Implement Effective Risk Management Strategies in Any Organization
Transfer up to 90 Credits
Request More Information
Complete this form to receive information about coursework, admissions, tuition, and more.
Learn to Analyze and Manage Digital Threats
The online BS in Cybersecurity: Risk Management major from The American Women’s College of Bay Path University (TAWC) delivers the tools and technical competencies you need to develop strategic plans to mitigate risk and prevent cyber attacks. Through an interdisciplinary curriculum that combines skills from areas ranging from project management to programming, you will graduate ready to protect your organization’s digital assets.
Risk Management Major Curriculum
14 major courses
3 credits per course
The Bachelor’s in Cybersecurity: Risk Management degree combines coursework in data privacy, crisis management, and incident recovery for a specialized skill set. You will also complete a capstone course focused on current issues in the field, preparing you to address real workplace challenges.
Students can also complete two graduate-level courses during their senior year. This option allows you to fast-track your master’s degree.
To view the complete list of program courses, visit the program curriculum page.
Required Major Courses
This course is intended to cover most of the fundamental aspects of modern project management (PM), both managerial and technical, as well as to give direct experience in implementing appropriate tools and techniques. By the end of this course, students should have a mastery of the basic theory and practice of PM, as described by the core knowledge modules (KMs) developed by Project Management Institute (PMI.) The course will draw extensively from the following three knowledge modules: Project Management Principles, Project Phases and Processes, and Project Planning and Integration.
The purpose of this course is to explore the evolving crime phenomenon resulting from the technology revolution over the last 60 years. An examination of the unique human-computer relationship will be conducted to develop an understanding of how criminal activity has adopted the use of new technologies to further their criminal activity. Additionally, a review of social constructs relating to high tech criminal activity will be provided.
Describes the legal and ethical issues associated with information security including access, use, and dissemination. It emphasizes legal infrastructure relating to information assurance, such as the Digital Millennium Copyright Act and Telecommunications Decency Act, and emerging technologies for management of digital rights. It examines the role of information security in various domains such as healthcare, scientific research, and personal communications such as email. It examines criminal activities such as computer fraud and abuse, desktop forgery, embezzlement, child pornography, computer trespass, and computer piracy.
This course will provide students with the knowledge and skills required to collect and interpret evidence related to network intrusions such as: network traffic, network devices, servers and operating systems. Specifically, students will learn crisis management skills while collecting and analyzing network traffic and protocols.
Prerequisite: CSC 210
This course builds a common cross-disciplinary understanding in the foundations of information assurance. Presents an overview of basic principles and security concepts related to information systems, including workstation security, system security, and communications security. It introduces information security via database technology, discusses legal infrastructure such as DMCA, Telecommunications Act, wire fraud, and other ethical issues. Covers security methods, controls, procedures, economics of cybercrime, criminal procedure, and forensics. It describes the use of cryptography as a tool, software development processes, and protection.
This course identifies legislation, policies and frameworks in the US and the EU related to computer and digital privacy, building upon earlier CBY curriculum. Students will learn concepts of personally identifiable information (PII) across multiple platforms and industries. From a risk management perspective, by the end of the course, students will understand how to protect PII and data privacy.
This capstone course is designed to provide an opportunity for the student to synthesize, reflect upon, and analyze the complex and robust field of cybersecurity. This course will highlight the major current issues in the field of cybersecurity.
Prerequisite: CBY 202, CBY 301, and CSC 210
In this course, students will be provided a baseline of knowledge of the fundamentals of computers and digital literacies to ensure they will be able to understand a constantly changing technology oriented landscape. In this course, students will be exposed to the fundamentals of computing technology, including computer hardware and software concepts; the Windows operating system and commands; drives, folders, and files; Google’s suite of applications; use of the Internet and growing connectivity with everyday devices; and digital literacy knowledge and skills. By mastering the fundamentals of computing technology and demonstrating digital literacy, students will have the skills needed to thrive in the 21st century workforce.
This course emphasizes technical computing concepts and the development of skills in a technology driven world. It further provides students with skills to perform basic operations involved in system administration, with an understanding of the roles of an operating system, its basic functions, and the services provided by the operating system. An introduction to coding languages is provided. Finally, the course provides students with the ability to create simple scripts/programs to automate and perform simple operations.
The purpose of this course is an in-depth exploration of data security controls and techniques. This course will examine theoretical concepts of network security implementation. This course will examine network security tools and techniques and include hands-on practical applications. Networking has enabled the emergence of mobile and cloud computing, creating one of the most important technological paradigm shifts in computing of the past decade. Coming advancements in wireless networking are expected to transform the technological landscape over the next decade by enabling an endless possibility of new applications, including the Internet of Things and wireless virtual reality, through the emergence of wireless networks with gigabit speeds. In order to play a role in this era of new network-powered advancements, students must have a thorough understanding of emerging networking topics, especially in the wireless domain.
This course introduces a systematic approach to programming. Specifically, this course teaches students to use Python to solve real world problems. By the end of the course, students will be able to construct a program from a series of instructions in Python.
