-
Degrees
- Program Finder
-
Bachelor's Degrees
- Accounting
- Analytics
- Applied Management
- Business Administration
- Business Forensics
- Cloud Computing
- Communications
- Computer Science
- Criminal Justice Administration
- Cybersecurity
- Education
- Exercise Science
- Financial Management
- Financial Planning
- Forensic Accounting
- Health Education & Promotion
- Health Information Management
- Healthcare Management
- Human Resources Management
- Information Systems
- Information Technology
- Interactive Media Design
- Management & Leadership
- Marketing
- Nursing (RN-BSN)
- Operations & Supply Chain Management
- Psychology
- Public Safety Management & Leadership
- Social Sciences
- Sport Management
-
Master's Degrees
- Accounting
- Business Analytics
- Business Psychology
- Computer Science
- Criminal Justice Administration
- Cybersecurity
- Data Analytics
- Education
- Health Informatics
- Healthcare Administration (MHA)
- Human Resource Management
- Information Systems
- Information Technology
- Instructional Design & Learning Technology
- MBA Programs
- MSN Programs
- Marketing & Communication
- Professional Sales Leadership
- Public Administration (MPA)
-
Doctoral Degrees
- Associate Degrees
-
Online Degrees
- Online Learning at Franklin
- Accounting Programs
- Business & Leadership Programs
- Computer Science Programs
- Criminal Justice & Public Safety Programs
- Cybersecurity Programs
- Data & Analytics Programs
- Education Programs
- Finance Programs
- Healthcare Programs
- Human Resources Programs
- Information Technology Programs
- Marketing & Communications Programs
- Nursing Programs
- Operations & Project Management Programs
- Psychology Programs
- Public & Social Sciences Programs
- Online Learning Facts
- Degrees By Location
- Degrees By College
- Minors
- Degree Completion Programs
- Second Bachelor's Degrees
-
Microcredentials & Certificates
- Microcredentials
-
- Accounting Data Analytics
-
- Cyber Defense
- Cyber Governance
- Criminal Justice Leadership
- Data Analytics
- Nurse Educator
- Instructional Design
-
- Adult-Gerontology Primary Care Nurse Practitioner
- Family Nurse Practitioner
- Psychiatric Mental Health Nurse Practitioner
-
- Adolescence to Young Adult Education (7-12)
- Primary Education (PK-5)
- Intervention Specialist: Mild/Moderate (K-12)
- Middle Childhood Education (4-9)
-
Admissions
- Undergraduate Students
- Graduate Students
- Partnership Students
-
- Study in the U.S.
- Earn Your Degree Online
- Community College Students
- College Credit Plus
-
-
- Air Force
- Army
- Coast Guard
- Marines
- Navy
-
- Montgomery GI Bill® - Selected Reserves
- Montgomery GI Bill®
- Post-9/11 GI Bill®
- Vocational Rehabilitation and Employment VetSuccess Program
- Yellow Ribbon Program
- Spouses & Family
-
- Online Open House
-
- Associate Degrees
-
- General Bachelor's Degree
- Nursing (RN-BSN)
-
- Accounting
- Business Administration (MBA)
- Business Analytics
- Business Psychology
- Computer Science
- Criminal Justice Administration
- Cybersecurity
- Data Analytics
- Health Informatics
- Healthcare Administration (MHA)
- Human Resource Management
- Information Technology
- Instructional Design & Learning Technology
- Nurse Administrator (MSN-ADM)
- Nursing-Adult-Gerontology Primary Care Nurse Practitioner
- Nursing-Family Nurse Practitioner (MSN-FNP)
- Nursing-Generalist (MSN)
- Nursing-Psychiatric Mental Health Nurse Practitioner
- Public Administration
-
- Business Administration (DBA)
- Healthcare Administration (DHA)
- Instructional Design Leadership (DPS)
- Nursing Practice-Family Nurse Practitioner (DNP-FNP)
- Nursing Practice-Leadership Track (DNP)
- Organizational Leadership (Ed.D.)
