Request Information
Fill out this brief form and an AIU Admissions Advisor will contact you and help with your degree questions.
*All fields are required
IT security gaps can put even the most successful businesses at risk. AIU’s Bachelor of Science in Information Technology degree with a concentration in Cybersecurity is designed to help students study how to spot weaknesses, create security protocols and devise new ways to protect an organization’s digital assets.
From mission-critical business systems to e-commerce and the Internet, cybersecurity and IT is not only an industry but also a fundamental building block of various industries. AIU offers an industry-relevant online cybersecurity degree program designed to help students study about the types of information technology security used in business today, as well as the practices that should be in place in any organization to ensure security.
Fill out this brief form and an AIU Admissions Advisor will contact you and help with your degree questions.
*All fields are required
Students will study how to work with security software, administer security systems and identify potential security threats organizations may face in a variety of real-world situations. The program also addresses issues of physical and operations security. The online cybersecurity degree program is designed for students looking to pursue career path opportunities in the fields of digital security, information collection and preservation, and security-system creation.
English Composition I
ENGL106
In this course, students focus on developing writing skills through practice and revision of a variety of different types of essays. Students are also given instruction in library and online research and methods of documentation. In this course, students focus on developing writing skills through practice and revision of a variety of different types of essays. Students are also given instruction in library and online research and methods of documentation. |
ENGL106 | 4.5 | ||||
English Composition II
ENGL107
In this course, students focus on research and developing writing skills through writing the ''argument'' essay. Students are also given instruction in library and online research and methods of documentation. In this course, students focus on research and developing writing skills through writing the ''argument'' essay. Students are also given instruction in library and online research and methods of documentation. |
ENGL107 | 4.5 | ||||
General College Mathematics
MATH125
An introductory course designed to develop critical thinking, problem solving, and quantitative reasoning skills through the use of standard mathematical operations and techniques as well as analysis of visual data. Students will be expected to identify, analyze, and solve problems in a variety of applied contexts for transfer toward academic, personal, and professional success. An introductory course designed to develop critical thinking, problem solving, and quantitative reasoning skills through the use of standard mathematical operations and techniques as well as analysis of visual data. Students will be expected to identify, analyze, and solve problems in a variety of applied contexts for transfer toward academic, personal, and professional success. |
MATH125 | 4.5 | ||||
Academic and Professional Success
UNIV103
This is a course for students who are new to university-level learning. Topics will include the theory and application of setting goals, managing time and money, developing self-awareness, and adhering to the rigorous standards of academic and professional writing. Additionally, students will be prepared to work autonomously and collaboratively in academic and professional settings. This is a course for students who are new to university-level learning. Topics will include the theory and application of setting goals, managing time and money, developing self-awareness, and adhering to the rigorous standards of academic and professional writing. Additionally, students will be prepared to work autonomously and collaboratively in academic and professional settings. |
UNIV103 | 4.5 | ||||
Technology and Information Literacy
UNIV106
This course exposes students to foundational components of computer technology and information literacy. Utilizing computer systems and applications, students will practice using a variety of computer applications used in the modern workplace. This course will introduce basic digital and information literacy skills, including responsible use of innovative technology tools such as Generative Artificial Intelligence, to help students build a foundation to be better consumers and users of information. The goal of this course is to help students build their technology and information literacy skills essential for success in the 21st century classroom and workplace.
This course exposes students to foundational components of computer technology and information literacy. Utilizing computer systems and applications, students will practice using a variety of computer applications used in the modern workplace. This course will introduce basic digital and information literacy skills, including responsible use of innovative technology tools such as Generative Artificial Intelligence, to help students build a foundation to be better consumers and users of information. The goal of this course is to help students build their technology and information literacy skills essential for success in the 21st century classroom and workplace.
|
UNIV106 | 4.5 | ||||
Interpersonal Communication
UNIV109
This course will introduce students to the basic principles of communication theory and effective interpersonal communication. It will assist students in the identification of how communication impacts an individual, and will help them develop techniques and competencies in diverse social and professional communication situations.
