B.S. Cybersecurity
124
Credit Hours
76%
Max Transfer Credit
Class Type
100% online, 6 & 12-week courses
Next Start Date
Jul 1, 2024
Cost Per Credit
Curriculum Alignment
NSA National Center of Academic Excellence in Cyber Defense Education

Guard against digital threats with a cybersecurity degree

When data networks and computer systems are compromised, exposed or exploited, the effects can be more far-reaching than any single business entity -- it can literally affect millions of customers. That’s why cybersecurity has exploded as a field: to provide critical protection of information assets from unauthorized or unintentional disclosure, modification or loss. With Franklin's transfer-friendly, online B.S. Cybersecurity degree program, you'll learn how to respond to security breaches with state-of-the-art tactics and countermeasures.

Program Availability

On Site

NSA Designated

Our program is nationally recognized for excellence in cyber defense education.

Real-World Experience

Participate in a true-to-life security simulation.

Finish Faster

Transfer up to 94 previously earned college credits.

Real-World Practitioners

Learn from experienced technology leaders.

100% Online Classes

Take classes that fit with your busy life.

Accredited Online University

Nearly 80% of our students take online courses.

Program Overview

Mitigate risk and provide critical protection against digital hijacking

Franklin University’s Cybersecurity degree program prepares you for a red-hot career in business, industry or government, protecting valuable data (and the bottom line) from security threats and hackers. So in-demand are cybersecurity professionals, that a 2019 report from Burning Glass reported that cybersecurity workers command 16 percent more in salary than other IT professionals. Perhaps that's why cybersecurity jobs are projected to grow by 9 percent, which is much faster than average between 2021 and 2031.*

Learn industry-standard cybersecurity methodologies

To prepare you for this exploding career field, you’ll learn the “defense in depth” approach, featuring layered security architecture with appropriate controls and countermeasures. Along with this methodology of comprehensive information and electronic defense, Franklin’s Cybersecurity bachelor's degree online program covers key knowledge areas as defined by the International Information Systems Security Certification Consortium (ISC) ². 

Gain valuable, real-world experience assessing actual information security needs

At Franklin, you’ll get a far-reaching, 360-degree education with classes in technology, policy, management, and architecture, along with a solid foundation in information technology principles, including programming, database, systems, and networks. You’ll not only learn the “what” of enterprise security, but also the “how” and “why.” And you’ll get real-world experience when you choose a local business or nonprofit organization for which you’ll prepare a security plan, risk assessment, penetration test, vulnerability scan, and more, assisting with their actual security needs.

Moreover, industry experts, such as C. Matthew Curtin, Founder of Interhack Corporation, review Franklin’s Cybersecurity program, ensuring that your Franklin education stays ahead-of-the-curve with a full-breadth of security courses combined with hands-on security exercises in a virtual environment. 

Earn a bachelor's degree focused exclusively on cybersecurity

Because it is a specialized field of industry, Franklin University offers a major in cybersecurity — rather than a component of another related program. 

Courses in this curriculum include risk management and compliance; security architecture and controls; business continuity and operations; and network and application security. At Franklin, you’ll learn about the typical development mistakes that lead to application-level security issues, including CSRF, XSS, cryptography, configuration errors, authentication, and authorization, as well as how to defend against them.

This program also teaches you about design and implementation of high-availability systems through storage redundancy, load balancing, virtualization clusters, and disaster recovery systems. And, you’ll have the opportunity to learn how security requirements and activities, such as risk identification, threat modeling, security testing, and monitoring, fit into the overall systems development lifecycle (SDLC).

Earn your degree from a university built for busy adults

Earn your degree on your terms by taking classes 100% online. Accredited and nonprofit, Franklin was built from the ground-up to satisfy the needs of adult learners. Our seamless transfer process and team of academic advisors will help ease your transition to becoming a student, while our flexible course schedules help to balance your education with work, family and life. Get started on your future today.

*Source information provided by Economic Modeling Specialists International (EMSI)

Read more >

Nicolas M.

B.S. Cybersecurity

"Franklin has provided major advantages. The knowledge I gained, combined with certifications led to two internship opportunities that will set me apart from other candidates after I graduate."

Future Start Date

Start dates for individual programs may vary and are subject to change. Please request free information & speak with an admission advisor for the latest program start dates.

