Must complete 90 credits in major before taking this course.
As cyber threats become a growing reality for businesses and organizations across all sectors, the need for highly trained cyber security professionals is becoming more critical than ever before. Designed to meet the needs of today’s businesses, and with a focus on hands-on experience and problem solving, Champlain’s nationally recognized online bachelor’s in cybersecurity degree is the ideal program for those looking to advance their careers in this critical field, delivering cutting-edge education and virtual hands-on learning application to help you stand out in the field and advance your career from day one.
A Nationally Recognized Leader in Cybersecurity
Champlain is a nationally recognized leader in cybersecurity and digital forensics education and home of the Senator Patrick Leahy Center for Digital Investigation & Cybersecurity. With a robust faculty of expert-practitioner instructors who have significant experience working for top organizations and are sought-after thought leaders in the field, we specialize in building agile cybersecurity and digital forensics programs that the meet mission-critical needs of today's businesses, nonprofit organizations, and state and federal governments.
Champlain has been designated a National Center of Academic Excellence in Cyber Defense Education by the U.S. National Security Agency and the Department of Homeland Security since 2006, and Champlain cybersecurity programs have been named best in the nation by SC Magazine. Champlain is also designated as a National Center of Digital Forensics Academic Excellence by the Defense Cyber Crime Center (DC3) Air Force Office of Special Investigations - the fifth college in the nation, and the only private college in the country, to receive this distinction.
Build Your Career Future
In a field that changes as rapidly as cybersecurity, with new technologies and best practices constantly emerging, it’s essential that your cyber security undergraduate degree helps you build a foundational skillset that can help you adapt and grow. Champlain’s program emphasizes both core technical skills (including knowledge of over 31 key applications, platforms, and programming languages) and essential soft skills like critical thinking and problem-solving that you can immediately apply to your workplace and that will give you an adaptive edge as global digital environments become more complex. You'll also have the opportunity to differentiate your degree and gain subject matter expertise through a certificate in a specialization of your choice, in Computer Forensics & Digital Investigations, Computer Networking, Incident Response, Linux Administration, Security Administrator, Software Security, or System Administration.
Academic Excellence and Recognition
Designated Best Online Private College by Intelligent.com
Consistently ranked among the Best Online Bachelor's Degrees by US News & World Report
Ranked among the Most Affordable Online Cybersecurity Bachelor's Degrees
Accredited by the New England Commission of Higher Education
What Can You Do With A Degree In Cybersecurity?
Cybersecurity careers are expected to grow 32% between 2018 and 2028, significantly higher than the average growth for all fields, as a result of increase cyber threats across all industries. The median annual salary for information security professionals is over $98,000.*
The strong demand for cybersecurity talent means that job opportunities are available in virtually every field and sector, including cyber incidence response, cyber risk and strategic analysis, vulnerability detection and assessment, and more. There is also a particular need for cyber professionals in the federal government, which has designated cybersecurity as a mission-critical function.
*Sources: Bureau of Labor Statistics (BLS), 2019; job titles: cyberdegrees.org, 2019
Top Jobs for Bachelor's in Cybersecurity Graduates
- Incident Responder
- Penetration Tester
- Security Administrator
- Security Analyst
- Security Engineer
- Security Auditor
- Vulnerability Assessor
Learn more about Champlain's 100% online cyber security bachelor's degree, designed for working professionals.
Champlain's online cyber security course portfolio encompasses the critical skills needed by today's cybersecurity professionals. Graduates of the program are required to complete the following courses.
Professional Courses (69 credits):
- Networking Fundamentals
- Introduction to Python
- Introduction to Operating Systems
- Senior Seminar Project (15-week course)
- Foundations of Cybersecurity
- Digital Forensic Investigation Techniques
- Operating System Security
- Security Scripting With Python
- Cloud Computing Security
- Networking & Security
- Mobile Security
- Ethical Hacking
- Intrusion Analysis and Response
- Emerging Threats & Defenses
- Wireless Networking
- Cybersecurity Policy Analysis & Implementation
- Web Page Development I- HTML
- System Administration & Network Services 1
- Project Management or Project Management Standards & Behaviors
- Technical Electives (see Embedded Certificates/Technical Electives. 12 credits required)
General Education Courses (15 credits):
- Intro to Psychology or Intro to Sociology
- Critical Reading & Expository Writing I
- Critical Reading & Expository Writing II
- Interpersonal Communication
- Intro to Statistics (15-weeek course)
- Technical Writing
- Microeconomics OR Macroeconomics
- Intercultural Communication
- Writing in the Workplace
- Ethics in the Professions
- Lab Science (4 credits required)
- Hum/Sci/Math Elective (9 credits required)
- General Electives (5 credits required)
Cybersecurity Course Descriptions:
This course provides students with an understanding of the many different devices and technologies, from historical to emerging, that are required to design and build networks. In a broad survey of concepts and terminology, students will learn about topology, communications, protocols, and security, and to diagram basic networks to specification.
