Cybersecurity

Online Bachelor of Science in Cybersecurity (BS)

Save @ AMU

$0 Application Fee
$0 Transfer Credit Evaluation
$0 Textbooks & eBooks

72%Have Graduated with No APUS-incurred Student Loan Debt2

About our Bachelor's Degree in Cybersecurity

Learn to foil cyber criminals with a cyber defense education. Gain a basic understanding of cybersecurity theory and knowledge with the bachelor of science in cybersecurity from American Military University (AMU). In your cybersecurity courses, you will:

  • Learn how to strategically assess, evaluate, plan, design, develop, and implement countermeasures for effective cybersecurity defense mechanisms for organizations in both public and private sectors
  • Increase your knowledge of cybersecurity resources, tools, laws, and methods

Classes for this online bachelor of science in cybersecurity program are taught by security professionals with deep real-world knowledge of homeland security, network defense, and computer forensics.  

What You Will Do in our Online Cybersecurity Degree Program

  1. Understand cybersecurity’s various aspects, including cyber defense, cyber operations, cyber exploitations, cyber intelligence, cybercrime, and cyber law
  2. Learn digital forensics processes and investigation goals, including the importance of search warrants and chain of custody for electronic evidence in law enforcement investigations
  3. Create information technology strategies and plans for enabling security measures, such as tools, techniques, and technologies designed to prevent cyber threats and network penetration
  4. Grow your knowledge of network defense as well as network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect information security

View Program Outcome Assessment Results

Degree at a Glance

Number of Credits
120
Cost Per Credit
$350 | $250*
$315**
Courses Start Monthly
Online
  • Want to Learn More?

    Contact student support if you're a current student and need assistance.

    Step One: Introduce Yourself
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here

Program Requirements Printable Catalog Version

Students must choose a concentration for this degree program:

This concentration for the Bachelors of Science in Cybersecurity will allow students to specialize in the methodologies used to secure the networks, hardware – devices, software – apps, and the laws and regulations, policies and procedures, and ethical responsibilities for privacy and security of mobile devices using mobile and wireless network infrastructures. The concentration will emphasize countermeasures taken to harden the security of various aspects of mobile technologies associated to government, military, industry, educational, and private enterprises.

Objectives:

This concentration for the Bachelors of Science in Cybersecurity will allow students to specialize in the methodologies used to secure the networks, hardware – devices, software – apps, and the laws and regulations, policies and procedures, and ethical responsibilities for privacy and security of mobile devices using mobile and wireless network infrastructures. The concentration will emphasize countermeasures taken to harden the security of various aspects of mobile technologies associated to government, military, industry, educational, and private enterprises.

Must take all courses for this section.

Course ID: 4865

|
This course explores security strengths and weaknesses of applications on various mobile operating systems running on PDAs and mobile devices. It identifies, analyzes and explores vulnerabilities, attacks, exploits, and insecurities of mobile applications running on operating systems such as iOS, Android, Windows®, and BlackBerry® OS. What constitutes designing secure code for apps on these operating systems will also be covered. BlackBerry® is a registered trademark of BlackBerry Limited.
Registration Dates Course Dates Session Weeks
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4864

|
This course explores security strengths and weaknesses of devices running various mobile operating systems. It identifies, analyzes and explores vulnerabilities, attacks, exploits, and insecurities of mobile applications running on operating systems such as iOS, Android, Windows, and Blackberry OS. A comparative study of current mobile devices with respect to security and privacy capabilities will be covered.
Registration Dates Course Dates Session Weeks
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4863

|
The mobile communication market has grown so rapidly keeping up security in wireless networks has become a challenge. Maintaining secure connectivity on mobile devices as well as retaining flexibility, mobility, and resilience are critical to keeping files, data, and information secure and private. This course explores security issues surrounding mobile cellular communication technologies. Hands-on labs are also included as practical examples of wireless network security. (Prerequisite: ISSC343)
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4412

|
The growth of wireless networking technologies has given rise to many security issues. Wireless technology has become popular because of its convenience and low cost. This course pertains to the study of Computer Forensics Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. An overview of cybercrime and security will be addressed by explaining the basic security procedures and will include discussions of the various security threats that today’s users face. This course will prepare students to gather all necessary information and evidence to support prosecution in a court of law. This course will examine wireless networks and devices and will discuss how to investigate wireless attacks, as well as PDA, iPod®, iPhone®, iPad®, and BlackBerry® forensics. Current literature will be examined on such topics. iPod®, iPhone® and iPad® are registered trademarks of Apple, Inc. BlackBerry® is a registered trademark of BlackBerry Limited.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4413

|
The increase in the use of the Internet and ensuing growth in cybercrime have given rise to the field of digital forensics. Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. This course examines computer related crime and abuse cases in order to gather all necessary information and evidence to support prosecution in a court of law. Collection of evidence, investigating information hiding, and intrusion response techniques will be explored. This course will examine network intrusions, network traffic, web attacks, DoS attacks and corporate espionage. Current literature will be examined on such topics.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

A general concentration allows you to take courses across a number of areas of study within your program based on your own interests.

Objectives:

This general concentration allows you to choose from a variety of elective courses from homeland security, intelligence, information systems security, and IT project management.

Must take all courses for this section.

Course ID: 5162

|
This course studies the major advancements in database technology that have taken place in recent years. The class will introduce students without a prior background in Microsoft Access® to basic concepts and will cover advanced topics as well. The course offers both conceptual and hands-on material in database management, enabling students to have improved comprehension and retention of course material. Note: Software for this course is not provided by the course material grant and must be purchased/provided by students. Note for Mac users: Access 2019 and older do not work on the Mac OS. The University recommends using Windows OS, even on Mac. If a Mac OS must be used, it is recommended that students install Windows on Parallels (purchased separately) and install Access 2019 on the Windows OS via Parallels. Microsoft Access is a registered trademark of Microsoft Corporation. Microsoft Access® is a registered trademark of Microsoft Corporation.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4671

|
This course offers a framework for learning the latest developments and trends in ad-hoc wireless and mobile communications. The course provides a complete coverage of the wireless ad-hoc networks: principles, protocols and applications. The course will look at the characteristics and operations of contemporary ad-hoc wireless network technologies. Students will study the impact of wireless transmission and user mobility with an emphasis on the design and management of ad-hoc wireless mobile systems. Students must have access to MS Visio software. Course software requirements with the appropriate versions are listed under the course materials site. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical I category.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4403

|
The course covers physical security requirements in a network enterprise on varying levels including physical protection against internal and external threats that may impact people, property, and other data and networked assets. Students will learn how to assess and protect these assets via multiple layers of physical security.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4412

