Cyber criminals cause widespread destruction to individuals, organizations, government agencies, and military operations. This online cybersecurity degree program explores tactics that help thwart their efforts.
The curriculum examines how to safeguard information technology from offensive cyberattacks. Students also learn how to identify security vulnerabilities and take corrective measures.
Courses emphasize the importance of organizational security throughout both the public and private sectors. You will discuss how cybersecurity professionals protect digital data across computer networks, mobile devices, digital data, and emerging technologies.
Assignments incorporate AMU’s cyber range, a virtual environment where students complete hands-on activities to develop cyber defense skills. In addition, this online Bachelor of Science in Cybersecurity program familiarizes students with:
- Trends in cyber crime
- Cybersecurity laws
- Protocols for evaluating, designing, and implementing effective cybersecurity practices
- Strategies for balancing data privacy and security
- Incident response techniques that today’s security practitioners employ
Classes are taught by security professionals with real-world knowledge of network defense, homeland security, and computer forensics.
Choose a Cybersecurity Degree Concentration to Focus Your Studies
Cybersecurity education provides foundational knowledge of the theories and principles that form the basis of specialty areas within the field. Concentration tracks in this online degree program explore these specializations and equip students with practical, career-relevant skills. From digital forensic investigations to security protocols for critical infrastructure, each track examines a unique branch of the cybersecurity discipline.
Select a concentration to learn more.
About the Concentration
This concentration for the Bachelors of Science in Cybersecurity will allow students to specialize in the methodologies used to secure the networks, hardware – devices, software – apps, and the laws and regulations, policies and procedures, and ethical responsibilities for privacy and security of mobile devices using mobile and wireless network infrastructures. The concentration will emphasize countermeasures taken to harden the security of various aspects of mobile technologies associated to government, military, industry, educational, and private enterprises.
Program Objectives
Upon successful completion of this concentration, the student will be able to:
- Extrapolate threats and vulnerabilities introduced into the network infrastructures of wireless, mobile, cellular, and satellite technologies.
- Examine current mobile application models, their security framework, and methodologies on hardening the security to safeguard the devices running them and adapt them to higher privacy standards.
- Appraise security hardening techniques for wireless or mobile device technologies based on wireless security principles and current industry standards.
- Investigate forensics of wireless network attacks caused by mobile and wireless peripheral devices, and then evaluate security and access procedures within wireless Internet use of subject search warrants and chain of custody in a forensic investigation.
About the Concentration
A general concentration allows you to take courses across a number of areas of study within your program based on your own interests.
Program Objectives
This general concentration allows you to choose from a variety of elective courses from homeland security, intelligence, information systems security, and IT project management.
About the Concentration
The Bachelor of Science in Cybersecurity with a concentration in Critical Infrastructure provides you with the knowledge to best understand the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems that run the everyday systems that we depend on from gas, electric, and other utilities to the production of your favorite foods. The concentration will delve into how these systems differ from the devices used by your average computer user, as well as how one can best protect these unique systems from hackers to nation states. You will be exposed to various aspects of systems from Programmable Logic Controllers (PLC) to nuclear power plants. This is a unique field with consistent growth as everyone depends on critical infrastructure virtually nonstop around the clock.
Program Objectives
Upon successful completion of this concentration, the student will be able to:
- Evaluate risks of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems.
- Explore various federal agencies’ roles in protecting the nation’s critical infrastructure.
- Identify critical infrastructure components.
- Determine appropriate solutions to mitigate critical infrastructure threats.
About the Concentration
Bringing cybercriminals to justice requires individuals with computer forensics skill sets who have the ability to quickly collect, analyze, and present cybercrime evidence. Become familiar with digital forensic measures for security incident response with a concentration in Digital Forensics.
Study how to prevent the loss of sensitive proprietary information and deter future cyberattacks. In addition, you’ll learn about common incident response procedures, web attacks, router forensics, email crime, corporate espionage, and steganography in your online courses in digital forensics.
Program Objectives
Upon successful completion of this concentration, the student will be able to:
- Demonstrate knowledge of incident response procedures, computer investigation processes, digital forensics lab work, and investigative reports.
- Illustrate understanding of wireless network attack forensics, wireless internet use security and access procedures, search warrants, and chain of custody.
About the Concentration
The Privacy and Surveillance concentration provides students with a multifaceted approach not only addressing commonly used tools and methods of surveillance but also privacy considerations. Students will be exposed to how surveillance is both intentional and unintentional. The risk of using various forms of hardware and software will be discussed. Legal and ethical consideration surrounding the impact surveillance has on privacy rights will be addressed.
Program Objectives
Upon successful completion of this concentration, the student will be able to:
- Demonstrate knowledge of common surveillance technologies.
- Illustrate understanding of how technology impacts population segments differently.