Summer 2024
July
1
Recommended Register By:
Jun 21
Fall 2024
August
19
Recommended Register By:
Aug 9
Fall 2024
September
30
Recommended Register By:
Sep 20
Fall 2024
November
11
Recommended Register By:
Nov 1
Spring 2025
January
6
Recommended Register By:
Dec 27
Spring 2025
February
17
Recommended Register By:
Feb 7
Spring 2025
March
31
Recommended Register By:
Mar 21
Summer 2025
May
19
Recommended Register By:
May 9
Summer 2025
June
30
Recommended Register By:
Jun 20
Fall 2025
August
18
Recommended Register By:
Aug 8
Fall 2025
September
29
Recommended Register By:
Sep 19
Fall 2025
November
10
Recommended Register By:
Oct 31
Spring 2026
January
5
Recommended Register By:
Dec 26
Spring 2026
February
16
Recommended Register By:
Feb 6
Spring 2026
March
30
Recommended Register By:
Mar 20
Summer 2026
May
18
Recommended Register By:
May 8
Summer 2026
June
29
Recommended Register By:
Jun 19

Your Best Value B.S. Cybersecurity

Choose Franklin's nationally-recognized B.S. Cybersecurity and get a high-quality degree that fits your life and budget. 

Keep the Credit You've Earned

57
AVG TRANSFER HOURS

On average, students transfer in 1/2 of the credits required.

Transfer MORE Credits, Pay LESS tuition*

$11,940
|
$26,666
Max Transfer Credits
Avg Transfer Credits
*$398 per credit, 124 Total Credits, 94 maximum transfer credits, 57 average transfer credits.

Tuition Guarantee

Inflation-proof your degree cost by locking-in your tuition rate from day one through graduation.

Highly Recommended

98%
STUDENT SATISFACTION

98% of graduating students would recommend Franklin to their family, friends and/or colleagues.

Source: Franklin University, Office of Career Development Student Satisfaction Survey (Summer 2023)

×
×

Curriculum & Course Descriptions

124 Semester Hours
Fundamental General Education
English Composition
ENG 120 - College Writing (4)

In this course, students acquire the writing competencies necessary for completing analytical and argumentative papers supported by secondary research. A variety of assignments, beginning with personal reflections, build upon one another, as students develop ideas that respond to, critique, and synthesize the positions of others. Students systematize and organize knowledge in ways that will help them in all their courses. The course also emphasizes the elements of critical reading, effective writing style, appropriate grammar and mechanics, clarity of language, and logical and cohesive development. It culminates in submission of an extended, documented research paper.

Mathematics
MATH 215 - Statistical Concepts (4)

This course introduces you to statistics with applications to various areas. The course covers both descriptive and inferential statistics. Topics included are: sampling techniques, data types, experiments; measures of central tendency, measures of dispersion, graphical displays of data, basic probability concepts, binomial and normal probability distributions, sampling distributions and Central Limit Theorem; confidence intervals, hypothesis tests of a mean, or a proportion for one or two populations, and linear regression.

Choose either MATH 140 Introduction to Quantitative Reasoning or MATH 150 Fundamental Algebra as the prerequisite to MATH 215. Course can count as a University Elective. MATH 215 is a prerequisite for major area courses.

Social and Behavioral Sciences

6 credits from the following types of courses:
Choose from Anthropology, Economics, Geography, History, Political Science, Psychology, and Sociology. Must select at least two different disciplines to meet requirements.

Science

6 credits from the following types of courses:
Two courses from the Science discipline. One course must have a lab component.

Arts & Humanities
HUMN 211 - Introduction to Critical Ethics (2)

Critical Ethics uses critical thinking to get around the limitations of personal belief and indoctrination to get to what ought to be done and why to improve the human condition. Accordingly, the goal of this course is to help the student improve his/her ethical analysis and evaluation skills to help the student do the thing that must be done, when it ought to be done, using critical thinking.

4 credits from the following types of courses:
Choose additional course from the Art, English Literature, Fine Arts, Humanities, Music, Philosophy, Religion or Theater disciplines.