|
The growth of wireless networking technologies has given rise to many security issues. Wireless technology has become popular because of its convenience and low cost. This course pertains to the study of Computer Forensics Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. An overview of cybercrime and security will be addressed by explaining the basic security procedures and will include discussions of the various security threats that today’s users face. This course will prepare students to gather all necessary information and evidence to support prosecution in a court of law. This course will examine wireless networks and devices and will discuss how to investigate wireless attacks, as well as PDA, iPod®, iPhone®, iPad®, and BlackBerry® forensics. Current literature will be examined on such topics. iPod®, iPhone® and iPad® are registered trademarks of Apple, Inc. BlackBerry® is a registered trademark of BlackBerry Limited.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4673

|
This course introduces students to issues and controversies that comprise the new field of Cyberethics. The course examines a wide range of ethical issues of moral responsibility towards social and ethical concerns which affect us in our daily lives. Other topics include machine ethics, conceptions of autonomy and trust, responsible innovation, ethical controversies related to ethical computing.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

The Bachelor of Science in Cybersecurity with a concentration in Critical Infrastructure provides you with the knowledge to best understand the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems that run the everyday systems that we depend on from gas, electric, and other utilities to the production of your favorite foods. The concentration will delve into how these systems differ from the devices used by your average computer user, as well as how one can best protect these unique systems from hackers to nation states. You will be exposed to various aspects of systems from Programmable Logic Controllers (PLC) to nuclear power plants. This is a unique field with consistent growth as everyone depends on critical infrastructure virtually nonstop around the clock.

Objectives:

Upon successful completion of this concentration, the student will be able to:

  • Evaluate risks of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems.
  • Explore various federal agencies’ roles in protecting the nation’s critical infrastructure.
  • Identify critical infrastructure components.
  • Determine appropriate solutions to mitigate critical infrastructure threats.

Must take all courses for this section.

Course ID: 4868

|
This course provides an overview of critical infrastructures and their relationships to one another. Critical infrastructure sectors will be analyzed to determine prioritization, potential areas of vulnerability to threats, and potential counter-measures that can be utilized. Students will explore issues pertaining to planning, securing, and responding to these infrastructures under serious threat to ensure continuity of operations. Factors that should be considered in the response to minimize disruption and improve first responder safety will also be discussed.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5241

|
This course provides an overview of the architecture of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems and how these system can be secured. Students will explore issues such as planning and developing an ICS/SCADA network, learn about PLC devices and their role in these systems, diagraming and ensuring secure communications and operations, and implementing security standards.
Registration Dates Course Dates Session Weeks
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5242

|
This course provides an overview into risk management techniques used in securing Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems. Students will explore how the unique equipment in these systems affect an otherwise standard risk assessment and risk management strategy for the average enterprise network. Students will also learn the different mitigation techniques that can be implemented to mitigate the identified risks. (Prerequisite: ISSC477)
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5243

|
This course provides an overview into the security standards and policies involved in Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems. Students will explore the standards laid out in federal, state, and local laws, as well as those developed by the Federal Government via the National Institute of Standards and Technology (NIST) and the Department of Homeland Security (DHS). Students will also explore other potential external authorities that may play a role in certain critical infrastructure sectors as well as various industry groups focusing on information sharing. (Prerequisite: ISSC478)
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5244

|
This course provides a peek into the latest threats to Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems. Students will explore historical attacks against critical infrastructures across the world to develop an understanding of the challenges faced in securing these systems. Key topics such as malware threats, insider attacks, denial of service, hacker attacks, and terrorism will be reviewed. (Prerequisite: ISSC479)
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Bringing cybercriminals to justice requires individuals with computer forensics skill sets who have the ability to quickly collect, analyze, and present cybercrime evidence. Become familiar with digital forensic measures for security incident response with a concentration in Digital Forensics.

Study how to prevent the loss of sensitive proprietary information and deter future cyberattacks. In addition, you’ll learn about common incident response procedures, web attacks, router forensics, email crime, corporate espionage, and steganography in your online courses in digital forensics.

Objectives:

Upon successful completion of this concentration, the student will be able to:

  • Demonstrate knowledge of incident response procedures, computer investigation processes, digital forensics lab work, and investigative reports.
  • Illustrate understanding of wireless network attack forensics, wireless internet use security and access procedures, search warrants, and chain of custody.

Must take all courses for this section.

Course ID: 4411

|
This course is an introduction to Computer Forensics Investigation Procedures and Response. It provides a basic understanding of the importance of computer forensics, how to set up a secure lab, the process for forensic investigation including first responder responsibilities, how to handle various incidents and information on the various reports used by computer forensic investigators.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4412

|
The growth of wireless networking technologies has given rise to many security issues. Wireless technology has become popular because of its convenience and low cost. This course pertains to the study of Computer Forensics Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. An overview of cybercrime and security will be addressed by explaining the basic security procedures and will include discussions of the various security threats that today’s users face. This course will prepare students to gather all necessary information and evidence to support prosecution in a court of law. This course will examine wireless networks and devices and will discuss how to investigate wireless attacks, as well as PDA, iPod®, iPhone®, iPad®, and BlackBerry® forensics. Current literature will be examined on such topics. iPod®, iPhone® and iPad® are registered trademarks of Apple, Inc. BlackBerry® is a registered trademark of BlackBerry Limited.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4413

|
The increase in the use of the Internet and ensuing growth in cybercrime have given rise to the field of digital forensics. Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. This course examines computer related crime and abuse cases in order to gather all necessary information and evidence to support prosecution in a court of law. Collection of evidence, investigating information hiding, and intrusion response techniques will be explored. This course will examine network intrusions, network traffic, web attacks, DoS attacks and corporate espionage. Current literature will be examined on such topics.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4414

|
This course is designed to expose the student to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. The course provides a basic understanding of steganography, data acquisition and duplication. It examines how to recover deleted files and partitions and image file forensics.
Registration Dates Course Dates Session Weeks
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session

Course ID: 4415

|
This course is designed to expose the student to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. The course provides a basic understanding of file systems, hard disks and digital media devices. Boot processes, Windows and Linux Forensics and application of password crackers.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

The Privacy and Surveillance concentration provides students with a multifaceted approach not only addressing commonly used tools and methods of surveillance but also privacy considerations. Students will be exposed to how surveillance is both intentional and unintentional. The risk of using various forms of hardware and software will be discussed. Legal and ethical consideration surrounding the impact surveillance has on privacy rights will be addressed.