-
- Criminal Justice Leadership
- Instructional Design
-
Tuition & Financial Aid
- Tuition & Fees
- Cost Estimate Calculator Tool
- Tuition Guarantee
- Undergrad Tuition Comparison
- Federal Aid & State Aid
- Institutional Aid & Private Loans
- Applying for Aid
- Community College Students
- Scholarships
- Payment Options
- Financial Aid Resources
-
Transferring Credit
- Estimate Your Transfer Credit
- How to Transfer Credits
-
- Previously Earned College Credit
- Certificates + Professional Training Credit
- Military Training Credit
- Testing Credit
-
- Partner Schools
- Pathway Portal
- Transfer into a Bachelor’s Degree
- Transfer into a Master’s Degree
- Transfer into a Doctoral Degree
- Transfer into an Associate Degree
-
The Franklin Experience
- Built For Working Adults
- Transfer Friendly
- Accredited University & Quality Degrees
- Fast & Affordable
- Student Success Stories
- Valued By Employers
- Nonprofit
- Student Support
- Career Development
-
About Us
-
-
- Columbus
-
-
-
- Become a Partner
- Current Partners
- Teachers
-
-
- Benefits for Community Colleges
- Benefits for Businesses
-
- Employer Partnerships
-
- Solutions
-
- Al Baha University
- MCBS
- Saudi Electronic University
- Current Partnerships
- Medical School Partnerships
- Nurse Preceptor
- Ohio School District Partnerships
-
-
- Board of Trustees
- University Leadership
- University Directory
- Faculty Profiles
- President's Welcome
- Admission Advisors
-
-
- CCNE Accreditation
- IACBE Accreditation
- State Authorization & Professional Licensure Information
- Our Mission & Values
- The Four Cornerstones
- Our History
- Consumer Information
- Safety & Security
- Bookstore
- Assessment
- Map & Directions
-
-
-
- Students
- Faculty & Staff
- Future Students
- Events
- News
- Request an Expert
- Presentations & Awards
- Faculty Awards and Recognitions
- Speakers' Bureau
- Event Hosting
-
- Careers at Franklin
-
- Title IX
- Community Standards & Student Code of Conduct
- Discrimination Harassment & Sexual Misconduct
- Anti-Hazing Policy
- Drug Free School & Communities Act
- Franklin Intervention & Awareness Team
- Filing Complaints
-
-
- Application & Review Process
- Cayuse
- CITI Training
- Research Review Categories
- Committee & Policies
- Documents, Resources & FAQs
- Research at Franklin University
- Programs & Support
- Resources
- Research Opportunities
- About Us
-
- Office of Accessibility Services
- Combating Copyright Infringement
- Financial Aid Statement
- Influenza Information
- Information Technology Acceptable Use
- Notice of Privacy Rights (FERPA)
- Privacy Statement
- Student Parking
- Tuition Refund Policy
- Vaccinations
- Inclement Weather Policy
- Transfer Credit Policy & Procedures
- Community Engagement
- Request Your Franklin Transcripts
- Urbana University Resources
- Give to Franklin
-
Class Type100% online, 6 & 12-week courses
Cost Per Credit
Tuition GuaranteeLock-In Your Tuition Rate from Day One
The Franklin University Tuition Guarantee locks-in your first-term tuition rate for the duration of your associate, bachelor’s or master’s degree program, for as long as you remain actively enrolled.
Lock-In Your Tuition Rate from Day One
The Franklin University Tuition Guarantee locks-in your first-term tuition rate for the duration of your associate, bachelor’s or master’s degree program, for as long as you remain actively enrolled.
Curriculum Alignment
Guard against digital threats with a cybersecurity degree
When data networks and computer systems are compromised, exposed or exploited, the effects can be more far-reaching than any single business entity -- it can literally affect millions of customers. That’s why cybersecurity has exploded as a field: to provide critical protection of information assets from unauthorized or unintentional disclosure, modification or loss. With Franklin's transfer-friendly, online B.S. Cybersecurity degree program, you'll learn how to respond to security breaches with state-of-the-art tactics and countermeasures.
Program Availability
NSA Designated
Our program is nationally recognized for excellence in cyber defense education.
Real-World Experience
Participate in a true-to-life security simulation.
Finish Faster
Transfer up to 94 previously earned college credits.
Real-World Practitioners
Learn from experienced technology leaders.
100% Online Classes
Earn your degree around your schedule.
Accredited Online University
Nearly 80% of our students take online courses.
Program Overview
Mitigate risk and provide critical protection against digital hijacking
Franklin University’s Cybersecurity degree program prepares you for a red-hot career in business, industry or government, protecting valuable data (and the bottom line) from security threats and hackers. So in-demand are cybersecurity professionals, that a 2019 report from Burning Glass reported that cybersecurity workers command 16 percent more in salary than other IT professionals. Perhaps that's why cybersecurity jobs are projected to grow by 9 percent, which is much faster than average between 2021 and 2031.*
Learn industry-standard cybersecurity methodologies
To prepare you for this exploding career field, you’ll learn the “defense in depth” approach, featuring layered security architecture with appropriate controls and countermeasures. Along with this methodology of comprehensive information and electronic defense, Franklin’s Cybersecurity bachelor's degree online program covers key knowledge areas as defined by the International Information Systems Security Certification Consortium (ISC) ².
Gain valuable, real-world experience assessing actual information security needs
At Franklin, you’ll get a far-reaching, 360-degree education with classes in technology, policy, management, and architecture, along with a solid foundation in information technology principles, including programming, database, systems, and networks. You’ll not only learn the “what” of enterprise security, but also the “how” and “why.” And you’ll get real-world experience when you choose a local business or nonprofit organization for which you’ll prepare a security plan, risk assessment, penetration test, vulnerability scan, and more, assisting with their actual security needs.
Moreover, industry experts, such as C. Matthew Curtin, Founder of Interhack Corporation, review Franklin’s Cybersecurity program, ensuring that your Franklin education stays ahead-of-the-curve with a full-breadth of security courses combined with hands-on security exercises in a virtual environment.
Earn a bachelor's degree focused exclusively on cybersecurity
Because it is a specialized field of industry, Franklin University offers a major in cybersecurity — rather than a component of another related program.
Courses in this curriculum include risk management and compliance; security architecture and controls; business continuity and operations; and network and application security. At Franklin, you’ll learn about the typical development mistakes that lead to application-level security issues, including CSRF, XSS, cryptography, configuration errors, authentication, and authorization, as well as how to defend against them.
This program also teaches you about design and implementation of high-availability systems through storage redundancy, load balancing, virtualization clusters, and disaster recovery systems. And, you’ll have the opportunity to learn how security requirements and activities, such as risk identification, threat modeling, security testing, and monitoring, fit into the overall systems development lifecycle (SDLC).
Earn your degree from a university built for busy adults
Earn your degree on your terms by taking classes 100% online. Accredited and nonprofit, Franklin was built from the ground-up to satisfy the needs of adult learners. Our seamless transfer process and team of academic advisors will help ease your transition to becoming a student, while our flexible course schedules help to balance your education with work, family and life. Get started on your future today.
*Source information provided by Economic Modeling Specialists International (EMSI)
Nicolas M.
