Cybersecurity Courses Online – Bachelor’s Degree | WGU (2024)

Bachelor of Science

3rd Party Certifications and Recognition

OVERVIEW

Prepare to Fight Cybercrime with a Cybersecurity Bachelor's Degree

Hackers and cybercriminals launch new, sophisticated computer viruses, malware, and scams every day that threaten the data our society relies on. WGU's online degree in cybersecurity will help you be prepared to outsmart cybercriminals and be the front line of support for governments and top organizations.  This computer systems degree program provides a solid background in IT security principles such as:

  • Secure Systems Analysis & Design
  • Data Management
  • Web and Cloud Security
  • Hacking Countermeasures and Techniques
  • Digital Forensics and Incident Response

WGU’s online B.S. Cybersecurity and Information Assurance degree program was designed with input from cybersecurity experts and leading IT employers to meet the most recent Department of Homeland Security (DHS) and National Security Agency (NSA) guidelines. This program has also helpedWGU receive the designation of aNational Center of Academic Excellence in Cyber Defense  through 2026.

The WGU cybersecurity program boasts15 top certificationsthat arebuilt into the IT degree programand do not add time or additional costs—but do add to your résumé as soon as you've earned them, even before you complete your degree!

60%of graduates finish within

29Months*

Students who have experience in cybersecurity, transfer credits, and time to dedicate to their schooling may be able to finish their bachelor's degree faster than a traditional bachelor's degree.

*WGU Internal Data

Flexible Schedule

Tuition per six-month term is

$4,265

Tuition charged per term—rather than per credit—helps students control the ultimate cost of their business management degree. Finish faster, pay less!

Certifications in this program

15

This online cybersecurity and information assurance program includes 15 top industry certifications, helping enhance your résumé before you even graduate.

Certifications

Ready to Start Your WGU Journey?

Next Start Date: {{startdate}}

Start Dates the 1st of Every Month

COURSES

Cybersecurity Courses

Program consists of 34 courses

At WGU, we design our curriculum to be timely, relevant, and practical—all to help you show that you know your stuff.

Program Guide

The bachelor’s degree program in cybersecurity and information assurance was designed, and is routinely updated, with input from the cybersecurity specialists on ourInformation Technology Program Council, ensuring you learn best practices in systems and services, networking and security, scripting and programming, data management, and the business of IT security. Your online cyber security degree is sure to boost your résumé and prepare you for an exciting future.

Earning this degree in cyber security, designed by industry experts, adds theoretical depth to the practical IT knowledge you already have. Our Information Technology Program Council are industry experts who know exactly what it takes for a tech graduate with an online degree in cyber security to be successful in their field.

This program consists of the following courses. Some may be waived through transfer from your previous college experience. The rest you typically will complete one at a time as you make your way through your degree program, working with your Program Mentor each term to build your personalized Degree Plan. You’ll work through each course as quickly as you can study and learn the material. As soon as you’re ready, you’ll pass the assessment, complete the course, and move on. This means you can finish as many courses as you're able in a term at no additional cost.

WHAT ABOUT TRANSFER CREDITS?

Program consists of: 34 courses

An unofficial estimated 14 courses are fulfilled by your associate degree leaving 27 courses.

Courses Fulfilled By Your Associate Degree

This is an unofficial estimate of your transfer credit. You may recieve more or less credits depending upon the specific courses taken to complete your degree and other credits you may have.

Below are the anticipated courses that will be fulfilled based on your indication that you have earned an associate degree. During the enrollment process this information will be verified.

General Education

Welcome to Composition: Successful Self-Expression! In this course, you will focus on four main topics: professional writing for a cross-cultural audience, narrowing research topics and questions, researching for content to support a topic, and referencing research sources. Each section includes learning opportunities through readings, videos, audio, and other relevant resources. Assessment activities with feedback also provide opportunities to check your learning, practice, and show how well you understand course content. Because the course is self-paced, you may move through the material as quickly or as slowly as you need to gain proficiency in the seven competencies that will be covered in the final assessment. If you have no prior knowledge or experience, you can expect to spend 30-40 hours on the course content. You will demonstrate competency through a performance assessment. There is no prerequisite for this course and there is no specific technical knowledge needed.