Objectives:

Upon successful completion of this concentration, the student will be able to:

  • Demonstrate knowledge of common surveillance technologies.
  • Illustrate understanding of how technology impacts population segments differently.

Must take all courses for this section.

Course ID: 5237

|
As technology continues to integrate in diverse areas of our daily environment the possibility of being monitored via an Internet of Things (IoT) device drastically increases. This course will look at how technologies including medical devices, vehicles, wearable tech, and smart homes can be used as a surveillance tools.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session

Course ID: 5238

|
The course focuses on the tools and methods that are used to remotely monitor and analyze network traffic. Students will exposed to various surveillance techniques including cellular, video, and cloud. The ability to use social media as a means to monitor individuals remotely will be addressed. Network Intrusion and Detection Systems as a mitigation method will be reviewed.
Registration Dates Course Dates Session Weeks
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5239

|
Digital Surveillance in conjunction with Artificial Intelligence creates innovative opportunities to increase the effectiveness of remote monitoring however there are concerns that widespread surveillance can have unforeseen consequences. This course will address potential biases of electronic monitoring including the color of surveillance phenomenon, governmental authority, and religious concerns.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 5240

|
This course examines legislative and policy areas related to surveillance and privacy. The ability for organizations and governments to remotely monitor and track individuals has given rise to legal and ethical concerns which are addressed. This course will examine how laws have had to change to account for the new possibilities of privacy violations.
Registration Dates Course Dates Session Weeks
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session

Course ID: 5169

|
This course examines how laws have changed to account for the expanded realm of crimes in the digital age. Students will learn about topics such as online identity theft, sexual harassment, intellectual property rights violations, and plagiarism. In addition, students will learn how stalkers can access the digital data of victims, gain access to highly confidential medical and financial information, and sabotage their victims' reputations. This course examines current literature on topics such as the Health Insurance Portability and Accountability Act (HIPAA), the Family Educational Rights and Privacy Act (FERPA), the Children’s Online Privacy Protection Act (COPPA), the Sarbanes-Oxley Act, and other legislation impacting legal disputes.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Select 2 course(s) from the following:

Course ID: 2895

|
This course develops interpersonal, group, and presentational communication skills that are applicable in personal and professional cross-cultural relationships, and focuses on differences in values, message systems, and communication rules across cultural boundaries and in multicultural settings.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 3694

|
This course is a contemporary study of popular culture in America – its development and characteristics, its role in shaping our individual lives and key social institutions; and its broad effects on our globalizing world. The course is designed around the interdisciplinary nature of cultural studies, and students will learn how to use key concepts and theories to examine popular culture from a number of different fields including Sociology, Anthropology, Communications, History, Cultural Studies, English, Women’s Studies, Ethnic Studies, and American Studies. Students will develop the skills to analyze the reciprocal relationship between culture and key stratification factors such as gender, race, ethnicity, class, age, region and sexuality. The course will cover many facets of popular culture from all forms of media, to sports, fashion, and the influence of technology. Students will learn to situate popular culture within its social, historical, political, and economic contexts and their personal lives.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 3725

|
Microeconomics is an overview course that covers how households (consumers), firms (producers), and governments interact in competitive and other markets to set prices, and determine what and how much is produced. Key concepts introduced include the role of scarcity and choice, incentives and competition, and the law of supply and demand.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 3726

|
Introduction to Macroeconomics is a survey course that builds on the topics covered and skills developed in ECON101 (Microeconomics) in order to present a complete picture of the economy. Macroeconomics shows how consumers and markets fit into the overall or aggregated economy and provides a framework to assess government policies. Key topics covered will include economic cycles (growth and recession), economic indicators and measures, and interest rates and money supply.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 3727

|
This course is a basic overview of the geographer’s study of the location and distribution of features on the Earth’s surface. These features are both natural and man-made, both physically and culturally determined. The relationship of people and place is central to an understanding of human history, contemporary events, and possible global futures. As an introductory course it covers the whole globe and all its greatest geographic features and relationships. This dictates that the approach is broad and not too deep. However, knowledge of the geographer’s art will enable students to delve as deeply as their interest and energy will allow, into the dynamic spatial realities that surround them.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 3729

|
This is the first course in a two-course sequence in American Government. The course is designed to convey basic facts about the structure and functioning of the American political system. The philosophical foundation of the U.S. Constitution is explored and the federalist construct is examined. The functions of the three separate branches of government and their roles in policy making are a major focus.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 3731

|
An overview of the field of international and global politics. The nation state, factors of power, collective security, international trade, regional and international organization, sources of conflict and convergence are addressed.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 3733

|
Introduction to Sociology introduces students to the sociological investigation of human interaction and behavior in society. Students will become familiar with the sociological perspective and develop a ‘sociological imagination’ – the ability to see the general in the particular, the new in the familiar, and to observe the impact social forces have on our lives. The course explores environmental, historical, cultural, and organizational influences on our interpersonal relationships and life-patterns within the context of contemporary society. Students will learn how to use sociological concepts, theory and research to think critically about individuals, groups, institutions, and societies in any given situation.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 3734

|
The course introduces students to the art and science of Psychology. Course emphasis is on applying the "science of human behavior" to a variety of settings: vocational, personal, academic, and clinical. Course content introduces the history of psychology, major theories of personality and learning, current research and developmental issues. The course has a holistic approach and integrates the biological basis of behavior, social factors, learning and the unique coping styles of the individual to understand human behavior.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 3735

|
This course is a worldwide survey of prehistoric cultural adaptations from the first use of bone and stone tools to the ancient mysterious civilizations of Asia, Africa, the Americas, and Europe including recent archaeological discoveries. Emphasis is on the development of technologies, social groups and the patterns of cultural development. Archeological excavation methods and archeological artifacts are discussed in considerable detail. Archaeological concepts and skills will be explored through simulations as well as virtual field trips and activities.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 3737

|
This course is designed to acquaint the novice anthropology student with anthropology and its various sub-fields, examining cross-cultural, global, comparative, and critical perspectives on human behavior and culture, as well as the diversity of human cultures from hunter-gatherers to industrialized city dwellers. The implications of socio-cultural analysis of economic, social, symbolic, and religious systems are also considered.
Registration Dates Course Dates Session Weeks
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 3738

|
This course introduces students to human nature and behavior from the broad, holistic perspective of contemporary U.S. American anthropology. The four primary sub-fields of anthropology, biological, cultural, linguistics, and archaeology, will be discussed in order to integrate various aspects of the human condition.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 3739