B.S. Cybersecurity
"Franklin has provided major advantages. The knowledge I gained, combined with certifications led to two internship opportunities that will set me apart from other candidates after I graduate."
Future Start Date
Start dates for individual programs may vary and are subject to change. Please request free information & speak with an admission advisor for the latest program start dates.
Your Best Value B.S. Cybersecurity
Choose Franklin's nationally-recognized B.S. Cybersecurity and get a high-quality degree that fits your life and budget.
Keep the Credit You've Earned
On average, students transfer in 1/2 of the credits required.
Transfer MORE Credits, Pay LESS tuition*
Tuition Guarantee
Inflation-proof your degree cost by locking-in your tuition rate from day one through graduation.
Highly Recommended
98% of graduating students would recommend Franklin to their family, friends and/or colleagues.
Source: Franklin University, Office of Career Development Student Satisfaction Survey (Summer 2023)
Curriculum & Course Descriptions
In this course, students acquire the writing competencies necessary for completing analytical and argumentative papers supported by secondary research. A variety of assignments, beginning with personal reflections, build upon one another, as students develop ideas that respond to, critique, and synthesize the positions of others. Students systematize and organize knowledge in ways that will help them in all their courses. The course also emphasizes the elements of critical reading, effective writing style, appropriate grammar and mechanics, clarity of language, and logical and cohesive development. It culminates in submission of an extended, documented research paper.
This course is designed to prepare students for Applied Calculus and Discrete Mathematics and to provide the mathematical background needed for the analytic reasoning used in other courses. Topics include functions and their graphs, including exponential and logarithmic functions; complex numbers; systems of equations and inequalities; matrices; basic principles of counting and probability; and other selected topics. Note, this course has proctored exam(s).
Choose MATH 150 Fundamental Algebra as the prerequisite. Course can count as a University elective.
6 credits from the following types of courses:
Choose from Anthropology, Economics, Geography, History, Political Science, Psychology, and Sociology. Must select at least two different disciplines to meet requirements.
6 credits from the following types of courses:
Two courses from the Science discipline. One course must have a lab component.
Critical Ethics uses critical thinking to get around the limitations of personal belief and indoctrination to get to what ought to be done and why to improve the human condition. Accordingly, the goal of this course is to help the student improve his/her ethical analysis and evaluation skills to help the student do the thing that must be done, when it ought to be done, using critical thinking.
4 credits from the following types of courses:
Choose additional course from the Art, English Literature, Fine Arts, Humanities, Music, Philosophy, Religion or Theater disciplines.
This course prepares students to be successful lifelong learners both academically and in their chosen careers. Franklin courses require a high level of self-directed learning and focus on the skills required in the workplace and the classroom that are easily transferrable between the two environments. The course includes strategies for time management, goal setting, reading comprehension, and advancing communication skills, including the use of electronic tools to participate in virtual environments.
This course prepares students to be successful lifelong learners both academically and in their chosen careers. Franklin courses require a high level of self-directed learning and focus on the skills required in the workplace and the classroom that are easily transferable between the two environments. The course includes strategies for advancing communication skills, including the use of electronic tools to participate in virtual environments. The assignments and activities in the course are created to closely simulate teamwork found in the workplace.
By using applied critical and creative thinking, students in this course will develop a set of communication skills that will enhance their personal and professional relationships and endeavors. This course will focus on skill development in key areas such as self, perception, listening, verbal messages, conversations, relationships, conflict management, persuasion, and presentation skills.
This basic public-speaking course intends to improve the student's ability to think critically and to communicate orally. Theory and practice are provided in various speaking situations. Each student is required to speak before an audience, but class work also involves reading, gathering and organizing information, writing, and listening.
This is an intermediate course focusing on the composition of research papers. Students in this course prepare to be active participants in professional discourse communities by examining and practicing the writing conventions associated with their own fields of study and work. By calling attention to the conventions of disciplinary writing, the course also prepares students for upper-division college writing and the special conventions of advanced academic discourse. Course activities include three extended research papers, semi-formal writing addressing interdisciplinary communication, and readings fostering critical engagement with disciplinary conversations.
This course introduces you to statistics with applications to various areas. The course covers both descriptive and inferential statistics. Topics included are: sampling techniques, data types, experiments; measures of central tendency, measures of dispersion, graphical displays of data, basic probability concepts, binomial and normal probability distributions, sampling distributions and Central Limit Theorem; confidence intervals, hypothesis tests of a mean, or a proportion for one or two populations, and linear regression.
Many organizations today utilize computers and information systems to store, organize, analyze, and summarize data to solve problems. As a result, computing is a tool that can benefit students in many different fields. At the heart of solving problems with computers is the study of structured thinking using algorithms. This course is designed for students with no prior programming experience and teaches the building blocks of algorithms, including variables, expressions, selection and repetition structures, functions and parameters, and array processing.
This course serves as an introduction to the function, design, administration, and implementation of computer networks. Topics include network infrastructure, architecture, protocols, applications, and the OSI networking model.
This course, Database Management Systems, covers the fundamental concepts necessary for the design, use, implementation, and administration of database systems. The course will stress the fundamentals of database modeling and design, the languages and facilities provided by database management systems, and some techniques for implementing and administering database systems.
The Internet has changed dramatically, and so have the activities that are dependent on it in some shape or form. Understanding the need for security, its influence on people, businesses and society, as well as business drivers, are critical. The course also covers malicious attacks, threats and vulnerabilities common to the world of security, as well as access controls and methods to assess and respond to risks. Hands-on labs accompany the various concepts that are taught.
