Special opportunities:
- Complete the IBM Cybersecurity Analyst Professional Certificate offered through Coursera by working through micro-courses embedded within your classes.
- Attend field trips to cybersecurity conferences and career fairs.
- Learn from faculty who are experts in the field of cybersecurity and have extensive background experience working in both industry and government.
- Intern with a local organization and gain real world experience putting the cybersecurity theories and applications you’ve learned in the classroom to the test.
- Work under the supervision of experienced faculty as you complete an independent study, applying your learnings to a research project relevant to the field of cybersecurity.
Your cybersecurity degree at work
Graduates will be prepared for demanding positions in public and private sectors overseeing, operating, or protecting critical computer systems, information, networks, infrastructures and communications networks. These graduates typically pursue careers as information security analysts particularly in the banking and financial industry, healthcare industry, governmental organizations and within the military.
Students who choose to pursue a graduate degree following their bachelor in cybersecurity are well positioned to pursue graduate degrees such as a MS in Cybersecurity or a MA in Information Technology Management.
The cybersecurity program at William Woods University provided me with a great foundation to pursue professional opportunities after college. The knowledge I gained from the cybersecurity program taught me best practices to use, and helped me adapt to the software I use in daily activities. I thoroughly enjoyed my time as a student, and if you are looking for a program to give you a solid foundation and tools you need to become a cybersecurity professional, the cybersecurity program at William Woods is the perfect place for you.— Chase Tennyson ’25, (Equitable)
Requirements
The Bachelor of Science in Cybersecurity degree at William Woods University consists of 120 distinct credit hours for graduation — including 54 core major credits and 3 experiential learning credits. The experiential learning component may be fulfilled by completing an internship or independent study course.
Major Requirements
Core Credits: 54.00
| This course will examine digital forensics as it relates to both civil and criminal investigations. Topics include best practices in securing, processing, acquiring, examining and reporting on digital evidence as well as an examination of software programs such as Encase™, which is often used in digital investigations. credits: | Digital Evidence and Forensic Investigations | 3 |
| Issues addressed in this course include descriptions of the types of crimes and terrorist acts committed using computer technology, theories addressing hackers and other types of digital criminals, an overview of the legal strategies and tactics targeting this type of crime, and in-depth coverage of investigating and researching digital crime, digital terrorism, and information warfare. Additionally, upon completion of the course, students should find themselves better prepared for further study into the growing problems of crime, terrorism and information warfare being committed using computer technology. credits: | Cybercrime and Information Warfare | 3 |
credits: | Information Security | 3 |
| This course will focus on the fundamental principles of information security management from a systems perspective. While other courses will provide the deep dive into specific areas of security, this course will serve as an exploration into the varying principles of systems-level information security management that are employed to achieve secure solutions. credits: | Introduction to Cybersecurity-Q | 3 |
| The laws and policies dealing with cybercrime, cyber warfare and privacy will be explored and analyzed. Ethics in cybersecurity will also be reviewed with a focus on international perspectives. Prerequisites: CSS 210 and MIS 250 credits: | Cybersecurity Law & Ethics | 3 |
| The application, physical, link, and transport layers of the protocol stack are presented. Students will study technologies, processes and practices designed to protect networks, computers, programs, and data from attacks. Cybersecurity issues such as malware (worms, phishing, Trojans, and viruses) and other vulnerabilities will be presented. Prerequisites: CSS 210 and MIS 250 credits: | Cybersecurity & Internet Architecture | 3 |
| The course provides students with insight on common cyber-attacks and the techniques for identifying, detecting and defending against cybersecurity threats. The course will cover firewalls, intrusion detection/prevention, authentication, ciphers, cryptography, etc. The course presents emerging technologies such as virtualization, Cloud computing, and multimedia protocols. This course also discusses critical infrastructures and how to protect them. Prerequisites: CSS324 credits: | Cyber Attacks and Defenses | 3 |
| The course will provide a broad overview of the concepts, fundamental ideas, vocabulary, and literature central to the study and development of cryptography and cryptanalysis. This course will explore the historical development of cryptography, as well as methods used to defeat it. In addition, the course will cover the mathematical foundations of cryptography today, as well as some current uses of such cryptography, such as public key infrastructures, the Internet Key Exchange protocol, and more. Prerequisites: CSS210 and MIS250 credits: | Encryption Techniques | 3 |
