Living in the age of data means embracing the interconnectedness that allows us to communicate and collaborate in an infinite number of ways. Data can mean a wealth of information and insight at our fingertips, but it can also be detrimental in the wrong hands. With progressively more information traveling over the wires and with increasing threats internationally with cyber terrorism, the need to defend and protect an organization’s assets is critically important.
Do you want to stop cyber-crime before it starts? If preventing, detecting, and battling digital crime is important to you, a career in cyber security may be the perfect fit and a Cyber and Information Security Technology degree could be a great way to start! As a cybersecurity specialist, you could be on the front lines of cyber warfare and defense, protecting vital computer systems against inside and outside threats alike, including social engineering, hackers, malware, spyware, and viruses.
You could earn a Bachelor of Science Degree in Computer and Information Science with a major in Cyber and Information Security Technology and a track in Cybersecurity in as little as 2.5 years through ECPI University’s year-round degree program.
Our Cyber and Information Security Technology major and Cybersecurity track could teach you how to:
- Protect data and manage personnel conduct in relation to safeguarding data.
- Perform vulnerability analysis/penetration testing of organizations
- Actively monitor and defend networks
- Create basic security policy and procedures
Join an exciting industry where you could make a difference in the lives of so many—contact ECPI University today and learn more about earning your bachelor’s in Computer and Information Science with a major in Cyber and Information Security Technology and a track in Cybersecurity.
The National Security Agency and the Department of Homeland Security have designated ECPI University as a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE) for the Bachelor of Science in Computer and Information Science: Cyber and Information Security Technology major, Cybersecurity Track through academic year 2023. Designation Letter can be viewed here.
The Computer and Information Science programs are delivered online or through a campus-based hybrid model.
Cybersecurity Possible Career track
- Technical support and help desks
- Network & Security infrastructure support
- Information security analyst
- Network security analyst
- IT supervision/management
- Information technology solutions providers
- Network Security implementation
- Information Security Engineer
Students in the B.S. in Computer & Information Science program develop planning, design, implementation, and support skills in operating systems, networking, software programs, and security. Students develop additional focused skills based on which major the student pursues. Students also learn principles of excellent customer service in order to assist clients with technical issues.
Upon successful completion of the Bachelor of Science in Computer & Information Science, graduates are expected to:
- Design, implement, and evaluate computer-based solutions that incorporate the appropriate computing requirements identified through the analysis of specific organizational or computing problems
- Function effectively on teams to establish goals, plan tasks, meet deadlines, manage risk, and produce deliverables
- Apply written, oral, and graphical communication in both technical and non-technical environments
- Evaluate and use appropriate technical literature
- Engage in continuous professional development through user groups, associations, conferences, readings, research, and other channels
- Develop and apply ethical and legal best practices in the maintenance and security of information and systems
- Develop cloud computing tools
In addition to the B.S. CIS Program Outcomes, students in the Cyber and Information Security Technology Major learn about installing, securing, testing, and maintaining computer networks.
Upon successful completion of the Cyber and Information Security Technology Major - Cybersecurity Track, graduates are expected to:
- Plan, design, configure and administer a network and security infrastructure
- Maintain, monitor, and troubleshoot a network and security infrastructure
- Assess and implement technical and non-technical security controls to protect an organization from threats and vulnerabilities
|Course ID||Course Name||Credits|
|BUS121||BUS121 Introduction to Business||3.00|
|CIS123||CIS123 Introduction to Python Scripting||3.00|
|CIS126||CIS126 Introduction to Programming||3.00|
|CIS142||CIS142 Introduction to Cloud Solutions||3.00|
|CIS150||CIS150 Introduction to Networking||3.00|
|CIS206||CIS206 Linux Administration||3.00|
|CIS212||CIS212 Principles of Cybersecurity||3.00|
|CIS223||CIS223 Introduction to Databases||3.00|
|PMT472||PMT472 Applied Project Management||3.00|
|PMT472L||PMT472L Applied Project Management LAB||1.00|
|Credit Hour(s) total||28.00|
|Course ID||Course Name||Credits|
|CAP480||CAP480 Arts and Sciences Capstone||3.00|
|COM115||COM115 Principles of Communication||3.00|
|ENG110||ENG110 College Composition||3.00|
|ENG120||ENG120 Advanced Composition||3.00|
|HUM205||HUM205 Culture and Diversity: Exploring the Humanities||3.00|
|MTH131||MTH131 College Algebra||3.00|
|PSY105||PSY105 Introduction to Psychology||3.00|
|PSY220||PSY220 Positive Psychology||3.00|
|PHY120L||PHY120L Physics LAB||1.00|
|BIO122||BIO122 Environmental Biology||3.00|
|BIO122L||BIO122L Environmental Biology LAB||1.00|
*For allowable substitutions of arts and sciences courses, see the Arts & Sciences Department page.
