- 100% Online, Flexible Programs
- 24/7 Student Support
- Industry Experienced Faculty
DeVry Bachelor's Degree Specialization
Cyber Security
Choose the schedule that best fits your goals and commitments. You can earn your Bachelor's Degree in as few as 2 years 8 months*.
Or, follow a normal schedule and complete your program in 4 years.**
*Per 12-month period, assumes completion of 3 semesters, enrollment in 12-19 credit hours per semester and continuous, full-time year-round enrollment with no breaks.
**Per 12-month period, assumes completion of 2 semesters and full-time enrollment in 12-19 credit hours per semester.
A Complimentary Laptop: You’ll get a complimentary laptop as part of your technology program1. It’s our way of investing in your education—and you.
Work with IoT Technologies & Systems: Immerse yourself in the Internet of Things (IoT) world and obtain hands-on experience with IoT, cloud, software and security technologies and systems.
Certification Exam Reimbursement: Several of our tech programs are designed with industry-recognized certifications in mind. Qualified students may receive up to a $300 reimbursement for the cost of one exam attempt across a wide range of certifications:
Other certifications may also be eligible for reimbursement. Speak to your Student Support Advisor for additional information.
^These figures displayed represent the minimum credit hours required for graduation. Additional coursework may be necessary to complete program requirements. At the time of application to the next credential level, an evaluation of qualifying transfer credit will occur and the most beneficial outcome will be applied.
Computer systems analysts study an organization’s current computer systems and design ways to improve efficiency.
Computer support specialists maintain computer networks and provide technical help to computer users.
Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems.
Penetration testers perform simulated cyberattacks on a company's computer systems and networks. These authorized tests help identify security vulnerabilities and weaknesses before malicious hackers have the chance to exploit them.
Vulnerability Assessors perform assessments of systems and networks within the network environment or enclave and identify where those systems or networks deviate from acceptable configurations, enclave policy, or local policy. The role measures effectiveness of defense-in-depth architecture against known vulnerabilities.
Growth projected on a national level. Local growth will vary by location. BLS projections are not specific to DeVry University students or graduates and may include earners at all stages of their career and not just entry level.
Prepare for the Career You Want
We understand your career aspirations start long before you enter a classroom, which is why at DeVry, we put your success at the center of everything we do. We are committed to helping you pursue your career goals from the day you enroll and far past your graduation date. Our Career Advisors ensure that you get hands-on guidance to help you pursue your future career confidently by providing a wide range of services, which includes helping you identify and highlight your key strengths and skills, polish your resume, refine your LinkedIn profile and so much more.
Students study transmission media's role as one of the many sources of systems security vulnerability. This course discusses the various types of media used to connect computing and digital devices to networks, and their significance when planning a secure system. The course covers several major media, including copper, coaxial cable, fiber optic cable, wireless and microwave media. Physical and virtual systems are analyzed, implemented and secured.
This course provides you with the opportunity to gain knowledge and skills related to activities behind hacking attacks and countermeasures. Coursework helps students build defense mechanisms to protect applications, systems and networks from hackers. Security loopholes, as well as many of the attack tools used by black hat hackers, are examined.
This course examines network security testing, including testing countermeasures against malware threats such as denial of service (DOS), distributed denial of service (DDOS) attacks, email, web and wireless. This course also communicates the importance using a layered approach requiring design, implementation and testing of attack countermeasures.
This course provides an in-depth look at risk factor analysis that must be performed in order to design a flexible and detailed security plan. Topics include assessing threats, developing countermeasures, protecting information and security designs processes. Auditing practices used to verify compliance with policies and procedures, as well as for building a case for presentation in private and public settings, are also covered.
No. The courses you take and the requirements to graduate from DeVry are the same whether you enroll in our hybrid or online Cyber Security Degree Specialization.
It depends on the specific job you would like to pursue. Typically, a career in cyber security requires at least a bachelor’s degree. According to the U.S. Bureau of Labor Statistics, the majority of information security analyst positions require a bachelor’s degree in a computer-related field, such as a cyber security specialization.1
A cyber security degree can be worth it on several levels. According to the BLS, Employment of Information security analysts is projected to grow 32 percent from 2022 to 2032, much faster than the average of all occupations. This growth is projected on a national level and local growth will vary by location. This projection is not specific to DeVry University graduates and may include earners at all stages of their careers and not just entry-level. Also, a career in cyber security can provide great personal satisfaction knowing that the work you do can help keep your organization, its employees and customers safe from cybercrime.
There are several soft skills that can help people work toward a career in cyber security. Excellent communication and writing skills can help you clearly convey issues and solutions to management, while organization and collaboration skills can help you remain collected should an issue arise. These soft skills supplement a thorough knowledge of technical skills such as network building, programming and system maintenance.
1As part of this program, one complimentary laptop is provided to students enrolled in the Associate in Cybersecurity and Networking, Associate in Information Technology and Networking, Associate in Engineering Technology, Bachelor’s of Information Technology and Networking, Bachelor’s of Software Development, Bachelor’s of Engineering Technology, Bachelor’s of Network and Communications Management and Bachelor’s of Computer Information Systems. The laptop is issued during the student’s second session. Certain restrictions apply.