Additional General Education
PF 121 - Basic Learning Strategies (2)

This course prepares students to be successful lifelong learners both academically and in their chosen careers. Franklin courses require a high level of self-directed learning and focus on the skills required in the workplace and the classroom that are easily transferrable between the two environments. The course includes strategies for time management, goal setting, reading comprehension, and advancing communication skills, including the use of electronic tools to participate in virtual environments.

OR PF 321 - Learning Strategies (2)

This course prepares students to be successful lifelong learners both academically and in their chosen careers. Franklin courses require a high level of self-directed learning and focus on the skills required in the workplace and the classroom that are easily transferable between the two environments. The course includes strategies for advancing communication skills, including the use of electronic tools to participate in virtual environments. The assignments and activities in the course are created to closely simulate teamwork found in the workplace.

COMM 150 - Interpersonal Communication (4)

By using applied critical and creative thinking, students in this course will develop a set of communication skills that will enhance their personal and professional relationships and endeavors. This course will focus on skill development in key areas such as self, perception, listening, verbal messages, conversations, relationships, conflict management, persuasion, and presentation skills.

OR SPCH 100 - Speech Communication (4)

This basic public-speaking course intends to improve the student's ability to think critically and to communicate orally. Theory and practice are provided in various speaking situations. Each student is required to speak before an audience, but class work also involves reading, gathering and organizing information, writing, and listening.

ENG 220 - Research Writing: Exploring Professional Identities (4)

This is an intermediate course focusing on the composition of research papers. Students in this course prepare to be active participants in professional discourse communities by examining and practicing the writing conventions associated with their own fields of study and work. By calling attention to the conventions of disciplinary writing, the course also prepares students for upper-division college writing and the special conventions of advanced academic discourse. Course activities include three extended research papers, semi-formal writing addressing interdisciplinary communication, and readings fostering critical engagement with disciplinary conversations.

Professional Core
COMP 101 - Problem Solving With Computing (2)

Many organizations today utilize computers and information systems to store, organize, analyze, and summarize data to solve problems. As a result, computing is a tool that can benefit students in many different fields. At the heart of solving problems with computers is the study of structured thinking using algorithms. This course is designed for students with no prior programming experience and teaches the building blocks of algorithms, including variables, expressions, selection and repetition structures, functions and parameters, and array processing.

COMP 204 - Principles of Computer Networks (2)

This course serves as an introduction to the function, design, administration, and implementation of computer networks. Topics include network infrastructure, architecture, protocols, applications, and the OSI networking model. Note, this course has proctored exam(s).

COMP 281 - Database Management Systems (4)

This course, Database Management Systems, covers the fundamental concepts necessary for the design, use, implementation, and administration of database systems. The course will stress the fundamentals of database modeling and design, the languages and facilities provided by database management systems, and some techniques for implementing and administering database systems.

ITEC 136 - Principles of Programming (4)

This course introduces programming to individuals with little or no programming background. The goal of this course is to introduce the fundamentals of structured programming, problem solving, algorithm design, and software lifecycle. Topics will include testing, data types, operations, repetition and selection control structures, functions and procedures, arrays, and top down stepwise refinement. Students will design, code, test, debug, and document programs in a relevant programming language.

WEBD 101 - Introduction to Web Page Construction (2)

This course presents introductions to many of the basic concepts, issues, and techniques related to designing, developing, and deploying Web sites. During the course, students will learn about Web design, HTML, XHTML, and Cascading Style Sheets (CSS). Students will learn how to create sites both manually and through the use of Web site development software.

ITEC 200 - Linux Fundamentals (2)

This course introduces the Linux operating system with a focus on the foundational Linux concepts and core tasks of the system administrator. Students will examine numerous commands and tools to maintain and operate Linux systems. This course utilizes hands-on lab exercises to provide students with professional experience.

CLOUD 200 - Cloud Fundamentals (2)

This course explores the concepts of cloud computing, including financial impacts and business value, financial requirements, deployment, risks, and security. Hands-on exercises help students to gain experience with cloud computing environments, identifying technical and security requirements for given deployment scenarios, implementing the proposed cloud deployment scenario, and troubleshooting technical issues of existing cloud computing scenarios.

CYSC 200 - Cybersecurity Fundamentals (2)

The Internet has changed dramatically; so have the activities that are dependent on it in some shape or form. Understanding the need for security, it's influence on people, businesses and society, as well as business drivers is critical. The course also covers malicious attacks, threats and vulnerabilities common to the world of security, as well as access controls, and methods to assess and respond to risks. Hands-on labs accompany the various concepts that are taught.

