Subscribe to our Newsletter

Helpful articles and useful tips for adults considering a college degree.

Thank you for signing up for our newsletter!

You will soon receive an email
confirming your request.

Cyber Security Degree Program

Program OverviewProgram DetailsWhy Choose Franklin

Mitigate risk and provide critical protection against digital hijacking

Compromise, breach, intrusion. When a data network or computer system is exposed or exploited, the result can be catastrophic to both business and industry. That’s why cyber security has grown into its own field — one that provides critical protection of information assets from unauthorized disclosure or modification, and accidental or intentional loss
of data.

Franklin University’s Cyber Security degree program prepares you for a red-hot career in business, industry or government, protecting valuable data (and the bottom line) from security threats and hackers. So in-demand are cyber security professionals, that a 2015 report from Burning Glass reported that cyber security workers command 9 percent more in salary than other IT professionals.Perhaps that's why cyber security jobs are projected to grow by 18 percent, which is much faster than average between 2015 and 2025.1 

Learn industry-standard cyber security methodologies

To prepare you for this exploding career field, you’ll learn the “defense in depth” approach, featuring layered security architecture with appropriate controls and countermeasures. Along with this methodology of comprehensive information and electronic defense, Franklin’s Cyber Security degree online program covers key knowledge areas as defined by the International Information Systems Security Certification Consortium (ISC) ². 

Gain valuable, real-world experience assessing actual security needs

At Franklin, you’ll get a far-reaching, 360-degree education with classes in technology, policy, management, and architecture, along with a solid foundation in information technology principles, including programming, database, systems, and networks. You’ll not only learn the “what” of enterprise security, but also the “how” and “why.” And you’ll get real-world experience when you choose a local business or nonprofit organization for which you’ll prepare a security plan, risk assessment, penetration test, vulnerability scan, and more, assisting with their actual security needs.

Moreover, industry experts, such as C. Matthew Curtin, Founder of Interhack Corporation, review Franklin’s Cyber Security program, ensuring that your Franklin education stays ahead-of-the-curve with a full-breadth of security courses combined with hands-on security exercises in a virtual environment.

Earn a bachelor's degree focused exclusively on cyber security

Because it is a specialized field of industry, Franklin University offers a major in cyber security — rather than a component of another related program.

Courses in this curriculum include risk management and compliance; security architecture and controls; business continuity and operations; and network and application security. At Franklin, you’ll learn about the typical development mistakes that lead to application-level security issues, including CSRF, XSS, cryptography, configuration errors, authentication, and authorization, as well as how to defend against them.

This program also teaches you about design and implementation of high-availability systems through storage redundancy, load balancing, virtualization clusters, and disaster recovery systems. And, you’ll have the opportunity to learn how security requirements and activities, such as risk identification, threat modeling, security testing, and monitoring, fit into the overall systems development lifecycle (SDLC).

Earn your degree from a university built for busy adults

Earn your degree on your terms by taking classes 100% online or pursue available coursework at one of our Midwest locations. Regionally accredited and nonprofit, Franklin was built from the ground-up to satisfy the needs of adult learners. Our seamless transfer process and team of academic advisors will help ease your transition to becoming a student, while our flexible course schedules help to balance your education with work, family, and life. Get started on your future today.

1Source information provided by Economic Modeling Specialists International (EMSI)

Gain The Skills Employers Desire

  • Security Architecture
    • Identify cyber security goals, objectives, and metrics consistent with industry best practices
    • Create and implement security policies, procedures, and guidelines to prevent unauthorized use, release, transmittal, and modification of data across multiple platforms
    • Develop cyber security strategies that balance business needs, industry, and regulatory standards with technology
    • Ensure the integrity and accessibility of company information
    • Provide ongoing review of security plans, products, and control techniques
    • Employ a layered approach to hardware, operating systems, middleware, and application
    • Communicate security solutions effectively to business leadership
  • Web Application Security
    • Test websites, infrastructure, and applications using industry-standard tools and techniques
    • Identify and correct programming and software architecture mistakes that lead to security vulnerabilities
    • Design and implement web and application security controls to ensure that security risks are properly addressed
    • Audit code and identify security vulnerabilities according to OWASP categories, including injection, cross-site scripting, authentication and session management, and cryptographic storage
    • Ensure that software is designed to avoid security-related logic flaws
    • Establish appropriate security control requirements based on threat modeling
  • Network Security
    • Employ firewalls, VPNs, and stateful packet inspection techniques to harden computer networks
    • Develop network monitoring tools to prevent corruption of information systems
    • Implement and maintain a variety of networking and security devices, such as routers, intrusion detection and prevention systems, and vulnerability scanners
    • Configure, deploy, fine-tune, and monitor firewalls, proxies, and logging servers
    • Assess event management and response systems, such as intrusion detection and prevention systems
    • Understand authentication, authorization, and auditing
    • Manage and monitor web application firewalls
    • Employ network scanning, fingerprinting, vulnerabilities, and exploits to perform penetration tests
    • Build proper firewall rules for both ingress and egress
  • Risk Management
    • Identify security hazards and monitor systems for compliance with information policies
    • Develop and implement incident response procedures
    • Provide technical expertise and leadership to infrastructure staff during risk assessment
    • Identify, analyze, and communicate risk to help determine business impact
    • Understand threats, vulnerabilities, exploits, and countermeasures
    • Possess an accurate understanding of U.S. compliance laws
    • Design and coordinate security audits and risk assessments
    • Work with internal groups to mitigate security issues
  • Disaster Recovery
    • Use load balancing methodology to distribute workloads across multiple resources
    • Create and implement business continuity and disaster recovery plans
    • Design systems to minimize economic impact during outages
    • Connect business objectives, business processes, and technical solutions via high-level architectures
    • Establish recovery time periods and resources required for resumption of business operations
    • Develop procedures to assist during security incidents
    • Assess disaster recovery systems
    • Evaluate and improve storage redundancy systems
  • Security Law & Compliance
    • Research and propose changes to security policies in response to regulatory changes
    • Work with internal and external auditors to ensure compliance with regulations
    • Communicate regulations effectively to business leadership
    • Identify applicable laws and regulations related to technical resources
    • Monitor the changing regulatory landscape for future compliance requirements
    • Coordinate and lead compliance requirements change