|
This course is an overview of the biological, psychological, cultural, and behavioral aspects of human sexuality and family life. The overall theme of the course focuses on attitudes and responsible sexual behavior. Key topics include how culture, society, and history have impacted our understanding of human sexuality.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 4328

|
This course examines a diverse sample of social problems facing the United States today and identifies how these problems affect, and are affected by, our institutions and culture. The sociological perspective and key theories will be used to understand the beginnings of the civil society, how problems develop and are defined, and the role of social change (particularly contemporary technological innovation). Key social problems covered will include social stratification/inequality, crime, drug abuse, prostitution, aging, infectious disease, family violence, health care, racial/ethnic conflict, terrorism, etc. Sociological research on social problems will be explored, and social policies to remedy the negative consequences of these issues on society will be discussed
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 4636

|
This course explores the practical and theoretical social impacts of computer-mediated communication (CMC) systems, including many different types of technologies, such as social networking sites, email, forums, chat, and online games. Students will engage in the analysis of CMC practices, the social processes and structures that emerge when people use these applications, and the problems and barriers that emerge from use.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 4949

|
In a developed country, one can often take for granted the safety of the food supply. 1 in 6 Americans get sick from foodborne illness annually, with an estimated 128,000 requiring hospitalization and resulting in approximately 3,000 deaths annually. Practical knowledge in safe food sourcing, storage, preparation and serving is addressed along with providing tips for practical awareness of techniques for staying safe. In a global society, food safety is not just a local issue, and everyone should have a working knowledge of food safety and what to look for to remain free of foodborne illness. In this course, students will learn general techniques for preparing and consuming food that is free from harmful pathogens, incorporating the flow of food from purchasing through storage and preparation to serving. Students will explore contemporary and cross cultural issues surrounding food safety in a global society. Practical knowledge about preparing safe food and red flags to watch for when dining out will be explored. Students will learn where to find information on health inspection reports, foodborne illness outbreaks and recall alerts, and will know where to report any suspected foodborne illness or suspicious activity related to the food and water supply.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 4961

|
This course is based upon the Institute for Humane Education’s (IHE) definition of humane education, which is “a lens, body of knowledge, and set of tools and strategies for teaching about human rights, animal protection, environmental stewardship, and cultural issues as interconnected and integral dimensions of a just, healthy society” (Institute for Humane Education, n.d.). The course explores issues, resources, rationales, and approaches to humane education related to various considerations and disciplines, including: economics, politics, science, technology, education, the arts, philosophy, religion, and geography.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5170

|
Introduction to Political Science explains foundational principles of the field. Students will learn the purpose of political science, common terms and concepts, and subfields. Among these are introductions to political philosophies and ideologies, comparative systems of government, and international relations. The course also examines the professional and academic fields to which a political science degree is relevant.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5176

|
This course offers students with a unique approach into the societies and cultures that we could progress toward in the future via the review of the science fiction genre. This course will review many aspects of technological questions that society will face in the future. Does the rise of technological advancements in artificial intelligence and robotics eventually bring us to a point where we must decide what is life and the right to self-determination as the Star Trek: TNG series covered in “The Measure of a Man”, laying out the rights of Commander Data. This is just one of many aspects of society and culture that will be examined throughout the course as students are made to think critically about what will the future look like.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 5245

|
Literature has the ability to shape the way a nation thinks and behaves; it both responds to important issues in society and (re)shapes them. For far too long, the literature of cultures on the periphery of American society have been ignored because they do not fit comfortably into mainstream culture. Yet, from voices within the Native American population to Appalachian artists to LGBTQ groups, for example, cultures on the periphery have consistently helped shape the American literary identity and have continued to influence American society long after the publication of their works. This course lends credence to the legitimacy of the contributions of these underrepresented cultures and explores the role they have in shaping American literature—past, present, and future. (Pre-requisite: ENGL210 for English majors, or ENGL101 or ENGL110 for non-English majors)
Registration Dates Course Dates Session Weeks
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5278

|
This course provides perspectives on death and dying. Students examine how death is beneficial and necessary for evolution. Participants explore the media's impact on mortality. Participants analyze how to communicate death to the living. Students assess the bereavement and burial process. Topics include: communicating death, the feeling of emptiness, the forgetfulness of life, living in the face of death, organ donation, burial, and the other side after death.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 5279

|
American society is a cauldron of various racial, political, ethnic, and religious formations. Amongst these, religious and racial formations provide strong modes of social organization. Both religion and race are also a major stimulus of cultural practices and belief systems. These two modes influence the ideals of democracy, equality, freedom, and even political identifications. The current agitations about Black Lives Matter are drawing attention to the racial divisions that are splitting the American society. At the same time, these movements are receiving the support of people from different religions. The Islam phobia and growth of right-wing militias are also similarly pitting Americans against one another based upon their religious beliefs. American writers, artists, activists, and even poets have drawn attention to these linkages and the pernicious impact it is having upon our society. Their contributions provide an alternate understanding of the strengths and limitations of American democracy. In this course, we will examine a variety of sources to understand how religion and race are shaping American democracy and society.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 5280

|
Difficult situations in life motivate us to think carefully about religion. The forms of religions are based on the well-being of human beings, and they have provided many different ways to follow paths that are good for our mental and physical health. This course will deal with essential questions; do religions offer ways and techniques to support that are good for our well-being? What paths have been provided to lead a good life? How our hope, contemplation, and resilience are rooted in popular religions? What are the methods advised by religions to help practitioners? The course will include traditions that are isolated to a specific culture. However, they have their historical, cultural, and social context, in which they have been beneficial to the practitioners of these cultures. On American soil, they are coming together as a melting pot, and this course will look into how their beneficial value can be used to manage current stresses. This course will look into beneficial teachings from different religions that are becoming mainstream and are practiced in a non-traditional way without converting to a specific religion. The course will cover Christian traditions, Sufi traditions, traditions from People of First Nation, Hindu, and Buddhist traditions. Ways to Stop and reflect and achieve tranquility. Not as a way of worship rather a way of living one’s life with equanimity and hope.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5454

|
This course introduces students to an attitude and approach for college success and relevant connections to their own inner motivations and external career options. Key elements in this course include values-goal alignment, an orientation to online learning, and strategies for successful learning. Other elements include planning a pathway from academic studies to a career path, career awareness, networking, engaging support resources, and collaborating with colleagues. Through the learning and activities in this course, students will gain the perspective needed for successful time management and prioritization, critical thinking, applied and collaborative learning, and civic/democratic and global learning. The content within the classroom includes open educational resources that are easily available online. This course fulfills one general education elective.   This course is recommended to be completed first in the student’s degree plan when possible.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Must take the following in this Section:

Course ID: 5037

|
Information and Digital Literacy is designed to provide students with sustainable and usable skills essential to success in both academic and professional settings. Students will learn best practices to locate and evaluate sources, and effectively communicate using digital literacy to become proficient 21st century learners.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Course ID: 4951

|
Martin Luther King, Jr, said, “If you can’t fly, then run. If you can’t run, then walk. If you can’t walk, then crawl. But whatever you do, you have to KEEP MOVING.” Making Writing Relevant is a composition course that will definitely keep you moving. It is not merely a required course; it is the type of course you will want to take because it moves you onto the path to success. Over eight-weeks, we will help you learn the most important components of a successful writer-communicator. We will teach you how to research properly, knowing you will need this skill in every course you take here at APUS and also in interactions in your professional and personal life. We will teach you the formatting style you will use in your field. We will provide a supportive community to strengthen and encourage you, and by the end of this nearly-all-you-need-to-know-about-writing course, you will be able to fly.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
01/27/25 - 07/04/25 07/07/25 - 08/31/25 Summer 2025 Session B 8 Week session

Must take the following in this Section:

Course ID: 3282

|
This course will encompass the basic concepts involved in graphing points and linear equations and the solution and graphing of inequalities and systems of linear equations. The course will also concentrate on the manipulation and use of exponential expressions and radicals and the solution of quadratic equations and their applications. Practical applications will be provided throughout the course. There is careful attention to the presentation of concepts that will become important in the study of analytic geometry, trigonometry, and calculus.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Must take all courses for this section.

Course ID: 4585

|
This course introduces the scripting languages necessary in custom programming for server administration and security purposes. Introductory level programming will be covered using scripting languages such as JavaScript®, VBScript®, Windows Shell Script, Python® and SQL. Previous programming experience is recommended. You must have access to a Windows®-based system to successfully complete the assignments in the course. JavaScript® is a registered trademark of Oracle America, Inc. VBScript® is a registered trademark of Microsoft Corporation. Python® is a registered trademark of the Python Software Foundation. Windows® is registered trademark of Microsoft Corporation.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 3203

|
This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5163

|
This course is a study of the evolution, the concepts, and the principles of local, distributed and enterprise networking. This course examines Network design, topologies, architecture, media, interface cards, protocols, problem resolution, communications, administration, operations, and resources. It introduces the student to the concepts of wireless networking, and web-based networks. This course also explores the Open Systems Interconnection (OSI) and the Transmission Control Protocol/ Internet Packet (TCP/IP) reference models. This course also examines internetworking servers, and hardware and operating systems maintenance.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5164

|
This course is a study of the principles and concepts of Network Security from various aspects including but not limited to hardware, software, and other critical elements relating to the CIA Triad. There is an emphasis on standard Operating System (OS) functions and discovering vulnerabilities. Upon completion of this course, students will be able to demonstrate an understating of methodologies and measures necessary to take a preventive stance to address security vulnerabilities. Students will examine the principles, practices, and policies related to hardening and securing Operating Systems. This course focuses on vulnerabilities and related countermeasures of various Windows components
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5165

|
This course examines the techniques and technologies for penetration of networks, detection of attacks, and prevention of attacks. This course addresses the techniques, the technologies, and the methodologies used by cyber intruders (hackers) to select a target and launch an attack. Students will gain insight into the motives and desired goals of hackers as well as effective tools and techniques used as countermeasures ensuring data assets remain secure. This course focuses on techniques and technologies to detect such attacks even while the attack is in progress; early detection enables the administrator to track the movements of the hacker and to discover the intent and goals of the hacker. This course assesses the various countermeasures to keep the system out of the “sights” of the hacker and to keep the hacker out of the perimeter of the target network. This course also explores the laws and the legal considerations in prosecuting computer crime.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5166

|
This course will provide an extensive overview of the field of cryptography, which includes but not limited to a historical perspective on early systems, building to the number theoretic foundations of modern day cryptosystems. Upon completion of this course students will have the ability to demonstrate a knowledge of how cryptosystems are designed, and to match cryptosystems to the needs of an application. Students will also study basic cryptanalysis and will be presented with real life breaches of common cryptosystems so that they better understand the dangers within cryptosystem design and in the design of systems that rely on cryptography. Students will also gain an understanding of the various methods of encryption and analyze the strength and weaknesses of various techniques to ensure data assets are protected and secure.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5167

|
This course is an introductory study of the principles, practices, procedures, and methodologies to ensure security of data at rest within databases. It appraises the convergence between database security and associated threat vectors and attack methods. It examines database types, security architecture, platform fundamentals, user administration, password management, security models, virtual private databases, and auditing models. It reviews database security processes, security configuration techniques, and auditing checklists. Course topics include: Secure Architecture, Privilege Management, and Auditing Processes.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4670

|
This course presents an introduction to biometrics, the study of recognizing individuals based on their unique physical or behavioral traits related to computer and information security. Authentication, authorization, identification, and access control through biometric perspective are emphasized. The course orients practical applications of biometrics in the real world, providing a realistic view of the use of biometrics within the emerging threats in information security.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 3349

|
This course allows the student to obtain the knowledge required to analyze and mitigate threats in the organizational network environment. Upon completion of this course, students will be able to demonstrate a knowledge of both computer and network security, from the wetware (human), software, and hardware perspectives. The "wetware" component will deal with identification of potential risk situations, establishing policies for avoidance, recovery, and prosecution, and proactive measures to reduce causal factors for security breaches in an organization. The "software" perspective will examine types of inappropriate software activity, as well as asset protection issues (recognizing software assets). This component will also address software tools available to assist in reducing administrative costs due to both malicious and accidental loss. The "hardware" component will address hardware approaches to protecting assets, as well as hardware techniques used to compromise assets. Specific technologies discussed include firewalls, symmetric key encryption, public key encryption, digital certificates, and cryptographic systems (SSL/TLS, VPNs, and Kerberos).
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 3183

|
This course allows students to examine a broad range of computer security issues and provides the student with technical knowledge not normally addressed in traditional training. It explores the protection of proprietary information and security planning with an emphasis on networked computer vulnerabilities. It also focuses on detection (e.g. viruses, hackers, types of computer crime, computer forensic examination, etc.), as well as disaster recovery and technology law. A primary focus is put on security of systems and computer crime prevention. Also addressed is the maturing criminal population with increased computer literacy, whose tendency is to move from violent actions to more profitable computer crime. Finally, issues of privacy and freedom of information are examined. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical II and Management I categories. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4009