This course will introduce students to the basic principles of communication theory and effective interpersonal communication. It will assist students in the identification of how communication impacts an individual, and will help them develop techniques and competencies in diverse social and professional communication situations.
|
UNIV109 | 4.5 | ||||
Humanities (2 Courses) | 9 | |||||
Natural Sciences (2 Courses) | 9 | |||||
Social and Behavioral Sciences (2 courses) | 9 | |||||
General Education Elective (1 Course) | 4.5 | |||||
58.5 Total Credit Hours | 58.5 Total Credit Hours |
Discovering Information Technology
ITCO101
This course provides an introduction to information technologies and information technology careers. The history of information technology is reviewed with a focus on key innovations and innovators. The significance of digital data to information technologies and organizations is reviewed. Students are provided with opportunities to evaluate social and ethical implications of information technology. This course provides an introduction to information technologies and information technology careers. The history of information technology is reviewed with a focus on key innovations and innovators. The significance of digital data to information technologies and organizations is reviewed. Students are provided with opportunities to evaluate social and ethical implications of information technology. |
ITCO101 | 4.5 | ||||
Introduction to Computer and Network Hardware
ITCO103
This course provides an overview of information technology hardware in the categories of microcomputer, handheld/mobile, wearable computing devices, and core networking hardware components. An introduction to the Internet of Things (IoT) is provided. Emphasis is placed on capabilities, functionality, and basic troubleshooting. This course provides an overview of information technology hardware in the categories of microcomputer, handheld/mobile, wearable computing devices, and core networking hardware components. An introduction to the Internet of Things (IoT) is provided. Emphasis is placed on capabilities, functionality, and basic troubleshooting. |
ITCO103 | 4.5 | ||||
Information Technology and Society
ITCO105
This course examines the impact of information technology on society at local and global levels. Specific societal implications and concerns inherent in the information technology profession from the perspective of professional, ethical, legal, security and social issues and responsibilities will be addressed.
This course examines the impact of information technology on society at local and global levels. Specific societal implications and concerns inherent in the information technology profession from the perspective of professional, ethical, legal, security and social issues and responsibilities will be addressed.
|
ITCO105 | 4.5 | ||||
Developing Professional Communications
ITCO107
This course is designed to help students develop skills that will enable them to produce rich and effective professional and technical document using word processing, spreadsheet and presentation tools. The course will also focus on basic principles of good technical writing with other forms of writing and on types of documents common in technical fields and organizations. While the emphasis will be on writing, use of tools and how best to utilize the features available will form an important component of the course.
This course is designed to help students develop skills that will enable them to produce rich and effective professional and technical document using word processing, spreadsheet and presentation tools. The course will also focus on basic principles of good technical writing with other forms of writing and on types of documents common in technical fields and organizations. While the emphasis will be on writing, use of tools and how best to utilize the features available will form an important component of the course.
|
ITCO107 | 4.5 | ||||
Introduction to Operating Systems
ITCO211
In this introduction to operating systems, students are exposed to contemporary desktop and mobile operating systems. Topics may include operating system support, functions, network requirements, virtualization, and basic maintenance. In this introduction to operating systems, students are exposed to contemporary desktop and mobile operating systems. Topics may include operating system support, functions, network requirements, virtualization, and basic maintenance. |
ITCO211 | 4.5 | ||||
Fundamentals of Programming and Logic
ITCO221
In this course, students are introduced to the programming concepts of control structures, arrays, and modular program design. Students will also develop, debug, and execute simple applications. In this course, students are introduced to the programming concepts of control structures, arrays, and modular program design. Students will also develop, debug, and execute simple applications. |
ITCO221 | 4.5 | ||||
Introduction to Databases
ITCO231
In this course, students will review the fundamental concepts of database systems, leading to the rationale for today's dominance of the relational database model. In addition, the course will focus on designing and implementing a database, entering data, normalizing tables, and performing queries. In this course, students will review the fundamental concepts of database systems, leading to the rationale for today's dominance of the relational database model. In addition, the course will focus on designing and implementing a database, entering data, normalizing tables, and performing queries. |
ITCO231 | 4.5 | ||||
Network Infrastructure Basics
ITCO251
This course provides students with a conceptual overview of network infrastructure. Topics may include network configurations, network operations, segmentation through subnetting, and wireless developments. This course provides students with a conceptual overview of network infrastructure. Topics may include network configurations, network operations, segmentation through subnetting, and wireless developments. |
ITCO251 | 4.5 | ||||
Comprehensive IT Project
ITCO299
In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes. In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes. |
ITCO299 | 4.5 | ||||
Information Technology Security
ITCO361
This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures. This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures. |
ITCO361 | 4.5 | ||||
Introduction to Mobile Technologies and Internet of Things
ITCO385
This course tracks the evolution path of mobile technologies, and introduces students to wireless networks and its infrastructure, mobile operating systems, devices, and tools that support mobile communications. The focus is on current and emergent technologies, security, and user experience and interaction with mobile devices.