CYSC 325 - Network Security (4)

Networks are the major point of entry to most computer systems. Preventing unwanted intrusion, use, abuse, or flooding of communications channels is a high priority to organizations trying to protect their assets. Network security is about preserving the appropriate use of network resources while preventing disallowed use. In this course, you will learn how to employ firewalls, VPNs, and stateful packet inspection techniques to harden computer networks. Topics include packet filtering, intrusion detection and prevention (IDS/IPS), ingress and egress rules, monitoring, network access controls, authentication, authorization, and auditing.

Major Area Required
ITEC 350 - Windows Administration (4)

This course provides the student with an introduction to Windows Server administration and is structured to assist a network manager or planner in planning, configuring, installing, running, and repairing networks that include a Windows Server 2008. As such, it provides an introduction to server installation, Active Directory, printer management, domains, network clients, security, disaster recovery, fault/error management, and scripting of common tasks. This course also uses cloud technologies and requires internet access.

MIS 310 - Info Systems Architecture & Technology (4)

This course provides a conceptual survey of general systems theory followed by a conceptual and technological survey of the structure of distributed information systems architectures, operating systems, network operating systems, peripheral technology and user interfaces. Interoperability between these architectural components will be explored and current technology and trends in each architectural element will be reviewed. This course will de-emphasize, although not ignore, mainframe architectures in favor of information architectures more applicable to client/server computing. The various interacting categories of client/server computing as well as the benefits and implications of such a system will be fully explored.

WEBD 236 - Web Information Systems Programming (4)

This course builds web applications by employing server-side scripts that query relational databases. The student learns and reflects on two- and three-tier software architectures, separation of responsibility, model-view-controller pattern, basic security, and web frameworks. The student will design, code, test, debug, and document programs using a server-based scripting language. Note: This is a technology course in a technology program, and it requires the purchase of software that may be used in subsequent courses as well as being suitable for commercial work beyond completion of degree studies.

CYSC 375 - Digital Forensics & Incident Response (4)

The prevalence of data breaches, identity theft, and the darknet makes the study of digital forensics and cybercrime highly relevant to information security. Identifying, acquiring, preserving, analyzing and reporting evidence to business and law enforcement is a much-needed skill. This course will cover those topics as well as live versus dead-box techniques, appropriate legal and regulatory issues, open source and commercial tools, and the special challenges represented by new and emerging technologies. Note, this course has proctored exam(s).

CYSC 475 - Security Engineering & Assessment (4)

Ensuring the confidentiality, integrity, and availability of large and complex systems is notoriously difficult in the face of capable and determined opponents. This course discusses security engineering as the practical application of requirements analysis, modeling, architecture, processes, and measurement toward improving the dependability of complex information systems throughout their lifecycle. Note, this course has proctored exam(s).

CYSC 495 - Cybersecurity Capstone (4)

The Cybersecurity Capstone course encourages teamwork in small groups on a substantial project. The intent of this course is to provide a capstone experience that integrates the material contained in courses required of the cybersecurity major. It also provides an opportunity for students to recognize and evaluate the interrelationship of their general education courses with the courses taken for their information security major. The major areas of the program are reviewed and assessed via standardized exams. Students will also culminate their experiences with an overview of the evolution of computer systems and the application of cybersecurity to networks with a look at the near-term future. Note, this course has proctored exam(s).

CYSC 300 - Information Assurance (4)

In a highly connected, data intensive, and cost-focused business environment, the practice of information security is not a business advantage; it is a customer requirement. Malware and exploits including ransomware, viruses, trojans, denial of service attacks, phishing, and even Wiki leaks have become headline news. Failure to insure the confidentiality, integrity, and availability of data costs companies millions, if not billions of dollars in legal settlements, lost business, and trade secrets. In this course, you will get an overview of information security principles and practices, including security models, risk management, access controls, intrusion detection and prevention (IDS/IPS), cryptography, software vulnerabilities, and ethical issues. Subsequent courses expand on this foundational material in much greater depth. Note, this course has proctored exam(s).

