Request Information
Fill out this brief form and an AIU Admissions Advisor will contact you and help with your degree questions.
*All fields are required
Cybersecurity gaps can put even the most successful businesses at risk. AIU’s Bachelor of Science in Information Technology degree with a concentration in Cybersecurity is designed to help students study how to spot weaknesses, create security protocols and devise new ways to protect an organization’s digital assets.
From mission-critical business systems to e-commerce and the Internet, cybersecurity and IT is not only an industry but also a fundamental building block of various industries. AIU offers an industry-relevant online cybersecurity degree program designed to help students study about the types of information technology security used in business today, as well as the practices that should be in place in any organization to ensure security.
Fill out this brief form and an AIU Admissions Advisor will contact you and help with your degree questions.
*All fields are required
Students will study how to work with security software, administer security systems and identify potential security threats organizations may face in a variety of real-world situations. The program also addresses issues of physical and operations security. The online cybersecurity degree program is designed for students looking to pursue career path opportunities in the fields of digital security, information collection and preservation, and security-system creation.
English Composition I
ENGL106
In this course, students focus on developing writing skills through practice and revision of a variety of different types of essays. Students are also given instruction in library and online research and methods of documentation. In this course, students focus on developing writing skills through practice and revision of a variety of different types of essays. Students are also given instruction in library and online research and methods of documentation. |
ENGL106 | 4.5 | ||||
English Composition II
ENGL107
In this course, students focus on research and developing writing skills through writing the ''argument'' essay. Students are also given instruction in library and online research and methods of documentation. In this course, students focus on research and developing writing skills through writing the ''argument'' essay. Students are also given instruction in library and online research and methods of documentation. |
ENGL107 | 4.5 | ||||
General College Mathematics
MATH125
An introductory course designed to develop critical thinking, problem solving, and quantitative reasoning skills through the use of standard mathematical operations and techniques as well as analysis of visual data. Students will be expected to identify, analyze, and solve problems in a variety of applied contexts for transfer toward academic, personal, and professional success. An introductory course designed to develop critical thinking, problem solving, and quantitative reasoning skills through the use of standard mathematical operations and techniques as well as analysis of visual data. Students will be expected to identify, analyze, and solve problems in a variety of applied contexts for transfer toward academic, personal, and professional success. |
MATH125 | 4.5 | ||||
Academic and Professional Success
UNIV103
This is a course for students who are new to university-level learning. Topics will include the theory and application of setting goals, managing time and money, developing self-awareness, and adhering to the rigorous standards of academic and professional writing. Additionally, students will be prepared to work autonomously and collaboratively in academic and professional settings. This is a course for students who are new to university-level learning. Topics will include the theory and application of setting goals, managing time and money, developing self-awareness, and adhering to the rigorous standards of academic and professional writing. Additionally, students will be prepared to work autonomously and collaboratively in academic and professional settings. |
UNIV103 | 4.5 | ||||
Technology and Information Literacy
UNIV106
This course exposes students to foundational components of computer technology and information literacy. Utilizing computer systems and applications, students will practice using a variety of computer applications used in the modern workplace. This course will introduce basic digital and information literacy skills, including responsible use of innovative technology tools such as Generative Artificial Intelligence, to help students build a foundation to be better consumers and users of information. The goal of this course is to help students build their technology and information literacy skills essential for success in the 21st century classroom and workplace.
This course exposes students to foundational components of computer technology and information literacy. Utilizing computer systems and applications, students will practice using a variety of computer applications used in the modern workplace. This course will introduce basic digital and information literacy skills, including responsible use of innovative technology tools such as Generative Artificial Intelligence, to help students build a foundation to be better consumers and users of information. The goal of this course is to help students build their technology and information literacy skills essential for success in the 21st century classroom and workplace.
|
UNIV106 | 4.5 | ||||
Interpersonal Communication
UNIV109
This course will introduce students to the basic principles of communication theory and effective interpersonal communication. It will assist students in the identification of how communication impacts an individual, and will help them develop techniques and competencies in diverse social and professional communication situations.
