Class Type100% online, 6 & 12-week courses
Next Start Date
About Start Dates
Additional future start dates include:
Spring 2024
Jan 8, 2024Feb 19, 2024
Apr 1, 2024
Summer 2024
May 20, 2024Jul 1, 2024
Fall 2024
Aug 19, 2024Sep 30, 2024
Nov 11, 2024
Start dates for individual programs may vary and are subject to change. Please request free information & speak with an admission advisor for the latest program start dates.
Cost Per Credit
Tuition Guarantee_19-230-01.svg)
Lock-In Your Tuition Rate from Day One
The Franklin University Tuition Guarantee locks-in your first-term tuition rate for the duration of your associate, bachelor’s or master’s degree program, for as long as you remain actively enrolled.
Lock-In Your Tuition Rate from Day One
The Franklin University Tuition Guarantee locks-in your first-term tuition rate for the duration of your associate, bachelor’s or master’s degree program, for as long as you remain actively enrolled.
Curriculum Alignment
Guard against digital threats with a cybersecurity degree
When data networks and computer systems are compromised, exposed or exploited, the effects can be more far-reaching than any single business entity -- it can literally affect millions of customers. That’s why cybersecurity has exploded as a field: to provide critical protection of information assets from unauthorized or unintentional disclosure, modification or loss. With Franklin's transfer-friendly, online B.S. Cybersecurity degree program, you'll learn how to respond to security breaches with state-of-the-art tactics and countermeasures.
Program Availability
NSA Designated
Our program is nationally recognized for excellence in cyber defense education.
Finish Faster
Transfer up to 94 previously earned college credits.
Real-World Experience
Participate in a true-to-life security simulation.
Real-World Practitioners
Learn from experienced technology leaders.
100% Online Classes
Earn your degree around your schedule.
Accredited Online University
Nearly 80% of our students take online courses.
Program Overview
Mitigate risk and provide critical protection against digital hijacking
Franklin University’s Cybersecurity degree program prepares you for a red-hot career in business, industry or government, protecting valuable data (and the bottom line) from security threats and hackers. So in-demand are cybersecurity professionals, that a 2019 report from Burning Glass reported that cybersecurity workers command 16 percent more in salary than other IT professionals. Perhaps that's why cybersecurity jobs are projected to grow by 9 percent, which is much faster than average between 2021 and 2031.*
Learn industry-standard cybersecurity methodologies
To prepare you for this exploding career field, you’ll learn the “defense in depth” approach, featuring layered security architecture with appropriate controls and countermeasures. Along with this methodology of comprehensive information and electronic defense, Franklin’s Cybersecurity bachelor's degree online program covers key knowledge areas as defined by the International Information Systems Security Certification Consortium (ISC) ².
Gain valuable, real-world experience assessing actual information security needs
At Franklin, you’ll get a far-reaching, 360-degree education with classes in technology, policy, management, and architecture, along with a solid foundation in information technology principles, including programming, database, systems, and networks. You’ll not only learn the “what” of enterprise security, but also the “how” and “why.” And you’ll get real-world experience when you choose a local business or nonprofit organization for which you’ll prepare a security plan, risk assessment, penetration test, vulnerability scan, and more, assisting with their actual security needs.
Moreover, industry experts, such as C. Matthew Curtin, Founder of Interhack Corporation, review Franklin’s Cybersecurity program, ensuring that your Franklin education stays ahead-of-the-curve with a full-breadth of security courses combined with hands-on security exercises in a virtual environment.
Earn a bachelor's degree focused exclusively on cybersecurity
Because it is a specialized field of industry, Franklin University offers a major in cybersecurity — rather than a component of another related program.
Courses in this curriculum include risk management and compliance; security architecture and controls; business continuity and operations; and network and application security. At Franklin, you’ll learn about the typical development mistakes that lead to application-level security issues, including CSRF, XSS, cryptography, configuration errors, authentication, and authorization, as well as how to defend against them.
This program also teaches you about design and implementation of high-availability systems through storage redundancy, load balancing, virtualization clusters, and disaster recovery systems. And, you’ll have the opportunity to learn how security requirements and activities, such as risk identification, threat modeling, security testing, and monitoring, fit into the overall systems development lifecycle (SDLC).
Earn your degree from a university built for busy adults
Earn your degree on your terms by taking classes 100% online. Accredited and nonprofit, Franklin was built from the ground-up to satisfy the needs of adult learners. Our seamless transfer process and team of academic advisors will help ease your transition to becoming a student, while our flexible course schedules help to balance your education with work, family and life. Get started on your future today.
*Source information provided by Economic Modeling Specialists International (EMSI)
Nicolas Martin
B.S. Cybersecurity
"Franklin has offered me major advantages; taking advantage of the knowledge gained from Franklin and obtaining certifications has given me two internship opportunities that will set me apart from other candidates after I graduate. "
Future Start Date
Start dates for individual programs may vary and are subject to change. Please request free information & speak with an admission advisor for the latest program start dates.
Your Best Value B.S. Cybersecurity
Choose Franklin's nationally-recognized B.S. Cybersecurity and get a high-quality degree that fits your life and budget.
Keep the Credit You've Earned
On average, students transfer in 1/2 of the credits required.
Transfer MORE Credits, Pay LESS tuition*
Have Credit? Save Time!
Previously earned credit saves you time toward your degree.
