Skip to main content

CYBERSECURITY

$86.3k
AVERAGE STARTING SALARY
2020-2022 BYU CYBERSECURITY GRADUATES
75%
SECURED EMPLOYMENT PRIOR TO GRADUATION
(OF JOB-SEEKING STUDENTS)
100%
JOB-SEEKING BYU CYBERSECURITY GRADUATES EMPLOYED WITHIN 6 MONTHS (2020-2022)

Description

Cybersecurity is a computing-based discipline involving technology, people, information, and processes to protect computing systems from adversaries. It involves the creation, operation, analysis, and testing of secure computing systems (see ACM Documentation​). It is an interdisciplinary course of study, including aspects of law, policy, human factors, ethics, and risk management in the context of adversaries. BYU's Cybersecurity program is recognized as a National Center of Academic Excellence in Cyber Defense by the NSA/DHS. For Center news and activities, see the Cybersecurity@BYU website.

Program Requirements

Cyber graphic.png

Below are links to find out the specification of the major, past and present flowcharts, and other information about the program and graduation. If there are more questions, please contact the IT&C Academic Advisor.

Program Educational Objectives

  1. Practice as a competent professional in Cybersecurity or enrolled in an appropriate graduate program
  2. Demonstrate leadership by positive influence on others towards shared goals
  3. Collaborate and communicate effectively in diverse team environments
  4. Show sensitivity for global, societal, organizational issues, compliant with the moral standards of the Gospel of Jesus Christ in the application of technology.

Emphases

Students in the Cybersecurity major often choose courses related to a certain emphasis area. While these emphases don't appear on a student's diploma, they often map to job skills and careers.

Digital Forensics

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law.

Penetration Testing

Penetration testing is ethically discovering vulnerabilities in systems in order to best protect those systems.

IoT graphic

Internet of Things (IoT)

Cyber-physical systems (Internet of Things) interact both with the real world, through sensors and actuators, and with computer networks.

Network administration

System & Network Administration

System and network administrators manage an organizations' technical infrastructure.

Meet with Alisha Wall, ITC Advisor

Make an Appointment for:

  • Internship questions, processes and approvals
  • Academic Improvement Plans (AIP)
  • Academic Holds or yearly check ins
  • Major/Minor exploration and changes
  • Graduation Application status or questions
  • Department Scholarships
data-content-type="oneOffPage"

IT&C Work Experience

Learn more about the required 200 hours of work experience in the industry in the Cybersecurity major.
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=

Undergraduate Cybersecurity Technical Electives

COURSE

FALL

WINTER

SPRING

IT&C 327 - Digital Communications
IT&C 492R - Special Problems in Information Technology & Cybersecurity      ✓
      ✓
     ✓
IT&C 515R - Special Topics in Information & Cybersecurity      ✓
     ✓
     ✓
IT&C 515R - Security Operations
IT&C 515R - Vulnerability Exploitation & Reverse Eng
IT&C 529 - Advanced Networking     
         
IT&C 544 - System Administration      ✓
IT&C 548 - Cyber-Physical Systems      ✓
IT&C 562 - Cloud Architecture & Security
IT&C 585 - Encryption Implementation
MATH 485 - Mathematical Cryptography      ✓
EC EN 330 - Introduction to Embedded Systems Programming
EC EN 427 - Embedded Linux Systems
EC EN 526 - Wireless Networking      ✓