Computer Information Systems, Cybersecurity Option, BS
Bachelor of Science in Computer Information Systems, Cybersecurity (244305BS)
More on Computer Information Systems, Cybersecurity option
Program Description
The Bachelor of Science in Computer Information Systems (CIS) - Cybersecurity degree option allows students to attain knowledge of computer network configuration, computer network and data security, network intrusion detection and prevention, computer network forensics, digital forensics, and cryptography. The degree option includes an in-depth study of modern cryptography as it relates to cybersecurity and computing.
The CIS program offers high level training by introducing students to basic computing concepts while allowing them to develop the applied skills required for the workforce. Courses are taught in cutting edge computer labs so students can learn and practice skills. Schedules offer a range of day and evening classes.
Admission Requirements
- Admission to The University of Akron.
- A cumulative GPA of 2.0 and a minimum of 15 earned credit hours for transfer students.
- Students must pass a placement test before taking any required Computer Information Systems core courses or take CISS:105 Introduction to Computers and Application Software, which does not count towards degree requirements.
- Students must attain a ’C’ or better in each transferred course in the CIS major area.
Program-Specific Degree Requirements
- Students must attain a C or better in each course in their major area.
- A cumulative GPA of 2.0 and a minimum of 15 earned credit hours for Inter- and Intra-College Transfer into all Associate and Bachelor degree programs in Computer Information Systems.
- Prior to enrolling in classes for the BS degree you must contact your academic advisor.
Career Information
Graduates of the bachelor's degree program in Computer Information Systems under the Cybersecurity option are expected to qualify for such positions as law enforcement professionals, computer forensic specialists, data security analysts, systems security administrators, and network security administrators in government, business, information technology, and other industries.
The following information has official approval of The Department of Computer Science and The College of Engineering and Polymer Science, but is intended only as a supplemental guide. Official degree requirements are established at the time of transfer and admission to the degree-granting college. Students should refer to the Degree Progress Report (DPR) which is definitive for graduation requirements. Completion of this degree within the identified time frame below is contingent upon many factors, including but not limited to: class availability, total number of required credits, work schedule, finances, family, course drops/withdrawals, successfully passing courses, prerequisites, among others. The transfer process is completed through an appointment with your academic advisor. Transfer students should consult their Advisor to identify courses that are equivalent.
Requirements
Summary
Code | Title | Hours |
---|---|---|
General Education Requirements | 36 | |
Cybersecurity Major Core | 54 | |
Emergency Management & Homeland Security Courses | 18 | |
Cryptology and Data Analysis Courses | 11 | |
Additional Credits for Graduation * | 1 | |
Total Hours | 120 |
- *
Bachelor's degrees require a minimum of 120 credit hours for graduation.
Recommended General Education Courses
Code | Title | Hours |
---|---|---|
Students pursuing a bachelor’s degree must complete the following General Education coursework. Diversity courses may also fulfill major or Breadth of Knowledge requirements. Integrated and Applied Learning courses may also fulfill requirements in the major. | ||
Students are not required to enroll in the specific courses listed below. However, to facilitate successful degree completion, the academic department strongly encourages completion of the following recommendations. | ||
Academic Foundations | 12 | |
Mathematics, Statistics and Logic: 3 credit hours | ||
MATH:152 & MATH:153 | Technical Mathematics II and Technical Mathematics III | |
MATH:145 | Algebra for Calculus | |
Speaking: 3 credit hours | ||
Writing: 6 credit hours | ||
Breadth of Knowledge | 22 | |
Arts/Humanities: 9 credit hours | ||
Natural Sciences: 7 credit hours | ||
Social Sciences: 6 credit hours | ||
ECON:100 | Introduction to Economics | |
Diversity | ||
Domestic Diversity | ||
Global Diversity | ||
Integrated and Applied Learning | 2 | |
Select one class from one of the following subcategories: | ||
Complex Issues Facing Society | ||
Capstone | ||
Review the General Education Requirements page for detailed course listings. | ||
Total Hours | 36 |
Cybersecurity Major Core
Code | Title | Hours |
---|---|---|
CISS:121 | Introduction of Logic/Programming | 3 |
CISS:134 | Cybersecurity Fundamentals | 3 |
CISS:145 | Introduction to Unix/Linux | 3 |
CISS:201 | Networking Basics 2 | 3 |
CISS:202 | Router and Routing Basics 1 | 3 |
CISS:204 | WAN Technologies 2 | 3 |
CISS:240 | Computer Information Systems Internship 2 | 3 |
CISS:247 | Hardware Support | 3 |
CISS:300 | Network Authentication and Security 1 | 3 |
CISS:306 | Ethics & Law in Information Technology 2 | 3 |
or DGFR:383 | Ethical Hacking | |
CISS:331 | Programming for Cybersecurity 2 | 3 |
CISS:388 | Advanced UNIX/Linux 2 | 3 |
CISS:431 | UNIX-based Systems Security 1 | 3 |
CISS:491 | CIS Senior Cybersecurity Project 2 | 3 |
DGFR:440 | Intrusion Detection 2 | 3 |
DGFR:441 | Network Forensics I 1 | 3 |
DGFR:442 | Wireless Forensics 1 | 3 |
DGFR:443 | Network Forensics II 2 | 3 |
Total Hours | 54 |
Emergency Management & Homeland Security Courses
Code | Title | Hours |
---|---|---|
DGFR:100 | Introduction to Digital Forensics | 3 |
DGFR:280 | Cybercrime 1 | 3 |
DGFR:281 | Computer Forensic Methods 2 | 3 |
DGFR:283 | Cyber Warfare 1 | 3 |
DGFR:381 | Computer Forensic Methods II 1 | 3 |
DGFR:382 | File System Analysis 1 | 3 |
Total Hours | 18 |
Cryptology and Data Analysis Courses
Code | Title | Hours |
---|---|---|
MATH:261 | Applied Finite Mathematics 2 | 3 |
MATH:345 | Technical Data Analysis | 2 |
MATH:361 | Applied Cryptography 1 | 3 |
MATH:461 | Applied Cryptanalysis 2 | 3 |
Total Hours | 11 |
1 | Traditionally Fall Only (See Program Contact). |
2 | Traditionally Spring Only (See Program Contact). |
3 | ll students pursuing a bachelor's degree at the University of Akron must complete the General Education requirements. For efficient completion of UA General Education requirements, it is recommended that students choose General Education classes that also satisfy the Global Diversity and Domestic Diversity areas as shown. |
Note:
- Students entering the Computer Information Systems associate's and bachelor's degree options must pass a Computer Literacy Placement test or complete the following bridge course prior to enrolling in the program.
