Bachelor of Science in Cybersecurity

Program Mission

The primary purpose of the Bachelor of Science in Cybersecurity program is to protect computers and computer devices from unauthorized access to information such as, software, hardware, and data. Students will receive rigorous education to enhance their knowledge about technology, they will demonstrate and understand the importance of standard ethical and moral character while using technology and will be equipped to use their skills and function globally.

Student Learning Outcomes (SLOs)

The intended student learning outcomes for the major in Cybersecurity are aligned with Clinton College’s mission to promote academic achievement, positive moral and spiritual development, leadership qualities, and citizens who can contribute to a global society.

Content Knowledge: Students will detect and resolve security issues related to computer system and networks.

Critical Thinking: Students will develop, design, test, and evaluate software.

Problem Solving: Analyze a problem and find a solution regarding security risks. Apply computing, mathematical concepts, algorithmic principles, and computing for software structure.

Analysis and Application of Scientific Information: Students will investigate, interpret, and resolve computer incidents and understand the impact cybersecurity has locally and globally.

Degree Requirements (124 hours)

This listing of requirements is for information purposes as of the dating of this catalog. Part Two is restricted to students admitted to the bachelor’s degree and having a class standing of junior or senior.

Career Options

These are just a few of the careers you could start with a degree in Cybersecurity!

Information Security Analysis

Protect organizations from cyber threats by monitoring networks, identifying vulnerabilities, and implementing security measures.

System Testing

Test and evaluate the security of systems as an “ethical hacker” by simulating cyberattacks to identify weaknesses and prevent real breaches.

Security Consulting

Advise businesses on best practices for data protection, risk management, and compliance with security regulations.

The owner of this website has made a commitment to accessibility and inclusion, please report any problems that you encounter using the contact form on this website. This site uses the WP ADA Compliance Check plugin to enhance accessibility.