Must complete 90 credits in major before taking this course.
Cyber threats are growing rapidly within businesses and organizations across all sectors and the need for highly trained cyber security professionals is more critical than ever before. Designed to meet the needs of today’s businesses, and with a focus on hands-on experience and problem solving, Champlain’s nationally recognized online bachelor’s in cybersecurity degree is the ideal program for those looking to advance their careers in this critical field. Delivering cutting-edge education and virtual hands-on learning application, a degree in cybersecurity from Champlain will make you stand out in the field and advance your career.
Build Your Career Future
In a field that changes as rapidly as cybersecurity, with new technologies and best practices constantly emerging, it’s essential that your cyber security undergraduate degree helps you build a foundational skillset that can help you adapt and grow. Champlain’s program emphasizes both core technical skills (including knowledge of over 31 key applications, platforms, and programming languages) and essential soft skills like critical thinking and problem-solving that you can immediately apply to your workplace and that will give you an adaptive edge as global digital environments become more complex.
Grow Your Cyber Network
With thousands of sought after CCO cybersecurity alums around the world, you'll be joining an elite group of networked industry leaders looking for new talent. Your practitioner faculty, program directors and advisors will also help you set yourself up for a successful career in cybersecurity.
A Nationally Recognized Leader in Cybersecurity
Champlain is a nationally recognized leader in cybersecurity and digital forensics education and home of the Senator Patrick Leahy Center for Digital Investigation & Cybersecurity. With a robust faculty of expert-practitioner instructors who have significant experience working for top organizations and are sought-after thought leaders in the field, we specialize in building agile cybersecurity and digital forensics programs that the meet mission-critical needs of today's businesses, nonprofit organizations, and state and federal governments.
Champlain has been designated a National Center of Academic Excellence in Cyber Defense Education by the U.S. National Security Agency and the Department of Homeland Security since 2006, and Champlain cybersecurity programs have been named best in the nation by SC Magazine. Champlain is also designated as a National Center of Digital Forensics Academic Excellence by the Defense Cyber Crime Center (DC3) Air Force Office of Special Investigations - the fifth college in the nation, and the only private college in the country, to receive this distinction.
Fast Start Formula Career Bundle
Propel your career even further with our Fast Start Formula Career Bundle designed to get you noticed and get you hired. Gain access to the Fast Start Formula Career Course, the Landing A Job You'll Love Ebook, and live webinars with "hot seat" coaching by Executive Career Coach Jen Morris.
Academic Excellence and Recognition
Designated among the best schools with accelerated bachelor's degrees by Intelligent.com
Consistently ranked among the Best Online Bachelor's Degrees by US News & World Report
Ranked among the Most Affordable Online Cybersecurity Bachelor's Degrees
Accredited by the New England Commission of Higher Education
What Can You Do With a Degree in Cybersecurity?
Cybersecurity careers are expected to grow 33% between 2020 and 2030, significantly higher than the average growth for all fields, as a result of increase cyber threats across all industries. The median annual salary for information security professionals is over $103,590.*
The strong demand for cybersecurity talent means that job opportunities are available in virtually every field and sector, including cyber incidence response, cyber risk and strategic analysis, vulnerability detection and assessment, and more. There is also a particular need for cyber professionals in the federal government, which has designated cybersecurity as a mission-critical function.
*Sources: Bureau of Labor Statistics (BLS), 2020; job titles: cyberdegrees.org, 2020
Top Jobs for Bachelor's in Cybersecurity Graduates
- Incident Responder
- Penetration Tester
- Security Administrator
- Security Analyst
- Security Engineer
- Security Auditor
- Vulnerability Assessor
Learn more about Champlain's 100% online cyber security bachelor's degree, designed for working professionals.
Champlain's online cyber security course portfolio encompasses the critical skills needed by today's cybersecurity professionals. Graduates of the program are required to complete the following courses.
Professional Courses (60 credits)
Technical Electives (12 credits)
General Education Courses (42 credits)
General Electives (6 credits)
Note: Some of the courses in this program are available in 15-week terms only. Please contact your advisor for details.