Health, Fitness, and Wellness focuses on the importance and foundations of good health and physical fitness—particularly for children and adolescents—addressing health, nutrition, fitness, and substance use and abuse.

American Politics and the U.S. Constitution examines the evolution of representative government in the United States and the changing interpretations of the civil rights and civil liberties protected by the Constitution. This course will give candidates an understanding of the powers of the branches of the federal government, the continual tensions inherent in a federal system, the shifting relationship between state and federal governments, and the interactions between elected officials and the ever-changing electorate. This course will focus on such topics as the role of a free press in a democracy, the impact of changing demographics on American politics, and the debates over and expansion of civil rights. Upon completion of the course, candidates should be able to explain the basic functions of the federal government, describe the forces that shape American policy and politics, and be better prepared to participate in America’s civic institutions. This course has no prerequisite.

Ethics in Technology examines the ethical considerations of technology use in the 21st century and introduces students to a decision-making process informed by ethical frameworks. Students will study specific cases related to important topics such as surveillance, social media, hacking, data manipulation, plagiarism and piracy, artificial intelligence, responsible innovation, and the digital divide. This course has no prerequisites.

Applied Probability and Statistics is designed to help students develop competence in the fundamental concepts of basic statistics including: introductory algebra and graphing; descriptive statistics; regression and correlation; and probability. Statistical data and probability are often used in everyday life, science, business, information technology, and educational settings to make informed decisions about the validity of studies and the effect of data on decisions. This course discusses what constitutes sound research design and how to appropriately model phenomena using statistical data. Additionally, the content covers simple probability calculations, based on events that occur in the business and IT industries. No prerequisites are required for this course.

Introduction to Systems Thinking provides learners with the skills required to engage in a holistic systems-based approach to analyzing complex problems and solutions. This course introduces the foundational concepts and principles of systems thinking and provides opportunities to use a systems thinking approach to analyze and evaluate real-world case studies. The course will culminate with using systems thinking to develop a solution to an authentic complex problem. This course has no prerequisites, but general education math (C955 or C957) is preferred. Because the course is self-paced, learners may move through the material as quickly or as slowly as needed, with the goal of demonstrating proficiency in the five competencies covered in the final assessment. If learners have no prior knowledge of this material, they can expect to spend 30 to 40 hours on the course content.

Applied Algebra is designed to help you develop competence in working with functions, the algebra of functions, and using some applied properties of functions. You will start learning about how we can apply different kinds of functions to relevant, real-life examples. From there, the algebra of several families of functions will be explored, including linear, polynomial, exponential, and logistic functions. You will also learn about relevant, applicable mathematical properties of each family of functions, including rate of change, concavity, maximizing/minimizing, and asymptotes. These properties will be used to solve problems related to your major and make sense of everyday living problems. Students should complete Applied Probability and Statistics or its equivalent prior to engaging in Applied Algebra.

This course provides students an introduction to using the scientific method and engaging in scientific research to reach conclusions about the natural world. Students will design and carry out an experiment to investigate a hypothesis by gathering quantitative data. They will also research a specific ecosystem using academic sources and draw conclusions from their findings.

Welcome to Introduction to Communication: Connecting with Others! It may seem like common knowledge that communication skills are important, and that communicating with others is inescapable in our everyday lives. While this may appear simplistic, the study of communication is actually complex, dynamic, and multifaceted. Strong communication skills are invaluable to strengthening a multitude of aspects of life. Specifically, this course will focus on communication in the professional setting, and present material from multiple vantage points, including communicating with others in a variety of contexts, across situations, and with diverse populations. Upon completion, you will have a deeper understanding of both your own and others’ communication behaviors, and a toolbox of effective behaviors to enhance your experience in the workplace.