Completion time is calculated based on full-time status and average transfer credits.
Tuition Guarantee
Inflation-proof your degree cost by locking-in your tuition rate from day one through graduation.
Curriculum & Course Descriptions
In this course, students acquire the writing competence necessary for conducting and presenting research. A variety of assignments, beginning with personal reflections, build upon one another, as students develop ideas that respond to, critique, and synthesize the positions of others. Students systematize and organize knowledge in ways that will help them in all of their courses. The course also emphasizes the elements of good writing style, appropriate grammar and mechanics, clarity of language, and logical and cohesive development. It culminates in submission of a documented research paper.
This course is designed to prepare students for Applied Calculus and Discrete Mathematics and to provide the mathematical background needed for the analytic reasoning used in other courses. Topics include functions and their graphs, including exponential and logarithmic functions; complex numbers; systems of equations and inequalities; matrices; basic principles of counting and probability; and other selected topics. Note, this course has proctored exam(s).
Choose MATH 150 Fundamental Algebra as the prerequisite. Course can count as a University elective.
6 credits from the following types of courses:
Choose from Anthropology, Economics, Geography, History, Political Science, Psychology, and Sociology. Must select at least two different disciplines to meet requirements.
6 credits from the following types of courses:
Two courses from the Science discipline. One course must have a lab component.
Critical Ethics uses critical thinking to get around the limitations of personal belief and indoctrination to get to what ought to be done and why to improve the human condition. Accordingly, the goal of this course is to help the student improve his/her ethical analysis and evaluation skills to help the student do the thing that must be done, when it ought to be done, using critical thinking.
4 credits from the following types of courses:
Choose additional course from the Art, English Literature, Fine Arts, Humanities, Music, Philosophy, Religion or Theater disciplines.
This course introduces students to the Franklin University community and provides strategies for successful transition to and participation in that community. Topics include University resources and procedures, strategies for advancing communication skills, the use of electronic tools to participate in virtual environments, and the development of an academic and career plan.
This course prepares students to be successful lifelong learners both academically and in their chosen careers. Franklin courses require a high level of self-directed learning and focus on skills required in the workplace and the classroom that are easily transferable between the two environments. The course includes strategies for advancing communication skills, including the use of electronic tools to participate in virtual environments. The assignments and activities in the course are created to closely simulate teamwork found in the workplace.
By using applied critical and creative thinking, students in this course will develop a set of communication skills that will enhance their personal and professional relationships and endeavors. This course will focus on skill development in key areas such as self, perception, listening, verbal messages, conversations, relationships, conflict management, persuasion, and public speaking.
This public-speaking course emphasizes the fundamentals of extemporaneous speaking. Skill-building activities and assignments focus on research, organization, reasoning, style and delivery of presentations as well as listening and audience engagement.
This is an intermediate course focusing on the composition of research papers. Students in this course prepare to be active participants in professional discourse communities by examining and practicing the writing conventions associated with their own fields of study and work. By calling attention to the conventions of disciplinary writing, the course also prepares students for upper-division college writing and the special conventions of advanced academic discourse. Course activities include three extended research papers, semi-formal writing addressing interdisciplinary communication, and readings fostering critical engagement with disciplinary conversations.
This course introduces the student to statistics with business applications. The course covers both descriptive and inferential statistics. Topics included are: measures of central tendency; measures of dispersion; graphical displays of data; linear regression; basic probability concepts; binomial and normal probability distributions; confidence intervals; and hypothesis testing. These topics will be covered using a basic knowledge of algebra and Microsoft Excel. Note, this course has proctored exam(s).
Many organizations today utilize computers and information systems to store, organize, analyze, and summarize data to solve problems. As a result, computing is a tool that can benefit students in many different fields. At the heart of solving problems with computers is the study of structured thinking using algorithms. This course is designed for students with no prior programming experience and teaches the building blocks of algorithms, including variables, expressions, selection and repetition structures, functions and parameters, and array processing. Note, this course has proctored exam(s).
This course serves as an introduction to the function, design, administration, and implementation of computer networks. Topics include network infrastructure, architecture, protocols, applications, and the OSI networking model. Note, this course has proctored exam(s).
This course covers fundamental concepts necessary for the design, use, implementation and administration of database systems. The course will stress the fundamentals of database modeling and design, the languages and facilities provided by database management systems, and some techniques for implementing and administering database systems. Note, this course has proctored exam(s).
The Internet has changed dramatically; so have the activities that are dependent on it in some shape or form. Understanding the need for security, it's influence on people, businesses and society, as well as business drivers is critical. The course also covers malicious attacks, threats and vulnerabilities common to the world of security, as well as access controls, and methods to assess and respond to risks. Hands-on labs accompany the various concepts that are taught.
Networks are the major point of entry to most computer systems. Preventing unwanted intrusion, use, abuse, or flooding of communications channels is a high priority to organizations trying to protect their assets. Network security is about preserving the appropriate use of network resources while preventing disallowed use. In this course, you will learn how to employ firewalls, VPNs, and stateful packet inspection techniques to harden computer networks. Topics include packet filtering, intrusion detection and prevention, ingress and egress rules, monitoring, network access controls, authentication, authorization, and auditing.
This course covers fundamental programming principles for individuals with at least some programming background. Major themes are structured programming, problem solving, algorithm design, top-down stepwise refinement, and software lifecycle. Topics will include testing, data types, operators, repetition and selection control structures, functions, arrays, and objects. Students will design, code, test, debug, and document programs in a relevant programming language. Note, this course has proctored exam(s).
This course covers the fundamental concepts necessary for the construction of web pages using the basic building blocks of Hypertext Markup Language (HTML) and Cascading Style Sheets (css). HTML and XHTML are covered in detail for building web pages using a web page development environment. The use of styling using css is introduced.
This course introduces the Linux operating system with a focus on the foundational Linux concepts and core tasks of the system administrator. Students will examine numerous commands and tools to maintain and operate Linux systems. This course utilizes hands-on lab exercises to provide students with professional experience.
This course explores the concepts of cloud computing, including financial impacts and business value, financial requirements, deployment, risks, and security. Hands-on exercises help students to gain experience with cloud computing environments, identifying technical and security requirements for given deployment scenarios, implementing the proposed cloud deployment scenario, and troubleshooting technical issues of existing cloud computing scenarios.
The prevalence of data breaches, identity theft, and the dark net today makes the study of digital forensics and cybercrime highly relevant to information security. Identifying, acquiring, preserving, analyzing and reporting evidence to business and law enforcement is a much-needed skill. This course will cover those topics as well as the live versus dead-box techniques, appropriate legal and regulatory issues, open source and commercial tools, and the special challenges represented by new and emerging technologies. Note, this course has proctored exam(s).
Ensuring the confidentiality, integrity, and availability of large and complex systems is notoriously difficult in the face of capable and determined opponents. This course discusses security engineering as the practical application of requirements analysis, modeling, architecture, processes, and measurement toward improving the dependability of complex information systems throughout their lifecycle. Note, this course has proctored exam(s).
The Information Security Capstone course encourages teamwork in small groups on a substantial project. The intent of this course is to provide a capstone experience that integrates the material contained in courses required of the information security major. It also provides an opportunity for students to recognize and evaluate the interrelationship of their general education courses with the courses taken for their information security major. The major areas of the program are reviewed and assessed via standardized exams. Students will also culminate their experiences with an overview of the evolution of computer systems and a look at the near-term future. Note, this course has proctored exam(s).
This course provides the student with an introduction to Windows Server administration and is structured to assist a network manager or planner in planning, configuring, installing, running, and repairing networks that include a Windows Server. As such, it provides an introduction to server installation, Active Directory, printer management, domains, network clients, security, disaster recovery, fault/error management, and scripting of common tasks. This course uses cloud based software to provide the Windows Server operating system environment. Note, this course has proctored exam(s).
This course provides a conceptual survey of general systems theory followed by a conceptual and technological survey of the structure of distributed information systems architectures, operating systems, network operating systems, peripheral technology and user interfaces. Interoperability between these architectural components will be explored and current technology and trends in each architectural element will be reviewed. This course will de-emphasize, although not ignore, mainframe architectures in favor of information architectures more applicable to client/server computing. The various interacting categories of client/server computing as well as the benefits and implications of such a system will be fully explored. Note, this course has proctored exam(s).
This course builds web applications by employing server-side scripts that query relational databases. The student learns and reflects on two- and three-tier software architectures, separation of responsibility, model-view-controller pattern, basic security, and web frameworks. The student will design, code, test, debug, and document programs using a server-based scripting language. Note: This is a technology course in a technology program, and it requires the purchase of software that may be used in subsequent courses as well as being suitable for commercial work beyond completion of degree studies. For specific software requirements, consult the course syllabus. Note, this course has proctored exam(s).
In a highly connected, data intensive, and cost-focused business environment, the practice of information security not a business advantage; it is a customer requirement. Viruses, malware, trojans, denial of service attacks, phishing, and even Wiki leaks have become headline news. Failure to insure the confidentiality, integrity, and availability of data costs companies millions, if not billions of dollars in legal settlements, lost business, and trade secrets. In this breadth-based course, you will get an overview of information security principles and practices, including security models, risk management, access controls, intrusion detection and prevention, cryptography, software vulnerabilities, and ethical issues. Subsequent courses expand on this foundational material in much greater depth. Note, this course has proctored exam(s).
This course covers the fundamentals of security in the enterprise environment. Included are coverage of risks and vulnerabilities, threat modeling, policy formation, controls and protection methods, encryption and authentication technologies, network security, cryptography, personnel and physical security issues, as well as ethical and legal issues. This foundational course serves as an introduction to many of the subsequent topics discussed in depth in later security courses. Note, this course has proctored exam(s). This exam requires additional technology, if student uses online proctoring.
Software vulnerabilities, especially those that compromise personal or financial data, are appallingly common. Nearly every major software company has needed to deal with the fallout of a major incident due to vulnerabilities in their products. Writing correct - let alone secure - software is very difficult. Yet users and executives expect it. In this course, you will learn about the typical development mistakes that lead to application-level security issues as well as how to defend against them. Students will explore the Open Web Application Security Project (OWASP) top 10 security vulnerabilities. Topics include unchecked user input, injection, fuzzing, CSRF, XSS, cryptography, CAPTCHA, configuration errors, authentication, and authorization. Note, this course has proctored exam(s).