Professional Courses (60 Credits):
This course provides students with an understanding of the many different devices and technologies, from historical to emerging, that are required to design and build networks. In a broad survey of concepts and terminology, students will learn about topology, communications, protocols, and security, and to diagram basic networks to specification.
From day one, students in this course are problem solving, first in terms of algorithmic design and then as early as week two via programming in the latest version of Python, using PyCharm. Students begin by writing a program to have a conversation, having strings and numbers as input, and advance, by week seven, to building a working password saver program, capable of looking up, adding (and encrypting), and storing passwords.
This course, through guided research and hands-on learning experiences, provides students with an understanding of operating systems, including their core fundamental principles and how they work. Students are introduced to the three most popular operating systems for personal computers (Windows, OSX and Linux), and mobile operating systems, and learn about standard functions such as memory, process/thread, input/output, storage and device management.
Students are presented with the opportunity to expand and showcase their knowledge and abilities in this 15-week course where they are expected to work independently and develop a project related to their major.
This course is a thorough review of the Transmission Control Protocol/Internet Protocol (TCP/IP) which is used extensively in corporate enterprise networks and the Internet. The course will cover the structure of TCP/IP, its application to data networks, and security issues.
This course will introduce foundation subject matter and technologies that are critical to the multidisciplinary landscape of cybersecurity.
Complete CMIT-130 and CMIT-135.
This exciting course introduces students to the myriad software tools and best practices for handling digital evidence. Labs utilize Champlain College Online's Forensic VDI and challenge students to begin building their skills, from creating a hash value for a forensic copy with X-Ways Forensics and FTK Imager, to examining evidence with The Sleuth Kit (TSK), Autopsy and/or EnCase.
Complete CMIT-135 and CMIT-140
Through this course, students learn about what makes up an operating system and the various threats to that operating system and, by extension, the user. The focus of this course is on CentOS Linux and Windows Server.
In CYBR-260, students learn how to script with Python (through IDLE and PyCharm), keeping in sight that being able to program is not just about being able to program. It's also about understanding how programs are put together and how they work, what is possible, and how to control the system.
Cloud computing has become increasingly central to Information Security (IS) strategies both at the corporate and personal level. It unifies a variety of technologies to provide businesses a method to improve business efficiency and reduce costs. This course will cover concepts, protocols and implementation details for working with and implementing cloud technologies within an organization.
In this class, students take an intense look at networks and the ways that we provide appropriate controls and technology to provide security to them, while using Wireshark and NMAP as supporting tools.
Mobile devices are convenient, portable, inexpensive, powerful and essential to a lot of people. Considering many people have their own smartphones, it makes sense for some businesses to make use of that by allowing employees to use their smartphones to connect to corporate infrastructure for communication functions. This introduces security issues. Smartphones and tablets are not the only areas where wireless technology introduces risk into the enterprise environment, not to mention putting individuals at risk. Bluetooth, 802.11 wireless networks and near field communications all have the potential to be harmful. This course will cover the risks and remediations associated with wireless technology.
This is a course on how to find and exploit vulnerabilities in systems. While discussing the ethical and legal framework of these activities, students will use Google search techniques (a.k.a. Google Hacking), online applications, including Damn Vulnerable Web Application (DVWA), and Champlain’s virtual environments equipped with Kali Linux, Metasploitable, Nessus, Nexpose, NMAP, Zed Attack Proxy (ZAP), W3AF, Burp, and Security Administrator Tool for Analyzing Networks (a.k.a. SATAN), among other tools.
Take CMIT-135,WEBD-125 and WEBD-220 or CYBR-210
CYBR-320 covers strategies, techniques and technologies used in attacking and defending information systems, and how to design secure networks and protect against intrusion, malware and other hacker exploits. Students will use the Security Onion Linux distribution and the Security Onion toolkit and will perform some log analysis. However, the course has its bigger focus on best practices.
CYBR-240, CFDI-240, CYBR-210.
In CYBR-410, students have a look on how the landscape of threats and defenses is evolving. Some of the tools used in the class are: Social Engineer's Toolkit (Kali Linux), Metasploitable, Low Orbit Ion Cannon (loic), hping3, TinyCA, and openSSL.
This introductory course to Wireless LANs focuses on the design, planning, implementation, operation, and troubleshooting of Wireless LANs. It covers a comprehensive overview of technologies, security, and design best practices with particular emphasis on hands-on skills.
This course examines cybersecurity policy planning in an organizational context. The aim is to examine key procedures, such as security requirements analysis and risk assessments, to determine their roles in policy formation.
From storyboard to form creation, students walk through the steps to create a basic four to five-page website to specification in this course that introduces HTML5 and CSS. Hands-on assignments reinforce skills development and best practices in design: navigation, column layout, image editing and usage, fonts and tables.
NETW-255 is a lab-based course designed to introduce system administration in both Windows Server and Linux Server operating systems. Students learn how to install both Linux and Windows Operating systems, configure an Active Directory domain, learn common domain administration tasks, apply user and file management, experience application installation and configuration, and integrate the two operating systems to work together simulating a real-life work scenario.
Complete CMIT-130 and CMIT-140..
Project Management is the formal application of knowledge, skills, tools, and techniques to project-based activities to meet organizational requirements. Project management is accomplished through the use of processes such as Initiating, Planning, Executing, Monitoring and Controlling, and Closing. Project managers can divide projects into these phases to provide better management control with appropriate links to the ongoing operations of the organization. Collectively, these phases, known as the project life cycle, form the foundation for the practice of project management and are guided by the Body of Knowledge from the Project Management Institute (PMI).
Project schedules allow managers, team members, and stakeholders to track progress, set and manage expectations, communicate, control costs, and collaborate. Tasks and deliverables can be monitored and controlled to ensure timely delivery-and if any delays do occur, project managers can easily gauge their impact and make the necessary adjustments. Central to the schedule is a detailed understanding of the project budget, and working to control costs and manage stakeholder expectations.
Complete the following two courses:
This course introduces students to the foundational concepts needed to communicate effectively in writing for academic study and professional development. Students will be introduced to rhetorical modes and their role in the development of written communication. Students will also learn how to use the four stages of the writing process--prewriting, drafting, revising, and editing--to create written communication that meets its intended purpose for its intended audience.
This course builds on students' proficiency in the writing process and rhetorical modes to introduce the use of sources in written communication. Students will practice information literacy as they learn to determine information needs from sources, identify types of information resources, develop effective search strategies, and incorporate sources in written communication, legally and ethically. A minimum grade of C is required for this course to meet a general education requirement.
Complete ENGL-100 with a minimum grade of C or better
Complete the following course:
This course draws on fundamental concepts of contemporary communication research to help students identify and develop strategies to become effective and versatile communicators across media and settings. Students will examine and respond to a range of interpersonal situations through the critical evaluation of the three essential components of all communication: its purpose, audience, and context. Students will leave the course with the ability to reflect on and adapt their strategies to successfully and consistently communicate for a range of purposes across diverse settings.
Complete the following course:
This course draws on fundamental concepts of contemporary group communication research to help students identify and develop strategies to communicate effectively in small groups and teams for the cooperative purpose of advancing common goals. Students will draw on listening and responding strategies learned in COMM-130 Interpersonal Communication and apply them to communicating as a leader or member of a small group. They will also learn how to recognize and manage the types of conflicts that can arise in small groups. Prerequisite: COMM-130 Interpersonal Communication
Inquiry & Analysis
Complete the following course:
Students will learn and apply critical inquiry skills to analyze persuasive communication created by others and to develop persuasive communication/arguments of their own to solve problems in professional, civic, social, and personal contexts. Specifically, students will learn to recognize fallacies in logic; apply inductive and deductive reasoning strategies to the interpretation and development of persuasive communication; evaluate the validity of sources; and develop logically sound persuasive communication. Students will explore the roles of self-awareness, empathy, and ethics in the context of critical inquiry and the development of arguments.
Complete one of the following courses, unless your program requires a specific course:
This course is an historical overview, and examination of the evolution of digital, film, and print media, and their functions. Students will identify and analyze contemporary problems of the media such as the legal, social, economic and psychological implications of their relationships with society. They also will examine the ways in which marketing and PR professionals utilize the mass media channels to reach their intended target audiences.
This course explores the complex and evolving relationship between human beings and technology. Through a multi-disciplinary approach that draws on fields such as sociology, psychology, philosophy, and history, students will examine the ways in which technology has shaped human culture, identity, and values, as well as how humans have influenced and continue to influence the development, adoption and use of technology.
Complete the following two courses:
Mathematical reasoning, when applied to everyday and professional lives, has two dimensions: logic for deterministic situations and probabilities for non-deterministic situations. This course aims to help students develop these mathematical reasoning skills.
Accurate and appropriate visual data representation is increasingly critical in today's work environments. Students will develop skills in data organization, manipulation and interpretation in a way that supports data-driven decision-making and effective communication of numerical data
Scientific Literacy: Natural Sciences
Complete one of the following courses, unless your program requires a specific course:
Introduces students to the biochemistry and physiology of nutrition and exercise. Emphasis will be placed on human body systems such as musculoskeletal, digestive, respiratory and circulatory, and their relationship to nutrition and fitness. Students will also study the biochemistry of energy conversion as it relates to exercise physiology. Laboratory sessions are designed to reinforce, by a hands-on approach, the principles discussed in lecture. Course includes two laboratory hours per week.
Students learn the biology, genetics, chemistry, and physics involved in the forensic investigation of crimes. A wide range of topics are studied including DNA, entomology, fingerprinting, trace evidence, serology (blood, saliva, and semen), blood spatter, and chemical analysis of drugs, alcohol, and other compounds. Students apply their new knowledge of forensic science through the use of case studies and laboratories. This course includes two laboratory hours per week.
If you have taken FOR-110 you may not take this lab science course.
Students will develop the ability to apply scientific methods to understand the natural world, to identify scientific aspects of daily life, and to evaluate the quality of scientific information based on its source and the methods used for its generation.
Diversity, Equity, Inclusion and Global/Cultural Understanding
Complete the following course:
This course will introduce students to major streams of social justice thought, including historical social justice movements, theoretical problems having to do with social equality, personal freedom, marginalization, and stigmatization, and the ways in which civic and professional communities respond to these issues.
Arts & Humanities
Complete any two of the following courses, unless your program requires a specific course(s):
With pressure and release, a window opens and closes, recording light on a sensor. The simple action captures the instinct, judgement, and skill of the person behind the lens. This class will begin a study of the art and craft of photography. Students will develop their vision and their understanding of how to achieve it. Solid skills will be learned and many doors will be opened.
A survey of the continuing change experienced in art since the 15th century. Students will examine how an image is achieved as well as the significance of the subject represented. Individual inquiry concerning the nature of art is encouraged.
Students learn to appreciate films through the critical analysis of various elements of mise-en-scene, cinematography, editing and sound. The course introduces the conventions of classical Hollywood cinema, considers the work of one major director (auteur), and surveys selected international and independent films. Students view and discuss films each week.
Students in the course will explore the cultural history of the music genre broadly referred to as rock. Students will explore the social, economic and political contexts that are influenced by and that influenced each style in the United States. By listening, watching, reflecting upon, discussing and writing, students will explore how music takes on meaning, personally, and culturally. Topics and themes include the relationships between and among gospel, country, funk, folk, disco, rap and hip hop; the role of business and technology in those relationships, and political or transgressive elements of rock music.
Students will apply communication theory and research to address the particular challenges to communicating effectively in organizations. Students will learn how to identify organizational communication problems, analyze those problems, and generate effective solutions. Students will examine the relationship between organizational structure and specific communicative practices, and how communication practices by organizational members establish, maintain, or change organizational culture. They will also learn how to anticipate communication deficiencies in organizations, and use communication as a means to facilitate organizational development and innovation.
Complete COMM-130 or COM-100.
Specific application of common tools for writing in the working world. Students will be instructed in rhetorical strategies of professional writing including style, report formats, editing, document design, and integration of visual aids. Students will complete a semester-long writing project; oral and written reports associated with the process of problem-solving within the project will be included.
ENGL-112 or COR-125
Students will learn how to create conditions for successful conflict engagement, a necessary skill for any professional. The course focuses on the foundational capacities to remain calm and connected with oneself and others. In this state students can access helpful ideas and responses and be their best selves regardless of environment. Improving facility for conflict creates stronger relationships and reduces fear. By the end of the course, students will understand that disagreement and difference can become a source of personal and interpersonal growth.
Students will become familiar with arguments originating from the following schools of ethics: virtue ethics, deontology, and utilitarianism. Students will apply these ethical schools of thought to formulate arguments, practice deliberation and assess the implications of their decisions for various stakeholders in a professional context.
Must have 75 completed credits or permission of Program Director.
This course introduces students to the fundamental elements of technical writing (clear, concise, and targeted)that are common among seven forms of technical communication: email correspondence, editing,employment communication, proposals, long, formal reports,oral communication, and inventions. Through peer reviews and writing workshops, students develop the ability to write and edit text that precisely targets its audience. This course emphasizes deepening and broadening students' writing, speaking, and thinking abilities in a non-lecture-based, hands-on, discussion-centered classroom.
ENGL-112 or COR-125
Complete any two of the following courses, unless your program requires a specific course(s):
Provides a comprehensive analysis of the fundamentals of substantive criminal law. Students will learn the essential elements of crimes and the rationale underlying criminal law. The nature of jurisdiction, the criminal act, the criminal state of mind and matters affecting responsibility for criminal conduct are included.
This course focuses on the rules and procedures governing how the American criminal justice system must process individuals suspected, accused, and convicted of law violations.
This course provides students with a broad overview of the history, theory, and fundamentals of criminal investigation. Students are introduced to the basic responsibilities of investigators and protocols for report writing, evidence collection, and preparation of cases for trial. They also learn specific investigative techniques for different types of crimes, such as crimes involving violence and property, terrorism, and hate crimes, and, where appropriate, compare investigative protocols from other legal cultures.
Take CRIM-120, CRIM-121.
Principles of Economics introduces the fundamental concepts of economics - the study of how people manage resources, and how they react to scarcity. This course focuses on both microeconomics (the behavior of consumers and companies) and macroeconomics (large-scale economic factors such as employment and interest rates), so that you'll gain a broad understanding of how a modern market economy functions, how decisions in business settings are informed by economics, and how economics applies to your everyday life.
Students will study important themes in the social history of the United States since the Civil War. This course allows students to expand their critical thinking skills through an examination of primary and secondary sources. Themes might include: the evolving status of women; the immigrant experience; the concept of the American dream; the paradox of freedom vs. slavery; the minority experience; the tensions between social classes. Students will be evaluated primarily on writing assignments.
A survey of the science of psychology, including an overview of human behavior in various areas such as physiopsychology, development, learning social psychology, personality and abnormal behavior.
A study of human groups, culture, the self, and human interaction. The course focuses on contemporary American society and the influence of culture on our actions and beliefs, with the goal of fostering critical thinking about our social environment.
Graduates of the cybersecurity bachelor's online degree program will demonstrate the following industry-specific skills, knowledge, and competencies:
- Evaluate the computer network and information security needs of an organization.
- Assess cybersecurity risk management policies to effectively protect an organization's critical information and assets.
- Measure the performance of security systems within an enterprise-level information system.
- Troubleshoot, maintain, and update an enterprise-level information security system.
- Implement continuous network monitoring and provide real-time security solutions.
- Formulate, update, and communicate short- and long-term organizational cybersecurity policies and strategies.
- Acrylic Wifi
- Android x86 Emulator
- CentOS Linux
- Damn Vulnerable Web Application (DVWA)
- Google Hacking
- Linux Server
- Low Orbit Ion Cannon (loic)
- Open SSL
- Security Administrator Tool for Analyzing Networks (SATAN)
- Security Onion
- Social Engineer's Toolkit (Kali Linux)
- Transmission Control Protocol/Internet Protocol (TCP/IP) Suite
- Windows Server
- Wireless LANs
- Zed Attack Proxy (ZAP)
Students who have earned the CISSP Certification are eligible for transfer credits toward this degree. Please speak to an admission representative or your academic advisor for details.
Champlain College Online's cybersecurity faculty, led by Program Director Kathleen Hyde, are expert practitioners in the field. Their industry expertise ensures that our cyber security curriculum is aligned with the needs of employers, and reflects the skills today’s cybersecurity professionals need for success. Classes led by our seasoned experts will give you real-world insight into the world of cybersecurity, and create a rich community of career-focused learning.