From day one, students in this course are problem solving, first in terms of algorithmic design and then as early as week two via programming in the latest version of Python, using PyCharm. Students begin by writing a program to have a conversation, having strings and numbers as input, and advance, by week seven, to building a working password saver program, capable of looking up, adding (and encrypting), and storing passwords.
Use Windows? Want to know more about Linux and or Apple? In this course, students don't just read about other operating systems, they step out of their comfort zones and develop a working knowledge of their structure and functionality. As part of these activities, students also learn how to use VMware and, in the case of students without access to Apple hardware, resources offered in the cloud as a services. Students also survey/compare mobile device operating systems.
Students are presented with the opportunity to expand and showcase their knowledge and abilities in this 15-week course where they are expected to work independently and develop a project related to their major.
This course is a thorough review of the Transmission Control Protocol/Internet Protocol (TCP/IP) Suite, which is the de underlying de facto communications protocol standard suite of the Internet. Students will use the Wireshark software to analyze the operation of services provided by TCP/IP, troubleshoot common issues and gain an understanding of related security and management issues.
This course will introduce foundation subject matter and technologies that are critical to the multidisciplinary landscape of cybersecurity.
Complete CMIT-130 and CMIT-135.
This exciting course introduces students to the myriad software tools and best practices for handling digital evidence. Labs utilize Champlain College Online's Forensic VDI and challenge students to begin building their skills, from creating a hash value for a forensic copy with X-Ways Forensics and FTK Imager, to examining evidence with The Sleuth Kit (TSK), Autopsy and/or EnCase.
Complete CMIT-135 and CMIT-140
Through this course, students learn about what makes up an operating system and the various threats to that operating system and, by extension, the user. The focus of this course is on CentOS Linux and Windows Server.
In CYBR-260, students learn how to script with Python (through IDLE and PyCharm), keeping in sight that being able to program is not just about being able to program. It's also about understanding how programs are put together and how they work, what is possible, and how to control the system.
Cloud computing has become increasingly central to Information Security (IS) strategies both at the corporate and personal level. It unifies a variety of technologies to provide businesses a method to improve business efficiency and reduce costs. This course will cover concepts, protocols and implementation details for working with and implementing cloud technologies within an organization.
In this class, students take an intense look at networks and the ways that we provide appropriate controls and technology to provide security to them, while using Wireshark and NMAP as supporting tools.
This course focus on mobile threats and risks, smartphone security, mobile Internet security, mobile location privacy, and securing ad hoc networks. Students will use Acrylic WiFi, netsh and the Android x86 emulator.
This is a course on how to find and exploit vulnerabilities in systems. While discussing the ethical and legal framework of these activities, students will use Google search techniques (a.k.a. Google Hacking), online applications, including Damn Vulnerable Web Application (DVWA), and Champlain’s virtual environments equipped with Kali Linux, Metasploitable, Nessus, Nexpose, NMAP, Zed Attack Proxy (ZAP), W3AF, Burp, and Security Administrator Tool for Analyzing Networks (a.k.a. SATAN), among other tools.
Take CMIT-135,WEBD-125 and WEBD-220 or CYBR-210
CYBR-320 covers strategies, techniques and technologies used in attacking and defending information systems, and how to design secure networks and protect against intrusion, malware and other hacker exploits. Students will use the Security Onion Linux distribution and the Security Onion toolkit and will perform some log analysis. However, the course has its bigger focus on best practices.
CYBR-240, CFDI-240, CYBR-210.
In CYBR-410, students have a look on how the landscape of threats and defenses is evolving. Some of the tools used in the class are: Social Engineer's Toolkit (Kali Linux), Metasploitable, Low Orbit Ion Cannon (loic), hping3, TinyCA, and openSSL.
This introductory course to Wireless LANs focuses on the design, planning, implementation, operation, and troubleshooting of Wireless LANs. It covers a comprehensive overview of technologies, security, and design best practices with particular emphasis on hands-on skills.