Today, software is at the heart of nearly every business from finance to manufacturing. Software pervades everyday life in expected places like phones and computers but also in places that you may not consider such as toasters, thermostats, automobiles, and even light bulbs. Security flaws in software can have impacts ranging from inconvenient to damaging and even catastrophic when it involves life-critical systems. How can software be designed and built to minimize the presence of flaws or mitigate their impacts? This course focuses on software development processes that identify, model, and mitigate threats to all kinds of software. Topics include threat modeling frameworks, attack trees, attack libraries, defensive tactics, secure software development lifecycle, web, cloud, and human factors.
Students may take a graduate level course to fulfill requirements in an undergraduate program. Please review the academic policy and speak with your academic advisor for more details.
Proper assessment, management, and mitigation of risk are essential to any information security strategy. Risks aren't just related to IT assets, but to the overall business that the IT organization is supporting, thus, business continuity planning and impact analysis is also important. In this course, you will learn how to identify and analyze risks, determine impacts, and develop plans to mitigate issues. Topics include threats, vulnerabilities, exploits, and countermeasures; US compliance laws; risk assessment and mitigation; business impact analysis; and business continuity and disaster recovery planning.
When audits, technology, or compliance become the driver for security initiatives the resulting program is strategically fragmented, reactive, and rigid. Moreover, there are few, if any, assurances that the biggest threats are being addressed. On the other hand, risk assessment places values on assets, evaluates the current controls, and provides data to improve the protection in a controlled, proactive, and flexible manner. This course teaches an approach to security that combines operational security, risk assessment, test and review and mitigation such that value can be demonstrated. A project-based approach to risk assessment is followed including, project definition and preparation, data gathering, technical information, physical data gathering, analysis, mitigation, recommendations, and reporting. Note, this course has proctored exam(s).
24 credits from the following types of courses:
Any undergraduate courses offered by the University except developmental education courses.
All students are required to pass College Writing (ENG 120), and either Basic Learning Strategies (PF 121) or Learning Strategies (PF 321) prior to enrolling in any course at the 200 level or above. Students who enroll at Franklin with 30 or fewer hours of transfer credit are required to pass PF 121 Basic Learning Strategies in place of PF 321 Learning Strategies. Interpersonal Communication (COMM 150) or Speech Communication (SPCH 100) must be taken prior to enrolling in any course at the 300 level or above. Students must also meet the University algebra competency requirement.
Nationally Recognized

National Center of Academic Excellence in Cyber Defense
Franklin University has been designated as a Center of Academic Excellence in Cyber Defense through 2024, by the National Security Agency for our B.S. in Cybersecurity. The designation was awarded as a result of a thorough investigation into the University's cybersecurity curriculum, faculty credentials and competence in research and student involvement in cybersecurity activities.
For more information about the National Security Agency Centers of Academic Excellence, please click here.

National CyberWatch Center
Through our Center for Public Safety and Cybersecurity Education, a member of the National CyberWatch Center, the University collaboratively engages in efforts to advance cybersecurity education and strengthen the nation’s cybersecurity workforce. In service to communities and individuals, we provide access to the latest research impacting the industry, as well as innovations in cybersecurity education and training.

Center for Public Safety and Cybersecurity Education
Franklin University’s Center for Public Safety and Cybersecurity Education provides the skills necessary to prepare professionals to effectively prevent, solve and investigate cybersecurity issues and challenges. The Center’s offerings leverage its faculty – who are both thought leaders and practitioners – along with Franklin University’s reputation for excellence in curriculum and course development to create learning experiences that address prevailing security concerns within industries and communities.
Learn MoreMicrocredentials Align with Job Essentials
In today's dynamic work environments, adaptive professionals thrive. A microcredential - either as a stand-alone course or integrated into your degree program - is a short, skill-specific recognition that enables you to demonstrate your competency in a distinct area. Like Franklin's degree programs, microcredentials are aligned with market and industry demand to ensure what you learn can be put to use right away. Microcredentials are easily shared via digital badges and can be stacked to create a unique portfolio of in-demand skills.
Program Details
2023 - 2024 Tuition | Cost Per Credit |
---|---|
Standard tuition | $398 |
B.S. in Nursing | $298 |
Current service members | $250 |
International students | $526 |
See How Franklin Compares
67% LESS IN TUITION
For students taking 31 credits per year, Franklin University’s undergraduate tuition for the 2023-2024 academic year is $12,338. According to Collegeboard.org, that's about 67% less than the national average private, nonprofit four-year college tuition of $38,070.
A learning outcome map functions as a roadmap to help guide students' progress through their program of study. Click HERE to view the B.S. Cybersecurity matrix.
1. To be awarded an undergraduate degree, students must:
- Successfully complete all courses required in the major program, including:
- General Education
- Business or Professional Core
- Major Area and Elective Courses
- Technical transfer credit (for specific degree completion programs only)
2. Meet these grade point average (GPA) requirements:
- All students must attain a minimum Franklin University cumulative GPA of 2.00
- All students must attain a minimum GPA of 2.25 in the major area, and each major area course must be completed with a grade of “C” or better to count toward degree requirements
3. Complete the residency requirement
- Students seeking a bachelor’s degree must complete a minimum of 30 credit hours at Franklin University to be eligible for a degree. Students seeking an associate’s degree must earn 20 credit hours overall in residence at Franklin University to be eligible for a degree.
