What does it take to secure an organization’s data? To guard its operations against cybersecurity concerns and threats? To conduct digital forensics in response to a given security incident? Getting a cybersecurity online degree gives you the skills and direction you need to achieve all this and more.

You’ll learn how to
  • Maintain the security of networks and data in a range of environments;
  • Study different types of hacking (both ethical and unethical);
  • Perform penetration tests on communication media and wireless networks;
  • Generate network threat-testing techniques; and
  • Master the functions and impacts of malicious programs—and their countermeasures.


Transfer with ease

Already have IT certifications? You may be eligible to apply transfer credits toward your degree in three seamless steps. View the certifications we offer transfer credit for.


Get certified for less

Gain the skills you need to take select IT certification exams, including PMI, CompTIA, Microsoft©, and Cisco®. Plus, earn a discounted exam voucher to help cover the cost.


Summer Classes Start:

July 6

Courses to Complete:


Cost Per Course:


Getting a game-changing degree should be affordable. That’s why we offer plenty of ways to save on tuition.




  • CIS 332 - Network Server Administration I (Microsoft Track)

    This is a lab-based course that prepares students to install, configure, secure and maintain the Windows server environment. Topics include configuring and managing DHCP, DNS, routing and remote access, file and print services. You have options: choose this course, or CIS411 Advanced Routing (Cisco Track).

  • SEC 340 - Computer Forensic Technology

    Get the knowledge and skills to identify, track and prosecute cyber criminals. Understand computer forensics; creating a secure lab; and the process for forensic investigation, including first responder response techniques, incident management, and reports used by computer forensic investigators. Cover a broad base of topics designed to detect attacks and collect evidence in a forensically sound manner. Take preparatory steps to identify evidence in computer related crime and abuse cases and track a hacker’s path through a client system.

  • SEC 420 - Perimeter Defense Techniques

    This is a lab-based course that covers topics in offensive network security, ethical hacking, network defense and countermeasures. The course provides an understanding of the tactics and tools used by hackers and methods to prepare strong countermeasures and defensive systems to protect an organization’s critical infrastructure and information. Topics include perimeter defense techniques, scanning and attacking simulated networks with a variety of tools, viruses, and malware.

  • SEC 435 - Network Penetration Testing

    This is a lab-based course that covers topics in advanced penetration testing and information security analysis. Students are exposed to methodologies in conducting thorough information security analysis and advanced penetration testing techniques to effectively identify and mitigate risks to the security of an organization’s infrastructure.



    Provides a foundation in today's business operations with a focus on the major functions of a business (management, production, marketing, finance and accounting, human resource management, and various support functions). The course also provides an overview of business organizations and the competitive business environment, strategic planning, international business, ethical considerations, quality assurance and more.

  • BUS 375 - Project Management

    Presents the fundamentals of the project management process and examines application of the process. Reviews the stages and activities in the project life cycle, the organization for project management, and various project control and evaluations processes. Introduces considerations for negotiation and human resource management concerns in project management.

  • CIS 106 - Introduction to Information Technology

    This course provides a foundational overview to the discipline of Information Technology that illuminates key computing concepts and describes how those concepts relate to other computing disciplines. Students are presented the diverse context in which information technology is used and the challenges inherent in the diffusion of innovative technologies.

  • CIS 109 - Introduction to Information Systems

    This course provides an introduction to contemporary information systems and demonstrates how these systems are used throughout the organization. The focus of this course will be on the key components of information systems - people, software, hardware, data, and communication technologies, and how these components are developed, acquired and integrated to create a competitive advantage.

  • CIS 110 - Computer Programming Design

    The course introduces students to fundamental programming concepts to include event-driven programming, object-oriented programming, basic data structures, and algorithmic processes. Emphasis is placed on structure, decision-making, looping, arrays, methods, objects, events, databases, pseudo coding and visual flowcharting to construct workable programs.

  • CIS 111 - Introduction to Relational Database

    This course provides the students with an introduction to the theory and applied concepts of database design, database management and information management. Students will focus on identifying organizational information requirements, express those requirements using conceptual data modeling techniques, verifying the structural characteristics with normalization techniques and convert conceptual data models into physical database models.

  • CIS 175 - Introduction to Networking

    This course introduces students to the fundamentals of networking technology. The focus of the course will include networking protocols, topologies, hardware and operating systems. Topics include data communications, telecommunications, infrastructure security, inter/intranetworking and the application of networking to multimedia, information storage and distribution.

  • CIS 261 - Object Oriented Computer Programming I

    This course explores the fundamentals of object-oriented programming. Students will apply basic programming concepts as they design, develop, and test their own applications. Topics include variables, expressions, types, branching, loops, functions, string, list and dictionaries.

  • CIS 312 - Computer Architecture

    This course presents students with concepts and essential skills required to administer operating systems, networks, software, file systems, file servers, web systems, database systems, system documentation, policies and procedures. Topics include the methods required to select, deploy, integrate and administer computing platforms or components that support an organization's information technology infrastructure. The fundamentals of hardware, software and how they integrate to form essential components of systems also explored.

  • CIS 333 - Networking Security Fundamentals

    This is a lab-based course that provides an overview of information technology security principles, challenges, vulnerabilities and countermeasure strategies. Topics include definition of security terms, concepts, elements, and goals. Students will explore industry standards and practices that focus on the availability, integrity, and confidentiality aspects of information systems security.

  • -
  • CIS 276 - SQL Programming

    This course covers the concepts, and components for designing, building and querying databases using the Structured Query Language (SQL). Students will use tools to create tables, apply database and table constraints through the use of the Data Manipulation Language (DML) and Data Definition Language (DDL).

  • CIS 498 - Information Technology Capstone

    This course is an integrative capstone course for the Bachelor of Science in Information Technology program. The course takes a senior management approach to examine and solve real world problems and projects. Students will apply project management techniques to create integrative information technology solutions that include databases, systems analysis, security, networking, computer infrastructure, human-computer interaction and web design.

Strayer University is a proud recipient of the Academia Partner Circle of Excellence Award by EC-Council, a global leader in cybersecurity. Strayer's program now offers students Certified Ethical Hacker and Certified Hacking Forensics Investigator certifications.


Data protection is a key concern for businesses and organizations operating in a digital environment that is constantly tested by bad actors looking for ways to be where they shouldn’t. Protect valuable information and cut digital criminals off at the pass when you earn your cybersecurity online bachelor’s degree from Strayer University.

The online Bachelor of Science in Information Technology cybersecurity technology concentration at Strayer preps students to wear the white hat in the digital world.  We’ll give you the education you need to understand concepts like ethical hacking, network defense, offensive network security, and 

countermeasures against hackers that shut them out of your network — and shut them down.

You’ll learn to think like a hacker, understanding how these black-hat programmers breach network systems as you’re trained how to implement defense systems that protect data.

Security is the most pressing role in the information technology field. Jump onto the front lines in the fight against hackers when you earn your cybersecurity online bachelor's degree from Strayer.



Each Bachelor of Science in Information Technology concentration can provide you with skills you’ll be able to apply immediately. You may want to explore these other Bachelor of Science in Information Technology concentrations.

Bachelor of Science in Information Technology


U.S. Military Affiliation

Do you have transfer credits?

You consent to receive autodialed marketing calls or text messages from Strayer University and partner school, Capella University, at the phone number you provided. Consent is not required to purchase goods or services. You can always call us at 1.866.314.3547.


Submitting your information,
this may take a few seconds...