Associate Degree in Cybersecurity and Networking

Advance Your Ambition in the Battle Against Cybercrime

Internet-based crime is one of the fastest growing security threats in the United States**, and as cyber crime grows, so does the need for skilled individuals like you to help prevent attacks. Combine your interest and your experience and education in cyber security with your drive to lead the way in tech. The time is now.

Learn how to be an essential part of how organizations keep their networked devices, infrastructures and environments secure and running smoothly through the Associate Degree in Cybersecurity and Networking at DeVry University.  

Pursue your academic and professional goals to help close the opportunity gap in tech anytime, from anywhere, with the support of your DeVry advisors, faculty and peers. You can learn to protect data, safeguard networks and get hands-on experience in our 100% online program – no previous IT experience required.

Get to Know Our Cybersecurity and Networking Associate Degree Program

In our Associate Degree Cybersecurity and Networking program, you can learn the fundamentals of interconnected computing devices, peripherals and associated software to maximize network efficiency and productivity. You’ll apply this knowledge to:

  • Learn how to identify vulnerabilities in networks, software and devices
  • How to protect networks, software and devices from a cyberattack
  • Help prepare for and prevent cyber attacks 
  • Work through incident response and disaster recovery
  • Understand firewall architecture
  • Explore cryptography 


Did you know? You’ll earn DeVry’s IT Essentials Undergraduate Certificate on your path to earning your Associate Degree in Cybersecurity and Networking.


Classes Start Every 8 Weeks

Earn your Associate Degree in Cybersecurity and Networking in as little as 1 year + 4 months*—or even more quickly with qualifying transfer credits.

*Not including breaks. Assumes year-round, full-time enrollment.



Future Cyber Defenders Scholars Program

Take your ambition to the next level with a cybersecurity scholars program that helps you build your network, boost your skills and pursue the career you want. 

Learn More

What You'll Learn

Our Cybersecurity and Networking degree is anchored with Tech Core curriculum, designed to help you build a foundation of interdisciplinary skills you’ll need for today’s Internet of Things (IoT) economy and covers the following: 

  • communicate methods and findings icon

    Communicate Methods and Findings

    Learn to communicate the rationale behind research methods and recommendations while presenting performance objectives, issues and solutions.
  • collaborate in dynamic work environments icon

    Collaborate in Dynamic Work Environments

    Learn to collaborate with colleagues in varying locations and environments to coordinate and share information.
  • complex problem solving icon

    Complex Problem Solving

    Apply critical and analytical thinking to identify complex problems, evaluate options and implement solutions.
  • data analysis icon

    Data Analysis

    Learn to draw conclusions by finding patterns and relationships in numerical data with tools used for statistical analysis. Find out how data analysis can be used to make more efficient databases.
  • digital literacy icon

    Digital Literacy

    Learn to apply appropriate technologies in order to solve digital issues and problems within databases.
  • behavioral analytics

    Behavioral Analytics

    Apply behavioral analytics to networks and devices to prevent, detect and counter cybersecurity threats through continuous security monitoring.
  • information security icon

    Information Security

    Obtain critical knowledge on information systems security in organizations in areas such as: security concepts and mechanisms, mandatory and discretionary controls, basic cryptography and its application, intrusion detection and prevention, information system assurance and anonymity and privacy.
  • systems and networks

    Systems and Networks

    Apply principles of technology in the building, testing, operation and maintenance of connected and distributed digital-based systems and networks.
  • identify and mitigate network risk icon

    Identify and Mitigate Network Risk

    Explore the fundamentals needed to analyze internal and external security threats and implement security mechanisms. Learn to evaluate network and internet security issues to provide security solutions, design information systems security policy, troubleshoot networks, and implement digital signatures.

Embedded Programs - Demonstrate Skills at Every Step

Interested in learning how to earn an additional credential while earning your Cybersecurity and Networking associate degree? Our 2-in-1 designed program allows all courses in our IT Essentials certificate program to be embedded within this program. So you can earn a certificate on the way to your associate degree.*

*At the time of application to the next credential level, an evaluation of qualifying transfer credit will occur and the most beneficial outcome will be applied.

