Online Bachelor’s in Cybersecurity Curriculum
From personal passwords to massive government or institutional databases, cybersecurity impacts us in countless ways. And while notable breaches, such as the 2017 Equifax breach, or WikiLeaks revelations likely spring to mind when thinking about the term “cybersecurity,” in reality, this field has an impact much closer to home. Cybersecurity keeps your financial information safe, ensures your workplace network can’t be compromised, and protects your personal computer from malware or viruses.
If you’re interested in how security breaches happen — and how to prevent them — you may be interested in a Bachelor of Science in Cybersecurity. The curriculum for this type of degree strives to prepare students for future careers as cybersecurity professionals.

Courses can be completed in just 8 weeks each

100% online coursework

89% of company executives rank cybersecurity as a high priority (Comcast Business)

The global coast of cybercrime in 2020 was nearly $1 trillion (Parachute)

93% increase in ransomware attacks in 2021 (Check Point)

600% increase in phishing attacks (Fintech News)
Maryville University online Bachelor of Science in Cybersecurity curriculum
The online Bachelor of Science in Cybersecurity program at Maryville University aims to prepare students for professional success in the field of cybersecurity.
Learn more about Maryville’s online Bachelor of Science in Cybersecurity course offerings here:
-
In today’s business world, effective communication, whether it is delivered face-to-face or in a written format, is essential. This course increases the ability of students to express themselves effectively through various forms of communications channels. The course is designed to enhance the quality of student’s communication skills.
-
This course focuses on how business events affect financial statements by acquiring a working knowledge of basic accounting theory and concepts. Topics include the role of accounting in decision making; the recording procedures that accountants use to organize information for financial statement preparation; and analytical tools and accounting principles to aid in reading and interpreting financial statements.
-
This course provides an exploration of accounting concepts used by managers and leaders within organizations. Emphasis is placed on the impact of financial information in planning, decision making, and control. This course will address cost classifications, product and service costing methods and systems, profit planning, measuring performance, and the impact on all stakeholders.
-
This course introduces the economic perspective on decisions currently faced by individuals, businesses, and society. Basic economic principles and methods are used to address both microeconomic and macroeconomic topics, with a focus on the modern market economy. Essential content includes the laws of supply and demand; the behavior of consumers and firms; the function of resource markets; macroeconomic measures of economic growth, unemployment, and inflation; the use of fiscal and monetary policy to achieve macroeconomic goals; and an overview of international trade.
-
This course develops business data analysis skills and statistical techniques using spreadsheets. Topics include data collection storage and analysis using descriptive statistics, tables and charts; probability and data distributions, statistical tests, correlation, regression, forecasting, and quality control analysis.
-
Business Law I provides students with essential legal knowledge and critical analytical skills to understand how legal frameworks impact decision-making in the corporate world. The course covers key topics such as distinguishing between civil and criminal liability, evaluating the enforceability of contracts, and navigating employment law. Through practical case studies, students will learn to address legal challenges and apply legal principles effectively in business settings. The course covers key topics such as distinguishing between civil and criminal liability, evaluating the enforceability of contracts, navigating employment law, and legal business entities.
-
This course introduces students to management through real-world applications and practical insights. Learn how to navigate the complexities of decision-making, motivate teams, and lead organizational change. Focusing on modern business challenges, this course equips students with the tools and understanding necessary for effective leadership and team dynamics in today’s evolving workplace.
-
An introduction to the concepts of marketing and their application to those engaged in marketing consumer and industrial goods and services; pricing, product planning, distribution and promotion.
-
Students examine basic financial management of business firms: a) procurement, b) allocation and c) control of funds; corporate financial behavior; financial instruments and markets; and the analysis and interpretation of investment and profit performance.
-
This course examines business operations as they relate to both product and service type components. The course provides techniques of production and operation, as well as techniques for service type organizations.
-
This course focuses on the tools and concepts of strategic management as applied within the business context. Students will develop both the understanding and analytical skills necessary for strategic analysis, formulation and implementation. The course will also involve integration of concepts from prior business core courses.
Cybersecurity Core
-
This course covers the analysis and documentation of business processes and the design and use of information systems to automate these processes via PC, web, and mobile platforms. Students will learn to solve business problems and make better decisions using information systems, enhance business utility and marketability, and identify key enterprise applications. The course also introduces cybersecurity and artificial intelligence and examines the impact of the internet, mobile computing, social networks, and other emerging technologies on the business environment. Students will gain essential skills to participate in business decisions as users, developers, designers, sellers, or buyers of information assets.
-
This course will allow students to implement and audit the Critical Security Controls as documented by the Council on Cyber Security. These Critical Security Controls are rapidly becoming accepted as the highest priority list of what must be done and proven at nearly all organizations.
