Apply Now
Live Chat Icon
Chat with us
Request Information
Estimate Tuition
Book Appointment

Bachelor of Science in Information Technology (BSIT) Degree with a Concentration in Information Assurance and Security

Online Cybersecurity Degree

IT security gaps can put even the most successful businesses at risk. An online Cybersecurity Degree can help you learn to spot weaknesses, create security protocols and devise new ways to protect an organization’s digital assets in AIU's Bachelor's degree program.

Next Start Date:
June 07, 2023
Total Credits:
Online, Atlanta, Houston
Estimate tuition and fees with our Tuition and Graduation Calculator

Online Cybersecurity Degree Program Details

Online Cybersecurity Degree Program Outline

From mission-critical business systems to e-commerce and the Internet, cyber security and IT is not only an industry in its own right but also a fundamental building block of various industries. AIU offers an industry-relevant online cyber security degree program designed to help students learn about the types of information technology security used in business today, as well as the practices that should be in place in any organization to ensure security.

Students will study how to work with security software, administer security systems and identify potential security threats organizations may face in a variety of real-world situations. The program also addresses issues of physical and operations security. The online cyber security degree program is designed for students looking to pursue career opportunities in the fields of digital security, information collection and preservation, and security-system creation.

Online cybersecurity courses can help you learn how to:

  • Summarize details of essential computer concepts
  • Use an operating system interface to access, add, troubleshoot and configure hardware and manage files
  • Implement a relational database management system utilizing the concepts of database design and data modeling
  • Develop business applications using programming languages, tools and software development methodologies
  • Manage security threats and risks by applying industry-best practices to assure information integrity, confidentiality, availability, non-repudiation and authenticity

Download program detail PDF

Earn an IT Certificate Alongside Your BSIT Degree

As you work to complete your BSIT degree with a Concentration in Information Assurance and Security, you may opt to earn an Information Technology Certificate at no additional cost to you. These certificates are designed to coincide with students learning along their path towards degree completion. After you have successfully passed or received transfer credit for the courses listed in your degree concentration, you will be able to obtain documentation of the certificate from AIU. You may even work with your academic advisor to change non-IT general electives to the IT courses that lead to a certificate—this means you can earn more than one certificate at a time!

Unlike certifications that are tied to industry exams, the certificates issued represent competency of learning from a member of an accredited university system.

What undergraduate-level certificates are available?

  • Digital Investigations Certificate
  • Information Assurance & Security Certificate
  • Network Administration Certificate
  • Software Analysis and Development Certificate

Estimate Tuition and Grad Date

Total tuition for the online Cybersecurity Degree program may vary depending on your educational needs, existing experience, and other factors.

Estimate your costs, potential savings and graduation date.

Cybersecurity Degree Courses

Degree Requirements


General Education
ENGL106 English Composition I 4.5
ENGL107 English Composition II 4.5
MATH125 General College Mathematics 4.5
MATH133 College Algebra 4.5
UNIV103 Academic and Professional Success 4.5
UNIV106 Technology and Information Literacy 4.5
UNIV109 Interpersonal Communication 4.5
Humanities (2 Courses) 9
Natural Sciences (2 Courses) 9
Social and Behavioral Sciences (2 courses) 9
Total Credit Hours: 58.5
ITCO101 Discovering Information Technology 4.5
ITCO103 Introduction to Computer and Network Hardware 4.5
ITCO105 Information Technology and Society 4.5
ITCO107 Developing Professional Communications 4.5
ITCO211 Introduction to Operating Systems 4.5
ITCO221 Fundamentals of Programming and Logic 4.5
ITCO231 Introduction to Databases 4.5
ITCO251 Network Infrastructure Basics 4.5
ITCO299 Comprehensive IT Project 4.5
ITCO361 Information Technology Security 4.5
ITCO385 Introduction to Mobile Technologies and Internet of Things 4.5
ITCO391 Human/Computer Interfaces and Interactions 4.5
ITCO498 Program Capstone for IT 4.5
Total Credit Hours: 58.5
A combination of any 3 undergraduate Information Technology courses 0
and 0
A combination of any 7 undergraduate General Elective courses 0
Total Credit Hours: 45

Prerequisites must be met for selected electives.

Students enrolled in the general Information Technology track will select a total of 10 undergraduate General Elective courses, in lieu of a combination of General Elective and Information Technology Elective courses.