| This course provides students with the background and use of Social Engineering as a technique used to trick an individual into giving up sensitive information that can be used in a criminal activity. The course looks into what is targeted information, how e-mails, voice messages, or even in person visits masquerade as a legitimate, trusted source. Prerequisites: CSS 210 and MIS 250 credits: | Social Engineering | 3 |
| Critical infrastructures provide essential services that underpin our society. Whether physical or virtual, these infrastructures are vital to protect society, the economy and public health and safety. In this course, students will examine critical infrastructures identified by the Department of Homeland Security (DHS) as vital to the United States and explore ways to manage risk and enhance security in these areas. Prerequisites: CSS 210 and MIS 250 credits: | Critical Infrastructures | 3 |
| In this course, students will learn what Cloud Computing, storage is, and how to protect data and information stored via the Cloud. Prerequisites: CSS 210 and MIS 250 credits: | Cloud Security | 3 |
| In this course, students are expected to synthesize and integrate the learning experiences acquired throughout the BS in Cybersecurity program. They will be expected to evaluate current and future topics relevant to this major. Prerequisites: Senior standing in the Cybersecurity program. credits: | Cybersecurity Capstone | 3 |
| Through digital collaboration, this course will introduce the student to Web 2.0 tools by integrating and utilizing these tools in a business settings. Students will examine the theory of online business, simulations and other pedagogical implications while considering the social, interpersonal, cultural and technical implications of Web 2.0 in a business sense. (Students will be required to have Webcam & mic/headset) credits: | Cloud Computing-Q | 3 |
| This course prepares student to develop application programs in the database environment. Models of data, data structure and file organization are covered. credits: | Database Management Systems | 3 |
| The features of centralized, decentralized, and distributed systems are explored. Special emphasis placed on LAN (Local Area Network) technologies. credits: | Networking | 3 |
| This course is an examination of the knowledge sets, skills, tools and techniques of project management, with an emphasis on how project management contributes to the strategic goals of the organization. The course focuses on the role of information technology as an integration tool in project management. Topics: Microsoft project, work breakdown, structure development, resource scheduling, developing a project network, project organization, time management, and performance measurement and evaluation. The course also examines the managerial competencies required to organize and lead a project. credits: | Project Management | 3 |
| This course analyzes and assesses the managerial applications of Internet technology for a successful Web-based competitive organization. The application of management principles to business-to-consumer, business-to-business, and intra-business commercial ventures are examined. Topics: Electronic business models; the forces driving the widespread implementation of EC; the critical success factors for on-line retailing; proactive strategies for EC operations; on-line consumer trends and behaviors; web advertising and promotion strategies; EC and service industries; business-to-business electronic commerce models; electronic payment systems; EC strategy implementation; and environments that impact electronic commerce. credits: | Enterprise Systems | 3 |
| The Systems Analysis course is a study of the methods for structured analysis and design of Information Systems. Topics include data definition, flow charting, data flows and more. credits: | Systems Analysis | 3 |
Independent Study/Internship - 3 Credits
| Students choosing to complete an independent study will work under the supervision of a faculty member. The independent study is designed to allow the student to work independently on a research project relevant to the field of cybersecurity. Requires permission of the instructor the student wishes to work with and the School Director. Prerequisite: Senior standing in the Cybersecurity program credits: | IS: Independent Study | 3 |
| Students choosing to complete an internship will be required to work for a minimum of 120 hours in an approved organization where they have the opportunity for hands-on experience of the theories and applications they have learned in the classroom. Requires permission of the instructor and the School Director. credits: | CSS Internship I | 3 |
| Students choosing to complete an internship will be required to work for a minimum of 240 hours in an approved organization where they have the opportunity for hands-on experience of the theories and applications they have learned in the classroom. Requires permission of the instructor and the School Director. credits: | CSS Internship II | 6 |