CYBERSECURITY
2022-2024 BYU CYBERSECURITY GRADUATES
(OF JOB-SEEKING STUDENTS)
Description
Cybersecurity is a computing-based discipline involving technology, people, information, and processes to protect computing systems from adversaries. It involves the creation, operation, analysis, and testing of secure computing systems (see ACM Documentation). It is an interdisciplinary course of study, including aspects of law, policy, human factors, ethics, and risk management in the context of adversaries. BYU's Cybersecurity program is recognized as a National Center of Academic Excellence in Cyber Defense by the NSA/DHS. For Center news and activities, see the Cybersecurity@BYU website.
Program Requirements
Below are links to find out the specification of the major, past and present flowcharts, and other information about the program and graduation. If there are more questions, please contact the IT&C Academic Advisor.
- Course Flowcharts
- Program Requirements
- Expected Learning Outcomes
- Graduation Requirements
- Graduation Plan Template
Program Educational Objectives
- Apply knowledge in service to community and family and engage in lifelong learning through personal study and continuing education.
- Develop a fulfilling profession which may include employment in industry or academia, technology-based entrepreneurship, and postgraduate study in engineering or other disciplines.
- Leverage technical background to make innovative contributions to society and serve in responsible positions of leadership.
- Be an example of faith, character, and high professional ethics.
Learning Outcomes
- Problem Analysis and Solutions
Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions. - Design, Implement, & Evaluate Computing Solutions
Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program's discipline. - Communicate Effectively
Communicate effectively in a variety of professional contexts. - Legal & Ethical Judgment
Recognize professional responsibilities and make informed judgements in computing practice based on legal and ethical principles. - Teamwork and Management
Function effectively as a member or leader of a team engaged in activities appropriate to the program's discipline. - Security Principles and Practices
Apply security principles and practices to maintain operations in the presence of risks and threats.
Scholarships
Emphases
Digital Forensics
Penetration Testing
Internet of Things (IoT)
System & Network Administration
Meet with Alisha Wall, ITC Advisor
Make an Appointment for:
- Internship questions, processes and approvals
- Academic Improvement Plans (AIP)
- Academic Holds or yearly check ins
- Major/Minor exploration and changes
- Graduation Application status or questions
- Department Scholarships
IT&C Work Experience
Undergraduate Cybersecurity Technical Electives
COURSE | FALL | WINTER | SPRING |
|---|---|---|---|
| IT&C 327 - Digital Communications | ✓ | ||
| IT&C 492R - Special Problems in Information Technology & Cybersecurity | ✓ | ✓ | ✓ |
| IT&C 515R - Special Topics in Information & Cybersecurity | ✓ | ✓ | ✓ |
| IT&C 515R - Security Operations | ✓ | ||
| IT&C 515R - Vulnerability Exploitation & Reverse Eng | ✓ | ||
| IT&C 529 - Advanced Networking | ✓ | | |
| IT&C 544 - System Administration | ✓ | ||
| IT&C 548 - Cyber-Physical Systems | ✓ | ||
| IT&C 562 - Cloud Architecture & Security | ✓ | ||
| IT&C 585 - Encryption Implementation | ✓ | ||
| MATH 485 - Mathematical Cryptography | ✓ | ||
| EC EN 330 - Introduction to Embedded Systems Programming | ✓ | ✓ | |
| EC EN 427 - Embedded Linux Systems | ✓ | ||
| EC EN 526 - Wireless Networking | ✓ |