4. Complete the payment of all requisite tuition and fees
5. Not be under disciplinary dismissal due to academic dishonesty or a violation of the Student Code of Conduct
Program Chairs and Academic Advisors are available for consultation to provide information and guidance regarding the selection of courses, the accuracy of schedules, and the transfer process. However, students are responsible for understanding and meeting the degree requirements of their major program or degree and for planning schedules accordingly.
Overall Residency Requirements
Students seeking a bachelor’s degree must complete a minimum of 30 credit hours at Franklin University to be eligible for a degree. Students seeking an associate’s degree must earn 20 credit hours overall in residence at Franklin University to be eligible for a degree.
Course Level Requirements
A student must have 40 credit hours overall that are equivalent to 300/400 level Franklin University courses for a bachelor’s degree. A student must have a minimum of 12 credit hours of courses that are equivalent to 200 level or above for an associate’s degree.
Business Core Requirements
Majors that have Business Core requirements are Accounting, Applied Management, Business Administration, Business Economics, Business Forensics, Energy Management, Entrepreneurship, Financial Management, Financial Planning, Forensic Accounting, Human Resources Management, Information Systems Auditing, Logistics Management, Management & Leadership, Marketing, Operations & Supply Chain Management, and Risk Management & Insurance. The Business Core is the foundation of the related academic disciplines appropriate for a baccalaureate degree in business. The purpose of the Business Core is to provide students with a conceptual understanding of organizations, how the functional areas interrelate to achieve organizational goals, and how to apply professional decision-making competencies and technical skills in today’s environment. After completing the Business Core, graduates will be able to:
- analyze an organization’s accounting information in order to develop sound business decisions
- identify and apply valuation models relevant to an organization’s financial decisions
- identify the impact of forces influencing the major functional areas of business (e.g., ethical, legal, technological, economic, global and social)
- apply marketing activities to the delivery of goods and services in business-to-business and business-to-consumer markets
- apply interpersonal and resource management skills to enhance business success
Business Principles (BSAD 110) is a Business Core prerequisite. Transfer students with the equivalent of four business courses are not required to take Business Principles.
Major Area Requirements
A student must have 20 credit hours in the major area that are equivalent to 300/400 major level Franklin courses for a bachelor’s degree. A student must have 12 hours of major area courses that are equivalent to 200 level or above for an associate’s degree. A minimum 2.25 GPA is required in the major area for students enrolled in either the associate’s or bachelor’s degree programs, and each major course must be completed with a grade of “C” or better to count toward degree requirements.
Capstone Requirement
Every major has a capstone experience for which credit cannot be transferred into the University. This is a Franklin course designed to integrate and assess the learning outcomes specific to each major as a whole. This course should be taken as the last major course. If, given the academic scheduling process and the student’s projected graduation date, this is not possible, then the student should have Senior Standing (90 or more credit hours), plus the skill-based General Education courses (COMM, SPCH, WRIT, MATH, COMP), all business or professional core courses, and the capstone prerequisite courses.
Subsequent Degree Requirements
Students pursuing subsequent bachelor’s degrees must earn in residency at Franklin University a minimum of 30 credit hours at the 200 level or above, of which a minimum of 16 credit hours must be major area courses equivalent to 300/400 level courses.
Additional Degree Requirements
Students seeking an additional bachelor’s (or associate’s) degree must successfully complete a minimum of 30 credit hours (including the major requirements) beyond the first bachelor’s (or associate’s) degree. (See the “Subsequent Degree” section of the Academic Bulletin.)
Transfer Credit
Transfer credit and credit awarded on standardized exams, proficiency exams or portfolio credit awarded by another institution will not count toward the residency requirement at Franklin University. Credit awarded based on proficiency examination or portfolio evaluation conducted by Franklin University may apply as appropriate major area credit, but will not reduce the hours required toward the residency requirement.
Name | Organization | Title |
C. Matthew Curtin, CISSP | Interhack Corporation | Founder |
Daniel Houser | L Brands | Enterprise Security Architect |
David Kennedy | Trusted Sec and Binary Defense Systems | Founder |
Jason Montgomery | Nexosis | Co-Founder & CTO |
Richard Rozzell | American Electric Power | Senior Security Specialist |
Bill Sempf | Products of Innovative New Technology | Application Security Architect |
Franklin’s Apprenticeship Program provides the opportunity for paid employment in an aligned job while you complete your degree. Recently approved by the state of Ohio and the U.S. Department of Labor, apprenticeship opportunities lay the foundation for careers in rewarding and fast-growing fields.
As an apprentice, you’ll complete nine required classes within your degree program and benefit from regular pay increases as you complete your coursework and demonstrate the associated competencies.
Career Opportunities
Application Security Tester
Application Security Testers perform assessments, source code reviews and security tests to identify, understand, thwart, and remedy web application threats, vulnerabilities, and attacks.
Computer Security Specialist
Computer Security Specialists plan, implement, monitor, and upgrade control measures and solutions to protect computer networks and computer-based information from unauthorized use, breach, and/or disaster.
Cybersecurity Analyst
Cybersecurity Analysts prevent, monitor, and respond to data breaches, protecting information against hackers.
Cybersecurity Engineer
Cybersecurity engineers lead cybersecurity operations, build technical roadmaps and manage virtual network models.
Cyber Threat Analyst
Cyber Threat Analysts identify, monitor, assess, and counter threats posed to an organization using strategic assessments and tactical analysis.