In this course you will learn key critical thinking concepts and how to apply them in the analysis and evaluation of reasons and evidence. The course examines the basic components of an argument, the credibility of evidence sources, the impact of bias, and how to construct an argument that provides good support for a claim. The course consists of an introduction and four major sections. Each section includes learning opportunities through readings, videos, audio, and other relevant resources. Assessment activities with feedback also provide opportunities to check your learning, practice, and show how well you understand course content. Because the course is self-paced, you may move through the material as quickly or as slowly as you need to gain proficiency in the four competencies that will be covered in the final assessment. If you have no prior knowledge or experience, you can expect to spend 30-40 hours on the course content.

Network and Security

Network and Security - Foundations introduces learners to the basic network systems and concepts related to networking technologies. Learners will gain skills in applying network security concepts for business continuity, data access, and confidentiality, and in identifying solutions for compliance with security guidance.

Network and Security - Applications prepares learners for the CompTIA Security+ certification exam. The course introduces learners to skills in identifying threats, attacks, and vulnerabilities to organizational security. The learner will also gain skills in designing security solutions for enterprise infrastructures and architectures, as well as in implementing security solutions across hardware, applications, and network services. Learners will be able to execute operations and incident response with tools, policies, forensics, and mitigation techniques, and to analyze information security controls, governance, risk, and compliance.

IT Fundamentals

Introduction to IT examines information technology as a discipline and the various roles and functions of the IT department as business support. Students are presented with various IT disciplines including systems and services, network and security, scripting and programming, data management, and business of IT, with a survey of technologies in every area and how they relate to each other and to the business.

IT Foundations provides learners with an understanding of personal computer components and their functions in a desktop system; a knowledge of computer data storage and retrieval; and skills in classifying, installing, configuring, optimizing, upgrading, and troubleshooting printers, laptops, portable devices, operating systems, networks, and system security. This course also gives learners the ability to recommend appropriate tools, diagnostic procedures, preventative maintenance, and troubleshooting techniques for personal computer components in a desktop system; strategies for identifying, preventing, and reporting safety hazards and environmental or human accidents in technological environments; and effective communication skills for interacting with colleagues and clients, including job-related professional behavior. The course prepares learners for the CompTIA A+ Core 1 certification exam.

IT Applications introduces skills in identifying operating systems and their configurations and in implementing security principles across devices and networks. Learners will also gain skills in troubleshooting software, security, and malware issues, and in implementing basic operational procedures in documentation, change management, compliance, and communication. The course will introduce basic disaster recovery and business continuity procedures, scripting basics, and remote access technology solutions. The course prepares learners for the CompTIA A+ Core 2 certification exam.

Data Management

Data Management Foundations offers an introduction in creating conceptual, logical and physical data models.  Students gain skills in creating databases and tables in SQL-enabled database management systems, as well as skills in normalizing databases. No prerequisites are required for this course

Data Management - Applications covers conceptual data modeling and introduces MySQL. Students will learn how to create simple to complex SELECT queries, including subqueries and joins, and how to use SQL to update and delete data. Topics covered in this course include exposure to MySQL; creating and modifying databases, tables, views, foreign keys and primary keys (FKs and PKs), and indexes; populating tables; and developing simple Select-From-Where (SFW) queries to complex 3+ table join queries. The following course is a prerequisite: Data Management - Foundations.

Risk Management

This course expands on fundamentals of information security by providing an in-depth analysis of the relationship between an information security program and broader business goals and objectives. Students develop knowledge and experience in the development and management of an information security program essential to ongoing education, career progression, and value delivery to enterprises. Students apply best practices to develop an information security governance framework, analyze mitigation in the context of compliance requirements, align security programs with security strategies and best practices, and recommend procedures for managing security strategies that minimize risk to an organization.