|
The rapid change in technology and the exponential growth in the use of the Internet have resulted in an increase in the number of computer and technology related crimes. This course is designed to provide students with the foundational knowledge and technologies needed to detect, investigate, and prevent computer related crimes. Topics to be covered include: cybercrime classification (hacking, denial of service attacks, cyberstalking, cyberbullying, virus dissemination, identity theft, electronic funds transfers, phishing, spoofing, Internet fraud, access device fraud and salami attacks), vulnerability of computer systems and computer applications, computer intrusions and attacks, the impact of cybercrime (social, economic, and legal), investigation of digital evidence, computer forensics, and the prevention of cybercrime.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 4410

|
This course examines the practices for assuring information security. The various roles and functions within the Cybersecurity practice will be combined and leveraged to produce a secure organization. Case studies will be used to examine theories and practices drawn from real world situations. The numerous pitfalls of Cybersecurity will be presented with everyday practices of securing companies resources from attack. This course will examine the frameworks, roles, and competencies involved with information security. The fundamentals of Cybersecurity will be examined to include: network and security concepts, attacker techniques, data security, system and applications security and incident response techniques. Current literature will be examined on such topics.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 2647

|
This course examines the principles of security planning and policy; it offers a holistic approach to cybersecurity for an organization. It focuses on a variety of security guidelines, policies and plans (security requirements, internal users, external users, operational costs, geography, capacity plan, growth plan, business organization, business scenarios, business factors, business processes, business functions, business products, product life cycle, technical factors, roles and responsibilities, and organizational authority). This course addresses physical security, authentication, network security, encryption, software development, email, Internet, acceptable use, acceptable speech, and viruses/worms. It also covers the need for actionable and maintainable policies and the need for periodic audits of policies and configurations.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5169

|
This course examines how laws have changed to account for the expanded realm of crimes in the digital age. Students will learn about topics such as online identity theft, sexual harassment, intellectual property rights violations, and plagiarism. In addition, students will learn how stalkers can access the digital data of victims, gain access to highly confidential medical and financial information, and sabotage their victims' reputations. This course examines current literature on topics such as the Health Insurance Portability and Accountability Act (HIPAA), the Family Educational Rights and Privacy Act (FERPA), the Children’s Online Privacy Protection Act (COPPA), the Sarbanes-Oxley Act, and other legislation impacting legal disputes.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 3291

|
This is an interactive course designed to help students achieve a greater understanding of the statistical methods and models available to analyze and solve the wide variety of problems encountered in business, science, medicine, education, the social sciences, and other disciplines. Successful completion of this course will provide students with a working knowledge of the principles of both descriptive and inferential statistics, probability, averages and variations, normal probability distributions, sampling distributions, confidence intervals, statistical hypothesis tests, and correlation and regression analyses. The emphasis of the course will be on the proper use of statistical techniques and their application in real life -- not on mathematical proofs. This course will use Microsoft Excel for some of the work. Students should have a basic familiarity with Excel and have access to this software application. MATH120 is the recommended mathematics general education course for students who will be required to take additional statistics courses such as MATH302 Statistics as part of their program of study. (Prerequisites: MATH110, MATH111, MATH120, or MATH225)
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session
Select any courses that have not been used to fulfill major requirements. Credits applied toward a minor or certificate in an unrelated field may be used to fulfill elective credit for the major.

Must take all courses for this section.

Course ID: 4672

|
This Capstone course is a senior level course designed to allow the student to review, analyze, and integrate the work the student has completed toward the Bachelors of Science in Cybersecurity degree. Students will examine a number of real-world scenario cases related to various aspects of Cybersecurity to complete various cybersecurity related plans and policies that demonstrate mastery of their program of study in a meaningful culmination of their learning and to assess their level of mastery of the stated outcomes of their degree requirements. (Prerequisite: Completion of a minimum of 105 hours towards your program including ENGL101 or ENGL110)
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

What is Cybersecurity?

Enemy nations, criminals, and other bad actors seek to infiltrate computer systems to disrupt national security, steal classified information, and otherwise wreak havoc. Cybersecurity involves the strategies and technologies used to defend against these hazards. Information security analysts and other cybersecurity professionals are responsible for providing homeland security as well as safeguarding corporate data and systems. 

There’s no silver bullet when it comes to cyber defense. It changes all the time. Trouncing the enemy means always staying one step ahead when it comes to understanding and combatting cyber attacks.
Andre Slonopas,
PhD, CISA, CISM, CISSP, PMP, Department Chair and Faculty Member, Cybersecurity Department

Growth of Cybersecurity

Increasing cyber threats have led to growth in spending on information security, according to the technology research firm Gartner, Inc. The organization predicts that spending on cybersecurity, including integrated risk management and network security management, will reach more than $215 billion in 2024. At the same time, there is a shortage of more than 3 million cybersecurity professionals around the world, according to the National Institute of Science and Technology. Organizations are seeking key skills in cloud computing security, cyberattack intelligence, and malware analysis.

Virtually all organizations need some level of cybersecurity to protect their online assets. More than 70% of security leaders recently surveyed said demand for cybersecurity individual contributors will climb in the next year, with employers seeking hard skills in identity and access management, cloud computing, data protection, and incident response as well as soft skills such as critical thinking, communication, problem-solving, and teamwork.

cyber defense

Cyber Defense for the Nation

Military services and government agencies are seeking cybersecurity professionals to defend critical infrastructure. In 2023, the FBI director testified before Congress that the number of overseas hackers outnumbers FBI cyber personnel by 50 to one. On the heels of this report, members of Congress sounded the alarm that there is a critical need to fill cybersecurity jobs aimed at protecting information assets for the nation.

Amid growing cyber attacks, the Department of Defense is among the agencies taking decisive action to build its information technology workforce. The agency created a strategic program of recruiting cybersecurity professionals needed to ensure the nation's security. Likewise, the National Security Agency has an elite team of cybersecurity specialists who defend against cyber attacks and is planning for a surge in this workforce. The Department of Homeland Security also launched a talent management system to hire top cybersecurity professionals.

Why Earn your Cybersecurity Degree Online?

  • Build important connections with your peers. Students in our online cybersecurity degree program are working in the military and civilian workforce in many capacities. This means you have the opportunity to gain insights from highly experienced cybersecurity professionals working in the military and corporate world across the country. You may find a study partner or group, network with fellow students, or join one of our many student-led clubs.

  • Work around your mission. A 100% online cybersecurity degree program is ideal for busy working professionals. Our flexible delivery format means you can take classes from anywhere with an internet connection, and, for those in the military, even earn your degree while deployed. 