This course will introduce students to the basic principles of communication theory and effective interpersonal communication. It will assist students in the identification of how communication impacts an individual, and will help them develop techniques and competencies in diverse social and professional communication situations.
|
UNIV109 | 4.5 | ||||
Humanities (2 Courses) | 9 | |||||
Natural Sciences (2 Courses) | 9 | |||||
Social and Behavioral Sciences (2 courses) | 9 | |||||
General Education Elective (1 Course) | 4.5 | |||||
58.5 Total Credit Hours | 58.5 Total Credit Hours |
Discovering Information Technology
ITCO101
This course provides an introduction to information technologies and information technology careers. The history of information technology is reviewed with a focus on key innovations and innovators. The significance of digital data to information technologies and organizations is reviewed. Students are provided with opportunities to evaluate social and ethical implications of information technology. This course provides an introduction to information technologies and information technology careers. The history of information technology is reviewed with a focus on key innovations and innovators. The significance of digital data to information technologies and organizations is reviewed. Students are provided with opportunities to evaluate social and ethical implications of information technology. |
ITCO101 | 4.5 | ||||
Introduction to Computer and Network Hardware
ITCO103
This course provides an overview of information technology hardware in the categories of microcomputer, handheld/mobile, wearable computing devices, and core networking hardware components. An introduction to the Internet of Things (IoT) is provided. Emphasis is placed on capabilities, functionality, and basic troubleshooting. This course provides an overview of information technology hardware in the categories of microcomputer, handheld/mobile, wearable computing devices, and core networking hardware components. An introduction to the Internet of Things (IoT) is provided. Emphasis is placed on capabilities, functionality, and basic troubleshooting. |
ITCO103 | 4.5 | ||||
Information Technology and Society
ITCO105
This course examines the impact of information technology on society at local and global levels. Specific societal implications and concerns inherent in the information technology profession from the perspective of professional, ethical, legal, security and social issues and responsibilities will be addressed.
This course examines the impact of information technology on society at local and global levels. Specific societal implications and concerns inherent in the information technology profession from the perspective of professional, ethical, legal, security and social issues and responsibilities will be addressed.
|
ITCO105 | 4.5 | ||||
Developing Professional Communications
ITCO107
This course is designed to help students develop skills that will enable them to produce rich and effective professional and technical document using word processing, spreadsheet and presentation tools. The course will also focus on basic principles of good technical writing with other forms of writing and on types of documents common in technical fields and organizations. While the emphasis will be on writing, use of tools and how best to utilize the features available will form an important component of the course.
This course is designed to help students develop skills that will enable them to produce rich and effective professional and technical document using word processing, spreadsheet and presentation tools. The course will also focus on basic principles of good technical writing with other forms of writing and on types of documents common in technical fields and organizations. While the emphasis will be on writing, use of tools and how best to utilize the features available will form an important component of the course.
