CYBERSECURITY
2020-2022 BYU CYBERSECURITY GRADUATES
(OF JOB-SEEKING STUDENTS)
Description
Cybersecurity is a computing-based discipline involving technology, people, information, and processes to protect computing systems from adversaries. It involves the creation, operation, analysis, and testing of secure computing systems (see ACM Documentation). It is an interdisciplinary course of study, including aspects of law, policy, human factors, ethics, and risk management in the context of adversaries. BYU's Cybersecurity program is recognized as a National Center of Academic Excellence in Cyber Defense by the NSA/DHS. For Center news and activities, see the Cybersecurity@BYU website.
Program Requirements
Below are links to find out the specification of the major, past and present flowcharts, and other information about the program and graduation. If there are more questions, please contact the IT&C Academic Advisor.
- Course Flowcharts
- Program Requirements
- Expected Learning Outcomes
- Graduation Requirements
- Graduation Plan Template
Program Educational Objectives
- Practice as a competent professional in Cybersecurity or enrolled in an appropriate graduate program
- Demonstrate leadership by positive influence on others towards shared goals
- Collaborate and communicate effectively in diverse team environments
- Show sensitivity for global, societal, organizational issues, compliant with the moral standards of the Gospel of Jesus Christ in the application of technology.
Emphases
Digital Forensics
Penetration Testing
Internet of Things (IoT)
System & Network Administration
Meet with Alisha Wall, ITC Advisor
Make an Appointment for:
- Internship questions, processes and approvals
- Academic Improvement Plans (AIP)
- Academic Holds or yearly check ins
- Major/Minor exploration and changes
- Graduation Application status or questions
- Department Scholarships
IT&C Work Experience
Undergraduate Cybersecurity Technical Electives
COURSE | FALL | WINTER | SPRING |
---|---|---|---|
IT&C 327 - Digital Communications | ✓ | ||
IT&C 492R - Special Problems in Information Technology & Cybersecurity | ✓ | ✓ | ✓ |
IT&C 515R - Special Topics in Information & Cybersecurity | ✓ | ✓ | ✓ |
IT&C 515R - Security Operations | ✓ | ||
IT&C 515R - Vulnerability Exploitation & Reverse Eng | ✓ | ||
IT&C 529 - Advanced Networking | ✓ | | |
IT&C 544 - System Administration | ✓ | ||
IT&C 548 - Cyber-Physical Systems | ✓ | ||
IT&C 562 - Cloud Architecture & Security | ✓ | ||
IT&C 585 - Encryption Implementation | ✓ | ||
MATH 485 - Mathematical Cryptography | ✓ | ||
EC EN 330 - Introduction to Embedded Systems Programming | ✓ | ✓ | |
EC EN 427 - Embedded Linux Systems | ✓ | ||
EC EN 526 - Wireless Networking | ✓ |