Computer Information Systems, Cybersecurity Option, BS
Bachelor of Science in Computer Information Systems, Cybersecurity (244305BS)
More on Computer Information Systems, Cybersecurity option
Program Description
The Bachelor of Science in Computer Information Systems (CIS) - Cybersecurity degree option allows students to attain knowledge of computer network configuration, computer network and data security, network intrusion detection and prevention, computer network forensics, digital forensics, and cryptography. The degree option includes an in-depth study of modern cryptography as it relates to cybersecurity and computing.
The CIS program offers high level training by introducing students to basic computing concepts while allowing them to develop the applied skills required for the workforce. Courses are taught in cutting edge computer labs so students can learn and practice skills. Schedules offer a range of day and evening classes.
Admission Requirements
- Admission to The University of Akron.
- A cumulative GPA of 2.0 and a minimum of 15 earned credit hours for transfer students.
- Students must pass a placement test before taking any required Computer Information Systems core courses or take CISS 105 Introduction to Computers and Application Software, which does not count towards degree requirements.
- Students must attain a ’C’ or better in each transferred course in the CIS major area.
Program-Specific Degree Requirements
- Students must attain a C or better in each course in their major area.
- A cumulative GPA of 2.0 and a minimum of 15 earned credit hours for Inter- and Intra-College Transfer into all Associate and Bachelor degree programs in Computer Information Systems.
- Prior to enrolling in classes for the BS degree you must contact your academic advisor.
Career Information
Graduates of the bachelor's degree program in Computer Information Systems under the Cybersecurity option are expected to qualify for such positions as law enforcement professionals, computer forensic specialists, data security analysts, systems security administrators, and network security administrators in government, business, information technology, and other industries.
The following information has official approval of The Department of Computer Science and The College of Engineering and Polymer Science, but is intended only as a supplemental guide. Official degree requirements are established at the time of transfer and admission to the degree-granting college. Students should refer to the Degree Progress Report (Stellic) which is definitive for graduation requirements. Completion of this degree within the identified time frame below is contingent upon many factors, including but not limited to: class availability, total number of required credits, work schedule, finances, family, course drops/withdrawals, successfully passing courses, prerequisites, among others. The transfer process is completed through an appointment with your academic advisor. Transfer students should consult their Advisor to identify courses that are equivalent.
Requirements
Summary
Code | Title | Hours |
---|---|---|
General Education Requirements | 36 | |
Cybersecurity Major Core | 54 | |
Emergency Management & Homeland Security Courses | 18 | |
Cryptology and Data Analysis Courses | 11 | |
Additional Credits for Graduation * | 1 | |
Total Hours | 120 |
- *
Bachelor's degrees require a minimum of 120 credit hours for graduation.
Recommended General Education Courses
Code | Title | Hours |
---|---|---|
Students pursuing a bachelor’s degree must complete the following General Education coursework. Diversity courses may also fulfill major or Breadth of Knowledge requirements. Integrated and Applied Learning courses may also fulfill requirements in the major. | ||
Students are not required to enroll in the specific courses listed below. However, to facilitate successful degree completion, the academic department strongly encourages completion of the following recommendations. | ||
Academic Foundations | 12 | |
Mathematics, Statistics and Logic: 3 credit hours | ||
MATH 152 & MATH 153 | Technical Mathematics II and Technical Mathematics III | |
MATH 145 | Algebra for Calculus | |
Speaking: 3 credit hours | ||
Writing: 6 credit hours | ||
Breadth of Knowledge | 22 | |
Arts/Humanities: 9 credit hours | ||
Natural Sciences: 7 credit hours | ||
Social Sciences: 6 credit hours | ||
ECON 100 | Introduction to Economics | |
Diversity | ||
Domestic Diversity | ||
Global Diversity | ||
Integrated and Applied Learning | 2 | |
Select one class from one of the following subcategories: | ||
Complex Issues Facing Society | ||
Capstone | ||
Review the General Education Requirements page for detailed course listings. | ||
Total Hours | 36 |
Cybersecurity Major Core
Code | Title | Hours |
---|---|---|
CISS 121 | Introduction of Logic/Programming | 3 |
CISS 134 | Cybersecurity Fundamentals | 3 |
CISS 145 | Introduction to Unix/Linux | 3 |
CISS 201 | Networking Basics 2 | 3 |
CISS 202 | Router and Routing Basics 1 | 3 |
CISS 204 | Enterprise Networking 2 | 3 |
CISS 240 | Computer Information Systems Internship 2 | 3 |
CISS 247 | Hardware Support | 3 |
CISS 300 | Network Authentication and Security 1 | 3 |
CISS 306 | Ethics & Law in Information Technology 2 | 3 |
or DGFR 383 | Ethical Hacking | |
CISS 331 | Programming for Cybersecurity 2 | 3 |
CISS 388 | Advanced UNIX/Linux 2 | 3 |
CISS 431 | UNIX-based Systems Security 1 | 3 |
CISS 491 | CIS Senior Cybersecurity Project 2 | 3 |
DGFR 440 | Intrusion Detection 2 | 3 |
DGFR 441 | Network Forensics I 1 | 3 |
DGFR 442 | Wireless Forensics 1 | 3 |
DGFR 443 | Network Forensics II 2 | 3 |
Total Hours | 54 |
Emergency Management & Homeland Security Courses
Code | Title | Hours |
---|---|---|
DGFR 100 | Introduction to Cyber Forensics | 3 |
DGFR 280 | Cybercrime 1 | 3 |
DGFR 281 | Computer Forensic Methods 2 | 3 |
DGFR 283 | Cyber Warfare 1 | 3 |
DGFR 381 | Computer Forensic Methods II 1 | 3 |
DGFR 382 | File System Analysis 1 | 3 |
Total Hours | 18 |
Cryptology and Data Analysis Courses
Code | Title | Hours |
---|---|---|
MATH 261 | Applied Finite Mathematics 2 | 3 |
MATH 345 | Technical Data Analysis | 2 |
MATH 361 | Applied Cryptography 1 | 3 |
MATH 461 | Applied Cryptanalysis 2 | 3 |
Total Hours | 11 |
- 1
Traditionally Fall Only (See Program Contact).
