Program availability

Your Preferences

Update your Zip code, preferred campus, and preferred program

Bachelor's Degree

Cybersecurity
Online Bachelor's Degree Program

Program Length

32 Mo.

Credits

120

Format

Online

Interactive

Virtual Experience
calendar

NEXT START

Waived Enrollment Fee

Build a deep educational foundation in cybersecurity at your pace

CurriculumUp-to-date curriculum includes foundational cybersecurity topics: incident response, ethical hacking, artificial intelligence and machine learning, computer forensics, and much more
Format100% online courses you can take at home; flexible self-paced learning includes options for full-time or part-time enrollment
Hands-onInteractive learning modules provide training with real cybersecurity tools and software; you can elect an internship option to gain real-world practical experience1
CertificationsPrepare for key certifications from Cisco, CompTIA, and others—built-in as part of your tuition
QuickPathsEarn dual credit towards a Master of Science in Cybersecurity; transfer credit, stackable credentials, and adaptive learning technology build a faster pathway to a higher education with Herzing University
AccreditationAccredited by the Higher Learning Commission

Learn More Today!

Ranked by U.S. News & World Report as one of the best online bachelor's programs in 2024

Become a skilled defender of online security as a cybersecurity professional

Cybersecurity offers a rewarding and potentially lucrative career path for lifelong learners with a passion for IT and information security. Our bachelor’s degree curriculum in cybersecurity prepares students of all backgrounds, including beginners and veterans in IT, to develop the knowledge and skills to join a career field offering all kinds of unique job opportunities.

You can join our exuberant community of online faculty and students eager to learn and grow together as avid, formidable cybersecurity professionals. We know you are possible.

A smiling cybersecurity professional in a modern office setting, seated in front of a computer displaying code, representing the knowledge and skills developed in Herzing University’s cybersecurity program.
  • Career-focused curriculum

    Discover the crucial knowledge and skills required to succeed in your work and build a foundation for continued career growth.

  • Flexible schedule

    We work hard to help you maintain school-life balance, striving to be as flexible as possible for busy non-traditional students.

  • Virtual services

    Access to extensive virtual services, including academic advising, tutoring, support services, technical support and library services.

  • Lifelong support

    We support your ongoing career advancement by providing comprehensive, personalized student services with lifelong career coaching.

  • Rolling admissions

    No application deadlines to worry about. Apply when you’re ready and prepare to get started soon.

Curriculum

Courses & Curriculum Details

Our bachelor’s degree curriculum provides a comprehensive undergraduate education in cybersecurity to fully prepare you for success in your first job. We will help you build a strong understanding of evergreen concepts and equip you with the ability to skillfully adapt to a rapidly changing industry.

Cybersecurity courses emphasize the application of knowledge and skills rather than establishing concepts abstractly via scholarly writing.

All classes are delivered online with a required capstone or internship (if available in your state). Students with relevant, current industry certifications may be able to waive one or more courses in the program and decrease the time needed to complete the program – please contact admissions to confirm eligibility.

ProgramMonths iCredits
Bachelor of Science in Cybersecurity32120

Average number of months for students to complete program

Required Courses

All courses, 67.00 semester credit hours, are required.

This course delves into the intricacies of microcomputer architecture and organization, exploring the fundamental principles and concepts that govern their design and operation. The course emphasizes the interplay between sets, logic, and graph theory as they form the building blocks of microcomputer systems.

This course is designed to provide students with a solid foundation in the fundamental principles of computer architecture. This course explores the inner workings of computer hardware components, their interactions, and the underlying principles that govern their design and functionality. Throughout the course, students will delve into various topics related to computer architecture, including processor architecture, memory systems, storage devices, and input/output systems.

This course is designed to provide students with a comprehensive understanding of computer operating systems. This course explores the fundamental concepts, principles, and functionalities of operating systems, enabling students to effectively support and troubleshoot common operating system issues. Throughout the course, students will delve into various topics related to computer operating systems, including installation, configuration, maintenance, and troubleshooting of different operating systems.

This course is designed to provide students with a comprehensive understanding of networking concepts and principles. This course explores the foundational knowledge required to design, implement, and troubleshoot both wired and wireless networks. Throughout the course, students will delve into various topics related to network fundamentals, including network architecture, protocols, devices, and security.

