Here’s a no-cost way to complete gen eds. Get details
Online Bachelor of Science in Information Technology Cybersecurity
this may take a few seconds...
Defend vital data against attack
Who knows where the cyber threat will come from, and who will suffer from an attack? If you want to be one of the good guys guarding important data, consider earning a BS in Information Technology, Cybersecurity from Strayer University. You’ll build up skills in conducting digital forensics, learn how to help protect data and networks and defend against a digital onslaught, whatever its source.
Summer Classes Start on July 5
Program at a glance
40
11-week courses in the program
$1480
Cost per course
Online
Earn your degree online with Strayer
- Program details
- Cost & savings
- Courses
- Admissions
Help stop cybercriminals before they strike
In this bachelor’s program, you’ll learn how to maintain the security of networks and data, what ethical (and unethical) hacking looks like, and explore network defense, offensive network security and countermeasures to shut hackers off from accessing important data.
Build your skills
- Learn how to maintain the security of networks and data in a range of environments.
- Study different types of hacking (both ethical and unethical).
- Perform penetration tests on communication media.
- Study different network threat-testing techniques.
- Master the functions and impacts of malicious programs – and their countermeasures.
The high-quality higher education you deserve
Strayer University is proud to be certified
or accredited by
four respected organizations. We’re committed to meeting quality
standards, so you can earn an industry-recognized diploma you’re proud
to display. View
the ACBSP student achievement information.
3 out of 4 Strayer Bachelor of Science in Information Technology alumni agree that their degree was a worthwhile investment.
Strayer Alumni Survey, 2021
Affording your degree
At Strayer, you’ll find plenty of ways to make your tuition affordable, so you can worry less about your budget and get down to business.
$1480
cost per course
$150
degree conferral (one-time only)
$65
technology fee (one per term)
Estimate the cost of your degree
How much time and money will you have to invest toward a Strayer degree?
Estimate the cost of your degree
How much time and money will you have to invest toward a Strayer degree?
Expected Graduation
...
Approximate Total
...
*Student is required to take two courses per quarter during disbursement period
PREPARING YOUR RESULTS
Time commitment
Calculate the approximate time commitment of your degree.
Course load | ... courses/term |
Classroom time | ... hours/week |
Terms per year | ... terms |
Terms to graduation | ... terms |
Cost analysis
Calculate the approximate cost of your degree
Tuition | ... |
Books | ... |
Fees | ... |
No-cost gen ed | $0 |
Transfer credits | ... |
$5K scholarship | $0 |
Graduation Fund | $0 |
Brand-new laptop | Included |
Approximate total | ... |
Ways to reduce your cost
Access no-cost gen ed courses through Sophia Learning. Then, earn
even more courses, tuition-free, with the Strayer Graduation
Fund.
Transfer up to 28 classes toward your bachelor’s degree.
Earn one tuition-free class at the end of your program for every three you complete with Graduation Fund. Eligibility rules and restrictions apply. Connect with us for details.
Explore additional scholarships & ways to save.
More than 500 organizations – including corporations and community colleges – invest in their employees by partnering with Strayer University to offer access to discounted education programs. If your employer is a Corporate Alliance Partner, you may qualify for programs that can help you advance in your company and your career.
Learn defensive information technology
As in martial arts, so in cybersecurity: the best offense is often a good defense. Through fundamental coursework and lab-based training, you’ll gain insights into the defensive techniques used to protect against cyber threats and other nefarious activity. View all courses.
Sample courses

Being an effective communicator is an essential skill for any profession. In this course, you will learn the secrets to writing, listening, and speaking with credibility in order to share your voice with the world.
This course is an integrative capstone course for the Bachelor of Science in Information Technology program. The course takes a senior management approach to examine and solve real-world problems and projects. Students will apply project management techniques to create integrative information technology solutions that include databases, systems analysis, security, networking, computer infrastructure, human-computer interaction and web design.
This is a lab-based course that prepares students to install, configure, secure and maintain the Windows server environment. Topics include configuring and managing DHCP, DNS, routing and remote access, file and print services.
Get the knowledge and skills to identify, track and prosecute cyber criminals. Understand computer forensics; creating a secure lab; and the process for forensic investigation, including first responder response techniques, incident management, and reports used by computer forensic investigators. Cover a broad base of topics designed to detect attacks and collect evidence in a forensically sound manner. Take preparatory steps to identify evidence in computer-related crime and abuse cases and track a hacker’s path through a client system.
This is a lab-based course that covers topics in offensive network security, ethical hacking, network defense and countermeasures. The course provides an understanding of the tactics and tools used by hackers and methods to prepare strong countermeasures and defensive systems to protect an organization’s critical infrastructure and information. Topics include perimeter defense techniques, scanning and attacking simulated networks with a variety of tools, viruses, and malware.
This is a lab-based course that covers topics in advanced penetration testing and information security analysis. Students are exposed to methodologies in conducting thorough information security analysis and advanced penetration testing techniques to effectively identify and mitigate risks to the security of an organization’s infrastructure.
Bachelor’s admission requirements
Before you can pursue your bachelor’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer. Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
International students
We welcome international students from around the globe.
Campus Locations
Come to a campus near you for guidance and support. You’ll have access to helpful resources, a supportive community and plenty of spaces to learn and grow.

Ready to take the next step?
Your admissions officer is here to guide you through every step of the process, from completing your application to choosing your concentration.