This fully online bachelor’s in information technology to master’s in cybersecurity dual degree program allows students to earn both degrees in less time than when taking them in sequence. This curriculum not only allows students to transfer in credit from prior coursework, but also to apply 6 credits to both the undergraduate and graduate requirements.
In the bachelor’s part of the program, students gain job-ready skills in areas such as computer security, object-oriented programming, databases, networking and communications, software analysis and design, and project management. The graduate part of the program provides the advanced skills needed to protect critical information and cyber assets through organizational prevention, detection, countering, and recovery methods. Students are well-prepared for careers in the private sector or with governmental organizations or nonprofit organizations.
The bachelor’s in information technology program is accredited by the Computing Accreditation Commission of ABET, http://www.abet.org.
General, Cybersecurity Technology, Network Operations
General, Information Assurance
Top job areas in information technology include cloud computing, data analysis, and information security (Source: BLS)
Employment of cybersecurity professionals is projected to grow 13 percent by 2026 (Source: BLS)
Master’s degree holders earn on average $1 million more over a lifetime than those with only a bachelor's degree (Source: Georgetown Center on Education and the Workforce)
Of the 144 credits required for the Bachelor of Science in Information Technology to Master of Science in Cybersecurity dual degree, students must complete 60 credits in the arts and sciences component; 48 credits in the information technology component, of which 15 must be upper level; 6 credits in the bridge component; and 30 credits in the graduate component.
This course covers problem solving and algorithm development using the object-oriented programming language Java. Requires basic computer literacy.
Students learn about the application of the concepts and practices of data communications and networking within a business environment. Topics covered include: data communications models, protocols, standards, and services; networking technologies and communication media; network topology, design and architecture; network management; wireless technologies; network security; and cryptography. Students practice their knowledge and skills through hands-on labs and assignments.
The course covers in detail basic Boolean algebra, fundamentals of computer design, instruction set principles, RISC/CISC processors, instruction and processor level parallelism, memory hierarchy, pipelining, assembly language, and parallel computer architectures.
This introduction to the basic components and structure of a generic operating system considers in detail processes, process management and synchronization, threads, interrupts and interrupt handling, memory management, virtual memory management, and resource allocation. It also introduces students to file systems, protection, and security.
This overview course covers basic database concepts, database design principles including E-R diagrams and database normalization, SQL queries, transaction management, distributed databases, data warehousing, and database administration.
The course presents the fundamental principles of web programming and formatting. Students learn the difference between client side and server side scripting technologies, and the effective use of web authoring tools and code development. The course cover web design standards and the need for integrating human computer interaction principles in web design.
This course examines human-computer interaction (HCI) and focuses on all aspects of user interface (UI) and user experience (UX) design. Students will explore the fundamental concepts and methods involved in designing digital products, mobile applications, and websites. Students will be challenged to create a startup digital product in the form of a phone app, tablet app, or Web app/website.
This in-depth look at operating system security concepts and techniques examines theoretical concepts of computer security. Students explore security strategies, the advancement of security implementation, and timeless problem-solving strategies.
Students explore the concepts of system development life cycle (SDLC) and project life cycle to enhance their skills in budget and timeline management, and the use of project management software to design project schedules, using bar charts, PERT and critical path method.
Through hands-on lab assignments, learners gain the knowledge and hands-on skills necessary to administer systems and its resources. The course includes such topics as directory services, user account management, file and print services, load balancing, and security and user/client administration. Students set up and manage a fully functioning computer network of systems.
In this culminating course in the Bachelor of Science in Information Technology program, students reflect on past academic and professional experiences to develop learning statements supported by evidence. Additionally, students are required to complete an online final examination.
Focused on providing broad coverage on the technical, operational, and legal dimensions of cybersecurity, students attain a holistic view of implementing effective cybersecurity programs appropriate to the environment. Students learn to use a variety of cybersecurity tools and techniques in protecting information assets in organizations.
Students design their own area of focus by choosing from approved information technology electives. By customizing their concentration, students can build upon their interests and achievements to stay competitive in the job market.
Focused on providing students with critical knowledge and skills in telecommunications and networking, this concentration guides students through the process of planning, designing, and managing security network and telecommunication systems.
This introduction to network security fundamentals is organized into four parts. The first part covers the basics of private key and public key cryptography, including the common encryption algorithms AES, RC4, and RSA. The second part builds on cryptography to design secure protocols for confidentiality, authentication, and data integrity. The third part covers how cyber-attacks proceed from reconnaissance to exploits and intrusions, and the last part of the course focuses on intrusion prevention, detection, and response.
The course covers the key components of the project management process, including effectively defining the project, identifying the scope, project life cycle, communication, planning, performing, and controlling the project.
Online coursework examines the ethical, legal, and regulatory compliance issues related to the practice of cyber security. The course focuses on the requirements, challenges, and dilemmas of data protection, due diligence, privacy laws, fraud and risk management, intellectual property, and ethical corporate codes of conduct. It covers key mandates and laws, including the Foreign Corrupt Practices Act (FCA) and the Payment Card Industry Data Security Standards (PCI DSS).
The role of leaders in cybersecurity becomes critical to business success. The course covers global issues, with emphasis on individual’s roles within organizations and how they communicate their ideals to the teams of individuals performing cybersecurity tasks and other stakeholders who provide oversight.
Gain awareness, guidance, best practices, and assessments on the principles of information systems security. Online coursework covers the foundations of information systems security as defined by industry experts and the International Information Systems Security Certification Consortium, or (ISC)2.
In this final course of the program, students examine computer security technologies and principles such as cryptography, authentication, access control, database and software security, human factors, and security auditing. The course also covers TI security management, risk assessment, and legal and ethical considerations.
Choose from 9 credits worth of approved technical electives to customize the concentration to their career goals.
Designed as a specialization for an individual who desires to be hands on while combating cybersecurity threats, the information assurance concentration prepares you for roles on the front line of defense. Required courses include:
View additional details about programs and courses:Download the Undergraduate Studies Catalog
Chief Information Security Officer
The Bachelor of Science in Information Technology is accredited by the Engineering Technology Accreditation Commission of ABET, https://www.abet.org/. ABET is a specialized accrediting agency recognized by the Council for Higher Education Accreditation (CHEA).
Excelsior College is accredited by the Middle States Commission on Higher Education, 3624 Market Street, Philadelphia, PA 19104. (267-284-5000).
All of Excelsior College's academic programs are registered (i.e., approved) by the New York State Education Department.