This course is designed to provide students with a comprehensive understanding of Linux operating systems and the skills required to administer and manage Linux-based environments. This course covers a wide range of topics related to Linux system administration, including installation, configuration, maintenance, and troubleshooting. Throughout the course, students will delve into various aspects of Linux system administration, including file systems, user management, process management, networking, and security.

This course is designed to equip students with the essential knowledge and skills required to design, implement, and manage enterprise-level networks. This course focuses on the fundamental concepts and best practices of network engineering in a corporate environment. Throughout the course, students will explore a wide range of topics related to enterprise network engineering, including network architecture, routing and switching, network security, WAN (Wide Area Network) connectivity, and network troubleshooting.

This course is designed to introduce students to the fundamentals of programming using the Python programming language. This course is ideal for beginners who have no prior programming experience and wish to learn a versatile and widely used language. Throughout the course, students will be introduced to key programming concepts and techniques, including variables, data types, control structures, functions, and object-oriented programming (OOP) principles.

This course is designed to provide students with the knowledge and skills required to design, implement, and manage relational databases effectively. Throughout the course, students will explore various aspects of database management systems, including database design, normalization, data modeling, SQL (Structured Query Language), and database security.

This course offers students an introduction to the fundamental concepts and principles of virtualization technology. Throughout this course, students will explore the core concepts, benefits, and applications of virtualization in various IT environments.

This course is designed to provide students with a solid foundation in the field of cybersecurity This course serves as an entry point for individuals seeking to start a career in cybersecurity or enhance their understanding of security principles and practices. Throughout this course, students will explore the fundamental concepts, methodologies, and best practices of cybersecurity.

This course is designed to provide students with a comprehensive understanding of risk management principles and incident response strategies within the field of cybersecurity using traditional methods and artificial intelligence (AI) technology. Throughout this course, students will explore the fundamental concepts and methodologies of risk management.

This course is designed to provide students with a comprehensive understanding of the methodologies, tools, and techniques used in ethical hacking. This course equips individuals with the knowledge and skills necessary to identify and mitigate security vulnerabilities, assess network infrastructure, and protect organizations against malicious attacks. Throughout this course, students will explore the ethical hacking lifecycle, starting with the reconnaissance phase and progressing through scanning, enumeration, gaining access, maintaining access, and covering tracks.

This course is designed to equip students with the knowledge and skills required to effectively manage information systems and align them with the strategic goals of organizations. Throughout the course, students will explore key concepts and principles of information systems management, including service management, service design, service transition, service operation, and continual service improvement.

This course covers techniques and managerial concepts of information technology project management. It prepares students to manage complex information technology projects. Students are introduced to all five major process groups in project management, namely initiating, planning, executing, monitoring, controlling, and closing. Topics include project life cycles, cost benefit analysis, work breakdown structure, staffing, roles, responsibilities, accountability, finance, estimation, budgeting, planning, risk management, scheduling, and tracking. The course also introduces students to computer software for project management. Students will work in teams to design a project plan for a real-world IT project that demonstrates an ability to follow standard project management methodology.

This course is designed to provide students with comprehensive knowledge and skills in the field of AI and ML. Throughout this course, students will explore the core concepts, methodologies, and applications of AI and ML.

This course develops knowledge and skills in cloud computing. Students will learn cloud computing principles, architectures, and implementations. Topics include cloud computing history, principles, architectures, and implementations, cloud services and solutions, virtualization, network infrastructure and access, data storage, security, end-user access, and standards and compliance.

This course is designed to provide students with a comprehensive understanding of the security challenges and considerations associated with cloud computing environments. Throughout this course, students will explore the fundamental concepts of cloud computing and its impact on information security.

This course focuses on the essential concepts and skills required to secure wireless networks effectively. This course provides comprehensive coverage of wireless security principles, protocols, and best practices, equipping individuals with the knowledge and skills necessary to succeed in the wireless security domain. Throughout this course, students will delve into the fundamentals of wireless networking and the unique security challenges associated with wireless environments.

This course focuses on the core principles, regulations, and best practices related to data privacy, equipping individuals with the knowledge and skills necessary to navigate the complex field of privacy management. Throughout this course, students will explore the fundamental concepts of data privacy and the evolving regulatory landscape.

This course is designed as an introductory exploration into the field of digital investigations. This comprehensive course provides students with a solid foundation in the principles, methodologies, and techniques used in computer forensics. Throughout the course, students will be introduced to the fundamental concepts and theories underlying computer forensics.

