Online Bachelor of Science in Information Technology Cybersecurity
this may take a few seconds...
Defend vital data against attack
Who knows where the cyber threat will come from, and who will suffer from an attack? If you want to be one of the good guys guarding important data, consider earning a BS in Information Technology, Cybersecurity from Strayer University. You’ll build up skills in conducting digital forensics, learn how to help protect data and networks and defend against a digital onslaught, whatever its source.
Summer Classes Start on July 5
Program at a glance
11-week courses in the program
Cost per course
Earn your degree online with Strayer
- Program details
- Cost & savings
Help stop cybercriminals before they strike
In this bachelor’s program, you’ll learn how to maintain the security of networks and data, what ethical (and unethical) hacking looks like, and explore network defense, offensive network security and countermeasures to shut hackers off from accessing important data.
Build your skills
- Learn how to maintain the security of networks and data in a range of environments.
- Study different types of hacking (both ethical and unethical).
- Perform penetration tests on communication media.
- Study different network threat-testing techniques.
- Master the functions and impacts of malicious programs – and their countermeasures.
Get ready for IT certification
Get the skills that can help prepare you for CompTIA (A+, Network+, and Security+) and EC-Council (CEH, and CHFI) certification exams.
Add essential skills to your résumé
The high-quality higher education you deserve
Affording your degree
At Strayer, you’ll find plenty of ways to make your tuition affordable, so you can worry less about your budget and get down to business.
cost per course
degree conferral (one-time only)
technology fee (one per term)
Ways to reduce your cost
Transfer up to 28 classes toward your bachelor’s degree.
Save up to 25% off the cost of your bachelor’s degree. Eligibility rules apply.
Learn defensive information technology
As in martial arts, so in cybersecurity: the best offense is often a good defense. Through fundamental coursework and lab-based training, you’ll gain insights into the defensive techniques used to protect against cyber threats and other nefarious activity. View all courses.
Being an effective communicator is an essential skill for any profession. In this course, you will learn the secrets to writing, listening, and speaking with credibility in order to share your voice with the world.
This course is an integrative capstone course for the Bachelor of Science in Information Technology program. The course takes a senior management approach to examine and solve real-world problems and projects. Students will apply project management techniques to create integrative information technology solutions that include databases, systems analysis, security, networking, computer infrastructure, human-computer interaction and web design.
This is a lab-based course that prepares students to install, configure, secure and maintain the Windows server environment. Topics include configuring and managing DHCP, DNS, routing and remote access, file and print services.
Get the knowledge and skills to identify, track and prosecute cyber criminals. Understand computer forensics; creating a secure lab; and the process for forensic investigation, including first responder response techniques, incident management, and reports used by computer forensic investigators. Cover a broad base of topics designed to detect attacks and collect evidence in a forensically sound manner. Take preparatory steps to identify evidence in computer-related crime and abuse cases and track a hacker’s path through a client system.
This is a lab-based course that covers topics in offensive network security, ethical hacking, network defense and countermeasures. The course provides an understanding of the tactics and tools used by hackers and methods to prepare strong countermeasures and defensive systems to protect an organization’s critical infrastructure and information. Topics include perimeter defense techniques, scanning and attacking simulated networks with a variety of tools, viruses, and malware.
This is a lab-based course that covers topics in advanced penetration testing and information security analysis. Students are exposed to methodologies in conducting thorough information security analysis and advanced penetration testing techniques to effectively identify and mitigate risks to the security of an organization’s infrastructure.
Bachelor’s admission requirements
Before you can pursue your bachelor’s degree, you’ll need to enroll at Strayer. Here’s what you’ll need to get started for admission to the university.
Learn more about the admission process at Strayer.
Students applying to Washington, D.C., or New Jersey campuses must provide proof of proper immunization.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
We welcome more than 1,200 international students from more than 110 countries.
Experience the Strayer difference
Learning comes to life through short, documentary-style videos that blend core subject matter with stories about real people.
Your admissions officer and student services coach will mentor, motivate and support you from enrollment to the day you graduate.