Networks are the major point of entry to most computer systems. Preventing unwanted intrusion, use, abuse, or flooding of communications channels is a high priority to organizations trying to protect their assets. Network security is about preserving the appropriate use of network resources while preventing disallowed use. In this course, you will learn how to employ firewalls, VPNs, and stateful packet inspection techniques to harden computer networks. Topics include packet filtering, intrusion detection and prevention, ingress and egress rules, monitoring, network access controls, authentication, authorization, and auditing.
This course introduces programming to individuals with little or no programming background. The goal of this course is to introduce the fundamentals of structured programming, problem solving, algorithm design, and software lifecycle. Topics will include testing, data types, operations, repetition and selection control structures, functions and procedures, arrays, and top down stepwise refinement. Students will design, code, test, debug, and document programs in a relevant programming language.
This course presents introductions to many of the basic concepts, issues, and techniques related to designing, developing, and deploying Web sites. During the course, students will learn about Web design, HTML, XHTML, and Cascading Style Sheets (CSS). Students will learn how to create sites both manually and through the use of Web site development software.
This course introduces the Linux operating system with a focus on the foundational Linux concepts and core tasks of the system administrator. Students will examine numerous commands and tools to maintain and operate Linux systems. This course utilizes hands-on lab exercises to provide students with professional experience.
This course explores the concepts of cloud computing, including financial impacts and business value, financial requirements, deployment, risks, and security. Hands-on exercises help students to gain experience with cloud computing environments, identifying technical and security requirements for given deployment scenarios, implementing the proposed cloud deployment scenario, and troubleshooting technical issues of existing cloud computing scenarios.
The prevalence of data breaches, identity theft, and the darknet today makes the study of digital forensics and cybercrime highly relevant to information security. Identifying, acquiring, preserving, analyzing, and reporting evidence to business and law enforcement is a much-needed skill. This course will cover those topics as well as the live versus dead-box techniques, appropriate legal and regulatory issues, open-source and commercial tools, and the special challenges represented by new and emerging technologies.
Ensuring the confidentiality, integrity, and availability of large and complex systems is notoriously difficult in the face of capable and determined opponents. This course discusses security engineering as the practical application of requirements analysis, modeling, architecture, processes, and measurement toward improving the dependability of complex information systems throughout their lifecycle.
The Information Security Capstone course encourages teamwork in small groups on a substantial project. The intent of this course is to provide a capstone experience that integrates the material contained in courses required of the information security major. It also provides an opportunity for students to recognize and evaluate the interrelationship of their general education courses with the courses taken for their information security major. The major areas of the program are reviewed and assessed via standardized exams. Students will also culminate their experiences with an overview of the evolution of computer systems and a look at the near-term future.
This course provides the student with an introduction to Windows Server administration and is structured to assist a network manager or planner in planning, configuring, installing, running, and repairing networks that include a Windows Server 2008. As such, it provides an introduction to server installation, Active Directory, printer management, domains, network clients, security, disaster recovery, fault/error management, and scripting of common tasks. This course also uses cloud technologies and requires internet access.
This course provides a conceptual survey of general systems theory followed by a conceptual and technological survey of the structure of distributed information systems architectures, operating systems, network operating systems, peripheral technology and user interfaces. Interoperability between these architectural components will be explored and current technology and trends in each architectural element will be reviewed. This course will de-emphasize, although not ignore, mainframe architectures in favor of information architectures more applicable to client/server computing. The various interacting categories of client/server computing as well as the benefits and implications of such a system will be fully explored.
This course builds web applications by employing server-side scripts that query relational databases. The student learns and reflects on two- and three-tier software architectures, separation of responsibility, model-view-controller pattern, basic security, and web frameworks. The student will design, code, test, debug, and document programs using a server-based scripting language. Note: This is a technology course in a technology program, and it requires the purchase of software that may be used in subsequent courses as well as being suitable for commercial work beyond completion of degree studies.
In a highly connected, data intensive, and cost-focused business environment, the practice of information security not a business advantage; it is a customer requirement. Viruses, malware, trojans, denial of service attacks, phishing, and even WikiLeaks have become headline news. Failure to ensure the confidentiality, integrity, and availability of data costs companies millions, if not billions, of dollars in legal settlements, lost business, and trade secrets. In this breadth-based course, you will get an overview of information security principles and practices, including security models, risk management, access controls, intrusion detection and prevention, cryptography, software vulnerabilities, and ethical issues. Subsequent courses expand on this foundational material in much greater depth.
This course covers the fundamentals of security in the enterprise environment. Included are coverage of risks and vulnerabilities, threat modeling, policy formation, controls and protection methods, encryption and authentication technologies, network security, cryptography, personnel and physical security issues, as well as ethical and legal issues. This foundational course serves as an introduction to many of the subsequent topics discussed in depth in later security courses.
Software vulnerabilities, especially those that compromise personal or financial data, are appallingly common. Nearly every major software company has needed to deal with the fallout of a major incident due to vulnerabilities in their products. Writing correct - let alone secure - software is very difficult. Yet users and executives expect it. In this course, you will learn about the typical development mistakes that lead to application-level security issues as well as how to defend against them. Students will explore the Open Web Application Security Project (OWASP) top 10 security vulnerabilities. Topics include unchecked user input, injection, fuzzing, CSRF, XSS, cryptography, and CAPTCHA.