Data Security Analyst
Data Security Analysts ensure the integrity of computer-based information by monitoring networks, programs, and digital files for vulnerabilities, and recommending security protection protocol.
Identity Management Specialist
Identity Management Specialists oversee identity protection protocols, ensuring that identity risks are minimized or thwarted, and that users are properly identified and granted appropriate access to systems and data according to business need.
Information Security Engineer
Information Security Engineers design, test, and monitor computer security systems to ensure that data and digital informaiton is safe from security threats and breaches.
Information Security Manager
Information Security Managers develop and oversee organizational policies, procedures, and methodologies to ensure the protection of data and information against compromise by hackers, viruses, and other threats.
Network Security Specialist
Network Security Specialists structure, install, and manage network information systems to prevent the loss of data and respond appropriately to security breaches
Security Architect
Security Architects create computer network and software protection plans to protect systems from invasion, abnormal activity, or hackers.
Security Administrator
Security Administrators protect computer system data by implementing security policies and procedures, such as system backups, password scripts, and anti-virus software.
Employment Outlook
From 2021-2031, jobs in Cybersecurity are expected to increase by 9%
All Occupations
2021 |
4,174,602 jobs
|
2031 |
4,565,120 jobs
|
Web Developers and Digital Interface Designers
2021 |
198,907 jobs
|
2031 |
222,454 jobs
|
Computer Systems Analysts
2021 |
622,728 jobs
|
2031 |
677,941 jobs
|
Database Administrators and Architects
2021 |
141,582 jobs
|
2031 |
156,869 jobs
|
Network and Computer System Administrators
2021 |
361,626 jobs
|
2031 |
385,521 jobs
|
Computer Occupations, All Other
2021 |
420,138 jobs
|
2031 |
452,283 jobs
|
Computer User Support Specialists
2021 |
699,494 jobs
|
2031 |
769,787 jobs
|
Computer Network Support Specialists
2021 |
198,280 jobs
|
2031 |
214,305 jobs
|
Source information provided by Lightcast.
Knowledge & Skillsets
Gain in-demand skills sought by employers with curriculum that teaches you:
- Identify cyber security goals, objectives, and metrics consistent with industry best practices
- Create and implement security policies, procedures, and guidelines to prevent unauthorized use, release, transmittal, and modification of data across multiple platforms
- Develop cyber security strategies that balance business needs, industry, and regulatory standards with technology
- Ensure the integrity and accessibility of company information
- Provide ongoing review of security plans, products, and control techniques
- Employ a layered approach to hardware, operating systems, middleware, and application
- Communicate security solutions effectively to business leadership
- Test websites, infrastructure, and applications using industry-standard tools and techniques
- Identify and correct programming and software architecture mistakes that lead to security vulnerabilities
- Design and implement web and application security controls to ensure that security risks are properly addressed
- Audit code and identify security vulnerabilities according to OWASP categories, including injection, cross-site scripting, authentication and session management, and cryptographic storage
- Ensure that software is designed to avoid security-related logic flaws
- Establish appropriate security control requirements based on threat modeling
- Employ firewalls, VPNs, and stateful packet inspection techniques to harden computer networks
- Develop network monitoring tools to prevent corruption of information systems
- Implement and maintain a variety of networking and security devices, such as routers, intrusion detection and prevention systems, and vulnerability scanners
- Configure, deploy, fine-tune, and monitor firewalls, proxies, and logging servers
- Assess event management and response systems, such as intrusion detection and prevention systems
- Understand authentication, authorization, and auditing
- Manage and monitor web application firewalls
- Employ network scanning, fingerprinting, vulnerabilities, and exploits to perform penetration tests
- Build proper firewall rules for both ingress and egress
- Identify security hazards and monitor systems for compliance with information policies
- Develop and implement incident response procedures
- Provide technical expertise and leadership to infrastructure staff during risk assessment
- Identify, analyze, and communicate risk to help determine business impact
- Understand threats, vulnerabilities, exploits, and countermeasures
- Possess an accurate understanding of U.S. compliance laws
- Design and coordinate security audits and risk assessments
- Work with internal groups to mitigate security issues
- Use load balancing methodology to distribute workloads across multiple resources
- Create and implement business continuity and disaster recovery plans
- Design systems to minimize economic impact during outages
- Connect business objectives, business processes, and technical solutions via high-level architectures
- Establish recovery time periods and resources required for resumption of business operations
- Develop procedures to assist during security incidents
- Assess disaster recovery systems
- Evaluate and improve storage redundancy systems
- Research and propose changes to security policies in response to regulatory changes
- Work with internal and external auditors to ensure compliance with regulations
- Communicate regulations effectively to business leadership
- Identify applicable laws and regulations related to technical resources
- Monitor the changing regulatory landscape for future compliance requirements
- Coordinate and lead compliance requirements change
Get College Credit for What You Already Know
The certificates and training listed below are relevant to this degree program. Search our database to view pre-evaluated credentials and see how a license, certification or professional training saves you time and money toward your degree.
Frequently Asked Questions
Congratulations on wanting to finish your degree. At Franklin, we make it easy and convenient for busy, working adults to complete their bachelor's degree program alongside other commitments. Typically, a bachelor’s degree takes about 4 years of full-time study from start to finish. However, Franklin’s generous transfer policy can help you finish faster. Visit MyTransfer Credit to see how your previously earned credits can save you time toward your bachelor’s.