- 2
Traditionally Spring Only (See Program Contact).
- 3
ll students pursuing a bachelor's degree at the University of Akron must complete the General Education requirements. For efficient completion of UA General Education requirements, it is recommended that students choose General Education classes that also satisfy the Global Diversity and Domestic Diversity areas as shown.
Note:
- Students entering the Computer Information Systems associate's and bachelor's degree options must pass a Computer Literacy Placement test or complete the following bridge course prior to enrolling in the program.
- Bridge Course: CISS 105 Introduction to Computers and Application Software
Recommended Sequence
1st Year | ||
---|---|---|
Fall Semester | Hours | |
First Writing Course | 3 | |
MATH 152 & MATH 153 | Technical Mathematics II and Technical Mathematics III 6 | 4 |
DGFR 100 | Introduction to Cyber Forensics | 3 |
CISS 121 | Introduction of Logic/Programming | 3 |
CISS 247 | Hardware Support | 3 |
Hours | 16 | |
Spring Semester | ||
Second Writing Course | 3 | |
Natural Science Requirement | 3 | |
CISS 134 | Cybersecurity Fundamentals | 3 |
CISS 145 | Introduction to Unix/Linux | 3 |
CISS 201 | Networking Basics 2 | 3 |
Hours | 15 | |
2nd Year | ||
Fall Semester | ||
Speaking Requirement | 3 | |
Social Science/Domestic Diversity Requirement 3 | 3 | |
DGFR 280 | Cybercrime 1 | 3 |
DGFR 283 | Cyber Warfare 1 | 3 |
CISS 202 | Router and Routing Basics 1 | 3 |
Hours | 15 | |
Spring Semester | ||
ECON 100 | Introduction to Economics 5 | 3 |
MATH 261 | Applied Finite Mathematics | 3 |
DGFR 281 | Computer Forensic Methods 2 | 3 |
CISS 204 | Enterprise Networking 2 | 3 |
One of the following: | 2-3 | |
CISS 240 | Computer Information Systems Internship 2 | |
Free Elective (2 cr. minimum) - if opting for a Co-op during 3rd year summer | ||
Hours | 14-15 | |
3rd Year | ||
Fall Semester | ||
Humanities Requirement 3 | 3 | |
MATH 361 | Applied Cryptography | 3 |
DGFR 381 | Computer Forensic Methods II 1 | 3 |
DGFR 382 | File System Analysis 1 | 3 |
DGFR 441 | Network Forensics I 1 | 3 |
Hours | 15 | |
Spring Semester | ||
Arts Requirement 3 | 3 | |
DGFR 443 | Network Forensics II 2 | 3 |
CISS 306 or DGFR 383 | Ethics & Law in Information Technology 2 or Ethical Hacking | 3 |
CISS 331 | Programming for Cybersecurity 2 | 3 |
CISS 388 | Advanced UNIX/Linux 2 | 3 |
Hours | 15 | |
Summer Semester | ||
Cooperative Education | ||
Hours | 0 | |
4th Year | ||
Fall Semester | ||
Natural Science with Lab Requirement | 4 | |
MATH 345 | Technical Data Analysis | 2 |
DGFR 442 | Wireless Forensics 1 | 3 |
CISS 300 | Network Authentication and Security 1 | 3 |
CISS 431 | UNIX-based Systems Security 1 | 3 |
Hours | 15 | |
Spring Semester | ||
Arts/Humanities/Global Diversity Requirement 3 | 3 | |
Complex Issues Requirement | 3 | |
MATH 461 | Applied Cryptanalysis 2 | 3 |
DGFR 440 | Intrusion Detection 2 | 3 |
CISS 491 | CIS Senior Cybersecurity Project | 3 |
Hours | 15 | |
Total Hours | 120-121 |
Program Notes
- 1
Traditionally Fall Only (See Program Contact).
- 2
Traditionally Spring Only (See Program Contact).
- 3
All students pursuing a bachelor's degree at the University of Akron must complete the General Education requirements. For efficient completion of UA General Education requirements, it is recommended that students choose General Education classes that also satisfy Global Diversity and Domestic Diversity as shown
- 5
Fulfills the Social Science Requirement
- 6
MATH 145 Algebra for Calculus may be completed in place of MATH 152 and MATH 153.
Policy Alert: By the end of your first 48 credit hours attempted, you must have completed your required General Education Mathematics, Statistics, and Logic, Writing First Course, and Speaking requirements.