OR CYSC 610 - Information Assurance (4)

This course covers the fundamentals of security in the enterprise environment. Included are coverage of risks and vulnerabilities, threat modeling, policy formation, controls and protection methods, encryption and authentication technologies, network security, cryptography, personnel and physical security issues, as well as ethical and legal issues. This foundational course serves as an introduction to many of the subsequent topics discussed in depth in later security courses. Note, this course has proctored exam(s). This exam requires additional technology, if student uses online proctoring.

CYSC 400 - Application Security (4)

Software vulnerabilities, especially those that compromise personal or financial data, are appallingly common. Nearly every major software company has dealt with the fallout of a major incident due to vulnerabilities in their products. Developing correct - let alone secure - software is very difficult. Yet users and executives expect it. In this course, you will learn about the typical development mistakes that lead to application-level security issues as well as how to defend against each.. Students will explore the Open Web Application Security Project (OWASP) top 10 security vulnerabilities. Topics include unchecked user input, injection, fuzzing, CSRF, XSS, cryptography, CAPTCHA, configuration errors, authentication, and authorization. Note, this course has proctored exam(s).

OR CYSC 620 - Software and App Security (4)

Today, software is at the heart of the business processes of nearly every business from finance to manufacturing. Software pervades everyday life in expected places like phones and computers but also in places that you may not consider such as toasters, thermostats, automobiles, and even light bulbs. Security flaws in software can have impacts ranging from inconvenient to damaging and even catastrophic when it involves life-critical systems. How can software be designed and built to minimize the presence of flaws or mitigate their impacts? This course focuses on software development processes that identify, model, and mitigate threats to all kinds of software. Topics include threat modeling frameworks, attack trees, attack libraries, defensive tactics, secure software development lifecycle, web, cloud, and human factors.

Students may take a graduate level course to fulfill requirements in an undergraduate program. Please review the academic policy and speak with your academic advisor for more details.

CYSC 350 - Security Risk Management (4)

Proper assessment, management, and mitigation of risk are essential to any cybersecurity strategy. Risks aren't just related to IT assets, but to the overall business that the IT organization is supporting, thus, business continuity planning and impact analysis are also important. In this course, you will learn how to identify and analyze risks, determine impacts, develop plans to mitigate issues and manage residual risk. Topics include threats, vulnerabilities, exploits, and countermeasures; US compliance laws; risk assessment and mitigation; business impact analysis; and business continuity and disaster recovery planning.

OR CYSC 630 - Information Risk Management (4)

When audits, technology, or compliance become the driver for security initiatives the resulting program is strategically fragmented, reactive, and rigid. Moreover, there are few, if any, assurances that the biggest threats are being addressed. On the other hand, risk assessment places values on assets, evaluates the current controls, and provides data to improve the protection in a controlled, proactive, and flexible manner. This course teaches an approach to security that combines operational security, risk assessment, test and review and mitigation such that value can be demonstrated. A project-based approach to risk assessment is followed including, project definition and preparation, data gathering, technical information, physical data gathering, analysis, mitigation, recommendations, and reporting. Note, this course has proctored exam(s).

University Electives

28 credits from the following types of courses:
Any undergraduate courses offered by the University except developmental education courses.

Additional Requirements

All students are required to pass College Writing (ENG 120), and either Basic Learning Strategies (PF 121) or Learning Strategies (PF 321) prior to enrolling in any course at the 200 level or above. Students who enroll at Franklin with 30 or fewer hours of transfer credit are required to pass PF 121 Basic Learning Strategies in place of PF 321 Learning Strategies. Interpersonal Communication (COMM 150) or Speech Communication (SPCH 100) must be taken prior to enrolling in any course at the 300 level or above. Students must also meet the University algebra competency requirement.

Academic Minors

Personalize your degree with a minor. Explore available minors, learn how minors can benefit you, and find out what requirements you must meet to earn a minor.

Learn More

Nationally Recognized

National Center of Academic Excellence in Cyber Defense

Franklin University has been designated as a Center of Academic Excellence (CAE) in Cyber Defense since 2019, by the National Security Agency and its federal partners for our B.S. in Cybersecurity. The designation was awarded as a result of a thorough investigation into the University's cybersecurity curriculum, faculty credentials and competence in research and student involvement in cybersecurity activities.

For more information about the National Security Agency's Centers of Academic Excellence, please click here and for more information about the CAE Community, please click here.