Franklin makes getting started easy and convenient. We offer three trimesters every year, with start dates within each. Talk to your admissions advisor to find the start date that works best for you.
Franklin University offers a quality education at a competitive cost so you can afford to invest in your future. Our per credit hour tuition rates (vs. per year or per term rates) enable you to get a realistic estimate of exactly how much your degree will cost - especially once you've factored in transfer credit. Our 2023-2024 tuition rate is $398 per credit hour and with our tuition guarantee, you can lock-in your tuition rate from your first term through graduation. Ask our helpful staff about available financing options and financial aid programs. Visit MyTransfer Credit to see how transfer credits could help you save time and money.
This is a four-year undergraduate degree program. With Franklin University's B.S. Cybersecurity degree program, you'll develop an in-depth understanding of how to protect data, information, systems, networks, and programs from known, unknown, intended and unintended attack, loss or theft.
With Franklin's B.S. Cybersecurity degree, you'll have the opportunity to play a crucial role in helping organizations deal with compromises, breaches and intrusions of data networks and computer systems. In addition, you'll be well-position for a wide variety of red-hot career positions, including security engineer, chief information security officer, forensics expert, cyber analyst, cryptographer, security administrator and more.
When you graduate with a Franklin B.S. Cybersecurity degree, you'll be prepared to help business, industry and government protect critical information assets from accidental or unauthorized access, disclosure, modification, loss, security threats and hackers.
Franklin’s B.S. Cybersecurity degree program provides a hands-on and responsive education to help make you job-ready from day one. Franklin's curriculum is designed for the busy, working adult, with classes in information technology, policy, management, architecture, programming, database systems and networks. You learn both the “what” of enterprise security, as well as the “how” and the “why.” In addition, you'll prepare a real-world security plan, risk assessment, penetration test, vulnerability scan and more that can assist a local business or nonprofit organization with their actual security needs.
Back to College Blog
Related Programs
- Degrees
- Microcredentials & Certificates
- Admissions
- Tuition & Financial Aid
- Transferring Credit
- The Franklin Experience
- About Us
- FranklinWORKS Marketplace
Franklin University
201 S Grant Ave.
Columbus, OH 43215
Local: (614) 797-4700
Toll Free: (877) 341-6300
admissions@franklin.edu
Copyright 2023 Franklin University
Franklin University is accredited by the Higher Learning Commission (hlcommission.org/800.621.7440) and authorized by the Ohio Department of Higher Education.
Franklin University is committed to being an inclusive community free from all forms of discrimination and harassment.
-
Degrees
- Program Finder
-
Bachelor's Degrees
- Accounting
- Analytics
- Applied Management
- Business Administration
- Business Forensics
- Communications
- Computer Science
- Criminal Justice Administration
- Cybersecurity
- Education
- Exercise Science
- Financial Management
- Financial Planning
- Forensic Accounting
- Health Education & Promotion
- Health Information Management
- Healthcare Management
- Human Resources Management
- Information Systems
- Information Technology
- Interactive Media Design
- Management & Leadership
- Marketing
- Nursing (RN-BSN)
- Operations & Supply Chain Management
- Psychology
- Public Safety Management & Leadership
- Social Sciences
- Sport Management
-
Master's Degrees
- Accounting
- Business Analytics
- Business Psychology
- Computer Science
- Criminal Justice Administration
- Cybersecurity
- Data Analytics
- Education
- Health Informatics
- Healthcare Administration (MHA)
- Human Resource Management
- Information Technology
- Instructional Design & Learning Technology
- MBA Programs
- MSN Programs
- Marketing & Communication
- Professional Sales Leadership
- Public Administration (MPA)
-
Doctoral Degrees
- Associate Degrees
-
Online Degrees
- Online Learning at Franklin
- Accounting Programs
- Business & Leadership Programs
- Computer Science Programs
- Criminal Justice & Public Safety Programs
- Cybersecurity Programs
- Data & Analytics Programs
- Education Programs
- Finance Programs
- Healthcare Programs
- Human Resources Programs
- Information Technology Programs
- Marketing & Communications Programs
- Nursing Programs
- Operations & Project Management Programs
- Psychology Programs
- Public & Social Sciences Programs
- Online Learning Facts
- Degrees By Location
- Degrees By College
- Minors
- Degree Completion Programs
- Second Bachelor's Degrees
-
Microcredentials & Certificates
- Microcredentials
-
Undergraduate Certificates
- Accounting Data Analytics
- Business Analysis
- Project Management
-
Graduate Certificates
- Cyber Defense
- Cyber Governance
- Criminal Justice Leadership
- Data Analytics
- Nurse Educator
- Instructional Design
-
Post-Graduate Certificates
- Adult-Gerontology Primary Care Nurse Practitioner
- Family Nurse Practitioner
- Psychiatric Mental Health Nurse Practitioner
-
Post-Baccalaureate Teacher Certification
- Adolescence to Young Adult Education (7-12)
- Primary Education (PK-5)
- Intervention Specialist: Mild/Moderate (K-12)
- Middle Childhood Education (4-9)
-
Admissions
- Undergraduate Students
- Graduate Students
- Partnership Students
-
International Students
- Study in the U.S.
