Live Chat Now
Available
Give us a call

Send us a text

855.890.3001

855.890.3001

Computer Information Systems

Bachelor's Degree Specialization in Cyber Security Programming

Learn To Protect Organizations from Cyberattacks

Cyberattacks can compromise personal data, provide unwanted visibility to sensitive information and cripple a business’ infrastructure. But where there are cybercrimes and cyberattacks, there are dedicated cyber security professionals helping keep organizations safe.

Are you ready to be on the front lines? Get started with a Bachelor’s Degree Specialization in Cyber Security Programming from DeVry University. This program is built with Tech Core curriculum, which is designed to give you hands-on learning experiences in Engineering Technology, Information Technology and Software and Information Systems. You’ll build a foundation of interdisciplinary skills you can put to work in your future cyber security career.

Get To Know Our Cyber Security Programming Specialization

Our Cyber Security Programming Degree Specialization can help you develop the skills and tools you need to protect and defend data against cyberattacks. Our experienced faculty will guide you through hands-on exercises and projects, teaching you how to create, plan, implement and monitor security solutions to protect data and networks and prevent future attacks. You’ll also explore the design of an organization’s security systems procedures, standards, protocols and policies, as well as how to ensure operational security is in compliance with standards, policies and laws.

The Cyber Security Programming Specialization can be earned as a part of the Bachelor’s Degree in Computer Information Systems.

Classes Start Every 8 Weeks
Accreditation and Recognition Matter

DeVry University’s Cyber Security curriculum is acknowledged and verified as an approved provider by NICCS.

#image
#image
Why DeVry?

Why Choose Cyber Security Programming at DeVry?

Complimentary Laptop

You’ll get a complimentary laptop as part of your technology program.1 It’s our way of investing in your education — and you.

Work With IoT Technologies & Systems

Immerse yourself in the Internet of Things (IoT) world and obtain hands-on experience with IoT, cloud, software and security technologies and systems.

Certification Exam Reimbursement

Several of our tech programs are designed with industry-recognized certifications in mind. Qualified students may receive up to a $300 reimbursement for the cost of one exam attempt across a wide range of certifications:

 

CompTIA A+
CompTIA Linux+
CompTIA Network+
CompTIA Cloud+

Other certifications may also be eligible for reimbursement. Speak to your Student Support Advisor for additional information.

Questions for our admissions team?
Request Info about Cyber Security Programming Specialization Program now.
Scholars Program

Future Cyber Defenders Scholars Program

Take your ambition to the next level with a cybersecurity scholars program that helps you build your network, boost your skills and pursue the career you want.
Minimum Completion Time*
2 year
8 months
OR
Normal Completion Time
4 years

ACCELERATE AT YOUR PACE

Choose the schedule that best fits your goals and commitments. You can earn your Bachelor's Degree in as few as 2 years and 8 months.*

Or, follow a normal schedule and complete your program in 4 years.**

*Per 12-month period, assumes completion of 3 semesters, enrollment in 12 to 19 credit hours per semester and continuous, full-time year-round enrollment with no breaks.
**Per 12-month period, assumes completion of 2 semesters and full-time enrollment in 12 to 19 credit hours per semester.

Knowledge & Skills

What You'll Learn

The Cyber Security Programming Specialization covers the following skills and topics in order to help you build important cyber security capabilities:

  • Information Systems Security Planning and Audit
    Understand the risk factor analysis that must be performed in order to design a flexible and comprehensive security plan.
  • Data Privacy and Security
    Explore the legal, ethical and security issues involving data and information assets that organizations must address to ensure operational continuity, as well as compliance with standards, policies and laws.
  • Web Security
    Examine issues involved in protecting web-based applications from external threats while safeguarding customer privacy and accessibility.
  • Information Security and Mobile Devices
    Focus on protecting information on mobile devices, types of mobile devices, risks, encryption, information at rest and in motion, attack scenarios and defense-in-depth controls.
  • Advanced Network Security
    Identify network and wireless vulnerabilities, conduct risk assessments, respond to intrusions, and provide for business continuity and disaster recovery. Learn how to work with cyber security specialists to improve your existing systems.
  • Networking
    Gain working knowledge of the underlying technology of local area networks (LANs), wide area networks (WANs) and the internet. This topic also covers networking media, the Open Systems Interconnection (OSI) model, transmission control protocol/internet protocol (TCP/IP), routing and switching, and small network configuration and troubleshooting.
  • Routing
    Understand router configuration, maintenance and troubleshooting. Explore internet protocol (IP) addressing techniques, routing protocols, IPv4 and IPv6, access control lists (ACLs) and network address translation (NAT).
  • Switching
    Understand switch configuration, maintenance and troubleshooting. Explore Ethernet frame switching techniques, switch-port security, virtual area networks (VLANs) and VLAN Trunking Protocol (VTP).
  • Logic and Design
    Study basic programming logic and algorithm design, including control structures for sequential, iterative and decision-based processing. Learn how computers think in order to set up complex patterns and controls.
  • Complex Problem Solving
    Apply critical and analytical thinking to identify complex problems, evaluate options and implement solutions.
Embedded Programs

Embedded Programs - Demonstrate Skills at Every Step

Curious to learn how you can earn two additional credentials? Our unique 3-in-1 design allows you to do just that. Courses in our Programming Essentials certificate program and Information Technology and Networking associate degree are included within this program, allowing you the opportunity to earn a certificate and an associate degree on the road to your Computer Information Systems – Cyber Security Programming undergraduate degree.*

*The figures displayed represent the minimum credit hours required for graduation. Additional coursework may be necessary to complete program requirements.