|
ITCO107 | 4.5 | ||||
Introduction to Operating Systems
ITCO211
In this introduction to operating systems, students are exposed to contemporary desktop and mobile operating systems. Topics may include operating system support, functions, network requirements, virtualization, and basic maintenance. In this introduction to operating systems, students are exposed to contemporary desktop and mobile operating systems. Topics may include operating system support, functions, network requirements, virtualization, and basic maintenance. |
ITCO211 | 4.5 | ||||
Fundamentals of Programming and Logic
ITCO221
In this course, students are introduced to the programming concepts of control structures, arrays, and modular program design. Students will also develop, debug, and execute simple applications. In this course, students are introduced to the programming concepts of control structures, arrays, and modular program design. Students will also develop, debug, and execute simple applications. |
ITCO221 | 4.5 | ||||
Introduction to Databases
ITCO231
In this course, students will review the fundamental concepts of database systems, leading to the rationale for today's dominance of the relational database model. In addition, the course will focus on designing and implementing a database, entering data, normalizing tables, and performing queries. In this course, students will review the fundamental concepts of database systems, leading to the rationale for today's dominance of the relational database model. In addition, the course will focus on designing and implementing a database, entering data, normalizing tables, and performing queries. |
ITCO231 | 4.5 | ||||
Network Infrastructure Basics
ITCO251
This course provides students with a conceptual overview of network infrastructure. Topics may include network configurations, network operations, segmentation through subnetting, and wireless developments. This course provides students with a conceptual overview of network infrastructure. Topics may include network configurations, network operations, segmentation through subnetting, and wireless developments. |
ITCO251 | 4.5 | ||||
Comprehensive IT Project
ITCO299
In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes. In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes. |
ITCO299 | 4.5 | ||||
Information Technology Security
ITCO361
This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures. This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures. |
ITCO361 | 4.5 | ||||
Introduction to Mobile Technologies and Internet of Things
ITCO385
This course tracks the evolution path of mobile technologies, and introduces students to wireless networks and its infrastructure, mobile operating systems, devices, and tools that support mobile communications. The focus is on current and emergent technologies, security, and user experience and interaction with mobile devices.
This course tracks the evolution path of mobile technologies, and introduces students to wireless networks and its infrastructure, mobile operating systems, devices, and tools that support mobile communications. The focus is on current and emergent technologies, security, and user experience and interaction with mobile devices.
|
ITCO385 | 4.5 | ||||
Human/Computer Interfaces and Interactions
ITCO391
The course examines human factors and performance in relation to technology applications, components of technology, and methods and techniques used in the design and evaluation of system and application interfaces. The course examines human factors and performance in relation to technology applications, components of technology, and methods and techniques used in the design and evaluation of system and application interfaces. |
ITCO391 | 4.5 | ||||
Program Capstone for IT
ITCO498
This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management.
This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management.
|
ITCO498 | 4.5 | ||||
58.5 Total Credit Hours | 58.5 Total Credit Hours |
A combination of any 3 undergraduate Information Technology courses | 0 | |||||
and | 0 | |||||
A combination of any 7 undergraduate General Elective courses | 0 | |||||
45 Total Credit Hours | 45 Total Credit Hours |
Prerequisites must be met for selected electives.
Students enrolled in the general Information Technology track will select a total of 10 undergraduate General Elective courses, in lieu of a combination of General Elective and Information Technology Elective courses.
Linux Fundamentals for Cybersecurity
CYB320
This course is designed to introduce students to Linux fundamentals with a focus on cybersecurity. Students are provided the opportunity for hands-on scripting specific to penetration testing and threat detection.
This course is designed to introduce students to Linux fundamentals with a focus on cybersecurity. Students are provided the opportunity for hands-on scripting specific to penetration testing and threat detection.
|
CYB320 | 4.5 | ||||
Ethical Hacking and Penetration Testing
CYB325
This course is designed to provide students with knowledge of ethical hacking concepts, methods, and best practices. Students have the opportunity for hands-on experience with ethical hacking and penetration testing tools.
This course is designed to provide students with knowledge of ethical hacking concepts, methods, and best practices. Students have the opportunity for hands-on experience with ethical hacking and penetration testing tools.
|
CYB325 | 4.5 | ||||
Network Defense and Countermeasures
CYB330
This course focuses on network defense topics to include intrusion detection, network security, and security incident management. Students will have the opportunity to explore tactics and tools used in network defense.
This course focuses on network defense topics to include intrusion detection, network security, and security incident management. Students will have the opportunity to explore tactics and tools used in network defense.
|
CYB330 | 4.5 | ||||
Cybersecurity Operations
CYB400
This course is designed to introduce students to incident response methodologies and proper methods of handling digital forensic evidence. Students will have the opportunity to explore national and international legal aspects of digital forensics. The course will cover digital forensic acquisition, preservation, analysis, and reporting.