Web and Cloud Security

Managing Cloud Security prepares learners to safeguard cloud data with identity and access management and to implement secure solutions in cloud service models. Learners will be introduced to skills in identifying security policies and procedures for cloud applications and in implementing operational capabilities, procedures, and training in relation to organizational needs. Learners will also gain skills in conducting risk analysis and risk management in alignment with disaster recovery and business continuity plans and in identifying legal, compliance, and ethical concerns.

Ethics & Cyber Law

Security information professionals have the role and responsibility for knowing and applying ethical and legal principles and processes that define specific needs and demands to assure data integrity within an organization. This course addresses the laws, regulations, authorities, and directives that inform the development of operational policies, best practices, and training to assure legal compliance and to minimize internal and external threats. Students analyze legal constraints and liability concerns that threaten information security within an organization and develop disaster recovery plans to assure business continuity.

Networks

Networks introduces skills in configuring networking components and a network infrastructure. Learners will gain skills in optimizing network operations for availability, performance, and security, and in troubleshooting network issues. The course prepares learners for the CompTIA Network+ certification exam. Network and Security - Foundations is a prerequisite for this course.

Capstone

The capstone project consists of a technical work proposal, the proposal’s implementation, and a post-implementation report that describes the graduate’s experience in developing and implementing the capstone project. The capstone project should be presented and approved by the course instructor in relation to the graduate’s technical emphasis.

Operating Systems

Linux Foundations prepares learners for the LPI Linux Essentials certification, and is an introduction to Linux as an operating system as well as an introduction to open-source concepts and the basics of the Linux command line. Learners will gain skills in identifying the fundamentals of open-source software and to develop resources for data access and security.

Information Assurance

Introduction to Cryptography introduces skills in applying cryptography principles in alignment with organizational and information security guidelines. Students will determine requirements and techniques for cryptanalysis. This course builds skills in implementing encryption methods with symmetric and asymmetric algorithms.

Scripting and Programming

Scripting and Programming - Foundations introduces programming basics such as variables, data types, flow control, and design concepts. The course is language-agnostic in nature, ending in a survey of languages, and introduces the distinction between interpreted and compiled languages. Learners will gain skills in identifying scripts for computer program requirements and in using fundamental programming elements as part of common computer programming tasks. Learners will also gain an understanding of the logic and outcome of simple algorithms.

Introduction to Programming in Python introduces skills in creating Python scripts with basic programming concepts. Learners will be able to create control flow with functions and loops, and to implement code with packages, modules, and libraries.

Wireless & Mobile Technologies

The continual evolution of technology means that cybersecurity professionals must be able to analyze and evaluate new technologies in information security such as wireless, mobile, and internet technologies. Students review the adoption process that prepares an organization for the risks and challenges of implementing new technologies. This course focuses on comparison of evolving technologies to address the security requirements of an organization. Students learn underlying principles critical to the operation of secure networks and adoption of new technologies.

Business of IT

Business of IT - Applications examines Information Technology Infrastructure Library (ITIL®) terminology, structure, policies, and concepts. Focusing on the management of information technology (IT) infrastructure, development, and operations, learners will explore the core principles of ITIL practices for service management to prepare them for careers as IT professionals, business managers, and business process owners. This course has no prerequisites.

In this course, students will build on industry standard concepts, techniques, and processes to develop a comprehensive foundation for project management activities. During a project's life cycle, students will develop the critical skills necessary to initiate, plan, execute, monitor, control, and close a project. Students will apply best practices in areas such as scope management, resource allocation, project planning, project scheduling, quality control, risk management, performance measurement, and project reporting. This course prepares students for the following certification exam: CompTIA Project+.

Penetration Testing

Penetration Testing and Vulnerability Analysis introduces learners to the skills necessary to perform penetration testing and vulnerability management within an organization. Learners will gain skills in defining the scope and planning for procurement of penetration testing engagements and in performing cyber reconnaissance for information gathering and vulnerability identification. Learners will also gain skills in developing penetration testing techniques in exploitation of physical, digital, and social vulnerabilities, and to simulate attacks and responses on an organization's security infrastructure. Lastly, learners will gain skills in reporting the results of cybersecurity assessments with recommended actions.

Hacking Countermeasures and Techniques

Traditional defenses—such as firewalls, security protocols, and encryption—sometimes fail to stop attackers determined to access and compromise data. This course provides the fundamental skills to handle and respond to computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students learn how to leverage intelligence and threat detection techniques; analyze and interpret data; identify and address vulnerabilities; suggest preventative measures; effectively respond to and recover from incidents; and handle various types of incidents, risk assessment methodologies, and various laws and policies related to incident handling. This course prepares students for the CompTIA Cybersecurity Analyst (CySA+) certification exam. The following courses are prerequisites: Networks and Network and Security – Applications.

Secure Systems Analysis & Design

This course lays the foundation for understanding terminology, principles, processes, and best practices of information security at local and global levels. It further provides an overview of basic security vulnerabilities and countermeasures for protecting information assets through planning and administrative controls within an organization. This course has no prerequisites.

IT security professionals must be prepared for the operational demands and responsibilities of security practitioners including authentication, security testing, intrusion detection and prevention, incident response and recovery, attacks and countermeasures, cryptography, and malicious code countermeasures. This course provides a comprehensive, up-to-date global body of knowledge that ensures students have the right information, security knowledge, and skills to be successful in IT operational roles to mitigate security concerns and guard against the impact of malicious activity. Students demonstrate how to manage and restrict access control systems; administer policies, procedures, and guidelines that are ethical and compliant with laws and regulations; implement risk management and incident handling processes; execute cryptographic systems to protect data; manage network security; and analyze common attack vectors and countermeasures to assure information integrity and confidentiality in various systems. This course prepares students for the Systems Security Certified Practitioner (ISC2 SSCP) certification exam.

Digital Forensics and Incident Response

Digital Forensics in Cyber Security examines the relationships between incident categories, evidence handling, and incident management. This course teaches students to identify consequences associated with cyber threats and security laws using a variety of tools to recognize and recover from unauthorized, malicious activities and how to seek evidence that reveals who, what, when, where, and how threats compromise information.

Wireless & Mobile Technologies

The continual evolution of technology means that cybersecurity professionals must be able to analyze and evaluate new technologies in information security such as wireless, mobile, and internet technologies. Students review the adoption process that prepares an organization for the risks and challenges of implementing new technologies. This course focuses on comparison of evolving technologies to address the security requirements of an organization. Students learn underlying principles critical to the operation of secure networks and adoption of new technologies.

34 Courses

Program consists of34 courses

At WGU, we design our curriculum to be timely, relevant, and practical—all to help you show that you know your stuff.

Program Guide

Capstone Project

Special requirements for this program

At the end of your program, you will complete a capstone project that represents the culmination of all your hard work—this project consists of a technical work proposal, the proposal’s implementation, and a post-implementation report that describes the graduate’s experience.

Request Info

Skills For Your Résumé

As part of this program, you will develop a range of valuable skills that employers are looking for.

  • Cyber Security: Developed processes that integrate best security practices across an organization, enhancing overall cybersecurity posture and minimizing vulnerabilities.
  • Information Assurance: Created a risk management plan for threat mitigation countermeasures relevant to the organization, ensuring proactive identification and mitigation of potential cybersecurity risks.
  • Incident Response: Detected adverse events using cyber defense tools, enabling rapid response and mitigation of cybersecurity incidents.
  • Cybersecurity Strategy: Developed an information security strategy that aligns with organizational goals, objectives, and existing security strategies, ensuring a comprehensive and cohesive approach to cybersecurity.
  • Problem Solving: Compared alternatives to select the optimum solution to a problem, demonstrating analytical and decision-making skills in resolving cybersecurity challenges.
  • Incident Response: Created policies and procedures for an adverse cybersecurity event, establishing clear guidelines for responding to and recovering from cybersecurity incidents effectively.