Bachelor's
124
Credit Hours
Associate
60
Credit Hours
Certificate
22
Credit Hours
Career

Career Opportunities in Cyber Security

Graduates with our Cyber Security Programming Specialization may consider the following careers:
  • Software Developer

  • Computer Programmer

  • Information Security Analyst​

  • Cybersecurity Specialist​

  • Cybersecurity Analyst​

  • Cybersecurity Manager​

  • Penetration and Vulnerability Tester​

  • Cybersecurity Architect​

  • Security Specialist Principal ​

  • Information Systems Security Designer

  • Information Security Specialist

Learn more about
Cyber Security Programming
Program Courses

Cyber Security Programming Specialization

General Education Courses
Communication Skills
ENGL1122
Composition
ENGL135
Advanced Composition
ENGL216
Technical Writing


+ Choose one below:

SPCH275
Public Speaking
SPCH276
Intercultural Communication
Humanities
LAS432
Technology, Society and Culture


+ Choose one below:

ETHC232
Ethical and Legal Issues in the Professions
ETHC334
Diversity, Equity and Inclusion in the Workplace
Social Sciences
ECON312
Principles of Economics
SOCS185
Culture and Society


+ Choose one below:

SOCS3253
Environmental Sociology
SOCS350
Cultural Diversity in the Professions
Mathematics and Natural Sciences
MATH114
Algebra for College Students
PHYS204
Applied Physics With Lab
TECH221
Data-Driven Decision-Making
Personal and Professional Development
CARD405
Career Development
COLL148
Critical Thinking and Problem-Solving
Tech Core Courses
Tech Core
CEIS101
Introduction to Technology and Information Systems
CEIS106
Introduction to Operating Systems
CEIS110
Introduction to Programming
CEIS114
Introduction to Digital Devices
NETW191
Fundamentals of Information Technology and Networking
NETW212
Introduction to Cloud Computing
SEC285
Fundamentals of Information Systems Security
Program Courses
Information Systems and Programming
CEIS150
Programming With Objects
CEIS209
Intermediate Programming
CEIS236
Database Systems and Programming Fundamentals
CIS313
AI-Driven Business Application Coding
CIS355A
Business Application Programming With Lab
Information Technology and Networking
SEC290
Fundamentals of Infrastructure Security
SEC305
Cybersecurity and Data Privacy
SEC311
Ethical Hacking
SEC322
Penetration Testing
Career Preparation
CEIS298
Introduction to Technical Project Management
CEIS4994
Preparation for the Profession
MGMT404
Project Management
TECH460
Senior Project
Specialized Courses
Cyber Security Programming
NETW411
Information Security and Mobile Devices
SEC380
Cloud Computing Security
SEC440
Information Systems Security Planning and Audit
SEC395
Cybersecurity Architecture and Engineering

2 Students enrolled at a New Jersey location take ENGL108 in lieu of this course.
3 Students enrolled at a Nevada location must take POLI332 in lieu of this requirement.
4 Growth projected on a national level. Local growth will vary by location https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm.

 

FAQs: Cyber Security Programming Degree

What programming languages does Cyber Security use?

Some of the cyber security programming languages used by cyber security professionals include Java, JavaScript, PHP, Python, Ruby, Shell Scripting, SQL, Golang, and C. These languages enable cyber security programmers to bolster the defenses of their organizations, and in some cases make it possible for them to use hacking capabilities to test their own defense measures.

Is Cyber Security Programming hard to learn?

As with any discipline, how challenging a subject is depends on the individual, and cyber security programming is no different. In many ways, learning cyber security programming is like learning other types of programming. A good way of thinking about learning cyber security programming is to compare it to learning a foreign language; you have to learn the rules and logic of a programming language much like you would have to learn the grammatical rules of a different spoken language. 

Is Cyber Security Programming a good career?

According to the U.S. Bureau of Labor Statistics employment for cyber security programming professionals is expected to grow 35% between 2021 and 2031, which is much faster than the national average for all occupations. This growth is projected on a national level and local growth will vary by location. This projection is not specific to DeVry University graduates, and may include earners at all stages of their career and not just entry level.

Academic Catalog
2023 - 2024 Academic Catalog
Program Guides
Program Overview

As part of this program, one complimentary laptop is provided to students enrolled in the Associate in Cybersecurity and Networking, Associate in Information Technology and Networking, Associate in Engineering Technology, Bachelor’s of Information Technology and Networking, Bachelor’s of Software Development, Bachelor’s of Engineering Technology, Bachelor’s of Network and Communications Management and Bachelor’s of Computer Information Systems. The laptop is issued during the student’s second session. Certain restrictions apply.
2 Students enrolled at a New Jersey location take ENGL108 in lieu of this course.
3 Students enrolled at a Nevada location must take POLI332 in lieu of this requirement.
4 Growth projected on a national level. Local growth will vary by location https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm.