- Build fundamental IT security, Cyber Security and Networking skills that align to today’s careers.
- Learn to design, deploy, monitor, secure and manage local and cloud-based networks.
Bachelor's Degrees
Classes start: July 8
Choose the schedule that best fits your goals and commitments. You can earn your Bachelor's Degree in as few as 2 years and 8 months*.
Or, follow a normal schedule and complete your program in 4 years.**
*Minimum schedule does not include breaks and assumes 3 semesters of year-round, full-time enrollment in 12-19 credit hours a semester per 12-month period.
**Normal schedule does not include breaks and assumes 2 semesters of enrollment in 12-19 credit hours per semester per 12-month period.
A Complimentary Laptop: You’ll get a complimentary laptop as part of your technology program.1 It’s our way of investing in your education — and you.
Work with IoT Technologies & Systems: Immerse yourself in the Internet of Things (IoT) world and obtain hands-on experience with IoT, cloud, software and security technologies and systems.
Tech Core Curriculum: Immerse yourself in a core set of courses that help you develop skills related to operating systems, programming, hardware, connectivity and security that you can leverage in today’s IoT economy.
Certification Exam Reimbursement: Elements of this curriculum help you prepare to pursue industry certification opportunities that can validate your knowledge and skills to employers. Once you meet the program requirements, we’ll reimburse you for up to $300 toward the cost of one industry certification exam attempt. Certifications include:
Other certifications may also be eligible for reimbursement. Speak to your Student Support Advisor for additional information.
^These figures displayed represent the minimum credit hours required for graduation. Additional coursework may be necessary to complete program requirements. At the time of application to the next credential level, an evaluation of qualifying transfer credits will occur and the most beneficial outcome will be applied.
Ensure proper maintenance and security of an organization’s systems and networks by working as a team, identifying needs, overseeing the installation of new hardware or software and leveraging feedback to isolate issues.
Streamline computer systems and processes to enhance organizational efficiency and implement goal-driven solutions.
Protect systems and networks from cyber threats by monitoring and responding to security incidents and implementing security solutions and protocols to safeguard sensitive information.
Perform simulated cyberattacks on a company's computer systems and networks to identify security vulnerabilities and weaknesses before hackers exploit them.
Assess systems and networks within the network environment or enclave, identify deviations from acceptable configurations or policies and measure the effectiveness of defense-in-depth architecture against known vulnerabilities.
*Growth projected on a national level. Local growth will vary by location. BLS projections are not specific to DeVry University students or graduates and may include earners at all stages of their career and not just entry level.
Prepare for the Career You Want
We understand your career aspirations start long before you enter a classroom, which is why at DeVry, we put your success at the center of everything we do. We are committed to helping you pursue your career goals from the day you enroll and far past your graduation date. Our Career Advisors ensure that you get hands-on guidance to help you pursue your future career confidently by providing a wide range of services, which includes helping you identify and highlight your key strengths and skills, polish your resume, refine your LinkedIn profile and so much more.
Students study transmission media's role as one of the many sources of systems security vulnerability. This course discusses the various types of media used to connect computing and digital devices to networks and their significance when planning a secure system. The course covers several major media, including copper, coaxial cable, fiber optic cable, wireless and microwave media. Physical and virtual systems are analyzed, implemented and secured.
This course provides you with the opportunity to gain knowledge and skills related to activities behind hacking attacks and countermeasures. Coursework helps students build defense mechanisms to protect applications, systems and networks from hackers. Security loopholes, as well as many of the attack tools used by black hat hackers, are examined.
This course examines network security testing, including testing countermeasures against malware threats such as denial of service (DOS), distributed denial of service (DDOS) attacks, email, web and wireless. This course also communicates the importance using a layered approach requiring design, implementation and testing of attack countermeasures.
This course provides an in-depth look at risk factor analysis that must be performed in order to design a flexible and detailed security plan. Topics include assessing threats, developing countermeasures, protecting information and security designs processes. Auditing practices used to verify compliance with policies and procedures, as well as for building a case for presentation in private and public settings, are also covered.
1As part of this program, one complimentary laptop is provided to students enrolled in the Associate in Cybersecurity and Networking, Associate in Information Technology and Networking, Associate in Engineering Technology, Bachelor’s of Information Technology and Networking, Bachelor’s of Software Development, Bachelor’s of Engineering Technology, Bachelor’s of Cybersecurity and Networking and Bachelor’s of Computer Information Systems. The laptop is issued during the student’s second session. Certain restrictions apply.
2Future programmatic changes could impact the ability to earn additional credentials en route to an eligible degree program. Refer to the academic catalog for details.