This course tracks the evolution path of mobile technologies, and introduces students to wireless networks and its infrastructure, mobile operating systems, devices, and tools that support mobile communications. The focus is on current and emergent technologies, security, and user experience and interaction with mobile devices.
|
ITCO385 | 4.5 | ||||
Human/Computer Interfaces and Interactions
ITCO391
The course examines human factors and performance in relation to technology applications, components of technology, and methods and techniques used in the design and evaluation of system and application interfaces. The course examines human factors and performance in relation to technology applications, components of technology, and methods and techniques used in the design and evaluation of system and application interfaces. |
ITCO391 | 4.5 | ||||
Program Capstone for IT
ITCO498
This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management.
This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management.
|
ITCO498 | 4.5 | ||||
58.5 Total Credit Hours | 58.5 Total Credit Hours |
A combination of any 3 undergraduate Information Technology courses | 0 | |||||
and | 0 | |||||
A combination of any 7 undergraduate General Elective courses | 0 | |||||
45 Total Credit Hours | 45 Total Credit Hours |
Prerequisites must be met for selected electives.
Students enrolled in the general Information Technology track will select a total of 10 undergraduate General Elective courses, in lieu of a combination of General Elective and Information Technology Elective courses.
Linux Fundamentals for Cybersecurity
CYB320
This course is designed to introduce students to Linux fundamentals with a focus on cybersecurity. Students are provided the opportunity for hands-on scripting specific to penetration testing and threat detection.
This course is designed to introduce students to Linux fundamentals with a focus on cybersecurity. Students are provided the opportunity for hands-on scripting specific to penetration testing and threat detection.
|
CYB320 | 4.5 | ||||
Ethical Hacking and Penetration Testing
CYB325
This course is designed to provide students with knowledge of ethical hacking concepts, methods, and best practices. Students have the opportunity for hands-on experience with ethical hacking and penetration testing tools.
This course is designed to provide students with knowledge of ethical hacking concepts, methods, and best practices. Students have the opportunity for hands-on experience with ethical hacking and penetration testing tools.
|
CYB325 | 4.5 | ||||
Network Defense and Countermeasures
CYB330
This course focuses on network defense topics to include intrusion detection, network security, and security incident management. Students will have the opportunity to explore tactics and tools used in network defense.
This course focuses on network defense topics to include intrusion detection, network security, and security incident management. Students will have the opportunity to explore tactics and tools used in network defense.
|
CYB330 | 4.5 | ||||
Cybersecurity Operations
CYB400
This course is designed to introduce students to incident response methodologies and proper methods of handling digital forensic evidence. Students will have the opportunity to explore national and international legal aspects of digital forensics. The course will cover digital forensic acquisition, preservation, analysis, and reporting.
This course is designed to introduce students to incident response methodologies and proper methods of handling digital forensic evidence. Students will have the opportunity to explore national and international legal aspects of digital forensics. The course will cover digital forensic acquisition, preservation, analysis, and reporting.
|
CYB400 | 4.5 | ||||
18 Total Credit Hours | 18 Total Credit Hours |
This program includes a series of courses that correlate to the respective content and competencies of the specified certification exams offered by CompTIA¹. These credentials can serve as independent validation of the knowledge and skills required to be successful in the various information technology (IT) computer user support, IT security, and networking.
CompTIA A+ Certification1 |
ITCO 103 Introduction to Computer and Network Hardware ITCO 211 Introduction to Operating Systems |
CompTIA Network+ Certification1 | ITCO 251 Network Infrastructure Basics |
CompTIA Security+ Certification1 |
ITCO 361 Information Technology Security |
CompTIA Linux+ Certification1 |
CYB 320 Linux Fundamentals for Cybersecurity |
CompTIA PenTest+ Certification1 |
CYB 325 Ethical Hacking and Penetration |
CompTIA CySA+ Certification1 |
CYB 400 Cybersecurity Operations |
AIU B.S.I.T. students will be eligible to receive a discounted rate for the CompTIA examination fee once the respective courses above have been successfully completed in residence with the university².
For more information on the CompTIA certifications, including exam objectives, sample questions, and certification information, please visit https://www.comptia.org/certifications.
¹American InterContinental University does not prepare students to take the exam necessary to receive the specified certifications. AIU cannot guarantee that students or graduates of this program will be eligible to take third party certification examinations. Certification requirements for taking and passing these exams are controlled by outside entities and are subject to change without notice to AIU.
²In order to receive the discounted CompTIA exam rate, the listed courses must be completed in residence at American InterContinental University.
For an Online Cybersecurity Degree, your classes may include:
View the University Catalog
Course content subject to change.
.Why Accreditation Content
The BSIT degree with a concentration in Cybersecurity is designed to provide you with knowledge, skills, and abilities relevant for the cybersecurity field. The online cybersecurity degree program emphasizes problem-based and hands-on learning, so upon graduation you will be ready to pursue a career in the field.
Our bachelor’s degree programs are designed as 48-month programs. However, many factors can impact your time to completion. The time it may take you to earn your information assurance and security degree can be influenced by course loads proficiency and/or transfer credits, and breaks.
As you work to complete your degree concentration in cybersecurity, you will be immersed in courses such as: Linux Fundamentals for Cybersecurity; Network defense & Countermeasures; Cybersecurity Operations, and Ethical Hacking and Penetration Testing.
Courses for the online cybersecurity degree program start approximately every five weeks. Your actual start date is based on several factors, including receiving academic and financial documentation.
The Bachelor of Science in Information Technology degree with a concentration in Cybersecurity degree program consists of 180 credits. You may be eligible for transfer credit, which is evaluated on an individual basis. Not all credits are eligible to transfer. Please see the University Catalog for transfer credit policies.
By studying key topics in cybersecurity, you have an opportunity to focus your studies in the areas of operating systems security, network defense & countermeasures, and cybersecurity operations. In this specialized curriculum you will work to develop experience in the major areas of cybersecurity, which includes network defense, countermeasures, ethical hacking, penetration testing, and hardening operating systems. This real-world concentration can help you work to develop a focused, industry-specific knowledge base common to IT professionals in the field of cybersecurity.
Our online cybersecurity degree program can help you learn to spot weaknesses, create security protocols, and formulate fresh ways to protect an organization’s digital assets. When enrolled in this program, you will explore operating system and network security. Coursework covers principles and methods in cybersecurity; ethical hacking and penetration testing, and operating systems security; and network defense countermeasures.
Compare up to three additional degrees
Compare up to one additional degrees
The Bachelor of Science in IT degree program provides a variety of learning resources to students such as videos and e-books along with many interactive assignments. These materials are available online so students can access them anywhere they would like.Dr. T. MacNeil., Former Student Program Chair for the School of Information Technology
Military affiliation includes active duty, veteran, spouse of military or veteran, or anyone eligible to receive military benefits.