General Information Technology Track

In lieu of a Concentration, this generalist track allows students to select a combination of Information Technology Electives from any of the Concentrations below. Please contact your advisor to select or change your Electives, or to determine course eligibility.

Select 4 Information Technology Electives 0
Total Credit Hours: 18

Prerequisites must be met for selected electives.

Information Assurance and Security
ITAS362 Introduction to Information Assurance and Information Security 4.5
ITAS363 Telecommunications and Network Infrastructure Security 4.5
ITAS367 Principles and Methods in Cryptographic Security 4.5
ITAS465 Ethical Hacking and Penetration Testing 4.5
Total Credit Hours: 18

Total Credit Hours : 180

This program includes a series of courses that correlate to the respective content and competencies of the A+, Network+, and Security+ certification exams offered by CompTIA¹ and the Certified Ethical Hacker certification exam offered by EC-Council¹. These credentials can serve as independent validation of the knowledge and skills required to be successful in the fields of information technology (IT) computer user support, IT security, and networking.


CompTIA A+ Certification1 CompTIA Network+ Certification1 CompTIA Security+ Certification1 EC-Council Certified Ethical Hacker1
ITCO 103 Introduction to Computer and Network Hardware ITCO 251 Network Infrastructure Basics ITCO 361 Information Technology Security ITAS 367 Principles and Methods in Cryptographic Security
ITCO 211 Introduction to Operating Systems ITNA 353 Routing and Switching ITAS 362 Introduction to Information Assurance and Information Security ITAS 465 Ethical Hacking and Penetration Testing
ITNA 355 Advanced Routing and Switching ITAS 363 Telecommunications and Network Infrastructure Security
ITNA 357 Network Security Management


AIU B.S.I.T. students will be eligible to receive a discounted rate for the CompTIA examination fee² once all of the respective courses above have been successfully completed in residence with the universityᶟ.

For more information on the A+, Network+, or Security+ certifications, including exam objectives, sample questions, and certification information, please visit

For more information on the Certified Ethical Hacker certification, including information about the exam, course outlines, and requirements, please visit

¹American InterContinental University does not prepare students to take the exam necessary to receive the A+, Network+, Security+, or Certified Ethical Hacker credential. AIU cannot guarantee that students or graduates of this program will be eligible to take third party certification examinations. Certification requirements for taking and passing these exams are controlled by outside entities and are subject to change without notice to AIU.

²Students must contact the office of the Registrar in order to receive the promo code for the discounted exam rate.

ᶟIn order to receive the discounted CompTIA exam rate, the listed courses must be completed in residence at American InterContinental University.

Cybersecurity Degree Classes Overview

For an Online Cybersecurity Degree, your classes may include:

Introduction to Information Assurance and Information Security

This class is designed to provide students with an overview of network security principles and implementation techniques. Topics covered include authentication issues; examples of attacks and malicious code that may be used against networks, and the countermeasures against these; examples of perimeter and interior attacks; and protecting network services. Additional topics may include risk management and assessment, understanding and developing security policy, and protective technologies, such as firewall, intrusion detection systems and the use of encryption.

Telecommunications and Network Infrastructure Security

This course covers network security principles and implementation techniques. Topics covered include examples of attacks and countermeasures for securing email, definitions and principles underpinning all IT security, security management, and security architectures. Fundamental concepts, principles, and practical networking and internet working issues relevant to the design, analysis, and implementation of enterprise-level trusted networked information systems are also covered.

Information Systems Control and Auditing

The course covers the essential subjects and topics in information systems control, including types of audits, types of audit risks, frameworks for management and application controls, audit software and tools, concurrent auditing techniques, data integrity, system effectiveness, IT services delivery, life cycle management, information asset protection, IT governance, business continuity, and system efficiency. Also covered are processes for creating information systems audit and reviewing audit reports.

Principles and Methods in Cryptographic Security

This course covers the mathematical background to cryptography and is designed to provide a comprehensive review of contemporary cryptographic technologies, as applied to computer and network operations. Topics include determining the appropriate cryptographic targets and methods, digital key management, cryptographic vulnerabilities, and implementation of effective cryptographic methodologies to secure enterprise-wide information systems.

Ethical Hacking and Penetration Testing

This course covers techniques that hackers use to circumvent security and penetrate computers and computer networks. Topics covered include legal framework for conduction penetration testing, foot-printing, social engineering, host reconnaissance, session hijacking methods, denial of service, exploits of web server vulnerabilities, breach of database security, password crackers, Intrusion Prevention Systems (IPS) and firewalls circumvention, routers and switches services disruption, scanning and penetration of wireless networks, and overflow attacks methods and prevention. Other topics covered include creating, using, and preventing Trojan Horses, viruses, and other backdoor hostile codes.