This course examines cybersecurity policy planning in an organizational context. The aim is to examine key procedures, such as security requirements analysis and risk assessments, to determine their roles in policy formation.
From storyboard to form creation, students walk through the steps to create a basic four to five-page website to specification in this course that introduces HTML5 and CSS. Hands-on assignments reinforce skills development and best practices in design: navigation, column layout, image editing and usage, fonts and tables.
NETW-255 is a lab-based course designed to introduce system administration in both Windows Server and Linux Server operating systems. Students learn how to install both Linux and Windows Operating systems, configure an Active Directory domain, learn common domain administration tasks, apply user and file management, experience application installation and configuration, and integrate the two operating systems to work together simulating a real-life work scenario.
Complete CMIT-130 and CMIT-140..
Organizations value project management skills for all employees because these skills make everyone more effective and efficient. You will be introduced to skills that define a project's scope, specifications and assumptions. You will also learn to develop a work breakdown structure and task plan, and to schedule and control the, project. These skills can be used immediately, in work and home life.
Project Management II introduces students to the Project Management Institute's (PMI) Standards and Behaviors. You will explore the body of knowledge that forms the foundation for the field of project management, and begin to develop the competencies required to be eligible for the PMP examination. You will also reinforce competencies learned in Project Management I and focus on processes used in professional projects, including skills needed to define a project's scope, create a project charter, develop a work breakdown structure, task plan, schedule, and controlling the work. Finally, the project you begin in MGMT-262 will be completed in MGMT-265, allowing enough time to develop a comprehensively managed project.
A survey of the science of psychology, including an overview of human behavior in various areas such as physiopsychology, development, learning social psychology, personality and abnormal behavior.
A study of human groups, culture, the self, and human interaction. The course focuses on contemporary American society and the influence of culture on our actions and beliefs, with the goal of fostering critical thinking about our social environment.
Develops the ability to use writing for learning, thinking, and communicating. Includes an emphasis on critical reading of various texts for meaning, form, and voice. In order to discover their writing voices so they may communicate at a college level, students write several short formal and informal papers in response to their reading. They react to and summarize texts, develop and organize ideas, incorporate the ideas of others, revise and edit.
In addition to building on the skills learned in the first semester, this second-semester course develops the ability to write essays with an emphasis on research, critical reading and thinking. Students continue to learn strategies for writing texts that are clear, coherent, comprehensive, creative, concise and correct for a specific audience and purpose.
Students will study the basic concepts and theories of communication, and learn to apply this knowledge to improve their relationships with others through everyday communication. Specifically, students will learn how to interpret people's verbal and nonverbal behavior more accurately, and to be more aware of how others interpret communicative behavior. They will learn how to listen actively with empathy, and how to interact effectively and appropriately with others from different social and cultural backgrounds. Students will also explore how to use communication as a tool to develop their relationships and self-concepts, and how to manage conflict using specific communicative strategies.
How to collect, organize, analyze, and interpret data in order to make decisions about the world. Topics include descriptive statistics, probability, discrete probability distributions, normal probability distributions, confidence intervals, hypothesis testing with one sample, hypothesis testing with two samples, correlation, regression, chi square tests, and analysis of variance.
This course introduces students to the fundamental elements of technical writing (clear, concise, and targeted)that are common among seven forms of technical communication: email correspondence, editing,employment communication, proposals, long, formal reports,oral communication, and inventions. Through peer reviews and writing workshops, students develop the ability to write and edit text that precisely targets its audience. This course emphasizes deepening and broadening students' writing, speaking, and thinking abilities in a non-lecture-based, hands-on, discussion-centered classroom.
ENGL-112 or COR-125
Discusses the nature and method of economics with emphasis on microeconomic theory. Focus is on demand, supply, market equilibrium, elasticity, costs of production and resource pricing. Examines the market structures of pure competition, oligopoly and monopoly.
A general survey course that covers theories and applications of macroeconomics. Business firms, international economics, labor and government are included. Also examines monetary policy, taxes, public finances, economic output and growth, and international trade in the world economy.
This course builds on COM 130, but with an emphasis on how to develop skills for communicating competently in an increasingly diverse society. Students will explore how culture is communicated verbally and non-verbally, and how to interpret and understand culturally-specific communicative practices. They will also learn how to establish, develop and manage relationships with culturally different peoples, and how to recognize and overcome cultural stereotypes and prejudices.
Complete COMM-130 or COM-100.
Specific application of common tools for writing in the working world. Students will be instructed in rhetorical strategies of professional writing including style, report formats, editing, document design, and integration of visual aids. Students will complete a semester-long writing project; oral and written reports associated with the process of problem-solving within the project will be included.
ENGL-112 or COR-125
Students will become familiar with arguments originating from the following schools of ethics: virtue ethics, deontology, and utilitarianism. Students will apply these ethical schools of thought to formulate arguments, practice deliberation and assess the implications of their decisions for various stakeholders in a professional context.
Must have 75 completed credits or permission of Program Director.
Graduates of the cybersecurity bachelor's online degree program will demonstrate the following industry-specific skills, knowledge, and competencies:
- Evaluate the computer network and information security needs of an organization.
- Assess cybersecurity risk management policies to effectively protect an organization's critical information and assets.
- Measure the performance of security systems within an enterprise-level information system.
- Troubleshoot, maintain, and update an enterprise-level information security system.
- Implement continuous network monitoring and provide real-time security solutions.
- Formulate, update, and communicate short- and long-term organizational cybersecurity policies and strategies.
- Acquire in-demand technical, analytical and soft skills employers want - such as communication, creativity, critical thinking, and collaboration - in general education courses that are a part of this degree.
- Acrylic Wifi
- Android x86 Emulator
- CentOS Linux
- Damn Vulnerable Web Application (DVWA)
- Google Hacking
- Linux Server
- Low Orbit Ion Cannon (loic)
- Open SSL
- Security Administrator Tool for Analyzing Networks (SATAN)
- Security Onion
- Social Engineer's Toolkit (Kali Linux)
- Transmission Control Protocol/Internet Protocol (TCP/IP) Suite
- Windows Server
- Wireless LANs
- Zed Attack Proxy (ZAP)
Champlain College Online's cybersecurity faculty, led by Program Director Sérgio Tenreiro de Magalhães, PhD, are expert practitioners in the field. Their industry expertise ensures that our cyber security curriculum is aligned with the needs of employers, and reflects the skills today’s cybersecurity professionals need for success. Classes led by our seasoned experts will give you real-world insight into the world of cybersecurity, and create a rich community of career-focused learning.
Alumni of the Champlain College Online bachelor's in cyber security degree program work in corporations, small businesses, government organizations, and non-profits nationwide, including:
- Associated Business Systems - A Ricoh Company
- Bank of America
- Biotek Instruments
- Department of Homeland Security
- Dyncorp International
- National Grid
- National Life Group
- People's United Bank
- Security Risk Advisors
- TEK Systems
- University of Vermont
- U.S. Treasury
Titles our alumni hold include:
- Computer Forensics Examiner
- Cybersecurity Practices Manager
- IT Manager
- IT Specialist
- Information Assurance Network Manager
- Information Security Analyst
- Information Security Specialist
- Intelligence Analyst
- Network Administrator
- Network Analyst
- System Support Specialist
- Sr. Information Security Specialist
- Sr. Systems Engineer
- Unix Analyst
Tuition & Costs
Continuing your education is an investment in your future. Learn more about our affordable tuition rates.
Meet the Program Director
Sérgio Tenreiro de MagalhãesPhD
- Cybersecurity (B.S., Undergraduate Certificates)
- Software Development (A.S., B.S., Certificates)
- Digital Forensic Science (M.S.)
Dr. Sérgio Tenreiro de Magalhães is Associate Professor and Chair of Cybersecurity at Champlain College Online.
Prior to Champlain, Dr. Magalhães was a researcher of the Software Engineering and Management Group (SEMAG) of the Algoritmi Research Center (University of Minho) and an Assistant Professor of the Catholic University of Portugal - Braga. He is a member and reviewer of a number of organizations, including the NATO Multinational Cyber Defense Education and Training project and the Editorial Committee of the International Journal of Electronic Security and Digital Forensics.
Dr. Magalhães has a PhD in Information Systems and Technologies from the University of Minho (Portugal). His research interests focus on information security, intelligence and performance monitoring, and has published widely on security-related topics.
"Not having a bachelor's degree was restricting my career. I had been lucky to get in the door with some great companies without one, but there was only so high up I could go. Getting my degree opened up new opportunities for me in the cybersecurity field."
From Our Blog
You may also be interested in
Download Program Guide
Learn what you can expect from our online bachelor's in cybersecurity program.
Download Program Guide
Champlain College will not share or sell personal information. Submitting this form constitutes your express written consent to agree to receive e-mails, texts, and phone messages from Champlain College at the phone number(s) and email address provided in this form.