Online Bachelor's Degree in Cybersecurity
Develop Cutting-Edge Skills to Prevent Cybercrime
100% Online
3 Major Options
Accelerated Courses
Transfer Up to 90 Credits
Request More Information
Complete this form to receive information about coursework, admissions, tuition, and more.
- Duration 3.5 years
- Cost per Credit $410
- Credit Hours 120
Program Benefits
- No background in IT or computer science is required
- Learn 100% online from anywhere in courses led by experienced and industry-connected faculty
- The program offers fully paid internships open to online students at the Richard E. Neal Center of Cybersecurity Excellence and Security Operations Center at Union Station in Springfield, MA.
- Bay Path University has been named a National Center of Academic Excellence in Cybersecurity for Cyber Defense through 2027 for its Digital Forensics and Incident Response program
Become a Skilled Tech Professional with a Customizable Degree
The online Bachelor of Science in Cybersecurity degree from The American Women’s College of Bay Path University (TAWC) gives you the expertise you need to secure organizational data. As a student, you will learn using the same tools and technologies as professionals in the field to build your technical skill set. Choose from required majors in Digital Forensics and Incident Response, Information Assurance, and Risk Management to enhance your knowledge in targeted areas.
Learn to identify and investigate cybercrime by developing skills for leveraging cutting-edge digital forensic tools and techniques.
View MajorBuild the skills to protect digital infrastructure and help organizations keep valuable information secure.
View MajorGain the expertise you need to identify, evaluate, and manage threats to digital assets with courses in project management and crisis management.
View MajorMeet the Demand for Cyber Experts
Projections indicate the global cybersecurity market will increase at a compound annual growth rate of 12.3% from 2023 to 2030.1 Around 682,800 new computer and information technology jobs are expected to be added to the workforce from 2021 to 2031.2
This impressive industry growth makes now an ideal time to enter the cybersecurity field. The competencies you’ll gain in our bachelor’s program will empower you to succeed as a tech expert now and in the future.
Explore CareersCurriculum
120 total credits
40 total courses
In the online cybersecurity bachelor’s program, you will complete a university core, specialized major coursework, and a range of electives to customize your studies for your career interests. Each course is six weeks long and delivered 100% online. Study industry-focused topics like mobile technology, digital forensics, computer networks, and more to excel in many tech roles.
Course Highlights
- Cyber Governance: Privacy, Ethics, and Digital Rights
- Research and Writing in the Disciplines
- Programming Languages
Admissions Requirements – Start Your Application
Transfer up to 90 credits
6 start dates per year
Don’t put your professional goals on hold. Discover what you could achieve and apply to the online BS in Cybersecurity program today.
Applicants will need the following to apply:
A completed application |
2.0 GPA or higher Note: Students with a GPA under 2.0 may be considered |
Official transcripts from your high school or all regionally accredited institutions you have attended |
Tuition & Aid – Earn Your Degree at an Affordable Price
$410 per credit
$49,200 total tuition
Earning your degree online with TAWC is an investment in your future, which is why we provide options when it comes to financing your education. Discover the financial aid resources and scholarship opportunities available to you.
Tuition DetailsWhat You’ll Learn
The online cybersecurity bachelor’s degree delivers the interdisciplinary technical knowledge you need to protect valuable data assets and prevent cyber attacks. Depending on the cybersecurity major you choose, you will gain skills such as the ones listed here.
By Graduation, You’ll Have Skills to:
- Understand current approaches to detect, deter, and investigate incidences related to digital crime activity
- Understand the latest digital forensic tools and techniques
- Understand current issues relating to digital forensics and determine the best practices for attending to them based on available resources and tools, and the overall needs of the organization
- Demonstrate knowledge of the tools and techniques utilized to assure confidentiality, integrity, and availability of an organization’s data assets
- Recommend policy, practices, and procedures required to ensure accuracy, authenticity, utility, and possession of data, and recognize the needs of the organization for access as well as security
- Utilize critical thinking skills by demonstrating proficiency in the ability to research, understand, and communicate appropriate responses based on best practices, to test a variety of information assurance threats
- Understand various stakeholder perspectives and frameworks for assessing risk
- Describe and explain ways to mitigate risk across an enterprise
- Describe best practices for the documentation and communication of risk to various stakeholders
Douglas Keevers: Welcome, everybody to the American Women’s College here at Bay Path. Today, I’m going to discuss a little bit with you about the Cybersecurity Degree Program here at Bay Path and especially at TAWC in our graduate program in cybersecurity.
My name is Doug Keevers. I’m the Academic Program Director for IT and Cyber. Once again, I want to take the time to welcome all of you here to Bay Path. I know that the field of cybersecurity is a very large field. And I know that many of you may have reservations about whether or not you’d be interested in cybersecurity.
And I just want to talk to you a little bit about the fact that– please keep in mind that the field itself is not technical. A lot of you think that it probably is. And, yes, there are certain degrees of technology and technology acumen that you need to have. But the nice thing about cyber and the interesting thing, like many other fields, is that it is a very, very broad field. And there are many things that you can do in cybersecurity.
I’m going to go into a few of the different majors or specializations, if you will, that we have here and the programs that I run. And if you have any questions about that, I ask you to please either reach out to myself personally or to your academic advisor. I am more than willing to get on a call with anyone to help you decide the track and some of the different opportunities you may look to have interest in or to pursue as part of your degree.
So a little bit about Bay Path. We’ve been established since 1987. We have a very relatively large student population. We are accredited by NECHE. That is the pronunciation of the word. It’s the New England Commission for Higher Education. We’re a career-focused organization.
So what does that mean? It means that everything that we do in our programs right now must be geared towards the ultimate result, which is to see you all graduate but, most importantly, to be able to find employment based on the skills and knowledge you learn throughout our programs here at the American Women’s College and at Bay Path University in general.
We do have an all undergraduate women’s university here– the acronym for that is TAWC, The American Women’s College– as well as our graduate programs that are gender inclusive, meaning that we take more than just women into the program. We admit anyone, of any gender, into the graduate program.
And our top programs in particular are online and accelerated. They’re six-week sessions. So we designed that specifically for working adults and so that you can obtain your degree in a faster, more efficient time frame as opposed to taking courses that span two and three months at a time.
So let me get into a little bit more about the Bachelor of Science in Cybersecurity. This is our common core. What we mean by the common core is that all of you who would come into a cybersecurity program here at the bachelor’s level would be working through each one of these courses. I apologize. I don’t have the names of the courses here. But as you can see, all of you, regardless of the major that you would choose– and I’ll go into the majors momentarily– all of you would work through these particular foundation courses, if you will.
And again, there’s not a lot of the math or the science or anything that you would expect out of the common core. This is just the common core to get you familiar with the field of cybersecurity. We have three tracks. One here is Risk Management. Apologize for the acronym, BSORM. That just stands for Bachelor of Science in Risk Management.
And as you can see here, once you complete the core, these are your specialization courses you would take in risk management. But what is risk management really about? It’s just about that. It’s about how people protect an organization and other individuals from risk.
And you’ll take courses in things like data privacy. You’ll take a course in risk management, cyber strategy. One of the reasons that we have you taking courses like that is because it is important that you understand that cyber is more than just, as I said earlier, tech. It’s really about also the business and the operations and how to protect people and how to protect data. So cyber strategy is one particular course where you’ll lay a strategy out for how you would, in a hypothetical situation, protect your organization or maybe how you would protect your organization from things like a phishing scam. Those are just some examples.
Project management– very important in cybersecurity. It’s very important for all of you in any industry or any major that you undertake. Individuals out there as part of our advisory board always stress that they really want people who understand how to work with others. So it’s important that you understand the basics and fundamentals of project management.
One of the other specializations we have here is information assurance. And information assurance relates back to what we call the CIA triangle. It’s about confidentiality, integrity, and availability. So information assurance is about that. It’s how, do we ensure that our information is protected? How do we make sure that it is held in confidence? How do we get that information back in the same format that we stored it perhaps in and make sure that the information has got some integrity behind it? Those are important things.
You’ll learn about data privacy. You’ll learn about cloud computing. It’s a very big field today. Everyone today stores a lot of information in G Drive or in Dropbox or in SkyDrive. So understanding some of the basics about cloud computing and how information is stored and how it is retrieved is important.