- Bridge Course: CISS:105 Introduction to Computers and Application Software
Recommended Sequence
1st Year | ||
---|---|---|
Fall Semester | Hours | |
First Writing Course | 3 | |
MATH:152 & MATH:153 | Technical Mathematics II and Technical Mathematics III 6 | 4 |
DGFR:100 | Introduction to Digital Forensics | 3 |
CISS:121 | Introduction of Logic/Programming | 3 |
CISS:247 | Hardware Support | 3 |
Hours | 16 | |
Spring Semester | ||
Second Writing Course | 3 | |
Natural Science Requirement | 3 | |
CISS:134 | Cybersecurity Fundamentals | 3 |
CISS:145 | Introduction to Unix/Linux | 3 |
CISS:201 | Networking Basics 2 | 3 |
Hours | 15 | |
2nd Year | ||
Fall Semester | ||
Speaking Requirement | 3 | |
Social Science/Domestic Diversity Requirement 3 | 3 | |
DGFR:280 | Cybercrime 1 | 3 |
DGFR:283 | Cyber Warfare 1 | 3 |
CISS:202 | Router and Routing Basics 1 | 3 |
Hours | 15 | |
Spring Semester | ||
ECON:100 | Introduction to Economics 5 | 3 |
MATH:261 | Applied Finite Mathematics | 3 |
DGFR:281 | Computer Forensic Methods 2 | 3 |
CISS:204 | WAN Technologies 2 | 3 |
One of the following: | 2-3 | |
CISS:240 | Computer Information Systems Internship 2 | |
Free Elective (2 cr. minimum) - if opting for a Co-op during 3rd year summer | ||
Hours | 14-15 | |
3rd Year | ||
Fall Semester | ||
Humanities Requirement 3 | 3 | |
MATH:361 | Applied Cryptography | 3 |
DGFR:381 | Computer Forensic Methods II 1 | 3 |
DGFR:382 | File System Analysis 1 | 3 |
DGFR:441 | Network Forensics I 1 | 3 |
Hours | 15 | |
Spring Semester | ||
Arts Requirement 3 | 3 | |
DGFR:443 | Network Forensics II 2 | 3 |
CISS:306 or DGFR:383 | Ethics & Law in Information Technology 2 or Ethical Hacking | 3 |
CISS:331 | Programming for Cybersecurity 2 | 3 |
CISS:388 | Advanced UNIX/Linux 2 | 3 |
Hours | 15 | |
Summer Semester | ||
Cooperative Education | ||
Hours | 0 | |
4th Year | ||
Fall Semester | ||
Natural Science with Lab Requirement | 4 | |
MATH:345 | Technical Data Analysis | 2 |
DGFR:442 | Wireless Forensics 1 | 3 |
CISS:300 | Network Authentication and Security 1 | 3 |
CISS:431 | UNIX-based Systems Security 1 | 3 |
Hours | 15 | |
Spring Semester | ||
Arts/Humanities/Global Diversity Requirement 3 | 3 | |
Complex Issues Requirement | 3 | |
MATH:461 | Applied Cryptanalysis 2 | 3 |
DGFR:440 | Intrusion Detection 2 | 3 |
CISS:491 | CIS Senior Cybersecurity Project | 3 |
Hours | 15 | |
Total Hours | 120-121 |
Program Notes
1 | Traditionally Fall Only (See Program Contact). |
2 | Traditionally Spring Only (See Program Contact). |
3 | All students pursuing a bachelor's degree at the University of Akron must complete the General Education requirements. For efficient completion of UA General Education requirements, it is recommended that students choose General Education classes that also satisfy Global Diversity and Domestic Diversity as shown |
5 | Fulfills the Social Science Requirement |
6 | MATH:145 Algebra for Calculus may be completed in place of MATH:152 and MATH:153. |
Policy Alert: By the end of your first 48 credit hours attempted, you must have completed your required General Education Mathematics, Statistics, and Logic, Writing First Course, and Speaking requirements.