Today, software is at the heart of nearly every business from finance to manufacturing. Software pervades everyday life in expected places like phones and computers but also in places that you may not consider such as toasters, thermostats, automobiles, and even light bulbs. Security flaws in software can have impacts ranging from inconvenient to damaging and even catastrophic when it involves life-critical systems. How can software be designed and built to minimize the presence of flaws or mitigate their impacts' This course focuses on software development processes that identify, model, and mitigate threats to all kinds of software. Topics include threat modeling frameworks, attack trees, attack libraries, defensive tactics, secure software development lifecycle, web, cloud, and human factors.
Students may take a graduate level course to fulfill requirements in an undergraduate program. Please review the academic policy and speak with your academic advisor for more details.
Proper assessment, management, and mitigation of risk are essential to any information security strategy. Risks aren't just related to IT assets but to the overall business that the IT organization is supporting; thus, business continuity planning and impact analysis is also important. In this course, you will learn how to identify and analyze risks, determine compliance laws, risk assessment and mitigation, business impact analysis, and business continuity and disaster recovery planning.
When audits, technology, or compliance become the driver for security initiatives the resulting program is strategically fragmented, reactive, and rigid. Moreover, there are few, if any, assurances that the biggest threats are being addressed. On the other hand, risk assessment places values on assets, evaluates the current controls, and provides data to improve the protection in a controlled, proactive, and flexible manner. This course teaches an approach to security that combines operational security, risk assessment, test and review and mitigation such that value can be demonstrated. A project-based approach to risk assessment is followed including, project definition and preparation, data gathering, technical information, physical data gathering, analysis, mitigation, recommendations, and reporting.
24 credits from the following types of courses:
Any undergraduate courses offered by the University except developmental education courses.
All students are required to pass College Writing (ENG 120), and either Basic Learning Strategies (PF 121) or Learning Strategies (PF 321) prior to enrolling in any course at the 200 level or above. Students who enroll at Franklin with 30 or fewer hours of transfer credit are required to pass PF 121 Basic Learning Strategies in place of PF 321 Learning Strategies. Interpersonal Communication (COMM 150) or Speech Communication (SPCH 100) must be taken prior to enrolling in any course at the 300 level or above. Students must also meet the University algebra competency requirement.
Academic Minors
Personalize your degree with a minor. Explore available minors, learn how minors can benefit you, and find out what requirements you must meet to earn a minor.
Nationally Recognized
National Center of Academic Excellence in Cyber Defense
Franklin University has been designated as a Center of Academic Excellence (CAE) in Cyber Defense since 2019, by the National Security Agency and its federal partners for our B.S. in Cybersecurity. The designation was awarded as a result of a thorough investigation into the University's cybersecurity curriculum, faculty credentials and competence in research and student involvement in cybersecurity activities.
For more information about the National Security Agency's Centers of Academic Excellence, please click here and for more information about the CAE Community, please click here.
National CyberWatch Center
Through our Center for Public Safety and Cybersecurity Education, a member of the National CyberWatch Center, the University collaboratively engages in efforts to advance cybersecurity education and strengthen the nation’s cybersecurity workforce. In service to communities and individuals, we provide access to the latest research impacting the industry, as well as innovations in cybersecurity education and training.
Center for Public Safety and Cybersecurity Education
Franklin University’s Center for Public Safety and Cybersecurity Education provides the skills necessary to prepare professionals to effectively prevent, solve and investigate cybersecurity issues and challenges. The Center’s offerings leverage its faculty – who are both thought leaders and practitioners – along with Franklin University’s reputation for excellence in curriculum and course development to create learning experiences that address prevailing security concerns within industries and communities.
Learn MoreMicrocredentials Align with Job Essentials
In today's dynamic work environments, adaptive professionals thrive. A microcredential - either as a stand-alone course or integrated into your degree program - is a short, skill-specific recognition that enables you to demonstrate your competency in a distinct area. Like Franklin's degree programs, microcredentials are aligned with market and industry demand to ensure what you learn can be put to use right away. Microcredentials are easily shared via digital badges and can be stacked to create a unique portfolio of in-demand skills.
B.S. Cybersecurity Program Details
2023 - 2024 Tuition | Cost Per Credit |
---|---|
Standard tuition | $398 |
B.S. in Nursing | $298 |
Current service members | $250 |
International students | $526 |
See How Franklin Compares
67% LESS IN TUITION
For students taking 31 credits per year, Franklin University’s undergraduate tuition for the 2023-2024 academic year is $12,338. According to Collegeboard.org, that's about 67% less than the national average private, nonprofit four-year college tuition of $38,070.
A learning outcome map functions as a roadmap to help guide students' progress through their program of study. Click HERE to view the B.S. Cybersecurity matrix.
1. To be awarded an undergraduate degree, students must:
- Successfully complete all courses required in the major program, including:
- General Education
- Business or Professional Core
- Major Area and Elective Courses
- Technical transfer credit (for specific degree completion programs only)
2. Meet these grade point average (GPA) requirements:
- All students must attain a minimum Franklin University cumulative GPA of 2.00
- All students must attain a minimum GPA of 2.25 in the major area, and each major area course must be completed with a grade of “C” or better to count toward degree requirements
3. Complete the residency requirement
- Students seeking a bachelor’s degree must complete a minimum of 30 credit hours at Franklin University to be eligible for a degree. Students seeking an associate’s degree must earn 20 credit hours overall in residence at Franklin University to be eligible for a degree.
4. Complete the payment of all requisite tuition and fees
5. Not be under disciplinary dismissal due to academic dishonesty or a violation of the Student Code of Conduct
Program Chairs and Academic Advisors are available for consultation to provide information and guidance regarding the selection of courses, the accuracy of schedules, and the transfer process. However, students are responsible for understanding and meeting the degree requirements of their major program or degree and for planning schedules accordingly.