This course provides students with a comprehensive introduction to the principles, frameworks, and practices involved in effectively managing governance, risk, and compliance within organizations. Throughout the course, students will explore the fundamental concepts and theories underlying governance, risk, and compliance.

This course is designed to provide students with a comprehensive understanding of the fundamental concepts, methodologies, and applications of artificial intelligence (AI). Throughout the course, students will delve into the core principles and theories that underpin artificial intelligence. They will gain insights into machine learning, data analysis, natural language processing, computer vision, and other key AI domains.

Open Elective Courses

A minimum of 12.00 semester credit hours is required. Eligible students can take approved dual credit graduate level courses to complete a portion of the open electives requirement.

Required Capstone or Internship

3.00 semester credit hours are required. * Online students in some states may not be allowed to take this internship due to state restrictions.

Students work individually or in project teams on an industry-sponsored or instructor-approved project. They will identify a problem, develop design specifications based on stakeholder needs, consider alternative designs, develop a schedule and/or budget, and design, develop, and test the proposed process or product. Interim reports to the sponsor or to the class, a final project report, and a final presentation will be required.

This course is designed to provide students with practical, hands-on experience in the field of technology. This internship opportunity allows students to apply their theoretical knowledge and skills gained through coursework to real-world technology scenarios using traditional methods and artificial intelligence (AI) technology. Under the guidance of experienced professionals, interns will contribute to ongoing projects and gain valuable insights into the day-to-day operations of cybersecurity teams.

Required Courses in General Education

Students enrolled in this bachelor's degree must complete a minimum of 36.00 semester credit hours in general education distributed among the following disciplines. Refer to the General Education section of the catalog for specific information about courses within each discipline. Courses transferred from other accredited colleges may also be used to meet these requirements. • EN 104 English Composition I, Semester Credit Hours: 3.00 • EN 111 Information Literacy, Semester Credit Hours: 3.00 • EN 116 Speech, Semester Credit Hours: 3.00 • EN 304 English Composition II, Semester Credit Hours: 3.00 • HU 140 Cultural Diversity, Semester Credit Hours: 3.00 • HU 240 Introduction to Humanities, Semester Credit Hours: 3.00 • HU 340 Humanities and Contemporary Popular Culture, Semester Credit Hours: 3.00 • MA 109 College Algebra, Semester Credit Hours: 3.00 • MA 320 Statistics, Semester Credit Hours: 3.00 • SC 270 Environmental Literacy, Semester Credit Hours: 3.00 • PS 101 Psychology, Semester Credit Hours: 3.00 • SS 350 Social Issues and Technology, Semester Credit Hours: 3.00

Personal and Professional Development Courses

2.00 semester credit hours is required.

This course is designed to introduce students to methodologies that will prepare them for academic and professional success.  Topics include but are not limited to Canvas support, student support services, e-books, university policies, resumes, self-reflection, time management, goal setting, and strategies for anxiety reduction.

This course provides an opportunity for students to critically examine their skills and develop a plan to further their career and own financial literacy. Topics include research, job searching, developing career documents, refining interview and communication skills, and creating a personal budget.

TuItion & Cost 

Tuition & Cost

The cost of tuition for the Bachelor of Science in Cybersecurity program is $515 per credit.

You can potentially earn even greater savings by transferring credit from prior college coursework, applying for financial aid, or potential partnership opportunities through your employer.

Our goal is your career advancement. That's why we are always working to improve our curriculum and processes to make our program as affordable as possible while preparing you best for success in your work.

  • Scholarships & Financial Aid

    You may be eligible for multiple scholarships and grants—including our Nurses Circle of Achievement scholarship, which offers up to 10% tuition reduction.

    Find scholarships and grants  

  • Military/Veteran Discounts

    Veterans, Active Duty U.S. Servicemembers, and spouses may qualify for a 10% tuition discount or tuition reduction to $250 per credit.

    VA/Military benefits  

Requirements

Admissions requirements

Prerequisites to enroll in the Herzing University Cybersecurity bachelor's degree program include:

  • Prior education requirement. Completion of high school diploma, GED, or equivalent.
  • Entrance testing. Applicants must demonstrate the capacity to succeed in college-level courses via prior ACT/SAT scores, completion of prior college credit, or additional entrance testing.
  • Availability of time, personal commitment, and a professional attitude. We exist to help enthusiastic students fully committed to reaching their highest career goals. Our faculty and leadership are dedicated to helping you reach them.