Career Opportunities

Graduates with our Cybersecurity and Networking Associate degree may consider, but are not limited to, the following careers:

  • Computer Network Support Specialist
    Also called technical support specialists, these professionals analyze, troubleshoot and evaluate computer network problems. This career path primarily focuses on technical knowledge but can be enhanced by good communication skills that enable you to communicate technical needs to managers and company leaders.

  • Information Security Analyst
    Information security analysts are a first line of defense in protecting an organization’s data. They ensure that information is kept confidential, accurate and available through a combination of policies, procedures and technical measures. People in this profession are responsible for analyzing the flow of data and identifying weaknesses where breaches could occur. Once a breach point has been identified, it can be rectified prior to a network intrusion.

  • Information Technology Specialist
    IT specialists provide computer and technical support to schools, businesses and other organizations. They install and oversee the network, databases, software and hardware to ensure they run smoothly and are same from threats. Responsibilities may include testing devices, troubleshooting software and training employees on how to use the network effectively. IT specialists may also help create and manage data storage solutions and makes system upgrade recommendations.

General Education Courses

Communication skills

ENG112 Composition

One of:

SPCH275  Public Speaking

SPCH276  Intercultural Communication


One of:

ETHC232  Ethical and Legal Issues in the Professions

ETHC334  Diversity, Equity and Inclusion in the Workplace

Social Sciences

SOCS185 Culture and Society

Mathematics & Natural Sciences

MATH114 Algebra for College Students
PHYS204 Applied Physics with Lab

Personal & Professional Development

CARD205 Career Development
COLL148 Critical Thinking and Problem-Solving

Tech Core Courses

Tech Core

CEIS101 Introduction to Technology and Information Systems
CEIS106 Introduction to Operating Systems
CEIS110 Introduction to Programming
CEIS114 Introduction to Digital Devices
NETW191 Fundamentals of Information Technology and Networking
NETW211 Fundamentals of Cloud Computing
SEC285 Fundamentals of Information Systems Security

Program-Specific Courses

Career Preparation

CEIS299 Careers and Technology

Specialized Courses


SEC290 Fundamentals of Infrastructure Security
SEC310 Principles and Theory of Security Management

One of:

SEC311   Ethical Hacking

SEC321  Network Security Testing with Lab

One of:

SEC340  Business Continuity

SEC360  Data Privacy and Security

SEC380  Cloud Computing Security

Build Skills with Stackable Degrees

Earn a Credential at Every Step

You don’t have to wait four years to show a credential on your resume. At DeVry, several programs are designed to stack. 2

  • Start with a shorter credential that takes less time so it’s more affordable 

  • Flexible online and on-site classes build your professional skills right away

  • Every course counts toward the next degree level 3

How Do Credentials Stack?

Here's an example: When you earn the Cyber Security Certificate, every course you completed in the program applies to your Associate Degree in Cybersecurity and Networking, which then stacks into a Bachelor’s Degree in Information Technology and Networking with a specialization in Cyber Security. Build your confidence – and your resume – when you start your journey at DeVry. You got this. We got you. Connect with an advisor to learn more about how you can maximize your credits at DeVry.


Academic Catalog

Download PDF

Program Overview

Download PDF

Academic Catalog

Download PDF

Program Overview

Download PDF

1As part of this program, one complimentary laptop is provided to students enrolled in the Associate in Information Technology and Networking, Associate in Engineering Technology, Associate in Cybersecurity and Networking, Bachelor’s in Information Technology and Networking, Bachelor’s of Software Development, Bachelor’s in Engineering Technology, Bachelor’s in Network and Communications Management and Bachelor’s in Computer Information Systems. The laptop is issued during the student’s second session. Certain restrictions apply.
2 At the time of application to the next credential level, an evaluation of qualifying transfer credit will occur and the most beneficial outcome will be applied. 
3For the AITN-Automation and Electronic Systems specialization, every course counts toward the Bachelor’s in Engineering Technology. For the Associate in Cybersecurity and Networking program, every course counts toward the Bachelor’s in Information Technology and Networking with a specialization in Cyber Security program. Every course within the AITN-Information Systems and Programming specialization counts toward the Bachelor’s in Software Development and the Bachelor’s in Computer Information Systems programs. At the time of application to the next credential level, an evaluation of qualifying transfer credits will occur and the most beneficial outcome will be applied. 
*The figures displayed represent the minimum credit hours required for graduation. Additional coursework may be necessary to complete program requirements.