Overall Residency Requirements
Students seeking a bachelor’s degree must complete a minimum of 30 credit hours at Franklin University to be eligible for a degree. Students seeking an associate’s degree must earn 20 credit hours overall in residence at Franklin University to be eligible for a degree.
Course Level Requirements
A student must have 40 credit hours overall that are equivalent to 300/400 level Franklin University courses for a bachelor’s degree. A student must have a minimum of 12 credit hours of courses that are equivalent to 200 level or above for an associate’s degree.
Business Core Requirements
Majors that have Business Core requirements are Accounting, Applied Management, Business Administration, Business Economics, Business Forensics, Energy Management, Entrepreneurship, Financial Management, Financial Planning, Forensic Accounting, Human Resources Management, Information Systems Auditing, Logistics Management, Management & Leadership, Marketing, Operations & Supply Chain Management, and Risk Management & Insurance. The Business Core is the foundation of the related academic disciplines appropriate for a baccalaureate degree in business. The purpose of the Business Core is to provide students with a conceptual understanding of organizations, how the functional areas interrelate to achieve organizational goals, and how to apply professional decision-making competencies and technical skills in today’s environment. After completing the Business Core, graduates will be able to:
- analyze an organization’s accounting information in order to develop sound business decisions
- identify and apply valuation models relevant to an organization’s financial decisions
- identify the impact of forces influencing the major functional areas of business (e.g., ethical, legal, technological, economic, global and social)
- apply marketing activities to the delivery of goods and services in business-to-business and business-to-consumer markets
- apply interpersonal and resource management skills to enhance business success
Business Principles (BSAD 110) is a Business Core prerequisite. Transfer students with the equivalent of four business courses are not required to take Business Principles.
Major Area Requirements
A student must have 20 credit hours in the major area that are equivalent to 300/400 major level Franklin courses for a bachelor’s degree. A student must have 12 hours of major area courses that are equivalent to 200 level or above for an associate’s degree. A minimum 2.25 GPA is required in the major area for students enrolled in either the associate’s or bachelor’s degree programs, and each major course must be completed with a grade of “C” or better to count toward degree requirements.
Capstone Requirement
Every major has a capstone experience for which credit cannot be transferred into the University. This is a Franklin course designed to integrate and assess the learning outcomes specific to each major as a whole. This course should be taken as the last major course. If, given the academic scheduling process and the student’s projected graduation date, this is not possible, then the student should have Senior Standing (90 or more credit hours), plus the skill-based General Education courses (COMM, SPCH, WRIT, MATH, COMP), all business or professional core courses, and the capstone prerequisite courses.
Subsequent Degree Requirements
Students pursuing subsequent bachelor’s degrees must earn in residency at Franklin University a minimum of 30 credit hours at the 200 level or above, of which a minimum of 16 credit hours must be major area courses equivalent to 300/400 level courses.
Additional Degree Requirements
Students seeking an additional bachelor’s (or associate’s) degree must successfully complete a minimum of 30 credit hours (including the major requirements) beyond the first bachelor’s (or associate’s) degree. (See the “Subsequent Degree” section of the Academic Bulletin.)
Transfer Credit
Transfer credit and credit awarded on standardized exams, proficiency exams or portfolio credit awarded by another institution will not count toward the residency requirement at Franklin University. Credit awarded based on proficiency examination or portfolio evaluation conducted by Franklin University may apply as appropriate major area credit, but will not reduce the hours required toward the residency requirement.
A student who meets at least one of the following criteria is eligible for admission as a degree-seeking student:
- Has provided official documentation of graduation from an accredited high school or its equivalent (see Documentation Required below), or
- Has an associate, bachelor or master’s degree from an institutionally (formerly regionally) accredited institution of higher education, an institution recognized as a candidate for accreditation, or an institution recognized by the Council of Higher Education Accreditation
Documentation Required
- Documentation of high school graduation or equivalence - required for applicants who are transferring fewer than 60 semester hours that apply towards a Franklin degree.
- If the student has transferable hours of 60 credit hours or more from an institutionally (formerly regionally) accredited institution of higher education, then they will not have to provide a high school diploma or equivalence. Acceptable forms of documentation of high school graduation or high school equivalence for undergraduate admission must include one of the following:
- Official high school transcript listing the date of graduation
- Official GED certificate
- Official documentation of having passed a State High School Equivalency examination
- Official documentation of a home school completion certificate/transcript
- Official transcripts from all educational institutions (college, universities, professional schools, etc.) previously enrolled in, regardless if credit was earned.
A student classified as degree seeking will not be permitted to register for courses until all transcripts are received and placement tests completed (see specific requirements under “Placement Testing”).
Admission Process
Admission procedures should be started early to maximize scheduling options and financial planning. Learn more about the undergraduate admission process.
English Language Proficiency Requirements
Prospective students must demonstrate English Language Proficiency. The requirement is met through any of the following:
- The applicant is a citizen of a country where English is the official language.
- he applicant has received a bachelor’s degree (or higher) from an institution located in an English-speaking country in which the courses were taught in English.
- The applicant has earned appropriate scores on language proficiency exams taken within the last two years, as listed below.
Undergraduate face-to-face: Students must earn a minimum overall TOEFL score of 500 (paper-based), 60 (Internet-based), 5.5 IELTS, ACCUPLACER ESL 259, or Cambridge 160 with at least the following scores on each of the exam subsections. Prior to registration, students will be given a language placement exam to determine whether ESL studies are required.