-
This course covers the business data analysis using spreadsheets and databases. Topics include Excel tables and Pivot tables and the development, administration and management of relational databases. The course uses Microsoft SQLServer and/or MySQL as the primary database management systems with a focus on database design and interaction with other applications.
-
This course is an introduction to designing algorithms and implementing them as programs. Emphasis is placed on analyzing problems, designing solutions that are efficient in both expression and execution, and translating the solutions into well-designed programs. No prior experience with computer programming is expected or required.
-
This course will expose students to the dynamics of an operating system. It focuses on the inherent structure of an operating system as well as the application of virtualization to operating systems in an organization. Examples are conducted through Windows and Linux operating systems using virtualization technology. Theoretical concepts of hypervisors, virtual operating structures, and networking patterns are also addressed. Other key topics include the management of systems across a network and security principles related to it.
-
Students will demonstrate combined learning throughout the course with a cumulative semester-long project. This project will exhibit cyber laws/ethics, problem-solving, critical thinking, communication, tools, and risk management skills learned in the program while examining the latest trends to help organizations provide superior security and awareness within their environments. The foundation of the course will be supplemented through case studies, hands-on learning, and industry research.
-
This course explores information security and related policies in the private sector, focusing on privacy, incident response, computer crime, intellectual property, and recent legal cases. Students will learn about the history and development of the Internet, jurisdictional issues in cyberspace, and trademark and patent protection for technology products and services. The course also covers the enforceability of e-contracts and legal and policy issues surrounding privacy on social networking sites, search queries, online advertising, data mining, and workplace policies.
Cybersecurity (General) Track
-
This course explores penetration testing and ethical hacking methodologies to assess network, client machines, and mobile device security vulnerabilities. Students will learn the full penetration testing process, including planning, reconnaissance, scanning, exploitation, post-exploitation, and result reporting. Emphasis is placed on identifying errors that lead to insecurities and gaining hands-on experience with penetration testing tools and methods. By the end of the course, students will have a foundation in preparation for the Certified Ethical Hacker (CEH) certification exam.
-
This course builds on ethical hacking and penetration testing techniques learned in ISYS-470. Specific attention is paid on examining web application security.
-
This course will examine both network device security and wireless security issues. For wireless security, specific attention will be paid on WiFi and Bluetooth technologies.
-
This course is designed for students to secure their mobile devices by designing, deploying, operating and assessing a well-managed and safe mobile environment. You will learn how to capture and evaluate mobile device network activity, disassemble and analyze mobile code, recognize weaknesses in common mobile applications and conduct full-scale mobile penetration tests.
-
This course examines the capabilities of Security Information and Event Management (SIEM) systems to manage security-related events by assessing and correlating log data from various sources. Students will learn the purpose and functions of SIEM, identify and manage relevant data inputs, and analyze SIEM data to respond to security alerts effectively. The course also covers common pitfalls in deploying, managing, and operating a SIEM, ensuring students are well-prepared to utilize these systems effectively in a real-world setting.
-
Virtualization technologies require planning regarding access controls, user permissions, and traditional security controls. The cloud location of virtualized infrastructure will dictate policies and processes that need to be adapted and secured to work within that structure. This course will allow students to understand what security in the cloud means and how to implement, configure, and operate a market-leading cloud security solution.
-
This course will focus on digital forensic practices, tools, and exercises for the collection of electronic evidence on network, client, and mobile devices. Specific discussion will also include the introduction process of this electronic evidence in civil and criminal cases.
-
In this experience, students will be a security analyst on a team providing cybersecurity services to real-world clients (local non-profits, startups, community organizations, schools, and school districts). Students will work as a consultant, helping the clients of the Maryville University Cyber Fusion Center managed security service provider improve their cybersecurity defenses, with an emphasis on performing vulnerability scans and penetration tests, delivering professional, actionable reports and threat intelligence. Related Courses: ISYS 690 Prerequisite: Any 400 level Cybersecurity course
-
This course provides students with a structured academic framework for their internship experience. It connects theories with real-world practices, enabling students to apply and expand their academic knowledge. As a hands-on experience, this course allows for valuable insights into the daily operations and challenges of a professional environment in their field of study. Students will participate in reflection discussions and self-assessments and complete a cumulative project or presentation.
Cybersecurity (Offense) Track
-
This course explores penetration testing and ethical hacking methodologies to assess network, client machines, and mobile device security vulnerabilities. Students will learn the full penetration testing process, including planning, reconnaissance, scanning, exploitation, post-exploitation, and result reporting. Emphasis is placed on identifying errors that lead to insecurities and gaining hands-on experience with penetration testing tools and methods. By the end of the course, students will have a foundation in preparation for the Certified Ethical Hacker (CEH) certification exam.
