Loading…
Program Purpose
Everything we do in our day-to-day activities relies on technology and Internet connectivity. As consumers, we depend on this connectivity to shop, manage bank accounts, communicate, and access entertainment. Businesses thrive on their ability to leverage data, cloud services, and Internet connectivity in innovative and efficient ways. However, while technology empowers consumers and businesses alike, it has also become a powerful tool for cyber criminals and nation-state threat actors.
The threat landscape continues to evolve rapidly with the emergence of AI-powered attacks, including sophisticated phishing campaigns, deepfake social engineering, automated vulnerability exploitation, and AI-generated malware that can evade traditional security controls. Unchecked, organizations can be devastated by data breaches, ransomware attacks, and supply chain compromises. Individuals face risks from identity theft, social engineering, and privacy violations. The cyber domain extends beyond national borders and has become a critical component of military operations and national security. To protect themselves, government agencies, private industry, and the military actively seek professionals with the strongest cybersecurity credentials possible who understand both traditional and emerging AI-driven threats.
The B.S. in Cybersecurity program (formerly Computer & Network Security B.S.) provides a firm foundation in cybersecurity while offering flexibility for students to customize their degree according to their specific areas of interest. Students may earn a Digital Forensics Concentration by choosing six Security Elective courses focused on investigations and forensic analysis. While the Security Core and Security Electives provide technical expertise, the General Education and Support cores develop the critical thinking, communication, and analytical skills necessary for a well-rounded education.
Information Security continues to be among the fastest-growing occupations according to the U.S. Bureau of Labor Statistics (BLS). The BLS projects employment of information security analysts to grow 32% from 2022 to 2032, significantly faster than the average for all occupations. This growth reflects the increasing frequency and sophistication of cyberattacks, including those leveraging artificial intelligence and machine learning, and the critical need for organizations to protect their digital assets and infrastructure.
Program Competencies
Center of Academic Excellence (CAE)
The Cybersecurity Bachelor of Science program has been designated as a National Center of Academic Excellence in Cyber Defense (CAE-CD) through academic year 2028 by the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA).
This nationally recognized designation confirms that Wilmington University's B.S. in Cybersecurity curricula, faculty, outreach, and academic activities meet the rigorous standards established by the NSA and CISA. The goal of the National Centers of Academic Excellence designation program is to promote higher education in cybersecurity and cyber defense, preparing a growing number of professionals to meet the critical need to reduce vulnerabilities in the nation's information systems and critical infrastructure.
Highly Ranked Program
The Cybersecurity B.S. program is offered both face-to-face and online. Wilmington University's online Cybersecurity B.S. program has been recognized among top-ranked programs nationally by various higher education ranking organizations.
The curriculum aligns with the NICE Workforce Framework for Cybersecurity (NIST SP 800-181 Rev. 1), preparing students for roles across multiple work role categories:
In addition to becoming well-prepared for the technical aspects of a career in cybersecurity, students will develop essential soft skills. Critical thinking skills are needed to understand cybersecurity problems, risks, and solutions. Strong written and oral communication skills enable professionals to translate technical problems into terms that all stakeholders can understand, helping them recognize and avoid security threats. Most importantly, cybersecurity professionals must effectively communicate risks and business impacts to non-technical decision-makers responsible for budget allocation and strategic planning.
Hands-On Learning Experience:
Students gain practical experience through:
The Cybersecurity Bachelor of Science degree provides students with credentials specializing in information security and helps prepare students to sit for the following industry-recognized certifications:
CompTIA Certifications:
ISC2 Certifications:
ISACA Certifications:
Other Industry Certifications:
The categories of jobs involving cybersecurity are broad and diverse. The federal government's NICE Workforce Framework provides structure and clarity for cybersecurity career pathways. The following job titles are organized by experience level and represent roles for which the Cybersecurity B.S. program prepares students:
Entry-Level Positions (B.S. Degree):
Positions with Experience (2-4 Years):
Advanced Positions (5+ Years with Additional Certifications):
For more information on cybersecurity career pathways, visit the NICE Cybersecurity Career Pathways.
Experiential Learning at Wilmington University takes a 360° approach to applied education. Whether you bring significant professional experience and pursue Credit for Prior Learning (CPL), or you complete a Work-Integrated Learning (WIL) experience such as an internship or cooperative education placement embedded within your academic program, these opportunities provide meaningful pathways toward completing your degree.
The College of Business and Technology sets a required minimum grade of "C-" for program core courses. Students earning a grade lower than "C-" in a core course must repeat the course.