TOEFL | IELTS | ACCUPLACER | Cambridge English Scale | |
Reading | 15/30 | 5.5 | 85 | 160 |
Writing | 15/30 | 5.5 | 4 | 160 |
Listening | 15/30 | 5.5 | 85 | 160 |
Speaking | 15/30 | 5.5 | n/a | 160 |
Sentence Meaning | n/a | n/a | 85 | n/a |
Global or Online International students must take Reading Comprehension and Writing placement exams.
Students must earn a minimum overall TOEFL score of 550 (paper-based) /79 (Internet-based), 6.5 IELTS, ACCUPLACER ESL® 105, or Cambridge 180 with at least the following scores on each of the exam subsections.
TOEFL | IELTS | ACCUPLACER | Cambridge English Scale | |
Reading | 20/30 | 6.5 | 00 | 180 |
Writing | 20/30 | 6.5 | 5 | 180 |
ACCUPLACER Assessments for Admission
- Prospective students may demonstrate English language proficiency through the ACCUPLACER ESL® examinations administered by Franklin University. The ACCUPLACER ESL® suite of examinations are internet-based, computer-adaptive assessments designed to properly assess students’ English language competencies.
- Testing fees and any related administrative or proctor fee will be assessed for the administration of the
- ACCUPLACER examinations. Students are also responsible for all fees incurred for retake examinations.
- Students who do not meet the minimum score requirements may retake the examination(s) once within a two-week period. Subsequent examination retakes will be considered after a three month waiting period. Passing scores will remain valid with Franklin University for a period of two years.
- All ACCUPLACER examinations must be administered by an approved proctor that meets specific criteria, as defined by our proctor expectations. An alternative to finding a proctor in your area is Virtual, an online proctoring service, approved by ACCUPLACER. For additional information, contact the Office of International Students and Programs.
Franklin’s Apprenticeship Program provides the opportunity for paid employment in an aligned job while you complete your degree. Recently approved by the state of Ohio and the U.S. Department of Labor, apprenticeship opportunities lay the foundation for careers in rewarding and fast-growing fields.
As an apprentice, you’ll complete nine required classes within your degree program and benefit from regular pay increases as you complete your coursework and demonstrate the associated competencies.
Career Opportunities
Application Security Tester
Application Security Testers perform assessments, source code reviews and security tests to identify, understand, thwart, and remedy web application threats, vulnerabilities, and attacks.
Computer Security Specialist
Computer Security Specialists plan, implement, monitor, and upgrade control measures and solutions to protect computer networks and computer-based information from unauthorized use, breach, and/or disaster.
Cybersecurity Analyst
Cybersecurity Analysts prevent, monitor, and respond to data breaches, protecting information against hackers.
Cybersecurity Engineer
Cybersecurity engineers lead cybersecurity operations, build technical roadmaps and manage virtual network models.
Cyber Threat Analyst
Cyber Threat Analysts identify, monitor, assess, and counter threats posed to an organization using strategic assessments and tactical analysis.
Data Security Analyst
Data Security Analysts ensure the integrity of computer-based information by monitoring networks, programs, and digital files for vulnerabilities, and recommending security protection protocol.
Identity Management Specialist
Identity Management Specialists oversee identity protection protocols, ensuring that identity risks are minimized or thwarted, and that users are properly identified and granted appropriate access to systems and data according to business need.
Information Security Engineer
Information Security Engineers design, test, and monitor computer security systems to ensure that data and digital informaiton is safe from security threats and breaches.
Information Security Manager
Information Security Managers develop and oversee organizational policies, procedures, and methodologies to ensure the protection of data and information against compromise by hackers, viruses, and other threats.
Network Security Specialist
Network Security Specialists structure, install, and manage network information systems to prevent the loss of data and respond appropriately to security breaches
Security Architect
Security Architects create computer network and software protection plans to protect systems from invasion, abnormal activity, or hackers.
Security Administrator
Security Administrators protect computer system data by implementing security policies and procedures, such as system backups, password scripts, and anti-virus software.
Employment Outlook
From 2021-2031, jobs in Cybersecurity are expected to increase by 9%
All Occupations
2021 |
4,174,602 jobs
|
2031 |
4,565,120 jobs
|
Web Developers and Digital Interface Designers
2021 |
198,907 jobs
|
2031 |
222,454 jobs
|
Computer Systems Analysts
2021 |
622,728 jobs
|
2031 |
677,941 jobs
|
Database Administrators and Architects
2021 |
141,582 jobs
|
2031 |
156,869 jobs
|
Network and Computer System Administrators
2021 |
361,626 jobs
|
2031 |
385,521 jobs
|
Computer Occupations, All Other
2021 |
420,138 jobs
|
2031 |
452,283 jobs
|
Computer User Support Specialists
2023 |
604,207 jobs
|
2033 |
722,584 jobs
|
Computer Network Support Specialists
2021 |
198,280 jobs
|
2031 |
214,305 jobs
|
Source information provided by Lightcast.
