LEARN TO PROTECT ORGANIZATIONS FROM CYBERATTACKS.
Cyberattacks can compromise personal data, provide unwanted visibility to sensitive information and cripple a business’ infrastructure. Are you ready to be on the front lines? Get started with a bachelor’s degree specialization in Cyber Security Programming from DeVry University. This program is built with Tech Core curriculum, designed to give you hands-on learning experiences in Engineering Technology, Information Technology and Software and Information Systems. You’ll build a foundation of interdisciplinary skills you can put to work tomorrow.
GET TO KNOW OUR CYBER SECURITY PROGRAMMING SPECIALIZATION.
Classes Start Every 8 Weeks
Earn your Bachelor's Degree in Computer Information Systems with Cyber Security Programming Specialization in as little as 2 years + 8 months*—or even more quickly with qualifying transfer credits.
*Not including breaks. Assumes year-round, full-time enrollment.
OUR INVESTMENT IN A MORE POWERFUL YOU
As a new student, you’ll get a complimentary laptop as part of your technology program1. It’s our way of investing in your education—and you.
It’s portable so you can take it anywhere, powerful enough to run robust applications, and best of all, you can use it for all your classes to optimize your DeVry experience.
PORTABLE IOT KIT
Simulate the Internet of Things (IoT) wherever you are with your Portable IoT Kit, designed to give you hands-on experience and confidence working with real IoT technologies.
With the full complement of microprocessors and sensors in your kit, you’ll build elementary IoT devices, integrate them into cloud-based server systems and develop skills needed for today’s IoT economy.
CERTIFICATION EXAM REIMBURSEMENT
Our Tech programs are designed with industry-recognized certifications in mind. Qualified students may receive up to a $300 reimbursement for the cost of one exam attempt across a wide range of certifications:
- Cisco Certified Network Associate (CCNA) and Certified Entry Network Technician (CCENT)
- CompTIA A+ Technician, Network+, Security+ and IT Fundamentals+
- Microsoft Technology Associate
Others may be applicable as well. Speak with your professor for more info.
Graduates with our Cyber Security Programming Specialization may consider the following careers:
Computer Security Specialist
Cyber Security Specialist
Data Security Administrator
Information Security Analyst
Information Security Manager
|ETHC232||Ethical and Legal Issues in the Professions|
|LAS432||Technology, Society, and Culture|
|ECON312||Principles of Economics|
|SOCS185||Culture and Society|
Mathematics and Natural Sciences
|MATH114||Algebra for College Students|
|MATH221||Statistics for Decision-Making|
|PHYS204||Applied Physics with Lab|
Personal and Professional Development
|COLL148||Critical Thinking and Problem-Solving|
Tech Core Courses
|CEIS101||Introduction to Technology and Information Systems|
|CEIS106||Introduction to Operating Systems|
|CEIS110||Introduction to Programming|
|CEIS114||Introduction to Digital Devices|
|NETW190||Fundamentals of Information Technology and Networking I|
|NETW200||Fundamentals of Information Technology and Networking II|
|SEC285||Fundamentals of Information Security|
Information Systems and Programming
|CEIS236||Database Systems and Programming Fundamentals|
|CIS170C||Programming with Lab|
|CIS247C||Object-Oriented Programming with Lab|
Networking and Systems Administration
|NETW260||Intermediate Information Technology and Networking I|
|NETW270||Intermediate Information Technology and Networking II|
Information Technology and Networking
|CEIS210||Introduction to Cryptographic Methods|
|NETW411||Information Security and Mobile Devices|
|SEC321||Network Security Testing with Lab|
|CEIS392||Product, Project, and People Management|
|CEIS494||Senior Project I|
|CEIS496||Senior Project II|
Technology Career Preparation
|CEIS299||Careers and Technology|
|CEIS499||Preparation for the Profession|
Cyber Security Programming
|SEC290||Fundamentals of Infrastructure Security|
|SEC360||Data Privacy and Security|
|SEC440||Information Systems Security Planning and Audit|