Discover How This Cybersecurity Degree Can Help You Pursue Your Goals
AMU’s Bachelor of Science in Cybersecurity program examines cyber warfare tactics to familiarize students with cyber defense strategies. You will learn how to apply intelligence-driven approaches to stay one step ahead of cyber criminals.
You will also:
- Understand cybersecurity’s various aspects, including cyber defense, cyber operations, cyber exploitations, cyber intelligence, cybercrime, and cyber law.
- Learn digital forensics processes and investigation goals, including the importance of search warrants and chain of custody for electronic evidence in law enforcement investigations.
- Create information technology strategies and plans for enabling security measures, such as tools, techniques, and technologies designed to prevent cyber threats and network penetration.
- Grow your knowledge of network defense as well as network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect information security.
This Bachelor of Science in Cybersecurity arms students with career-relevant knowledge to help them pursue professional opportunities post-graduation. Cybersecurity professionals may work for government agencies and corporate entities alike.
Graduates of this program may be interested in roles as:
- Cyber defense analysts, who safeguard mission-critical systems against cyberattacks
- Cyber intelligence analysts, who collect and interpret data to anticipate threats and help inform defensive strategies
- Information assurance specialists, who ensure systems and operations comply with security frameworks and regulations
- Network warfare specialists, who employ active defense techniques to help protect information technology from sophisticated attacks
- Forensic and incident response specialists, who apply digital forensics to gather data on cyberattacks and preserve digital evidence to support investigations, legal cases, and national security missions
Cyber operations planners, who help ensure cyber operations align with national defense and homeland security objectives
Through AMU’s online cybersecurity degree program, you’ll gain technical skills to help you stay ahead of hackers. Courses incorporate exercises in the University’s cyber range, a virtual environment where students practice threat detection techniques and respond to simulated attacks. This interactive coursework further reinforces students’ understanding of the security principles practitioners apply to protect information assets.
Cybersecurity courses teach students to:
- Apply practices to secure critical infrastructure, protect classified information, and ensure continuity of operations
- Identify vulnerabilities, assess risk, and design layered defensive strategies
- Implement countermeasures to address threats
- Apply penetration testing, adversary emulation, and defensive monitoring
- Identify, track, and remediate adversary activities by applying digital forensics, malware analysis, and proactive threat-hunting techniques
Browse courses for your Online Master of Science in Space Studies (MS)
Explore Opportunities to Get Involved While You Pursue Your Cybersecurity Degree
Students in AMU’s online cybersecurity degree program can connect with peers and faculty members through study groups and student-led clubs, including:
- The Technology Professional Group
- The National Security Policy and Analysis Organization
- Women in STEM
- The Society for Advancement of Chicanos/Hispanics & Native Americans in Science
- wSEC (a club for women in the security field)
The University also offers dozens of cultural, faith-based, and social organizations, as well as clubs for military-affiliated students. Learn more about virtual communities and other ways to get involved when you pursue your cybersecurity degree online at AMU.
AMU is here to support your student journey
Your mission matters, but so does your well-being. That's why we provide supportive resources to help you stay ready for what’s next.
• Career Coaching• 24/7 Mental Health Support
• Admissions & Advising Support
• Student Life
CAREER SERVICES
Whether you’re transitioning from military to civilian life or pursuing advancement within your branch of service, AMU’s Career Services are here to help. Our coach-guided experiences empower you to translate your military skills into new opportunities, develop your professional strengths, and chart a course to your next mission.
Learn More24/7 MENTAL HEALTH SUPPORT
Resilience is critical to mission success, and that starts with your mental health. AMU offers confidential, flexible, 24/7 access to support resources to help you manage stress, find balance, and stay mission-ready. Whether you’re chatting with University chaplains, engaging with peers on the TalkCampus app, or meeting virtually with a licensed therapist through Uwill(r), supporting your mental health is our top priority.
Learn MoreADMISSIONS & ADVISING SUPPORT
We understand the unique needs of military students. That’s why our admissions and advising teams provide personalized guidance from day one, helping you navigate enrollment, maximize your benefits, and plan your academic journey around your service commitments. We’re here to help you succeed wherever duty calls.
Learn MoreSTUDENT LIFE
At AMU, you’ll be part of a strong, service-minded community that understands your goals and values. Through student organizations like the Student Veterans of America (SVA) and access to the university directory through ecampus, you’ll connect with peers and mentors who can help you build your professional network and lifelong camaraderie.
Learn MorePursuing a Bachelor of Science in Cybersecurity Is Affordable at AMU
- $0 Application Fee
- $0 Textbooks & EBooks
- $0 Transfer Credit Evaluation
- 72% students have graduated with no APUS-incurred student loan debt3
Earning a degree is a valuable investment, but it needs to fit into your budget. Our tuition calculator can help you estimate your total costs, so you can plan a manageable path to your educational goals. For more information, please refer to the financial aid cost of attendance (COA).