Knowledge & Skillsets
Gain in-demand skills sought by employers with curriculum that teaches you:
- Identify cyber security goals, objectives, and metrics consistent with industry best practices
- Create and implement security policies, procedures, and guidelines to prevent unauthorized use, release, transmittal, and modification of data across multiple platforms
- Develop cyber security strategies that balance business needs, industry, and regulatory standards with technology
- Ensure the integrity and accessibility of company information
- Provide ongoing review of security plans, products, and control techniques
- Employ a layered approach to hardware, operating systems, middleware, and application
- Communicate security solutions effectively to business leadership
- Test websites, infrastructure, and applications using industry-standard tools and techniques
- Identify and correct programming and software architecture mistakes that lead to security vulnerabilities
- Design and implement web and application security controls to ensure that security risks are properly addressed
- Audit code and identify security vulnerabilities according to OWASP categories, including injection, cross-site scripting, authentication and session management, and cryptographic storage
- Ensure that software is designed to avoid security-related logic flaws
- Establish appropriate security control requirements based on threat modeling
- Employ firewalls, VPNs, and stateful packet inspection techniques to harden computer networks
- Develop network monitoring tools to prevent corruption of information systems
- Implement and maintain a variety of networking and security devices, such as routers, intrusion detection and prevention systems, and vulnerability scanners
- Configure, deploy, fine-tune, and monitor firewalls, proxies, and logging servers
- Assess event management and response systems, such as intrusion detection and prevention systems
- Understand authentication, authorization, and auditing
- Manage and monitor web application firewalls
- Employ network scanning, fingerprinting, vulnerabilities, and exploits to perform penetration tests
- Build proper firewall rules for both ingress and egress
- Identify security hazards and monitor systems for compliance with information policies
- Develop and implement incident response procedures
- Provide technical expertise and leadership to infrastructure staff during risk assessment
- Identify, analyze, and communicate risk to help determine business impact
- Understand threats, vulnerabilities, exploits, and countermeasures
- Possess an accurate understanding of U.S. compliance laws
- Design and coordinate security audits and risk assessments
- Work with internal groups to mitigate security issues
- Use load balancing methodology to distribute workloads across multiple resources
- Create and implement business continuity and disaster recovery plans
- Design systems to minimize economic impact during outages
- Connect business objectives, business processes, and technical solutions via high-level architectures
- Establish recovery time periods and resources required for resumption of business operations
- Develop procedures to assist during security incidents
- Assess disaster recovery systems
- Evaluate and improve storage redundancy systems
- Research and propose changes to security policies in response to regulatory changes
- Work with internal and external auditors to ensure compliance with regulations
- Communicate regulations effectively to business leadership
- Identify applicable laws and regulations related to technical resources
- Monitor the changing regulatory landscape for future compliance requirements
- Coordinate and lead compliance requirements change
Get College Credit for What You Already Know
The certificates and training listed below are relevant to this degree program. Search our database to view pre-evaluated credentials and see how a license, certification or professional training saves you time and money toward your degree.
Frequently Asked Questions
Congratulations on wanting to finish your degree. At Franklin, we make it easy and convenient for busy, working adults to complete their bachelor's degree program alongside other commitments. Typically, a bachelor’s degree takes about 4 years of full-time study from start to finish. However, Franklin’s generous transfer policy can help you finish faster. Visit MyTransfer Credit to see how your previously earned credits can save you time toward your bachelor’s.
Franklin makes getting started easy and convenient. We offer three trimesters every year, with start dates within each. Talk to your admissions advisor to find the start date that works best for you.
Franklin University offers a quality education at a competitive cost so you can afford to invest in your future. Our per credit hour tuition rates (vs. per year or per term rates) enable you to get a realistic estimate of exactly how much your degree will cost - especially once you've factored in transfer credit. Our 2023-2024 tuition rate is $398 per credit hour and with our tuition guarantee, you can lock-in your tuition rate from your first term through graduation. Ask our helpful staff about available financing options and financial aid programs. Visit MyTransfer Credit to see how transfer credits could help you save time and money.
This is a four-year undergraduate degree program. With Franklin University's B.S. Cybersecurity degree program, you'll develop an in-depth understanding of how to protect data, information, systems, networks, and programs from known, unknown, intended and unintended attack, loss or theft.
With Franklin's B.S. Cybersecurity degree, you'll have the opportunity to play a crucial role in helping organizations deal with compromises, breaches and intrusions of data networks and computer systems. In addition, you'll be well-position for a wide variety of red-hot career positions, including security engineer, chief information security officer, forensics expert, cyber analyst, cryptographer, security administrator and more.
When you graduate with a Franklin B.S. Cybersecurity degree, you'll be prepared to help business, industry and government protect critical information assets from accidental or unauthorized access, disclosure, modification, loss, security threats and hackers.
Franklin’s B.S. Cybersecurity degree program provides a hands-on and responsive education to help make you job-ready from day one. Franklin's curriculum is designed for the busy, working adult, with classes in information technology, policy, management, architecture, programming, database systems and networks. You learn both the “what” of enterprise security, as well as the “how” and the “why.” In addition, you'll prepare a real-world security plan, risk assessment, penetration test, vulnerability scan and more that can assist a local business or nonprofit organization with their actual security needs.
Back to College Blog
Related Programs
- Degrees
- Microcredentials & Certificates
- Admissions
- Tuition & Financial Aid
- Transferring Credit
- The Franklin Experience
- About Us
- FranklinWORKS Marketplace
- Safety & Security
- Policy Information
- Your Privacy Settings
- Privacy Policy
- Terms of Use
- Careers At Franklin
- Sitemap
Franklin University
201 S Grant Ave.
Columbus, OH 43215
Local: (614) 797-4700
Toll Free: (877) 341-6300
admissions@franklin.edu
Copyright 2024 Franklin University
Franklin University is accredited by the Higher Learning Commission (hlcommission.org/800.621.7440) and authorized by the Ohio Department of Higher Education.
Franklin University is committed to being an inclusive community free from all forms of discrimination and harassment.
I AM A:
SHORTCUTS:
Associated Sites
- FranklinWORKS Marketplace
- Franklin University Store & Apparel
- International Institute for Innovative Instruction
- Leadership Center
- Global Center for Healthcare Education
- Center for Public Safety & Cybersecurity Education
- Best Adult Colleges & Careers Guide
- Accounting MVP Blog
- Data & Analytics MVP Blog