Cybersecurity, B.S.

The Bachelor of Science in Cybersecurity program provides students with the necessary knowledge, skills, and professional training to pursue careers in the rapidly growing field of Cybersecurity. The program offers a balance between the theoretical and deep technical skills of Cybersecurity. The program is suitable for students who have received an Associate's degree in Business, Homeland Security, Criminal Justice, Computer Science or a related major and have a desire to join the Cybersecurity workforce or conduct Cybersecurity research. The program prepares our graduates to face the futuristic security-related challenges emerging from our internet-connected world, the rapid adoption of mobile devices, and the ever-increasing role of software applications in our daily life. Our curriculum for the Bachelor in Cybersecurity program blends contemporary knowledge with advanced research concepts to deliver a cutting-edge program mapped with the NSA/DHS guidelines and knowledge units.

The requirement for admission to this degree track is a minimum cumulative grade point average (CGPA) of 2.25. 

Prerequisites (15 credits)
CS 101Computer Science I3
CS 206Concepts of Operating Systems3
CS 407Introduction to Unix/Linux System Administration and Shell Programming3
SECU 210Introduction to Intelligence3
SECU 222Computer Security I3
Core Courses (27)
CS 252Programming for All in Python and Computer Science Principles3
CS 410Telecommunications & Networks3
SECU 221Contemporary International Security Topics3
SECU 224Ethics in National Security3
SECU 309Introduction to Computer & Network Security3
SECU 322Computer Security II3
SECU 345Computer Forensics I3
SECU 430Computer Hacking Forensic Investigator3
SECU 460Security and Privacy of Information and Information Systems3
Security Studies Track Courses (21)
SECU 323Risk Management3
SECU 339Cyber Incident Handling3
SECU 340Ethical Hacking I3
SECU 400Cybersecurity and Event Management3
SECU 415Intrusion Detection and Prevention Systems3
SECU 422Computer Security III3
SECU 154Careers in Professional Security Studies3
Business Security Track Courses (21)
ACCT 450Corporate Governance & Internal Control Frameworks3
FINC 305Introduction to Data Science3
FINC 430Principles of Machine Learning3
MGMT 321Ethics and Corporate Social Responsibility3
MGMT 350Decision Intelligence in Supply Chains3
MKTG 231Principles of Marketing3
MKTG 422E-commerce3
Computer Science Track Courses (21)
CS 304Operating System Design Security3
CS 350Software Engineering I3
CS 306Data Base Design3
CS 407Introduction to Unix/Linux System Administration and Shell Programming3
CS 252Programming for All in Python and Computer Science Principles3
CS 5523
CS 307Microcomputer Maintenance and Repair3
Electives (12 credits) Take at least four courses
SECU 151Security Systems & Design3
SECU 152Loss Prevention Technique3
SECU 153Occupational Safety and Health3
SECU 155Introduction to International Security3
SECU 214Crime Scene Investigation3
SECU 215Behavioral Analysis and Criminal Profiling3
SECU 220Current Security Problems3
SECU 280Security Organization & Administration3
SECU 310Forensic Investigations3
SECU 311Bloodstain Pattern Analysis3
SECU 315Big Data Analysis and Visualization in U.S. National Security3
SECU 321Seminar on National Security3
SECU 398Research Methods in Professional Security Studies3
SECU 465Resource Manangement in Security3
SECU 1305Special Topics: Intelligence Analysis and National Security3
SECU 3305Special Topics: Executive Communications for National Security3
SECU 2305Special Topics: National Security Policy3
SECU 4305Special Topics: Domestic Terrorism3
SECU 5305Special Topics: Extremist Groups3
SECU 6305Special Topics: Critical Thinking3
SECU 7305Special Topics: Security Fraud3