  • Learn at your own pace. With new classes starting every month, you can log in anytime to meet your weekly course due dates. 
I chose American Military University because of the flexibility. Taking classes while being active duty was challenging, but American Military University provided multiple avenues to ensure that it was manageable…I now hold a management position in a top 10 Fortune 500 company and have the opportunity to succeed alongside some of the brightest young business minds in the world, thanks to my degree from American Military University.
Amari Buggs
American Military University graduate and Navy veteran

Why Earn your Degree in Cybersecurity at American Military University

High academic standards. Our associate, bachelor’s degree, and master’s degree programs in cybersecurity earned National Center of Academic Excellence designation for our commitment to producing cybersecurity graduates who will help protect the nation’s infrastructure. This means the programs have met rigorous standards set forth by the National Security Agency.

At the forefront of cybersecurity. The cybersecurity field is changing rapidly. Through our Industry Advisory Committee and Center for Cyber Defense, we partner with cybersecurity experts who drive the necessary curriculum updates so our cybersecurity students gain the latest knowledge about this ever-evolving field.

Military friendly. As a top higher education provider for the U.S. military and the #1 choice for veterans using their GI Bill® benefit*, we have 5,000+ active members of the Student Veterans of America chapter.

When you enroll at American Military University, you’re supported by a community committed to your success. Our  military education managers provide guidance to active-duty servicemembers and spouses stationed at bases around the country and are available virtually for those stationed overseas. They are there to support you every step of the way, from making the most of your military benefits through achieving your educational and career goals. We also offer academic and career resources through the Department of Defense’s Military Spouse Employment Partnership.

Affordability. We believe you shouldn’t have to break the bank to go to college. We offer affordable degree programs, and we don’t charge for application fees or ebooks for undergraduate programs. American Military University also offers up to 90 transfer credits toward a bachelor’s degree for:

  • Previous academic coursework
  • Professional training and certification
  • Credit by examination
  • Government or public safety training
  • Real-world experience (evaluated through prior learning assessment)
  • Military service or training

We also offer a completion option, which allows associate of science or associate of arts degree-holding students to transfer in a minimum of 60 semester hours of credit to complete their degree more quickly.

Visit our website to learn about branch-specific program credits and admission requirements.

* Based on FY 2019 Department of Defense tuition assistance data, as reported by Military Times, 2020, and Veterans Administration student enrollment data of students using the GI Bill® as of March 23, 2023.

GI Bill® is a registered trademark of the U.S. Department of Veterans Affairs (VA). More information about education benefits offered by VA is available at the official U.S. government website at https://www.benefits.va.gov/gibill.

cyber range

Gain Experience in a Cyber Range

Our immersive cybersecurity program is very lab focused. Using a cyber range, you’ll gain the real-world skills to combat cyber warfare in a failsafe way. Cyber ranges are cloud service models that prepare you to:

  • Inject malware
  • Perform vulnerability assessments
  • Conduct penetration testing
  • Apply security principles
  • Harden operating systems

Using a Kali Linux machine, you’ll learn how hackers operate and attack target systems, and then practice with threat detection techniques needed to protect the target system. In this gamified space, you’ll gain the tools to thwart cyber criminals.

There’s no special software to use the cyber range. All you need is a web browser and an internet connection.

Cybersecurity Program Highlights

Cybersecurity jobs require a combination of technical and communication skills as well as the vision to build an effective defense strategy. This highly interactive cybersecurity bachelor’s degree program teaches the security fundamentals to develop and execute plans to protect information assets, an understanding of the ethics behind network defense, as well as the soft skills to relay these ideas. Through the program, you’ll gain the analytical and problem-solving skills to stay ahead of hackers. 

The program is designed to prepare you to be a member of the cybersecurity community and gain the know-how to seek opportunities in a range of environments, such as a corporation, government agency, public or private organization, or consulting firm.  

 

Faculty Highlights

Due to the ever-changing nature of the field, our cybersecurity major is taught by highly skilled practitioners who provide direct exposure to what’s happening today in cyber defense. Our faculty has included subject matter experts who have been recognized for their contributions to cybersecurity. This includes professionals who have served as chief of staff, cyber warfare/intelligence analysts, forensics consultants, cyber data scientists, cybersecurity planners, cyber security operations analysts, and related roles at the U.S. Department of Defense, U.S. Air Force, U.S. Navy, U.S. Marines, as well as throughout the corporate world.

Our cybersecurity faculty has included:

  • Chief of staff for a cyber brigade
  • Head of cybersecurity for a new military aircraft
  • Security director for a $100 million cybersecurity portfolio
Critical infrastructure defense is needed to protect vital systems in the military as well as municipal systems that are responsible for ensuring the safety and continuity of energy, transportation, water, and other necessary systems on behalf of communities. Learning from fellow members of homeland security working in this emerging field enriches the learning experience.
Andre Slonopas
PhD, CISA, CISM, CISSP, PMP, Department Chair and Faculty Member, Cybersecurity Department

Cybersecurity Bachelor’s Degree Concentrations

Although the field of cybersecurity changes daily, there are overarching subjects that are expected to remain. Through our cybersecurity degree program, you can immerse yourself in one of these areas of concentration.

Gain exposure to the Industrial Control Systems and Supervisory Control and Data Acquisition systems that we depend on for producing power as well as other critical services. Learn about security protocols needed to safeguard these distinct systems from hackers as well as nation-states.
Secure the skills to bring cybercriminals to justice. Learn about computer investigations, digital forensics lab work, and investigative reports, as well as wireless network attack forensics.
Decide on your choice of elective classes on topics such as intelligence, information security, homeland security, and information technology project management.
Understand what's involved with different methods of surveillance, as well as the legal and ethical considerations involved. This concentration includes an examination of common surveillance technologies as well as how they impact different populations.
Explore secure measures needed to protect networks, hardware and software as well as the legal and ethical responsibilities of mobile and wireless networks. This concentration addresses the countermeasures needed to secure mobile technology across government, military, industry, education, and private businesses.

Become a Certified Ethical Hacker

After completing the cybersecurity bachelor's degree program, we encourage graduates to complete a five-day certification bootcamp to demonstrate your understanding of cyber defense, including conducting vulnerability assessments and responding to cyber threats. 

This certification through the EC-Council validates your comprehension of ethical hacking techniques, encryption, threat analysis, and incident response. Taught by ethical hackers themselves, the certification is an important way to demonstrate your critical thinking skills and real-world knowledge of computer science, security risks, and security architecture. 

Note: This bachelor of science in cybersecurity does not award any professional certifications but may be helpful in preparing to earn such certifications.