- Earn Your Degree Online
- Community College Students
- College Credit Plus
-
Military & Veterans
-
Active Duty
- Air Force
- Army
- Coast Guard
- Marines
- Navy
-
Veterans
- Montgomery GI Bill® - Selected Reserves
- Montgomery GI Bill®
- Post-9/11 GI Bill®
- Vocational Rehabilitation and Employment VetSuccess Program
- Yellow Ribbon Program
- Spouses & Family
-
Active Duty
- Online Open House
-
Admission Requirements
- Associate Degrees
-
Bachelor's Degrees
- General Bachelor's Degree
- Nursing (RN-BSN)
-
Master's Degrees
- Accounting
- Business Administration (MBA)
- Business Analytics
- Business Psychology
- Computer Science
- Criminal Justice Administration
- Cybersecurity
- Data Analytics
- Health Informatics
- Healthcare Administration (MHA)
- Human Resource Management
- Information Technology
- Instructional Design & Learning Technology
- Marketing & Communication
- Nurse Administrator (MSN-ADM)
- Nursing-Adult-Gerontology Primary Care Nurse Practitioner
- Nursing-Family Nurse Practitioner (MSN-FNP)
- Nursing-Generalist (MSN)
- Nursing-Psychiatric Mental Health Nurse Practitioner
- Public Administration
-
Doctoral Degrees
- Business Administration (DBA)
- Healthcare Administration (DHA)
- Instructional Design Leadership (DPS)
- Nursing Practice-Family Nurse Practitioner (DNP-FNP)
- Nursing Practice-Leadership Track (DNP)
- Organizational Leadership (Ed.D.)
-
Graduate Certificates
- Criminal Justice Leadership
- Instructional Design
-
Tuition & Financial Aid
- Tuition & Fees
- Cost Estimate Calculator Tool
- Tuition Guarantee
- Undergrad Tuition Comparison
- Federal Aid & State Aid
- Institutional Aid & Private Loans
- Applying for Aid
- Community College Students
- Scholarships
- Payment Options
- Financial Aid Resources
-
Transferring Credit
- Estimate Your Transfer Credit
- How to Transfer Credits
-
Types of Transfer Credit
- Previously Earned College Credit
- Certificates + Professional Training Credit
- Military Training Credit
- Testing Credit
-
Transferring from a Community College
- Partner Schools
- Pathway Portal
- Transfer into a Bachelor’s Degree
- Transfer into a Master’s Degree
- Transfer into a Doctoral Degree
- Transfer into an Associate Degree
-
The Franklin Experience
- Built For Working Adults
- Transfer Friendly
- Accredited University & Quality Degrees
- Fast & Affordable
- Student Success Stories
- Valued By Employers
- Nonprofit
- Student Support
- Career Development
-
About Us
-
Locations
-
Ohio
- Columbus
-
Ohio
-
Partnerships
- Employer Partnerships
-
Community College Partnerships
-
Career Advancement Program
- Benefits for Community Colleges
- Benefits for Businesses
-
Career Advancement Program
- Medical School Partnerships
-
Global Partnerships
- Solutions
-
Case Studies
- Al Baha University
- MCBS
- Saudi Electronic University
- Current Partnerships
-
College Credit Plus Partnerships
- Become a Partner
- Current Partners
- Teachers
-
Faculty & Staff
- Board of Trustees
- University Leadership
- University Directory
- Faculty Profiles
- President's Welcome
- Admission Advisors
-
University Details
- Accreditation
- State Authorization & Professional Licensure Information
- Our Mission & Values
- The Four Cornerstones
- Our History
- Consumer Information
- Safety & Security
- Bookstore
- Assessment
- Map & Directions
-
Franklin Pressroom
-
COVID-19 Updates
- Students
- Faculty & Staff
- Future Students
- Events
- News
- Presentations & Awards
- Request an Expert
- Speakers' Bureau
- Event Hosting
-
COVID-19 Updates
- Careers at Franklin
-
Policy Information
- Title IX
- Community Standards & Student Code of Conduct
- Discrimination Harassment & Sexual Misconduct
- Anti-Hazing Policy
- Drug Free School & Communities Act
- Franklin Intervention & Awareness Team
- Filing Complaints
-
Office of Academic Scholarship
-
Institutional Review Board (IRB)
- Application & Review Process
- Cayuse
- CITI Training
- Research Review Categories
- Committee & Policies
- Documents, Resources & FAQs
- Research at Franklin University
- Programs & Support
- Resources
- Research Opportunities
- About Us
-
Institutional Review Board (IRB)
- Office of Accessibility Services
- Combating Copyright Infringement
- Financial Aid Statement
- Influenza Information
- Information Technology Acceptable Use
- Notice of Privacy Rights (FERPA)
- Privacy Statement
- Student Parking
- Tuition Refund Policy
- Vaccinations
- Inclement Weather Policy
- Transfer Credit Policy & Procedures
- Community Engagement
- Request Your Franklin Transcripts
- Urbana University Resources
- Give to Franklin
-
Locations
I AM A:
SHORTCUTS:
Associated Sites
- FranklinWORKS Marketplace
- Franklin University Store & Apparel
- International Institute for Innovative Instruction
- Leadership Center
- Global Center for Healthcare Education
- Center for Public Safety & Cybersecurity Education
- Best Adult Colleges & Careers Guide
- Accounting MVP Blog
- Data & Analytics MVP Blog