Career Opportunities

  • Cyber Security Analyst

    Cyber Security Analysts prevent, monitor, and respond to data breaches, protecting information against hackers.                                          

    View Salary Trends
  • Cyber Threat Analyst

    Cyber Threat Analysts identify, monitor, assess, and counter threats posed to an organization using strategic assessments and tactical analysis.

    View Salary Trends
  • Cyber Security Engineer

    Cyber Security Engineers build and maintain IT security solutions for organizations, guarding against threat and analyzing risks.

    View Salary Trends
  • Application Security Tester

    Application Security Testers perform assessments, source code reviews and security tests to identify, understand, thwart, and remedy web application threats, vulnerabilities, and attacks.

    View Salary Trends
  • Computer Security Specialist

    Computer Security Specialists plan, implement, monitor, and upgrade control measures and solutions to protect computer networks and computer-based information from unauthorized use, breach, and/or disaster.

    View Salary Trends
  • Data Security Analyst

    Data Security Analysts ensure the integrity of computer-based information by monitoring networks, programs, and digital files for vulnerabilities, and recommending security protection protocols.

    View Salary Trends
  • Information Security Manager

    Information Security Managers develop and oversee organizational policies, procedures, and methodologies to ensure the protection of data and information against compromise by hackers, viruses, and other threats.

    View Salary Trends
  • Network Security Specialist

    Network Security Specialists structure, install, and manage network information systems to prevent the loss of data and respond appropriately to security breaches.

    View Salary Trends
  • Security Administrator

    Security Administrators protect computer system data by implementing security policies and procedures, such as system backups, password scripts, and anti-virus software.

    View Salary Trends
  • Security Architect

    Security Architects create computer network and software protection plans to protect systems from invasion, abnormal activity, or hackers.

    View Salary Trends
  • Identity Management Specialist

    Identity Management Specialists oversee identity protection protocols, ensuring that identity risks are minimized or thwarted, and that users are properly identified and granted appropriate access to systems and data according to business need.

    View Salary Trends
  • Information Security Engineer

    Information Security Engineers design, test, and monitor computer security systems to ensure that data and digital informaiton is safe from security threats and breaches.

    View Salary Trends

Employment Outlook

In 2015 there were 69,131 job openings related to Cyber Security. The previous year, 9,781 students completed programs in Cyber Security.

Source information provided by Economic Modeling Specialists International (EMSI) - October 2014

Our Recipe For Your Success

Academic & Industry Experts

Classes are taught and designed by credentialed professionals with real-world experience.

  • Programs are designed by combining the insight of industry leaders with the academic expertise of our faculty, ensuring what you learn translates into on-the-job success.

  • Academic concepts and theories are brought to life through our teaching faculty’s professional expertise, and can be immediately applied in your career.

  • Faculty with industry experience teach our courses, not graduate students or life-time academics, so you learn not only the theories behind the practice but also how to apply them in real-world situations.

Relevant & Consistent Curriculum

What you learn is a reflection of the program you choose, not the format in which it’s applied.

  • All programs are designed for learning outcomes to flow from the program level into actual coursework.

  • This top-down approach allows credentialed professionals to customize assignments based on trending industry topics without deviating from a program’s core outcomes.

  • Regardless of your professor or the format of your class, you receive the same quality education.

Hands-On Learning Experience

Franklin's coursework teaches not only theories and concepts, but also how they apply to practical situations.


  • Professional course designers ensure that class activities such as learning simulations, case studies, interactive videos, and group exercises are relevant and appropriate.

  • A curriculum development team is dedicated to making sure all courses are intuitively designed so content is taught in a logical manner that facilitates your success in the classroom and beyond.

Continuously Evolving Programs

Consistent program reviews ensure our programs stay at the forefront of industry trends.

  • Survey results and feedback from student and faculty assessments are reviewed regularly so that our programs are always improving and up-to-date.

  • A structured review process helps identify industry gaps that guide curriculum enhancements allowing our academic and industry experts to regularly implement new industry trends.

  • Regular assessment provides hard data that is used to improve student learning and teaching methods.

Get the details

View curriculum, read course descriptions,
and meet program faculty.

View Program Details