And then things like the Internet of Things, what does that really mean? How do sensors connect people? What do we mean by sensors and remote devices? Those are all things that you’ll study and learn about here in this particular specialization.
Our third specialization is digital forensics and incident response. This is more along the lines, for those of you who think about things like CSI. Digital forensics is about protecting or gathering information from devices that other people have had. How do you pull that information from those devices and prepare that information for use perhaps in court?
For those of you in legal study, working with attorneys, this is very important. There is a methodology that you have to follow in order to preserve data for use as evidence in court. So you’ll take courses in digital forensics, in cyber investigations, where you’ll look at different data, how it resides, where it resides, and how to bring it back. You’ll do work in mobile technology.
Again, all of us, everywhere we go today, we carry these with us. Make no mistake about it. They are a computer. And lots of data is stored and housed on these mobile devices today. So those are some of the things you’ll learn in this particular specialization.
Again, there are three– so the digital forensics, information assurance, and risk management. If you’re not sure which way to go, that’s perfectly fine. Most people don’t. And most students that I work with will change their direction sometimes once, maybe even twice, to determine what area of cyber they really enjoy the most.
Again, it’s a very, very wide field. It’s growing. It is not just the tech, the cryptography, or the biometrics, or the things that you think about when you say, wow, I really like cyber. There’s a lot of opportunity. But am I capable of understanding the technology? The answer to it is you absolutely are. It’s just that you need to understand some of the foundational elements to prepare you for a career in cyber.
But we’ve got you covered. So as long as you talk to your advisor, again, your advisor will always have the ability to reach out to me and provide you with my phone and email. And I’m more than happy to schedule time to speak with any of you.
So what does all this really mean for you all? Career opportunities. These are just a representative list of just some of the things that you can do with a career in cybersecurity. And again, don’t let the terminology scare you away. When we say security consultant or cyber auditor, these are things– cryptographer– a lot of times, people get anxious when they see these terms and say, wow, can I really see myself as a cyber analyst? What does that analyst really do? We’re here to help you with that. And I’m particularly interested in helping you to understand these different fields because, again, the field is just so big that none of us, including me, can even keep up with it.
One of the things, and the last thing, that I want to mention to you and why I believe that Bay Path is such a prominent and awesome university, not only to work for but to attend, is that my programs here at TAWC, The American Women’s College, and also our graduate programs are now certified through the National Security Agency as what we call a CAE, or a Center of Academic Excellence.
Folks, this is very, very important because what it means is that all of our curriculum and our outcomes and our student learning outcomes are all based on what the NSA feels are requisite knowledge in order to be in the field of cybersecurity or to work in the field of cyber. So this is not– and I repeat– this is not an easy thing to manage and maintain. My staff works very hard to maintain our accreditation with the NSA. And I personally attend a lot of events where I’m constantly awed by how great the field is growing and how massive the field has become.
We are the only undergraduate all-women’s university in the United States who is certified through the NSA. Our undergraduate and graduate programs are both NSA certified. We provide a lot of different resources. And these are just a few. As part of our NSA accreditation, we have things like cyber mentorship programs, where you can work with other people who have been in the field of cybersecurity for years and use them as a mentor to ask questions to and help you in your curriculum and in your career direction or trajectories.
We have a partnership with the Mass Cyber Center, where we utilize things like a SOC, Security Operations Center, internships, where you can actually work with others in a live cyber environment and do things like what we call live-range activities, where you’re actually working in a real environment with others to mitigate an attack or to understand an attack or to protect information or to, as we said in risk management, protect information or even, in information assurance, pull that information from another device or another location.
The other thing, too, is that we work with industry leaders. One of them is Cyberbit. Cyberbit has been named as one of the leaders in cybersecurity skills training. And what does that mean for you? As I said earlier, my staff and I work very hard to make sure that our courses are up to date. Cybersecurity changes every week. The terminology changes. The practices change. The frameworks and methodologies– excuse me– always change.
So what we have to do is, my staff and in my organizations, we have to stay current. And how do we do that? We leverage other organizations, like Cyberbit, to utilize their tools in our courses so that you can not only understand the terminology and do well in the courses but that you can learn the tools that are applicable in industry today.