“If you can hold yourself accountable, then WGU is the way to go. The price is excellent, [and] the competency based approach means you feel pride in every class you pass.”

—Detron Phillips
B.S. Cybersecurity and Information Assurance

WGU vs. Traditional Universities
Compare the Difference

Traditional Universities

Cybersecurity Courses Online – Bachelor’s Degree | WGU (1)

AVG. cost
For 3RD PARTY IT CERTIFICATIONS

$350*

Included with your tuition cost

TUITION STRUCTURE

Per credit hour

Flat rate per 6-month term

SUPPORT

Schedule and wait days or even weeks to meet with one of many counselors

Simply email or call to connect with your designated Program Mentor who supports you from day one

EXAMS

Scheduled time

Whenever you feel ready

SCHEDULE

Professor led lectures at a certain time and place

Courses available anytime, from anywhere

TIME TO FINISH

Approximately 4 years, minimal acceleration options

As quickly as you can master the material, typically less than 3 years

TRANSFER CREDITS

Few accepted, based on certain schools and specific courses

A generous transfer policy that is based on your specific situation

*The cost of valuable industry certification exams can range from $150 to $400. At WGU, we offer vouchers for certification exams, so the cost is included in your tuition price. Students may have to pay additional fees for membership to complete the certification requirements.

Traditional Universities

Cybersecurity Courses Online – Bachelor’s Degree | WGU (2)

AVG. cost
For 3RD PARTY IT CERTIFICATIONS

$350*

AVG. cost
For 3RD PARTY IT CERTIFICATIONS

Included with your tuition cost

TUITION STRUCTURE

Per credit hour

TUITION STRUCTURE

Flat rate per 6-month term

SUPPORT

Schedule and wait days or even weeks to meet with one of many counselors

SUPPORT

Simply email or call to connect with your designated Program Mentor who supports you from day one

EXAMS

Scheduled time

EXAMS

Whenever you feel ready

SCHEDULE

Professor led lectures at a certain time and place

SCHEDULE

Courses available anytime, from anywhere

TIME TO FINISH

Approximately 4 years, minimal acceleration options

TIME TO FINISH

As quickly as you can master the material, typically less than 3 years

TRANSFER CREDITS

Few accepted, based on certain schools and specific courses

TRANSFER CREDITS

A generous transfer policy that is based on your specific situation

*The cost of valuable industry certification exams can range from $150 to $400. At WGU, we offer vouchers for certification exams, so the cost is included in your tuition price. Students may have to pay additional fees for membership to complete the certification requirements.

Why WGU?

Earning Potential

According to a 2023 Harris Poll, just two years after graduation, WGU grads report earning $22,200 more per year, and that amount increases to $30,300 four years after graduation.

PAYING FOR SCHOOL

On Your Schedule

No class times, no assignment deadlines. You are in charge of your learning and schedule. You can move through your courses as quickly as you master the material, meaning you can graduate faster.

A FLEXIBLE SCHEDULE

Entirely Online

The cybersecurity bachelor's degree at WGU is 100% online, which means it works wherever you are. You can do your coursework at night after working at your full-time job, on weekends, while you're traveling the world or on vacation—it's entirely up to you.

ADMISSIONS INFO

Accredited, Respected,
Recognized™

One important measure of a degree’s value is the reputation of the university where it was earned. When employers, industry leaders, and academic experts hold your alma mater in high esteem, you reap the benefits of that respect. WGU is a pioneer in reinventing higher education for the 21st century, and our quality has been recognized.

IT CERTIFICATIONS

3rd Party Cybersecurity Certifications Included

Industry certifications in this degree program currently include, but not limited to: CompTIA CySA+, CompTIA Project+, CompTIA Security+, (ISC)2 certs and more.

