Skip to main content



Cybersecurity is a computing-based discipline involving technology, people, information, and processes to protect computing systems from adversaries. It involves the creation, operation, analysis, and testing of secure computing systems (see ACM Documentation​). It is an interdisciplinary course of study, including aspects of law, policy, human factors, ethics, and risk management in the context of adversaries. BYU's Cybersecurity program is recognized as a National Center of Academic Excellence in Cyber Defense by the NSA/DHS. For Center news and activities, see the Cybersecurity@BYU website.

Program Requirements

Cyber graphic.png

Below are links to find out the specification of the major, past and present flowcharts, and other information about the program and graduation. If there are more questions, please contact the IT&C Academic Advisor.

Program Educational Objectives

  1. Practice as a competent professional in Cybersecurity or enrolled in an appropriate graduate program
  2. Demonstrate leadership by positive influence on others towards shared goals
  3. Collaborate and communicate effectively in diverse team environments
  4. Show sensitivity for global, societal, organizational issues, compliant with the moral standards of the Gospel of Jesus Christ in the application of technology.


Students in the Cybersecurity major often choose courses related to a certain emphasis area. While these emphases don't appear on a student's diploma, they often map to job skills and careers.

Digital Forensics

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law.

Penetration Testing

Penetration testing is ethically discovering vulnerabilities in systems in order to best protect those systems.

IoT graphic

Internet of Things (IoT)

Cyber-physical systems (Internet of Things) interact both with the real world, through sensors and actuators, and with computer networks.

Network administration

System & Network Administration

System and network administrators manage an organizations' technical infrastructure.

Meet with an Advisor

Make an Appointment for:

  • Internship questions, processes and approvals
  • Academic Improvement Plans (AIP)
  • Academic Holds or yearly check ins
  • Major/Minor exploration and changes
  • Graduation Application status or questions
  • Department Scholarships

IT&C Work Experience

Learn more about the required 200 hours of work experience in the industry in the Cybersecurity major.
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=

Undergraduate Cybersecurity Technical Electives





IS 565- Digital Forensics for Organizations      ✓
IT&C 327 - Digital Communications
IT&C 441 - Embedded Computer Systems
IT&C 492R - Special Problems in Information Technology & Cybersecurity      ✓
IT&C 515R - Special Topics in Information & Cybersecurity      ✓
IT&C 515R - Cloud Architecture & Security
IT&C 515R - Security Operations
IT&C 529 - Advanced Networking     
IT&C 544 - System Administration      ✓
IT&C 548 - Cyber-Physical Systems      ✓
IT&C 585 - Encryption Implementation
MATH 485 - Mathematical Cryptography      ✓
EC EN 330 - Introduction to Embedded Systems Programming
EC EN 427 - Embedded Linux Systems
EC EN 526 - Wireless Networking      ✓