STUDENT LEARNING OUTCOMES

In addition to goals and objectives, the proposed B.S. in Cybersecurity program includes two sets of student learning outcomes: (1) institutional (i.e., NJCU) and (2) National Centers of Academic Excellence in Cyber Defense (CAE-CD) (i.e., NSA/DHS). Students earning a Bachelor of Science in Cybersecurity from the New Jersey City University will demonstrate proficiency in their abilities to:


NJCU’S GENERAL EDUCATION REQUIREMENT (GER) LEARNING OUTCOMES
1. Effectively communicate ideas orally and in writing, as informed by the tenets of a liberal
arts education (Liberal Arts Literacy) [GER1]

2. Use logical reasoning and a scientific approach to support conclusions based on empirical evidence (Scientific Literacy) [GER2]
3. Form conclusions that are supported logically by the principles of qualitative and quantitative reasoning, probability, and statistics (Quantitative Literacy) [GER3]
4. Demonstrate the ability to use computing systems in order to access, store, process and analyze the information as an essential aspect of critical thinking and problem solving (Computing Literacy) [GER4]
5. Identify and articulate the multifaceted relationships between the economic, social, and political forces that inform and structure society as well as an individual’s place within it (Social Science Literacy) [GER5]

CYBER DEFENSE (CD) KNOWLEDGE UNITS LEARNING OUTCOMES
1. Understand the major concepts in modern operating systems and the basic security issues in OS design and implementation (how the first principles of security apply to operating systems). [CAE-CD 1]
2. Evaluate leadership, theory, tools, skills, and practices as they apply to safeguard the security and privacy of today and tomorrow’s cyberinfrastructure. [CAE-CD 2]
3. Design solutions for complex problems in a secure and robust manner using a programming language. [CAE-CD 3]
4. Identify and articulate potential system attacks and the actors that might perform them.
[CAE-CD 4]
5. Identify and articulate appropriate measures to be taken should a system compromise occur. [CAE-CD 5]
6. Identify and articulate cyber defense tools, methods and components. [CAE-CD 6]
7. Understand cyber defense methods to prepare a system to repel attacks. [CAE-CD 7]
8. Demonstrate proficiency in the use of scripting languages to write simple scripts (e.g., to automate system administration tasks). [CAE-CD 8]
9. Identify and compare/contrast bad actors in cyberspace, including their resources, capabilities/techniques, motivations, and aversion to risk. [CAE-CD 9]
10. Describe different types of attacks and their characteristics [CAE-CD 10]
11. Describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies. [CAE-CD 11]

12. Understand the interaction between security and system usability and the importance of minimizing the effects of security mechanisms [CAE-CD 12]
13. Evaluate the architecture of a typical, complex system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed. [CAE-CD 13]
14. Identify the elements of a cryptographic system. [CAE-CD 14]
15. Describe how various cryptographic algorithms and protocols work. [CAE-CD 15]
16. Describe which cryptographic protocols, tools and techniques are appropriate for a given situation. [CAE-CD 16]
17. Describe how crypto can be used, strengths and weaknesses, modes, and issues that have to be addressed in implementation (e.g., key management), etc. [CAE-CD 17]
18. Apply and analyze hardware components of modern computing environments and their individual functions. [CAE-CD 18]
19. Describe the fundamental concepts, technologies, components and issues related to communications and data networks. [CAE-CD 19] 
20. Describe a basic network architecture given a specific need and set of hosts/clients. [CAECD 20]
21. Describe the responsibilities related to the handling of information about vulnerabilities. [CAE-CD 21]
22. Apply the knowledge gained to successfully install and securely configure, operate and maintain a commodity OS, to include: setting up user accounts, configuring appropriate authentication policies, configuring audit capabilities, performing back-ups, installing patches and updates, reviewing security logs, and restoring the system from a backup.
[CAE-CD 22]
23. Apply security principles to the design and development of database systems and database structures. [CAE-CD 23]
24. Apply the knowledge of network technologies to design and construct a working network. [CAE-CD 24]
25. Analyze a trace of packets to identify the establishment of a TCP connection. [CAE-CD 25]