Skip to main content

CYBERSECURITY

$87.8k
AVERAGE STARTING SALARY
2022-2024 BYU CYBERSECURITY GRADUATES
80%
SECURED EMPLOYMENT PRIOR TO GRADUATION
(OF JOB-SEEKING STUDENTS)
85%
JOB-SEEKING BYU CYBERSECURITY GRADUATES FOUND JOB BEFORE GRADUATION (2022-2024)

Description

Cybersecurity is a computing-based discipline involving technology, people, information, and processes to protect computing systems from adversaries. It involves the creation, operation, analysis, and testing of secure computing systems (see ACM Documentation​). It is an interdisciplinary course of study, including aspects of law, policy, human factors, ethics, and risk management in the context of adversaries. BYU's Cybersecurity program is recognized as a National Center of Academic Excellence in Cyber Defense by the NSA/DHS. For Center news and activities, see the Cybersecurity@BYU website.

Program Requirements

Cyber graphic.png

Below are links to find out the specification of the major, past and present flowcharts, and other information about the program and graduation. If there are more questions, please contact the IT&C Academic Advisor.

Program Educational Objectives

  1. Apply knowledge in service to community and family and engage in lifelong learning through personal study and continuing education.
  2. Develop a fulfilling profession which may include employment in industry or academia, technology-based entrepreneurship, and postgraduate study in engineering or other disciplines.
  3. Leverage technical background to make innovative contributions to society and serve in responsible positions of leadership.
  4. Be an example of faith, character, and high professional ethics.

Learning Outcomes

  1. Problem Analysis and Solutions
    Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
  2. Design, Implement, & Evaluate Computing Solutions
    Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program's discipline.
  3. Communicate Effectively
    Communicate effectively in a variety of professional contexts.
  4. Legal & Ethical Judgment
    Recognize professional responsibilities and make informed judgements in computing practice based on legal and ethical principles.
  5. Teamwork and Management
    Function effectively as a member or leader of a team engaged in activities appropriate to the program's discipline.
  6. Security Principles and Practices
    Apply security principles and practices to maintain operations in the presence of risks and threats.

Scholarships

BYU has two government Scholarship for Service opportunities available for Cybersecurity students

Emphases

Students in the Cybersecurity major often choose courses related to a certain emphasis area. While these emphases don't appear on a student's diploma, they often map to job skills and careers.

Digital Forensics

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law.

Penetration Testing

Penetration testing is ethically discovering vulnerabilities in systems in order to best protect those systems.

IoT graphic

Internet of Things (IoT)

Cyber-physical systems (Internet of Things) interact both with the real world, through sensors and actuators, and with computer networks.

Network administration

System & Network Administration

System and network administrators manage an organizations' technical infrastructure.

Meet with Alisha Wall, ITC Advisor

Make an Appointment for:

  • Internship questions, processes and approvals
  • Academic Improvement Plans (AIP)
  • Academic Holds or yearly check ins
  • Major/Minor exploration and changes
  • Graduation Application status or questions
  • Department Scholarships
data-content-type="oneOffPage"

IT&C Work Experience

Learn more about the required 200 hours of work experience in the industry in the Cybersecurity major.
overrideBackgroundColorOrImage= overrideTextColor= promoTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= promoTextAlignment=

Undergraduate Cybersecurity Technical Electives

COURSE

FALL

WINTER

SPRING

IT&C 327 - Digital Communications
IT&C 492R - Special Problems in Information Technology & Cybersecurity      ✓
      ✓
     ✓
IT&C 515R - Special Topics in Information & Cybersecurity      ✓
     ✓
     ✓
IT&C 515R - Security Operations
IT&C 515R - Vulnerability Exploitation & Reverse Eng
IT&C 529 - Advanced Networking     
         
IT&C 544 - System Administration      ✓
IT&C 548 - Cyber-Physical Systems      ✓
IT&C 562 - Cloud Architecture & Security
IT&C 585 - Encryption Implementation
MATH 485 - Mathematical Cryptography      ✓
EC EN 330 - Introduction to Embedded Systems Programming
EC EN 427 - Embedded Linux Systems
EC EN 526 - Wireless Networking      ✓