You will need to meet and interview with a Herzing University admissions advisor and complete an enrollment application to be admitted into the program.

If you have any additional questions regarding admissions into the program, please contact our admissions team.

  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado
  • Connecticut
  • Delaware
  • Florida
  • Georgia
  • Hawaii
  • Idaho
  • Illinois
  • Indiana
  • Iowa
  • Kansas
  • Kentucky
  • Louisiana
  • Maine
  • Maryland
  • Massachusetts
  • Michigan
  • Minnesota
  • Mississippi
  • Missouri
  • Montana
  • Nebraska
  • Nevada
  • New Hampshire
  • New Jersey
  • New Mexico
  • New York
  • North Carolina
  • North Dakota
  • Ohio
  • Oklahoma
  • Oregon
  • Pennsylvania
  • Rhode Island
  • South Carolina
  • South Dakota
  • Tennessee
  • Texas
  • Utah
  • Vermont
  • Virginia
  • Washington
  • West Virginia
  • Wisconsin
  • Wyoming
  • District Of Columbia
  • Virgin Islands

Accreditation & Recognition

Our accredited & recognized online school

We strive to earn rank as one of the top private, nonprofit universities in the United States. Just as you work every day to become the best version of yourself, so do we as a university.

We are proud to have attained institutional and programmatic accreditation in addition to industry recognition for our accomplishments helping students earn a college education and find career success.

Careers

What can I do with a bachelor’s degree in cybersecurity?

Computer Programmer Focusing on Software Development Image
Image

A bachelor’s degree focused on cybersecurity, as opposed to a more general IT or computer science curriculum, provides narrower coursework specifically regarding information security and the many relevant jobs under that umbrella.

For example, you can prepare for jobs on two general opposing “sides” of cyberattacks: on the defensive side as an analyst or responder (“blue” team) or offensive side as a penetration tester/ethical hacker (“red” team). Cybersecurity professionals may also work in governance, risk, and compliance to ensure systems are secure, compliant with regulations, and aligned with business objectives.

Over the course of your education, you will discover the diverse array of jobs available in the field of cybersecurity. Once you begin applying the skills you learn in coursework, you can determine the type of work that’s right for your unique abilities and personality.

U.S. News & World Report ranked Information Security Analyst the #7 Best Job in America for 2024. It’s a great time to begin earning the education you need to pursue an education in one of the top-rated career fields in the United States.

Career stats: Information Security Analysts*

Career stats: Substance Abuse, Behavioral Disorder, and Mental Health Counselors*

33%

projected employment increase, 2023-2033 (source)

$124,740

average annual salary (source)

Certifications

Prepare for key industry certifications

The BS in Cybersecurity curriculum includes coursework designed to prepare you for various certification exams testing your knowledge and skills in several different aspects of cybersecurity.

Several courses in the curriculum align with important industry certifications. Complete the requisite coursework and we will reimburse the application fees for up to three industry certifications, including:

  • Certified Artificial Intelligence Practitioner (CAIP)
  • Certified Ethical Hacker (CEH)
  • CompTIA A+ Core 1
  • CompTIA A+ Core 2
  • CompTIA Cloud+
  • CompTIA Network+
  • CompTIA Linux+
  • CompTIA Project+
  • CompTIA Security+
  • Cisco CCNA
  • CIW: Database Design Specialist
  • CWNP Certified Wireless Technician
  • IAPP CIPP / US Certified Information Privacy Professional 
  • ITIL 4 Foundation

Classes Start: []

Waived Enrollment Fee

Discover the educational pathway designed to maximize your career potential. Reach for greater heights with Herzing University.

Faq

Frequently Asked Questions

Didn't find the answer to your question? Send us an inquiry and we will be happy to answer all your questions!

There are general education courses in math you may need to complete depending on your prior education.

However, mathematics is not a significant part of a career in cybersecurity, and our core cybersecurity curriculum does not include any math courses.

People who look at cybersecurity programs may also be interested in different types of IT degrees, such as a computer networking bachelor's degree. With this degree, students learn how to install, configure, administer and maintain elements of computer network systems including software, operating systems, and programming languages.

Another popular degree choice is an information technology (IT) degree program. This degree can help prepare students to install, maintain, manage, repair and secure complex computer network systems. IT technicians support customers who are experiencing computer-related problems and troubleshoot components, hardware and software, including printers, scanners, email and work processes.