And it’s important that you understand that. It’s more than just certifications. It’s about how you can learn to take the tools that we’re teaching you and apply them to the field of cybersecurity. And that’s important from an employer perspective as well because they’re going to ask you that when you apply for a job. Yes, it’s great to say, well, I have a Security+ certification. And then they ask you, well, what have you done? Well, I’ve really never worked in the field of cybersecurity. But I have a certification.
And in my opinion, that’s because the certs sometimes teach you what you need to learn to pass the test. They don’t give you enough of the insight into the tools and the methodologies that are used in a particular field of cybersecurity. So keep that in mind when you’re looking for certifications. And make sure your certifications– that you discuss that with your advisor because it’s important you take on the correct trajectory when you’re applying for these certifications so that they complement your career or your interest in cyber.
I want to take a few moments again to thank you all for spending some time with me today. I encourage each and every one of you to reach out to me at any time should you have any questions. And before I finish, I would like to turn this over to Anise to discuss a little bit with you about the actual process for how to apply for our program. I hope to see you in the program. If you have any questions, please don’t hesitate to reach out. And thank you all again. Stay safe. Anise, I’ll turn it over to you.
Anise Fareed: Thank you, Dr. Keevers. My name is Anise Fareed. I’m the Director of Enrollment here at The American Women’s College. I wanted to very briefly go over how you can apply getting started. It just takes three easy steps.
We’ll need a completed application. We’ll want to see a GPA of 2.0 or higher. And then we just need official transcripts from either your high school or any and all regionally accredited universities or colleges that you’ve attended.
The application is very simple to fill out. You can usually fill it out with less than 10 minutes. I have a team of enrollment counselors who will be here to help you along the way, to talk to you about the programs. They can get you connected with Dr. Keevers if you have more in-depth questions. But we can help you get everything with your application together so we can get you started in one of our six terms.
Here, we also have the mailing address and the email address for transcripts. You’ll want to submit your official transcripts from your high school. Or if you’ve obtained 12 or more college credits, we don’t need your high-school transcripts, and we can just use your college credits. So we look forward to speaking with you. And thank you so much for spending some time with us this afternoon.
Douglas Keevers: Thank you, everybody. Have a great day. And please reach out with any questions you have. We look forward to seeing you enroll in Bay Path. And I look forward to seeing you in my program. Take care.
Watch our Latest Virtual Open House
Hear directly from the Program Director to learn more about the online course format, program curriculum, career outcomes, admissions process, and more.
Frequently Asked Questions
Explore our frequently asked questions for in-depth answers. If you don’t find what you’re looking for, reach out to us.
You can complete the program in just 3.5 years. To see the curriculum, view our courses page.
Tuition is $410 per credit hour. You’ll need to complete 120 credit hours for a total tuition of $49,200. You can review all tuition costs on the tuition page.
Yes, we accept up to 90 transfer credits from prior coursework and professional, volunteer, or military experience. Learn more about our requirements on the program’s admissions page.
You’ll complete 120 credits to earn your degree. You can review the courses to explore the topics.
Requirements include a high school diploma, a 2.0 GPA on a 4.0 scale, and official transcripts from your high school and, if applicable, all regionally accredited institutions you have attended. Learn more about our requirements on the program’s admissions page.
Depending on the major you choose within your degree, earning the online BS in Cybersecurity opens doors to a wide range of in-demand career possibilities. According to the U.S. Bureau of Labor Statistics, computer and information technology employment is expected to grow 15% from 2021 to 2031, much faster than the average for all occupations.
Graduates who pursue the Digital Forensics and Incident Response major can pursue careers like cybercrime analyst and digital criminology specialist, while the Risk Management major prepares students for careers that include security analyst and information security manager. The Information Assurance major is ideal for students who wish to pursue roles like information security analyst and secure systems auditor.
Sources
- Grand View Research. “Cyber Security Market Size, Share & Trends Analysis Report.” Retrieved from https://www.grandviewresearch.com/industry-analysis/cyber-security-market#:~:text=Report%20Overview,12.3%25%20from%202023%20to%202030.
- U.S. Bureau of Labor Statistics. Occupational Outlook Handbook. “Computer and Information Technology Occupations.” Retrieved from https://www.bls.gov/ooh/computer-and-information-technology/home.htm.