AMU Removes Barriers
Quality Education Should Be Available For All
We offer special rates and grants for eligible students and their families, including our:
- Preferred Military Rate
- Veteran Grant
- Everyday Heroes Grant
- Opportunity Grant
Transfer Credits
AMU recognizes the value of your service and experience. Our generous transfer credit policy ensures that you get credit for prior college coursework, military education and training, exams, and certifications so you can save time, keep costs low, and stay focused on your education mission.
Learn MoreFinancial Aid
In addition to special rates and grants for military servicemembers, veterans, and their families, we also participate in federal financial aid programs for those who qualify. Our Financial Aid Office team can help ensure you have the support you need.
Learn MorePrivate Loans & Scholarships
AMU students may explore private education loans or scholarship options to supplement their education funding. Before pursuing these options, you should complete the Free Application for Federal Student Aid (FAFSA) to learn about your eligibility. We encourage all borrowers to research their choices, review interest rates and repayment terms, and make an informed decision that aligns with their goals.
Learn MoreMilitary & Veteran Benefits
As a leader in higher education for the nation’s military and a top choice for veterans using education benefits, AMU proudly accepts Tuition Assistance (TA) and GI Bill®7 benefits. Our experienced Military Tuition Assistance team can help you understand your eligibility, apply your benefits, and make the most out of your available resources.
Learn MoreApply Today to AMU’s Online Cybersecurity Degree Program
Students in this online cybersecurity bachelor’s program become well-versed in the strategies that practitioners in the field use to safeguard information technology. Online courses start each month and cover everything from the fundamentals of network security to best practices for responding to data breaches.
There are no set login times, and students may submit weekly assignments from anywhere with internet access.
Ready to get started? Review our admission requirements and apply to AMU’s Bachelor of Science in Cybersecurity program today.
- No Entrance Exams No SAT or ACT required for undergraduate programs
- No Application Fee For undergraduate & master’s-level courses
- Courses Start Monthly Enroll now, start next month
- All AMU undergraduate programs require a minimum of a high school diploma or equivalent (i.e., GED). Please read all undergraduate admission requirements before applying to this program and be prepared to submit the required documentation.
- There is no fee to complete the AMU admission application for this program. View steps to apply.
Learn More About Cybersecurity Education and AMU’s Online Degree Program
Cybersecurity students learn how to design, implement, and evaluate cyber defense strategies to protect sensitive data. They also study the protocols cybersecurity professionals follow to identify and respond to cyberattacks.
Courses cover the tactics that criminals and other bad actors employ to infiltrate IT systems. Students discuss how hackers can steal classified information, threaten national security, and otherwise wreak havoc by exploiting vulnerable computer systems.
Absolutely. Courses for AMU’s bachelor’s degree in cybersecurity are fully online. Students complete weekly readings and assignments on their own time. Earning an online degree could therefore be a practical choice for anyone with service, professional, or family obligations.
This program also enables students to access a wide network of peers and faculty who may provide important connections in the cybersecurity field.
This cybersecurity program incorporates hands-on learning to familiarize students with the protocols for maintaining secure systems. Learners have the opportunity to work with a wide range of tools, including:
- Computer networking devices and simulation tools like Cisco Packet Tracer
- Computer programming and scripting languages like Python, Linux Shells, and MS PowerShell
- Industry-standard operating systems like Windows and Linux
- Security software such as OpenVAS, Snort, Kali Linux, and Metasploit
- Emerging technologies such as biometrics and artificial intelligence
Not all cybersecurity jobs require industry certifications, though they can be beneficial, depending on the role you’re interested in. After completing their bachelor’s degrees in cybersecurity, many students choose to pursue industry certifications such as:
- Certified Ethical Hacker® (CEH®) – Demonstrates an understanding of penetration testing, incident response, and incident prevention
- Certified Information Systems Security Professional (CISSP®) - Demonstrates competency in information technology security and the ability to design and implement a cybersecurity program
- Certified Information Systems Auditor® (CISA®) – Demonstrates expertise in conducting vulnerability assessments, designing controls, and providing compliance reporting
- Certified Information Security Manager (CISM®) – Demonstrates competency on the management side of information security, such as governance, program development, and risk management
- CompTIA Security+® – Demonstrates the ability to assess an organization's security; monitor and secure cloud, mobile, and IoT environments; and provide incident response
Certified Ethical Hacker® and CEH® are registered trademarks of EC-Council.
Certified Information Systems Auditor®, CISA®, and CISM® are registered trademarks of Information Systems Audit and Controls Association.
CompTIA Security+® is a registered trademark of the Computing Technology Industry Association.
CISSP® is a registered trademark of International Information Systems Security Certification Consortium, Inc.
NOTE: This bachelor’s in cybersecurity does not award any professional certifications, but may be helpful in preparing to earn such certifications.
Request More Information
Interested in a specific program or wondering about the application process? Fill out the quick form below, and we’ll follow up with details tailored to your goals.