Cyber Security Programming Degree Specialization
Cyber security professionals help protect computer networks from cyber attacks, preventing the theft, loss or damage of sensitive information and critical data1. To give you the hands-on experience needed to fight cyber crime and secure computers from the threat of hackers, terrorists and criminals, the Cyber Security Programming degree specialization at DeVry University features cyber-attack simulations in a virtual environment. Students learn to create, plan, implement and monitor innovative solutions to protect data and networks and prevent future attacks.
Learn more about the advantages of studying at DeVry University. Request more information.
All students enrolled in site-based programs will be required to take some coursework online and, for some programs and locations, a substantial portion of the program may be required to be completed online.
Take the TechPath
Want to learn how to navigate today’s tech-infused, dynamic and interconnected workplaces? Take the TechPath. Specially designed to help you gain the kinds of applied tech skills that are crucial in more and more companies today1, each TechPath class is powered by a learning rubric developed at DeVry called People-Process-Data-Devices, or P2D2. And because we believe TechPath is so important for our students and for helping to close the applied tech skills gap in this country, we’re offering our TechPath associates and bachelor’s degree programs to new students at a 20% savings2.
1Exploring America’s Tech Skills Gap and the Parallel Deficits of Applied Tech Skills and Hard Tech Skills, by The Career Advisory Board: http://careeradvisoryboard.org/research/technology-skills-gap-survey
2TechPath Associate and Bachelor’s degree programs are offered to new students at the cost of $487 per credit hour, which is 20% lower than our Non TechPath rate at $609. 20% savings is applicable to those who apply after 4/21/2017. New TechPath pricing savings do not apply to certificate programs.
Professional Certification Advantage
While there is a growing demand for cyber security professionals, employers have very high requirements. Over half of all positions require at least one professional certification, such as the Systems Security Certified Practitioner (SSCP) certification.2 The SSCP designation certifies that you have technical skills and practical security knowledge in hands-on operational IT roles.34
As a student enrolled in the DeVry University’s Cyber Security Programming specialization, you can take advantage of our SSCP Certification Prep courses offered at no tuition charge. Better still, eligible students who register for and complete the exam may be reimbursed for one exam sitting.
2. Study by Burning Glass Technologies, “Job Market Intelligence: Report on the Growth of Cybersecurity Jobs,” 2014, pg. 8
4. The SSCP designation requires 1 year of work experience. Without the work experience, those that pass the exam earn the Associate of (ISC)2.
When you specialize your Computer Information Systems degree in Cyber Security Programming, your coursework at DeVry University may include these courses:
Information Security and Mobile Devices
Information Systems Security Planning and Audit
Data Privacy and Security
Advanced Network Security with Lab
Understand the complex and challenging issues organizations face in dealing with mobile device information security. Topics include what needs to be protected; understanding the risks involved; numerous types of mobile devices; information in various states of at rest or in motion; the role of encryption; attack scenario vulnerabilities; and the aspects of defense-in-depth controls.
Get an in-depth understanding of risk factor analysis that must be performed in order to design a flexible and comprehensive security plan. Topics include assessing threats, developing countermeasures, protecting information and security designs processes. Auditing practices used to verify compliance with policies and procedures, as well as for building a case for presentation in private and public settings, are also covered.
Examine issues involved in protecting web-based applications from external threats while safeguarding customer privacy and accessibility. Develop strategies that mitigate external threats to an organizations systems and also support business goals.
Explore the legal, ethical and security issues involving data and information assets that organizations must address to ensure operational continuity as well as compliance with standards, policies and laws.
Develop skills in performing network security testing, including testing countermeasures against malware threats, denial of service (DOS) and distributed denial of service (DDOS) attacks, e-mail, Web, and Wireless using a layered approach. The layered approach requires design, implementation, and testing of attack countermeasures at five different layers within a network.