The cost of these certifications is included in your tuition, helping you save money as you enhance your skills in IT security. Earning certifications before you’ve even finished your degree gives you the knowledge, skills, and credentials that will immediately boost your résumé.

SEE MORE ABOUT CERTIFICATIONS

Cybersecurity Courses Online – Bachelor’s Degree | WGU (3)

  • ITIL®*^ Foundation Certification

*Subject to vendor availability.
^ITIL® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

  • A+
  • Network+
  • Security+
  • Project+
  • CySA+
  • Network Vulnerability Assessment Professional
  • Network Security Professional
  • Security Analytics Professional
  • PenTest+
  • IT Operations Specialist
  • Secure Infrastructure Specialist

Cybersecurity Courses Online – Bachelor’s Degree | WGU (4)

  • Linux Essentials

As well as:

  • Certified Cloud Security Professional (CCSP) – Optional Voucher
  • Systems Security Certified Practitioner (SSCP) – Associate of (ISC)² designation

COST & TIME

An Affordable Cybersecurity Bachelor's Degree

By charging per six-month term rather than per credit—and empowering students to accelerate through material they know well or learn quickly—WGU helps students control the ultimate cost of their degrees. The faster you complete your program, the less you pay for your degree.

Tuition Calculator

Pay less by completing your program faster

TOTAL COST:

$

.

5

1

1

.

5

2

2

.

5

3

3

.

5

4

Cybersecurity Courses Online – Bachelor’s Degree | WGU (5)

Cybersecurity Courses Online – Bachelor’s Degree | WGU (6)

YEARS

A College Degree Within Reach

There is help available to make paying for school possible for you:

The average student loan debt of WGU graduates in 2022 (among those who borrowed) was less than half* the national average.

Responsible Borrowing Initiative

Most WGU students qualify for financial aid, and WGU is approved for federal financial aid and U.S. veterans benefits.

Financial Aid

Find out if you're eligible for the $5,000WGU Cybersecurity Scholarship.

Scholarships

*WGU undergraduate students have approximately half the debt at graduation compared to the national average, according to theInstitute for College Access and Success (2022).

FLEXIBLE SCHEDULE

A Different Way to Learn: Degree Programs Designed to Fit Your Life—and All the Demands on Your Time

Professional responsibilities. Family obligations. Personal commitments. At WGU, we understand schedules are tight and often unpredictable for adult students. That’s why we offer a flexible, personalized approach to how education should be. No rigid class schedules. Just a solid, career-focused teaching program that meshes with your current lifestyle. You'll be challenged. You'll work hard.But if you commit yourself and put in the hours needed, WGU makes it possible for you to earn a highly respected degree as a busy working adult.

REQUEST MORE INFO

"Honestly, for my lifestyle and career path, WGU has been the best. I've been working in IT for over 20 years. The classes were, for the most part, directly tied to my experience, which made it easier. The certifications are great. Each instructor was helpful as needed and the resources that the program offers are very helpful.”

—Matthew
B.S. Cybersecurity and Information Assurance

Cybersecurity Courses Online – Bachelor’s Degree | WGU (7)

CAREER OUTLOOK

An IT Degree that Leads to an In-Demand Career

So much of modern life takes place online: social interactions, work, banking, shopping, and more—which only increases the demand for experts who can protect sensitive information from cyberattacks. The knowledge, techniques, and certifications you’ll earn as you complete your cybersecurity and information assurance degree will prepare you to successfully fill the ever-growing demand for information security specialists.

Every industry and private citizens are counting on our cybersecurity and information assurance experts to detect system vulnerabilities and protect sensitive data. An online degree in cybersecurity from WGU allows you to become a key member of any security team, protecting reputable organizations and government agencies from attackers.

MORE ABOUT CAREERS

Return on Your Investment

On average, WGU graduates see an increase in income post-graduation

Average income increase from all degrees in annual salary vs. pre-enrollment salary. Source:2023 Harris Poll Surveyof 1,655 WGU graduates.