This course is designed to introduce students to incident response methodologies and proper methods of handling digital forensic evidence. Students will have the opportunity to explore national and international legal aspects of digital forensics. The course will cover digital forensic acquisition, preservation, analysis, and reporting.
|
CYB400 | 4.5 | ||||
18 Total Credit Hours | 18 Total Credit Hours |
This program includes a series of courses that correlate to the respective content and competencies of the specified certification exams offered by CompTIA¹. These credentials can serve as independent validation of the knowledge and skills required to be successful in the various information technology (IT) fields.
CompTIA A+ Certification1 |
ITCO 103 Introduction to Computer and Network Hardware ITCO 211 Introduction to Operating Systems |
CompTIA Network+ Certification1 | ITCO 251 Network Infrastructure Basics |
CompTIA Security+ Certification1 |
ITCO 361 Information Technology Security |
CompTIA Linux+ Certification1 |
CYB 320 Linux Fundamentals for Cybersecurity |
CompTIA PenTest+ Certification1 |
CYB 325 Ethical Hacking and Penetration |
CompTIA CySA+ Certification1 |
CYB 400 Cybersecurity Operations |
AIU B.S.I.T. students will be eligible to receive a discounted rate for the CompTIA examination fee once the respective courses above have been successfully completed in residence with the university².
For more information on the CompTIA certifications, including exam objectives, sample questions, and certification information, please visit https://www.comptia.org/certifications.
¹American InterContinental University does not prepare students to take the exam necessary to receive the specified certifications. AIU cannot guarantee that students or graduates of this program will be eligible to take third party certification examinations. Certification requirements for taking and passing these exams are controlled by outside entities and are subject to change without notice to AIU.
²In order to receive the discounted CompTIA exam rate, the listed courses must be completed in residence at American InterContinental University.
For an Online Cybersecurity Degree, your classes may include:
View the University Catalog
Course content subject to change.
.Why Accreditation Content
An online BSIT in Cybersecurity is designed to provide students with a foundational understanding of how to protect networks, systems, and data from digital threats, offered in a fully online format. It explores topics such as network defense, ethical hacking, cryptography, incident response, and cybersecurity policy. Pursuing an online cybersecurity degree provides an opportunity to build technical and analytical skills for roles like information security analyst, penetration tester, or security architect, with the flexibility to study from anywhere. In addition to the online option, AIU also offers this cybersecurity degree program on campus at its Houston and Atlanta locations.
Yes, you can earn a Bachelor of Science in Information Technology with a concentration in Cybersecurity entirely online. AIU is a member of the American InterContinental University System. The System is accredited by the Higher Learning Commission (hlcommission.org), an institutional accreditor recognized by the U.S. Department of Education. Our online cybersecurity degree program is designed to offer flexibility, allowing students to balance their studies with personal and professional commitments. In addition to the fully online option, AIU also offers this degree program on campus at its Houston and Atlanta locations.
Some potential career paths for a BSIT may be*:
Explore related computer and information technology-related job positions and descriptions from the Bureau of Labor Statistics.
*AIU cannot guarantee employment or salary. The list of career paths related to this program is based on a subset from the Bureau of Labor Statistics CIP to SOC Crosswalk. Some career paths listed above may require further education or job experience.
To start on your path to pursuing a BSIT-Cybersecurity at AIU, follow these steps:
*University grants or scholarships are based on established criteria as published in the University Catalog or on its website and are awarded after verification that the conditions of eligibility have been met.
AIU’s online Bachelor of Science in Information Technology with a concentration in Cybersecurity is structured as a 48-month program, but your actual completion time can be shorter or longer depending on factors such as transfer credits, the number of courses you take each term, and any breaks you choose to schedule.
Compare up to three additional degrees
Compare up to one additional degrees
The Bachelor of Science in IT degree program provides a variety of learning resources to students such as videos and e-books along with many interactive assignments. These materials are available online so students can access them anywhere they would like.Dr. T. MacNeil., Former Student Program Chair for the School of Information Technology
Military affiliation includes active duty, veteran, spouse of military or veteran, or anyone eligible to receive military benefits.