IT Governance for Information Security Managers

This course covers enterprise IT governance framework, enterprise security governance framework, business-based investment decisions, maturity practices, compliance issues, IT security strategies, privacy regulations, computer misuse, and incident investigation procedures.

System Architecture and Integration

In this course, students will analyze the system integration requirements and apply appropriate frameworks, methodologies, and techniques that are used to manage, administer, acquire, develop, implement, and integrate enterprise systems.

Comprehensive IT Project

In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes.

Information Technology Security

This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures.

Data Structures and Implementation

This course is designed to introduce students to basic data structures and algorithms which are to be used as tools in designing solutions to real-life problems. Students will explore the specification, usage, implementation and analysis of basic data structures and algorithms.

Program Capstone for IT

This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management.

View the University Catalog

Course content subject to change.

Ways to Save on Your Online Cybersecurity Degree

Frequently Asked Questions

What is a Bachelor of Science in Information Technology (BSIT) degree with a concentration in Information Assurance and Security?

The BSIT degree with a concentration in Information Assurance and Security is designed to provide you with knowledge, skills, and abilities relevant for the information assurance and security field. The online information assurance and security degree program emphasizes problem-based and hands-on learning, so upon graduation you will be ready to pursue a career in the field.

How long does it take to earn an Information Assurance and Security degree?

Our bachelor’s degree programs are designed as 48-month programs. However, many factors can impact your time to completion. The time it may take you to earn your information assurance and security degree can be influenced by course loads proficiency and/or transfer credits, and breaks.

What kind of courses will I take during my information security and assurance degree?

As you work to complete your degree concentration in information assurance and security, you will be immersed in courses such as: Introduction to Information Assurance and Information Security; Telecommunications and Network Infrastructure Security; Principles and Methods in Cryptographic Security; and Ethical Hacking and Penetration Testing.

When can I begin classes?

Courses for the online information and assurance security degree program start approximately every five weeks. Your actual start date is based on several factors, including receiving academic and financial documentation.

How many credits are required to graduate with an information assurance security degree?

The Bachelor of Science in Information Technology degree with a concentration in Information Assurance and Security program consists of 180 credits. You may be eligible for transfer credit, which is evaluated on an individual basis. Not all credits are eligible to transfer. Please see the University Catalog for transfer credit policies.

Why should I pursue an information assurance and security degree?

By studying key topics in information assurance and security, you have an opportunity to focus your studies in the areas of digital security, information collection and preservation, and security-system creation. In this specialized curriculum you will work to develop experience in the major areas of system and network assurance and security, which includes wireless security, coping with insider threats, and hardening operating systems. This real-world concentration can help you work to develop a focused, industry-specific knowledge base common to IT professionals in the field of information assurance and security.

What does the concentration in information assurance and security mean?

Our online information assurance and security degree program can help you learn to spot weaknesses, create security protocols, and formulate fresh ways to protect an organization’s digital assets. When enrolled in this program, you will explore system and network assurance security. Coursework covers principles and methods in cryptographic security; ethical hacking and penetration testing, and information systems security; and network infrastructure security.

Compare Related Areas of Study

Master of Science in Information Technology (MSIT): Concentration in Cybersecurity Master of Science in Information Technology (MSIT): Concentration in IT Security Bachelor of Business Administration (BBA) Degree with a Specialization in Technology Management Bachelor of Science in Information Technology (BSIT) Degree with a Concentration in Digital Investigations

Compare up to three additional degrees

Next Steps

Take the next step. Classes Start June 7, 2023

Complete this form and an AIU Admissions Advisor will contact you and provide further assistance.

* Please correct the following errors:

By clicking the button below you agree to be contacted by AIU about education services (including through automated and/or pre-recorded means, e.g. dialing and text messaging) via telephone, mobile device (including SMS and MMS), and/or email, even if your telephone number or email address is on a corporate, state or the National Do Not Call Registry, and you agree to our Terms of Use and Privacy Policy. You understand that your consent is not required as a condition to purchase a good or service.

Classes Start June 7, 2023

Accrediation Image

Military affiliation includes active duty, veteran, spouse of military or veteran, or anyone eligible to receive military benefits.