Survey was sent to a representative sample of WGU graduates from all colleges. Respondents received at least one WGU degree since 2017.

35%

The number of positions for information security analysts is projected to grow by an incredible 35% from 2021 to 2031.

—U.S. Bureau of Labor Statistics

WGU's Cybersecurity and Information Assurance Grads are Doing Crucial White-Hat Work

Our B.S. Cybersecurity and Information Assurance alumni have great jobs and satisfying careers. Examples of work our cybersecurity grads are doing include:

Job Titles

  • Cybersecurity Analyst
  • Cybersecurity Engineer
  • Vulnerability Assessment Analyst
  • Cybersecurity Architect
  • Penetration Tester

Diverse Industries

  • Private business
  • Government
  • Military
  • Law enforcement
  • Colleges and universities

Major Employers

  • AT&T
  • U.S. Department of Defense
  • Google
  • U.S. Air Force
  • Verizon

WGU Grads Hold Positions With Top Employers

Explore More

ADMISSIONS

Cybersecurity Admissions Requirements

To be considered for enrollment into this program, you must possess a high school diploma or its equivalent AND demonstrate program readiness through oneof the following:

  • Option 1:Submit transcripts documenting completion of college-level coursework with a minimum of 2.75 GPA or higher. 
  • Option 2: Possess a bachelors or associate degree (A.A, A.S. or A.A.S. acceptable) from an accredited post-secondary institution.
  • Option 3: Submit official record of completion of a transferable IT certification, some of which may provide transfer credit into various programs.
  • Option 4: Submit high school transcripts with a minimum GPA of 3.0
  • Option 5:Submit transcripts documenting completion of previous IT coursework. IT coursework must be 300 level or higher.

NOTE: You do not need to take the ACT or SAT to be admitted to this program.Learn why we don't require these tests.

GENERAL ADMISSION REQUIREMENTS

Get Your Enrollment Checklist

Download your step-by-step guide to enrollment.

VIEW CHECKLIST

Get Your Questions Answered

Talk to an WGU Enrollment Counselor.

CONTACT AN ENROLLMENT COUNSELOR

Transfer Credits

TRANSFER INFORMATION

Get Added Support and Flexibility as You Start Your Degree
Take a course or two at your pace before committing to a full degree program. Strengthen your study habits, gain essential learning skills and, best of all, each completed course counts toward your degree requirements.

Learn More about Pathways to Starting

Frequently Asked Questions About Online Cybersecurity Degree Programs

WGU is one of the highest rated schools for cybersecurity, receiving top accreditation and awards for the program. This degree program also gives you the opportunity to earn top industry certifications as part of the degree program at no extra cost.

Absolutely. Research shows that 75 percent of cybersecurity job postings require at least a bachelor's degree, while neary a quarter require at least a master's degree. So earning a bachelor's degree in cybersecurity is critical in helping you be trained and qualified for job opportunities. Cybersecurity degree programs don't have to be expensive or time consuming, making them even more worth your time and money.

There are many kinds of degrees you can earn online including:

  • Cybersecurity
  • Accounting
  • Nursing
  • Elementary education
  • Software development
  • Cloud computing
  • Healthcare management
  • Marketing
  • IT management
  • Business management

Cybersecurity degrees tend to be challenging in their computing, coding, and scripting aspects. However, if you have a mind for that kind of work, cybersecurity can be exciting and extremely rewarding. Cybersecurity tends to be less labor intensive than lab-based work, but does take time and dedication to master.

An online bachelor's degree in information systems security or cybersecurity can prepare students for career paths focused on network systems, application security, business continuity, and more. An online bachelor's degree may also be ideal for students who are also working professionals.

Ready to Start Your WGU Journey?

Cybersecurity Courses Online – Bachelor’s Degree | WGU (2024)
Top Articles
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 6764

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.