Technology You’ll Learn

Our cybersecurity degree courses provide a solid understanding of computer science, including how operating systems, software, and virtual and physical systems work together. You’ll gain firsthand experience with a wide range of information technology tools, including:

  • Computer networking devices and simulation tools like Cisco Packet Tracer
  • Computer programming and scripting languages like Python, Linux Shells, and MS PowerShell
  • Industry-standard operating systems like Windows and Linux
  • Security software such as OpenVAS, Snort, Kali Linux, and Metasploit

This knowledge will help prepare you with sought-after skills in the cybersecurity field.

How to Pay for your Degree in Cybersecurity

We offer a Preferred Military Rate to servicemembers, National Guard members, Reservists, and their families.* In addition to an affordable degree program, we provide access to many grant and scholarship opportunities, including:

Additional scholarships are available through Military.com.

Tuition assistance is also available through:

* All U.S. active-duty servicemembers, National Guard members, Reservists, and military families (parents, spouses, legal partners, siblings, and dependents) are eligible for the Preferred Military Rate of $250/credit for undergraduate courses. The Preferred Military Rate, which is applied automatically, supersedes all other university grants and special rates, and cannot be combined with any other special promotions.

Leverage Your Military & Other Work Experience

Military personnel—often trained to figure out threats—have many inherent skills to work in cybersecurity. As a cybersecurity student at American Miltitary University, you’ll receive the support to make a smooth transition from military or professional life. We invest in academic advising to ensure the success of our students.

Our experienced advisors offer guidance in:

  • Choosing a degree path
  • Balancing your course load
  • Accessing study tools and other resources
  • Getting academic support
  • Working with professors
  • Preparing for graduation

Our partners at Uwill and TalkCampus offer 24/7 mental health support in 25 different languages. In addition, our University chaplain is here to support servicemembers who have experienced post-traumatic stress disorder.

Frequently Asked Questions

A cybersecurity degree prepares you with skills in digital forensics, incident response, risk management, and information security. These talents can be applied in a range of exciting fields, such as homeland security.

The level of degree you choose depends on your area of interest and career goals. 

  • An associate degree teaches security fundamentals, including information security. Students gain hands-on technical skills in enacting security policies and protecting sensitive data. An associate’s degree is often the minimum requirement for jobs such as cybersecurity technicians, network administrators, IT support specialists, and junior security analysts.
  • A bachelor’s degree provides broader exposure to cybersecurity, with a focus on advanced network security, ethical hacking, and security measures. Graduates of cybersecurity bachelor’s programs will have an understanding of online threats as well as strategies to combat them. Usually responsibilities related to cybersecurity analysts, security engineers, information security analysts, IT project managers, and risk managers require a bachelor’s degree in cybersecurity or other appropriate field.
  • A master’s degree offers a deeper dive into topics such as threat analysis and digital forensics. These programs prepare students to be leaders in cybersecurity, with a focus on strategic planning and policy development involved with protecting information assets. A master’s degree is typically required of those in roles such as senior cybersecurity consultants, chief information security officers, cybersecurity architects, and policy advisors.

Absolutely. Our bachelor’s degree in cybersecurity is 100% online. You will have weekly readings and assignments to complete but these can be done on your own time. This makes earning an online degree ideal for anyone with service, professional, or family obligations. 

Joining an online degree program also expands access to a wide network of peers and faculty who may provide important connections in the profession. 

Like most disciplines, cybersecurity is a skill that can be gained with the right time investment. Having a keen interest in problem solving and technology is the best foundation for those looking to take core cybersecurity courses. A basic understanding of computer science principles is also helpful for those starting out.

Not all cybersecurity jobs require industry certifications, though they can be beneficial, depending on the role you’re interested in. After completing their bachelor’s degree in cybersecurity, many students go on earn industry certifications such as:

  • Certified Ethical Hacker® (CEH®)—Demonstrates an understanding of penetration testing, incident response, and incident prevention
  • Certified Information Systems Security Professional (CISSP®)—Demonstrates experience in information technology security and ability to design and implement a cybersecurity program
  • Certified Information Systems Auditor® (CISA®)—Demonstrates expertise in conducting vulnerability assessments, designing controls, and providing compliance reporting
  • Certified Information Security Manager (CISM®)—Demonstrates experience on the management side of information security, such as governance, program development, and risk management.

CompTIA Security+®—Demonstrates ability to assess an organization's security; monitor and secure cloud, mobile, and IoT environments; and provide incident response.
Certified Ethical Hacker® and CEH® are registered trademarks of EC-Council.
Certified Information Systems Auditor®, CISA®, and CISM® are registered trademarks of Information Systems Audit and Controls Association.
CompTIA Security+® is a registered trademark of the Computing Technology Industry Association.
CISSP® is a registered trademark of International Information Systems Security Certification Consortium, Inc.
PMP® is a registered trademark of Project Management Institute. Inc.

Courses Start Monthly

Next Courses Start Feb 3
Register by Jan 31

Admission Requirements

  • All AMU undergraduate programs require a minimum of a high school diploma or equivalent (i.e., GED).
  • Please read all undergraduate admission requirements before applying to this program and be prepared to submit the required documentation.
  • There is no fee to complete the AMU admission application for this program. View steps to apply.

Materials Cost

Software and/or lab equipment required for some courses in this program must be purchased at the student’s expense, and are not included in the university book grant. 

 

Need Help?

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an AMU admissions coach at 877-755-2787 or [email protected].

Quality Education Should Be Affordable

So you can focus on the opportunities ahead, without the financial burden of more expensive schools who are not as invested in your success. Learn more about paying for school.

Consumer Information

Disclosures

Maryland Residents learn more about costs, completion rates, median debt, and more.

2Alumni Graduated with No APUS-incurred Student Loan Debt As of December 31, 2021

Includes alumni who graduated with an associate, bachelor's, or master's degree from APUS. Student loan debt is defined as student loans and private education loans used for tuition, fees, living expenses, and book costs associated with courses taken at APUS. Many APUS students receive military tuition assistance and veterans education benefits, which are not student loan debt.

1The University reserves the right to accept or deny credits according to policies outlined on our University website. Please see the University's transfer credit policy webpage for complete information.

*Cost Per Credit Hour

The Preferred Military Rate is $250 per credit hour for undergraduate and  master's-level courses. This rate is available to all U.S. active-duty servicemembers, National Guard members, Reservists, and military families, including parents, spouses, legal partners, siblings, and dependents.

See all military student benefits.

Cost of Attendance

Learn more about AMU’s cost components and full cost of attendance