|Course ID||Course Name||Credits|
|CIS101||CIS101 Computer Configuration I||3.00|
|CIS202||CIS202 Introduction to Routing and Switching||3.00|
|CIS202L||CIS202L Introduction to Routing and Switching LAB||1.00|
|CIS204||CIS204 Intermediate Routing and Switching||3.00|
|CIS207L||CIS207L Network Routing and Switching LAB||1.00|
|CIS225||CIS225 Network Protocols and Services||3.00|
|CIS245||CIS245 Windows Client and Server||3.00|
|CIS245L||CIS245L Windows Client and Server LAB||1.00|
|CIS251||CIS251 Advanced Windows Server||3.00|
|CIS256||CIS256 Windows Active Directory||3.00|
|CIS256L||CIS256L Windows Active Directory LAB||1.00|
|CIS321||CIS321 Network Scripting||3.00|
|CIS403||CIS403 Ethical Hacking||3.00|
|CIS425||CIS425 Advanced Defense and Countermeasures||3.00|
|CIS495||CIS495 Cyber and Network Security Capstone||3.00|
|CIS490||CIS490 Bachelor’s Externship-CIS||3.00|
*Choose one of the following: CIS495 - Cyber and Network Security Capstone or CIS490 - Bachelor's Externship-CIS
|Course ID||Course Name||Credits|
|CIS230||CIS230 Advanced Cybersecurity||3.00|
|CIS230L||CIS230L Advanced Cybersecurity LAB||1.00|
|CIS305||CIS305 Advanced Linux Administration||3.00|
|CIS335||CIS335 AI/Machine Learning/Edge Computing||3.00|
|CIS411||CIS411 Ethical Hacking II||3.00|
|CIS425L||CIS425L Advanced Defense and Countermeasures LAB||1.00|
|CIS403L||CIS403L Ethical Hacking Lab||1.00|
|Credit Hour(s) total||15.00|
Visit the ECPI University Catalog for the most current program information.
At ECPI University you’ll find faculty and staff who are dedicated to your success. Not only do we want to see you graduate, but our overarching goal is to prepare you for success. Industry driven curriculum taught using a variety of methods, from lecture to hands-on activities, will expose you to the information and skills you will need.
Our accelerated schedule can allow students to graduate with a bachelor’s degree in as little as 2.5 years, with two classes per 5-week term. While you are completing your course work, our Career Services department can help you with resumes, cover letters, and interview preparation. After graduation, our alumni association can keep you connected with peers within your field and across the country.
ECPI University’s degree programs are developed by talking with local employers first, and focusing on industry-driven curriculum, skillsets, and certifications. Twice a year, an advisory board comprising 16 campuses meets to discuss the latest employer needs. We then integrate these into our programs, developing content and activities used in virtual training environments and in practice with hands-on simulators, clinics, and externships.
Most universities and colleges teach students from a book and then leave them to learn skills “on the job.” At ECPI University, we educate our students and train them using hands-on workshops and labs, externships in the field of study, and certification programs. On their first day on the job, ECPI University students already know what is expected of them and are confident in their capabilities because it is work they have done before through our hands-on learning opportunities.
ECPI University offers discount vouchers for many industry-related certifications, so you’ll pay less here than you would anywhere else. These savings can be quite significant and into the thousands of dollars depending on your degree program and specialty. Not only that, but we also make it very easy! We provide students access to the “GetCertified” portal, where students can register for exam, claim and accept exam vouchers, and find preparatory information needed for the certifications.
In the IT field, certifications demonstrate that you have specialized industry knowledge. In some instances, this might be all that is needed to obtain initial employment. Having a degree can signify your commitment to employers and your field.
A degree may get you in the door, but any additional qualifications may help you stand out in a crowd from other candidates with only a degree. Getting certifications in your field can prove to potential employers that you are an expert who is dedicated to your craft. Certifications also keep you updated on the latest techniques and advancements in your field.
Similar to a restaurant getting an “A+” in cleanliness, the NSA/DHS Designation as a “National Center for Academic Excellence in Cyber Defense Education (CAE-CDE),” indicates that ECPI University’s cyber degree program has been evaluated by an independent third party and found to meet (or exceed) the requirements for the designation or award.