Cyber Security Programming Degree Specialization
Cyber security professionals help protect computer networks from cyber attacks, preventing the theft, loss or damage of sensitive information and critical data1. To give you the hands-on experience needed to fight cyber crime and secure computers from the threat of hackers, terrorists and criminals, the Cyber Security Programming degree specialization at DeVry University features cyber-attack simulations in a virtual environment. Students learn to create, plan, implement and monitor innovative solutions to protect data and networks and prevent future attacks.
Learn more about the advantages of studying at DeVry University. Request more information.
Professional Certification Advantage
While there is a growing demand for cyber security professionals, employers have very high requirements. Over half of all positions require at least one professional certification, such as the Systems Security Certified Practitioner (SSCP) certification.2 The SSCP designation certifies that you have technical skills and practical security knowledge in hands-on operational IT roles.34
As a student enrolled in the DeVry University’s Cyber Security Programming specialization, you can take advantage of our SSCP Certification Prep courses offered at no tuition charge. Better still, eligible students who register for and complete the exam may be reimbursed for one exam sitting.
2. Study by Burning Glass Technologies, “Job Market Intelligence: Report on the Growth of Cybersecurity Jobs,” 2014, pg. 8
4. The SSCP designation requires 1 year of work experience. Without the work experience, those that pass the exam earn the Associate of (ISC)2.
When you specialize your Computer Information Systems degree in Cyber Security Programming, your coursework at DeVry University may include these courses:
Information Security and Mobile Devices
Information Systems Security Planning and Audit
Data Privacy and Security
Advanced Network Security with Lab
Understand the complex and challenging issues organizations face in dealing with mobile device information security. Topics include what needs to be protected; understanding the risks involved; numerous types of mobile devices; information in various states of at rest or in motion; the role of encryption; attack scenario vulnerabilities; and the aspects of defense-in-depth controls.
Get an in-depth understanding of risk factor analysis that must be performed in order to design a flexible and comprehensive security plan. Topics include assessing threats, developing countermeasures, protecting information and security designs processes. Auditing practices used to verify compliance with policies and procedures, as well as for building a case for presentation in private and public settings, are also covered.
Examine issues involved in protecting web-based applications from external threats while safeguarding customer privacy and accessibility. Develop strategies that mitigate external threats to an organizations systems and also support business goals.
Explore the legal, ethical and security issues involving data and information assets that organizations must address to ensure operational continuity as well as compliance with standards, policies and laws.
Develop skills in performing network security testing, including testing countermeasures against malware threats, denial of service (DOS) and distributed denial of service (DDOS) attacks, e-mail, Web, and Wireless using a layered approach. The layered approach requires design, implementation, and testing of attack countermeasures at five different layers within a network.