(Bachelor of Science Degree)
The assurance of information during transmission or while in storage and the security of critical information infrastructures are a major responsibility of government and the private sector. Securing computers and computer networks, and conducting investigations of cybercrimes and forensic analysis of digital devices are principal methods of securing cyberspace. Through a multidisciplinary approach integrating criminology, criminal justice, economic crime, and computer science, students will be prepared for entry level positions either in cybercrime investigation and computer forensics or the security of information stored in or transmitted by computers and computer networks.
Utica College offers an on-ground undergraduate program in Cybersecurity; there is also an undergraduate online program for transfer students. The online BS in Cybersecurity degree is a completion program, which means that students must have an Associate’s degree from an accredited institution prior to enrolling in the program. Students transferring into this program without an Associate’s degree, but who have at least 57 transferable credits from a four-year institution may be considered. Additionally, students who show academic promise and don’t meet the prior 2 requirements may also be considered. However all students must meet the New York State Education Department’s mandated liberal arts requirements. A success coach will create an academic plan for students to ensure all core, liberal arts and graduation requirements are satisfied. Please see Utica’s Academic Requirements for more information on Utica’s Core and liberal arts requirements for transfer students.
There is also an online master’s program in Cybersecurity. For more information on the master’s program, consult the UC graduate catalog.
Total credit hours required for degree: 120
A student who completes the undergraduate major in Cybersecurity will demonstrate the following either orally or in writing:
- Knowledge of the technologies and methods to protect the confidentiality (“disclosure threat”), integrity (“authentication threat”) and availability (“denial of service threat”) of information and the computers, systems and networks that create, process, store and communicate valued information;
- Explore the nature and relationships qualitatively and quantitatively of risk, threats, impact, vulnerabilities and countermeasures applied to cybersecurity, computer forensics and information assurance;
- Apply problem solving techniques and Attack / Defense (A/D) scenarios to defend / respond to the critical cyber / information infrastructure threats;
- Knowledge of contemporary organization, principles, and best practices that govern cybersecurity activities at the federal, state, and local level and in the private sector;
- Plans for deployment of national assets into critical infrastructure sectors (CIS) and their protection against terrorist cyber threats - especially SCADA systems;
- Development of relevant theoretical knowledge, employment of strategic and tactical skills, and demonstration of cooperative leadership in solving problems of cybersecurity, computer forensics, identity fraud, child pornography, cyber terrorism, cyber-stalking, computer crimes, etc.;
- Synthesis of a broad-based knowledge of information assurance / security issues with government policies, procedures, laws and strategies;
- Effective and innovative strategies for rapid, creative responses to cybersecurity threats on our nations’ and corporate computer systems, by using research skills, knowledge of Federal and state policies, procedures, best practices and creative teamwork to respond to simulated cyber emergencies;
- Preparation of “on-target” executive PowerPoint situation reports that focus on key cybersecurity issues and joint dependencies and vulnerabilities, and recommend required short- and long-term actions;
- Explore the nexus between cybersecurity, economic crime, identity fraud, drug trafficking, and combating terrorism;
- Discuss how ethical issues impact organizational and individual decision making in the cybersecurity field;
- Understanding of information assurance, security policy; secure acquisitions, research and development; systems operations, vulnerability analysis, secure systems testing, triage and incident response, technology, procedures, insurance, training, and certification;
For forensics professionals, students will additionally demonstrate:
- Knowledge of how to set up an investigator’s office and laboratory, and understanding of what computer forensic hardware and software tools are required;
- Understanding of the importance of digital evidence controls and how to process crime and incident scenes;
- Details of data acquisition, computer forensic analysis, e-mail investigations, image file recovery, cell phone forensics, investigative report writing, and expert witness requirements;
- Effective performance of a range of laboratory and hands-on assignments about theory and practical application of computer forensic investigation;
- Construction of a solid Computer Forensics Evidence Plan, a fundamental component of preparing a legal case based on seized digital evidence.
The faculty have identified several advising specializations, groups of courses within the elective offerings that provide students with a focused path of study. Elective specializations are not formal parts of the curriculum but options within the elective section of the program. Students do not have to focus on a specialization but can with the consent of their advisor, simply elect to take courses that meet their needs or interests. The specializations identified by the faculty are:
Cybercrime and Fraud Investigation
Homeland Security and Emergency Management
Network Forensics and Intrusion Investigation
Students in Cybersecurity are required to achieve a cumulative grade point average of at least 2.5 (on a 4.0 scale) across major, major-related, major elective, and major concentration courses by the first semester of their junior year and to maintain that average thereafter.