-
This course will examine both network device security and wireless security issues. For wireless security, specific attention will be paid on WiFi and Bluetooth technologies.
-
This course is designed for students to secure their mobile devices by designing, deploying, operating and assessing a well-managed and safe mobile environment. You will learn how to capture and evaluate mobile device network activity, disassemble and analyze mobile code, recognize weaknesses in common mobile applications and conduct full-scale mobile penetration tests.
-
Building on the techniques learned in ISYS-470, this course focuses on advanced ethical hacking and penetration testing, specifically focusing on web application security. Students will explore the principles and techniques of penetration testing, covering the entire process from planning and reconnaissance to exploitation, post-exploitation, and result reporting. The course highlights common user, administrator, and programmer errors that lead to vulnerabilities. Through hands-on experience, students will gain proficiency with tools such as Kali Linux OS and Metasploit, enhancing their skills in identifying and mitigating security threats in web applications.
Cybersecurity (Defense) Track
-
This course examines the capabilities of Security Information and Event Management (SIEM) systems to manage security-related events by assessing and correlating log data from various sources. Students will learn the purpose and functions of SIEM, identify and manage relevant data inputs, and analyze SIEM data to respond to security alerts effectively. The course also covers common pitfalls in deploying, managing, and operating a SIEM, ensuring students are well-prepared to utilize these systems effectively in a real-world setting.
-
Virtualization technologies require planning regarding access controls, user permissions, and traditional security controls. The cloud location of virtualized infrastructure will dictate policies and processes that need to be adapted and secured to work within that structure. This course will allow students to understand what security in the cloud means and how to implement, configure, and operate a market-leading cloud security solution.
-
This course will focus on digital forensic practices, tools, and exercises for the collection of electronic evidence on network, client, and mobile devices. Specific discussion will also include the introduction process of this electronic evidence in civil and criminal cases.
-
This course explores incident response techniques, plans, frameworks, and analysis tools that target and infect computer systems. Knowing malware’s capabilities is critical to an organization’s Incident Response efforts and its ability to derive preventive threat intelligence to respond to security incidents and establish defenses. By the end of the course, students will have a foundation in preparation for the CYSA+ CompTIA certification exam.
To ensure the best possible educational experience for our students, we may update our curriculum to reflect emerging and changing employer and industry trends. Undergraduate programs and certificates are designed to be taken at a part-time pace. Please speak to your advisor for more details.
Ready for your next step?
Skills, concepts, and opportunities gained with a bachelor’s degree in cybersecurity
A typical bachelor’s in cybersecurity curriculum consists of courses that can give students in-depth knowledge and skills in several aspects of cybersecurity. Many of these cybersecurity courses will cover the following skills and concepts.
- Digital forensics, incident response, and malware analysis. Cybersecurity professionals possess investigative and analytical skills. When a data leak or other cyber attack occurs, those working in cybersecurity apply those skills to determine what took place, how it happened, and how to prevent it from happening again.
- Cyber law, policy, and compliance. If a government or organization doesn’t have the proper safeguards in place to protect data, it can risk a number of consequences, including revenue loss, a lack of public or consumer trust, or even regulatory fines and punishments. Students who want to enter the field of cybersecurity should have a handle on the types of laws and policies with which they’ll need to comply once they enter the field.
- Advanced ethical hacking principles. Ethical hacking is the practice of attempting to penetrate a computer system or network with the objective of finding any vulnerabilities that could be exploited by malicious hackers. Students will learn about the ethical hacking of networks, computers, and mobile devices.
- The value of cybersecurity to business processes. Increasingly, businesses are treating cybersecurity as a core element of their processes. As such, cybersecurity students need to understand how businesses work. Students will benefit from likely acquiring general business acumen in areas such as accounting, management, business law, and finance.
Common courses for undergraduate degree in cybersecurity students
These are some of the common courses offered for a cybersecurity degree. Though actual course titles may vary depending on the university, many cybersecurity programs offer courses that touch on the following concepts.
- Ethical Hacking. Students will learn how to approach networks, computers, and mobile devices with the intent of discovering vulnerabilities that could be exploited by malicious hackers.
- Digital Forensics. Digital forensics encompasses the collection and analysis of electronic evidence on network, client, and mobile devices. Students will also learn how this evidence is introduced in court.
- Incident Response and Malware Analysis. Malware targets and infects Windows computer systems. In order to defend a network against malware, students learn how to recognize threats, respond to information security incidents, and establish defenses.
- Cyber Law, Policy, and Compliance. Information leaks can lead to serious consequences for a business or organization. Students will learn about the policies and laws related to privacy, incident response, computer crime, and intellectual property.
- Business Processes and Information Systems. Students learn about business processes, such as finance or compliance, as well as how information systems are used to automate these processes across desktop, mobile, and web platforms.
Be Brave
Bring us your ambition and we’ll guide you along a personalized path to a quality education that’s designed to change your life.