CTA 260 IT Support Fundamentals I
ECO 105 Fundamentals of Economics
ENG 121 English Composition I
ENG 122 English Composition II
ENG 131 Public Speaking
ENG 310 Research Writing
HIS 381 Contemporary Global Issues
OR
POL 300 American Politics
MAT 205 Introductory Survey of Mathematics
PHI 100 Introduction to Critical Thinking
PSY 101 Introduction to Psychology
Choose two courses (6 credits) from:
ART, COM 245, CUL, DRA, DSN 110, ETN, HIS 230, HUM, LIT, MUS, PHI, SPA, TEC 215, VFP 313
MAT 200 Pre-Calculus
MAT 308 Inferential Statistics
SEC 314 Cyber Law, Policy & Ethics
CSC 345 Database Foundations
SEC 100 Introduction to Computer Hardware and Operation
SEC 210 Principles and Practice of Information Security
SEC 230 Introduction to Linux
SEC 235 Networks and Telecommunications
SEC 250 Operating System and Computer Systems Security
SEC 290 Introduction to Programming with Python
SEC 310 Cryptography: Algorithms and Applications
SEC 335 Linux for Systems Administrators
SEC 340 Windows Operating Systems and Systems Administration
SEC 410 Web and Data Security
SEC 450 Firewalls and Network Security
SEC 480 Experiential Learning in Cybersecurity
SEC 490 Cybersecurity Internship
Whereas the bulk of the Cybersecurity B.S. degree is devoted to defending against cyber attacks, digital forensics is used in the investigation of a crime or incident. In law enforcement, digital evidence found on computers, phones, laptops, Fitbits, Alexa, smart refrigerators, etc. is used to prosecute crimes. In the corporate world, digital forensics is used to investigate data breaches, intellectual property theft, corporate espionage and malicious employees among other things; sometimes the goal is to prosecute, sometimes not. The intelligence community, on the other hand, is not interested in prosecuting. Instead, the goal is to obtain actionable intel, such as in the pursuit of terrorist organizations and espionage activities by hostile nation states.
The Cybersecurity program has set a minimum passing grade of "C-" for Security Core and Security Elective courses. Students receiving a grade lower than "C-" in any of these courses must retake that course.
Those interested in declaring a Digital Forensics Concentration should select six (6) of the following eight Security Elective courses:
LES 331 Electronic Discovery
SEC 240 Foundations in Cyber Investigations
SEC 350 Introduction Computer Forensics
SEC 355 Mobile Device Security and Forensics
SEC 360 Advanced Mobile and IoT Forensics
SEC 370 Computer Incident Response Course
SEC 375 Malware Analysis Techniques
SEC 440 Network Forensics
Note: Students interested in declaring a Digital Forensics Concentration but who do not have enough available elective credits may request a waiver on the SEC480/490 requirement.
Students declaring a Digital Forensics Concentration may also earn two certificates: Digital Evidence Discovery and Digital Evidence Investigation by taking three additional courses: LES 330 – Cyber Law, SEC 360 – Advanced Mobile Device, and IoT Forensics and SEC 375 – Malware Analysis Techniques. For more information, see the section on Digital Evidence Discovery and Digital Evidence Investigation Certificates.
Students must complete five (5) Security Electives and one free or one Technology elective in order to satisfy the requirements of the degree.
LES 330 Cyberlaw
SEC 305 Psychology of a Cyber Attacker
SEC 325 Breaking Down Cloud Security
SEC 326 Cloud Architecture, Reliability & Economics
SEC 327 Cloud Services & Tools
SEC 328 Cloud Operations & Performance
SEC 329 Cloud Practitioner Certificate (CPC) Exam Review
SEC 420 Data Integrity and Disaster Recovery
SEC 425 Ethical Hacking
SEC 435 Advanced Network Management
SEC 491 Cybersecurity Internship
UAV 100 Intro to Drone Operations
UAV 102 Drone Design and Maintenance
UAV 200 Security of UAV and UAS Systems
IST 7060 Project and Change Management
IST 7100 IT Policy and Strategy
SEC 6080 Industrial Control Systems (ICS) Security
SEC 6082 SCADA Architecture
SEC 6084 SCADA Risk Management and Auditing
SEC 6086 SCADA Security Awareness and Standards
CSC, CTA, GMD, ISM, MIS, SEC, TEC
Students with less than 16 transfer credits are required to take FYE 101 as one of their electives.
A completion degree is a personalized version of a bachelor's degree created exclusively for students who have completed an associate degree at an accredited institution. Completion degrees are available for most Wilmington University Bachelor of Science degrees. A student who expects to transfer a completed associate degree should communicate with a Wilmington University academic advisor before registering for courses. A transcript with documentation of the conferred degree must be received by Wilmington University to confirm eligibility.
Note that a minimum of 120 combined credits are needed to satisfy the Completion Degree requirements, including both transfer credits and credits earned at Wilmington University.
Note: Students interested in declaring a Digital Forensics concentration and that do not have enough available elective credits may request a waiver on the SEC480/490 requirement.
The following courses or their equivalents are prerequisites for a degree in Computer and Network Security:
SEC 210 Principles and Practices of Information Security
SEC 235 Networks and Telecommunication
Security Elective
CoT Elective
This information applies to new students who enter this degree program during the 2026-2027 Academic Year. All enrolled students should log in to MyWilmU Degree Works to view their personalized course and program completion requirements. You may also refer to the academic catalog for the general curriculum for this program from previous academic years.
DESCRIPTION
PREREQUISITES
CROSSLISTING
SYLLABUS