In this course students will apply the practices for effective reading and writing introduced in ENG 114 to the distinctive language and forms of various disciplines. This course lays the foundation for academic and professional research and stresses the use of appropriate and effective information sources. Readings for a variety of academic audiences will provide students with strategies to communicate in the sciences, business and technology, psychology, liberal studies, and the social sciences. Research and documentation skills appropriate to the disciplines are stressed. In addition to leading students through the research process from start to finish, this course will examine the many ramifications of academic honesty.
Prerequisite: ENG 114
What You’ll Learn
Graduates of the online BS in Cybersecurity: Risk Management degree program are equipped with a balance of problem-solving, leadership, and technical knowledge. This unique combination of skills prepares you to create and implement effective risk management strategies.
By Graduation, You’ll Have Skills to:
- Demonstrate an understanding of various stakeholder perspectives and frameworks for assessing risk
- Describe and explain ways to mitigate risk across an enterprise
- Describe best practices for the documentation and communication of risk to various stakeholders
Prepare to Excel in a Growing Industry
Risk management is an essential part of the information security strategies used by organizations of all sizes and across industries. With projections indicating the global cybersecurity market will increase at a compound annual growth rate of 12.3% from 2023 to 2030,1 now is an ideal time to expand your technical skill set with our online risk management bachelor’s degree.
- $72,419 average annual salary for security analysts2
- $122,171 average annual salary for information security managers3
Learn from Industry Experts
At The American Women’s College, your learning is expanded by the rich workplace experience our faculty bring to the classroom. Faculty are professionals who hold an array of titles in the fields they teach. Their involvement in the day-to-day challenges of their role and industry brings curriculums to life with real-world examples as you connect what you learn to what they share.
Each faculty member at TAWC incorporates real industry experience into each lesson. As a student, you’ll receive personalized, one-on-one support and graduate fully prepared to face the challenges of your chosen field.
Douglas Keevers, EdD, Academic Program Director, Cybersecurity
Prior to joining Bay Path, Dr. Keevers served in academic positions as director of distance education, core faculty, methodologist, university research reviewer, and other academic appointments. Before entering academia, Dr. Keevers worked for IT-centric organizations such as Microsoft and Compaq/Hewlett Packard.
Dr. Keevers holds a Doctorate in eLearning & Instructional Technology from Northcentral University, a master’s degree in information technology management, and post-graduate coursework in business management and information security. He is also certified by the Department of Homeland Security (DHS) and the Federal Emergency Management Agency (FEMA) and holds a certification as a mobile forensics examiner.
Dr. Keevers’ research interests include eLearning, intrinsic motivational theory, and the Internet of Things (IoT). He is also an active member of InfraGard, a joint partnership run by the FBI and the private sector.
Choose Your Major
Customize your BS in Cybersecurity program by choosing from three career-focused majors designed to help you achieve your professional goals. In addition to this major, we offer majors in:
BS in Cybersecurity: Digital Forensics and Incident Response
Learn to identify and investigate cybercrime by developing skills for leveraging cutting-edge digital forensic tools and techniques.
BS in Cybersecurity: Information Assurance
Build the skills to protect digital infrastructure and help organizations keep valuable information secure.
Frequently Asked Questions
Explore our frequently asked questions for in-depth answers. If you don’t find what you’re looking for, reach out to us.
Choosing a major for your cybersecurity degree allows you to gain career-ready skills in a specific area of expertise. With these specialized skills, you can stand out to employers and qualify for specialist positions in the field.
While completing the Risk Management major, you’ll gain the expertise to identify, evaluate, and manage threats to digital assets using a combination of crisis management, project management, and risk management skills.
You’ll complete 120 credits, including 42 major-specific credits, to earn the BS in Cybersecurity: Risk Management. For more information, review the courses page.
Requirements include a high school diploma, a 2.0 GPA on a 4.0 scale, and official transcripts from your high school and, if applicable, all regionally accredited institutions you have attended. Learn more about our requirements on the program’s admissions page.
The online BS in Cybersecurity is offered 100% online at this time. This allows you to study at the times and locations that are best for you throughout your entire program without ever coming to campus.
Yes, it is possible to change your major after enrollment. Depending on the transferability of courses, you may lose credits by doing so. Contact us for more information.
Graduates of this program are prepared to take on roles like security analyst, information risk consultant, and information security manager. Learn more about your career options by visiting the careers page.
- Grand View Research. “Cyber Security Market Size, Share & Trends Analysis Report.” Retrieved from https://www.grandviewresearch.com/industry-analysis/cyber-security-market#:~:text=Report%20Overview,12.3%25%20from%202023%20to%202030.
- Payscale. “Average Security Analyst Salary.” Retrieved from https://www.payscale.com/research/US/Job=Security_Analyst/Salary.
- Payscale. “Average Information Security Manager Salary.” Retrieved from https://www.payscale.com/research/US/Job=Information_Security_Manager/Salary.