National CyberWatch Center

Through our Center for Public Safety and Cybersecurity Education, a member of the National CyberWatch Center, the University collaboratively engages in efforts to advance cybersecurity education and strengthen the nation’s cybersecurity workforce. In service to communities and individuals, we provide access to the latest research impacting the industry, as well as innovations in cybersecurity education and training.   

Center for Public Safety and Cybersecurity Education

Franklin University’s Center for Public Safety and Cybersecurity Education provides the skills necessary to prepare professionals to effectively prevent, solve and investigate cybersecurity issues and challenges. The Center’s offerings leverage its faculty – who are both thought leaders and practitioners – along with Franklin University’s reputation for excellence in curriculum and course development to create learning experiences that address prevailing security concerns within industries and communities.

Learn More

Microcredentials Align with Job Essentials

In today's dynamic work environments, adaptive professionals thrive. A microcredential - either as a stand-alone course or integrated into your degree program - is a short, skill-specific recognition that enables you to demonstrate your competency in a distinct area. Like Franklin's degree programs, microcredentials are aligned with market and industry demand to ensure what you learn can be put to use right away. Microcredentials are easily shared via digital badges and can be stacked to create a unique portfolio of in-demand skills.

B.S. Cybersecurity Program Details

Cybersecurity Career Opportunities

Application Security Tester

Application Security Testers perform assessments, source code reviews and security tests to identify, understand, thwart, and remedy web application threats, vulnerabilities, and attacks.

Computer Security Specialist

Computer Security Specialists plan, implement, monitor, and upgrade control measures and solutions to protect computer networks and computer-based information from unauthorized use, breach, and/or disaster.

Cybersecurity Analyst

Cybersecurity Analysts prevent, monitor, and respond to data breaches, protecting information against hackers.

Cybersecurity Engineer

Cybersecurity engineers lead cybersecurity operations, build technical roadmaps and manage virtual network models.

Cyber Threat Analyst

Cyber Threat Analysts identify, monitor, assess, and counter threats posed to an organization using strategic assessments and tactical analysis.

Data Security Analyst

Data Security Analysts ensure the integrity of computer-based information by monitoring networks, programs, and digital files for vulnerabilities, and recommending security protection protocol.

Identity Management Specialist

Identity Management Specialists oversee identity protection protocols, ensuring that identity risks are minimized or thwarted, and that users are properly identified and granted appropriate access to systems and data according to business need.

Information Security Engineer

Information Security Engineers design, test, and monitor computer security systems to ensure that data and digital informaiton is safe from security threats and breaches.

Information Security Manager

Information Security Managers develop and oversee organizational policies, procedures, and methodologies to ensure the protection of data and information against compromise by hackers, viruses, and other threats.

Network Security Specialist

Network Security Specialists structure, install, and manage network information systems to prevent the loss of data and respond appropriately to security breaches

Security Architect

Security Architects create computer network and software protection plans to protect systems from invasion, abnormal activity, or hackers.

Security Administrator

Security Administrators protect computer system data by implementing security policies and procedures, such as system backups, password scripts, and anti-virus software.

Cybersecurity Employment Outlook

9%

From 2021-2031, jobs in Cybersecurity are expected to increase by 9%

All Occupations

2021
4,174,602 jobs
2031
4,565,120 jobs
Show Details >

Web Developers and Digital Interface Designers

2021
198,907 jobs
2031
222,454 jobs

Computer Systems Analysts

2021
622,728 jobs
2031
677,941 jobs

Database Administrators and Architects

2021
141,582 jobs
2031
156,869 jobs

Network and Computer System Administrators

2021
361,626 jobs
2031
385,521 jobs

Computer Occupations, All Other

2021
420,138 jobs
2031
452,283 jobs

Computer User Support Specialists

2023
604,207 jobs
2033
722,584 jobs

Computer Network Support Specialists

2021
198,280 jobs
2031
214,305 jobs


Source information provided by Lightcast.

Knowledge & Skillsets

Gain in-demand skills sought by employers with curriculum that teaches you:

Get College Credit for What You Already Know

The certificates and training listed below are relevant to this degree program. Search our database to view pre-evaluated credentials and see how a license, certification or professional training saves you time and money toward your degree.

Frequently Asked Questions

Back to College Blog

Related Programs