, RC4, and RSA. The second part builds on cryptography to design secure protocols for confidentiality, authentication, and data integrity. The third part covers how cyber-attacks proceed from reconnaissance to exploits and intrusions, and the last part of the course focuses on intrusion prevention, detection, and response.

Project Management Principles and Application

The course covers the key components of the project management process, including effectively defining the project, identifying the scope, project life cycle, communication, planning, performing, and controlling the project.

Ethics, Legal, and Compliance Issues in Cybersecurity

Online coursework examines the ethical, legal, and regulatory compliance issues related to the practice of cyber security. The course focuses on the requirements, challenges, and dilemmas of data protection, due diligence, privacy laws, fraud and risk management, intellectual property, and ethical corporate codes of conduct. It covers key mandates and laws, including the Foreign Corrupt Practices Act (FCA) and the Payment Card Industry Data Security Standards (PCI DSS).

Leadership and Communication in Cybersecurity

The role of leaders in cybersecurity becomes critical to business success. The course covers global issues, with emphasis on individual’s roles within organizations and how they communicate their ideals to the teams of individuals performing cybersecurity tasks and other stakeholders who provide oversight.

Information Assurance

Gain awareness, guidance, best practices, and assessments on the principles of information systems security. Online coursework covers the foundations of information systems security as defined by industry experts and the International Information Systems Security Certification Consortium, or (ISC)2.

Master’s in Cybersecurity Capstone: 3 Credits

In this final course of the program, students examine computer security technologies and principles such as cryptography, authentication, access control, database and software security, human factors, and security auditing. The course also covers TI security management, risk assessment, and legal and ethical considerations.

Concentrations (Choose One): 9 Credits

General Concentration

Choose from 9 credits worth of approved technical electives to customize the concentration to their career goals.

Information Assurance

Designed as a specialization for an individual who desires to be hands on while combating cybersecurity threats, the information assurance concentration prepares you for roles on the front line of defense.  Required courses include:

  • Software and Application Security
  • Cyber Attacks and Defense
  • Digital Forensics and Investigations

Program Outcomes for BS in Information Technology

  • Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
  • Design, implement and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  • Communicate effectively in a variety of professional contexts.
  • Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • Function effectively as a member or leader of a team engaged in activities appropriate to information technology.
  • Identify and analyze user needs and to take them into account in the selection, creation, integration, evaluation, and administration of computing-based systems.
  • Demonstrate expertise in the core information technologies, including human-computer interaction, information management, programming, web systems and technologies, networking, system administration and maintenance, and systems integration and architecture.
  • Demonstrate the ability to analyze computing and information security requirements and risks, and apply the appropriate tools and techniques to protect organizational data assets in an ethically responsible manner.
  • Demonstrate the ability to apply best practices and standards for providing technology-based solutions.
  • Demonstrate the ability to identify and analyze the local, regional, and global impacts of information technology’s and computing on public, organizations, and individuals.
  • Demonstrate and commitment to professional development and continue to engage in lifelong learning.

    Program Outcomes for MS in Cybersecurity

  • Continuously monitor, maintain, and enhance the protection of enterprise-wide information assets through effective industry accepted information management and risk management techniques.
  • Detect, analyze, and respond to cyber-attacks on networks and computer systems.
  • Conduct risk and vulnerability assessments of existing and proposed information systems.
  • Utilize the best sources of information available related to cybersecurity issues, threats, and recovery.
  • Demonstrate the ability to understand professional, ethical, and social responsibility, including the effect of culture, diversity, and interpersonal relations.
  • Demonstrate proficiency in communicating technical information in formal reports, documentation, and oral presentations to users and information technology professionals.
  • Demonstrate a commitment to professional development and to continue to engage in lifelong learning.

View additional details about programs and courses:

Download the Undergraduate Studies Catalog
Download the Graduate Studies Catalog

Common Careers with an
Online BS in IT to MS in Cybersecurity

Chief Information Security Officer

Security Architect

Security Consultant

Security Director

Finishing [my degree] has given me more confidence knowing I have a degree standing behind my experience.
Alex Pejcic
Bachelor of Science in Information Technology

Accreditations

ABET Computing Accreditation Commission logo

ABET Accreditation

The Bachelor of Science in Information Technology is accredited by the Engineering Technology Accreditation Commission of ABET, https://www.abet.org/. ABET is a specialized accrediting agency recognized by the Council for Higher Education Accreditation (CHEA).

Middle States Commission on Higher Education logo

Institutional Accreditation

Excelsior College is accredited by the Middle States Commission on Higher Education, 3624 Market Street, Philadelphia, PA 19104. (267-284-5000).

All of Excelsior College's academic programs are registered (i.e., approved) by the New York State Education Department.

Request Information

Explore your options at an accredited, affordable, and accessible online college.

Speak to an Admissions Counselor directly: 888.647.2388