Alumni of the Champlain College Online bachelor's in cyber security degree program work in corporations, small businesses, government organizations, and non-profits nationwide, including:
- Associated Business Systems - A Ricoh Company
- Bank of America
- Biotek Instruments
- Department of Homeland Security
- Dyncorp International
- National Grid
- National Life Group
- People's United Bank
- Security Risk Advisors
- TEK Systems
- University of Vermont
- U.S. Treasury
Titles our alumni hold include:
- Computer Forensics Examiner
- Cybersecurity Practices Manager
- IT Manager
- IT Specialist
- Information Assurance Network Manager
- Information Security Analyst
- Information Security Specialist
- Intelligence Analyst
- Network Administrator
- Network Analyst
- System Support Specialist
- Sr. Information Security Specialist
- Sr. Systems Engineer
- Unix Analyst
Many students come to us seeking ways to get noticed at their current employers or to get hired in a new field. Given that, we are hyper focused on increasing the career mobility of our students and that's why we developed the Fast Start Formula Career Bundle, a suite of career offerings designed to help our students get noticed, get hired and land jobs they'll love.
Valued at over $1,000, the career bundle is offered to Champlain College Online students and includes:
- Fast Start Formula Course: The Fast Start Formula Course for getting noticed and getting hired is taught by Jen Morris, an executive career coach that we've developed a partnership with to support our students in their job search journeys. This course is online, self-paced and full of tips and tricks to land a job you'll love.
- Live Webinars: Log-on to ask your specific job search questions, get live “hot seat” coaching and gain valuable insights from leading career coach, Jen Morris.
- Landing A Job You'll Love Ebook: Download this ebook full of tips and tricks for standing out from the competition. From how to optimize your LinkedIn profile, to insider information on how recruiters work and bypassing the automated application websites, you’ll be sure to learn how to rise to the top.
Upon enrollment in a degree or certificate, your access to the Fast Start Formula Career Bundle will made available to you.
Tuition & Costs
Online Undergraduate Tuition Fall '23 - Summer '24
*Based on a 3-credit course; cost will vary if course is a different number of credits
Meet the Program Director
Kathleen HydeMCIS MBA
- Computer Forensics & Digital Investigations (B.S., Certificate)
- Computer Information Systems (B.S.)
- Information Security (M.S., Certificate)
- Management Information Systems (B.S.)
- Web Design & Development (A.S., B.S., Certificates)
Kathleen Hyde, MCIS, MBA, is the Chair of Cybersecurity Programs for Champlain College Online. She is responsible for the online cybersecurity and computer forensics and digital investigations undergraduate programs, as well as the M.S. in digital forensic science program.
As program director, Ms. Hyde maintains the cybersecurity and digital forensic programs' competitive and relevant edge, promotes the growth of the nation's cybersecurity workforce, and shares her passion for lifelong learning by teaching several online classes.
For more than 20 years, Ms. Hyde has provided consulting services in cybersecurity, data recovery, business continuity, and digital forensics to government, retail, finance, professional, and residential customers. She has also served as an instructor for Champlain's cybersecurity program and a subject-matter expert for course development for the past three years. Her areas of expertise and interest include insider threat detection, emerging threats and defenses, digital privacy and surveillance, and cybersecurity for educators.
Ms. Hyde holds both an MBA and an M.S. in Computer Information Studies from the University of Phoenix.
"Not having a bachelor's degree was restricting my career. I had been lucky to get in the door with some great companies without one, but there was only so high up I could go. Getting my degree opened up new opportunities for me in the cybersecurity field."
From Our Blog
You may also be interested in
Download Program Brochure
Learn what you can expect from our online bachelor's in cybersecurity program.
Download Program Guide
I acknowledge that, by clicking the "submit" button, I am giving my express written consent to Champlain College and its representatives to contact me about educational opportunities via email, text, or phone, at the phone number above, including my mobile phone, using an automatic dialer, or pre-recorded message. Message and data rates may apply. I understand that my consent is not a requirement for enrollment, and I may withdraw my consent at any time.