Students with a stronger interest in building applications or learning to code may prefer to explore our software development or computer programming degree programs.

The average pay for information security analysts was $124,740 per year ($59.97 per hour), according to the U.S. Bureau of Labor Statistics (BLS).*

The BLS projects an increase in demand well beyond the average U.S. occupation, with employment projected to grow 32% from 2022-2032.*

As with any skill, learning cybersecurity takes study, practice, and hard work. However, anyone who takes genuine interest in programming, how computer networks work, and security in the age of technology is capable of learning the fundamentals of cybersecurity.

Yes, it's worth it!

Today, cybersecurity is more important now than ever before. There are large amounts of sensitive data online, including personally identifiable information (PII), protected health information (PHI), and intellectual property, all of which needs protecting.

In addition to potential high earnings and a strong projected job outlook, the field can also be personally rewarding because you can help protect important data belonging to people and organizations. The field is growing, with more and more doors opening up to great career opportunities.

If you enjoy IT, problem solving, and enjoy technical challenges, take the first step with Herzing University and start your new career.

An undergraduate cybersecurity degree is a technical degree that offers students the knowledge needed to protect and defend internet/intranet computer networks, operating systems, and data from cyber attacks. It focuses on systems thinking, security principles, and adaptive incident response tactics.

Herzing’s cybersecurity program covers additional topics in ethical hacking, artificial intelligence and machine learning, cloud computing, wireless security, data privacy, digital forensics, and more.

The curriculum is designed to establish foundational cybersecurity topics such as networking, routing & switching, cloud computing, programming in Python, and information systems—then advance to more specialty areas including artificial intelligence, governance, risk and compliance, Linux administration, forensics, ethical hacking, and much more.

This does not fully display the depth of a bachelor’s degree curriculum. Stepping into the field of cybersecurity can be very overwhelming with limited structure and guidance. We strive to progress course study at a pace which helps you establish foundational concepts and advance to distinct branches of study relevant to unique occupations in the field.

On average, it takes 32 months to earn your degree in cybersecurity from Herzing University and become a cybersecurity analyst. You may be able to decrease how much time it takes by transferring up to 90 prior approved college credits into our bachelor’s degree program.

Cybersecurity specialists develop and deploy the plans and software that keep data secure, private, sound, and accessible by the right people within a business or organization.

Information assurance professionals focus on the business more than the software. Instead of focusing on the design of the security, they focus more on determining what data to protect, to what extent, and whether the protections are effective. and whether the protections are effective.

Locations

Program Finder

Bachelor of Science in Cybersecurity Degree Programs / Showing 1 program for the Online campus
  • Bachelor of Science in Cybersecurity

    Online

    To learn more about this program, click the Request Info button.

Request Information

Ready to get started?

Contact us to request more information

Opt-In to Receive SMS Messages

By selecting this button you agree to receive updates and alerts from Herzing University. Text HELP to 85109 for help, Text STOP to 85109 to end. Msg & Data Rates May Apply. By opting in, I authorize Herzing University to deliver SMS messages and I understand that I am not required to opt in as a condition of enrollment. By leaving this box unchecked you will not be opted in for SMS messages. Click to read Terms and Conditions and Privacy Policy.

The Student Experience at Herzing

Though I was worried about taking classes online, I found it to be a great experience that helped me improve my time management skills.

Lance Reed
Technology Student | Online Campus

I decided to pursue another industry after leaving the military. I came to Herzing to learn more about the ins and outs of Cybersecurity.

Shon Westfall
Technology Student | Atlanta Campus
Disclosures

Disclosures

1. Online students in some states may not be allowed to take this internship due to state restrictions.

Herzing University is accredited by the Higher Learning Commission (hlcommission.org), an institutional accreditation agency recognized by the U.S. Department of Education.

View Herzing University Accreditation and Approvals

* Bureau of Labor Statistics (BLS), U.S. Department of Labor, Occupational Employment and Wage Statistics 2023 / Occupational Outlook Handbook 2022. BLS estimates do not represent entry-level wages and/or salaries. Multiple factors, including prior experience, age, geography market in which you want to work and degree field, will affect career outcomes and earnings. Herzing neither represents that its graduates will earn the average salaries calculated by BLS for a particular job nor guarantees that graduation from its program will result in a job, promotion, salary increase or other career growth.

Classes Start: []

Waived Enrollment Fee

Discover the educational pathway designed to maximize your career potential. Reach for greater heights with Herzing University.