Bachelor of Science in Cybersecurity Program Overview

Networks are always on and a constant vigilance is needed to protect corporate data, government confidential information, and classified military information. Students who earn a Bachelor of Science degree in Cybersecurity and Policy will be prepared for a challenging and rewarding career field  fighting worldwide cybercrime and protecting the digital world from hacking, fraud, and malware. Cybersecurity students will be in a growing field of study with multiple opportunities to assist businesses, governments, and the military to protect their networks, data and systems.

B.S. in Cybersecurity Program Learning Goals

Graduates of the Bachelor of Science in Cybersecurity and Policy are able to:

  • Design a network that meets identified strategic objectives and which reflects emerging trends and issues in cybersecurity.
  • Apply appropriate network countermeasure policies designed to prevent security breaches of data and information.
  • Apply professional and ethical standards of conduct that ensure the protection of personal privacy.
  • Develop comprehensive security plans of computer systems, networks, and storage servers.

What You Will Learn

Cybersecurity is a rapidly growing field. Students in the Cybersecurity and Policy program are prepared for a burgeoning career field fighting worldwide “cybercrime” and protecting digital resources from hacking, fraud, and malware viruses. Our Bachelor Degree in Cybersecurity and Policy provides many advantages.

Core Courses & Requirements

  • ACCT 101 Principles of Financial Accounting I
  • BUS 110 Foundations of Business
  • BUS 202 Critical Thinking and Decision Making
  • BUS 230 Business Ethics and the Legal Environment
  • MGMT 210 Introduction to Project Management
  • CBSC 235 Foundations of Cybersecurity

  • CBSC 245 Cyber Law
  • CBSC 265 Network Security Management
  • COMP 140 Introduction to Data Communication and Networking
  • COMP 236 Survey of Operating Systems
  • COMP 251 Computer Systems Technology

Available Concentrations

Government Contract Management Concentration Courses

  • CBSC 310 Computer Security
  • MGMT 308 Government Contract Law
  •  MGMT 326 Principles of Federal Acquisition (FAR and DAR)
  • MGMT 330 Purchasing and Material Management

  • MGMT 332 Cost and Price Analysis
  • MGMT 350 Contract Administration
  • MGMT 450 Contract Modification and Options

Healthcare Management Concentration Courses

  • HLTH 303 Information Systems for Health Systems
  • HLTH 400 Societal Health and Policy Issues
  • HLTH 403 Global Health Administration

  • HLTH 405 Healthcare Financial Management
  • HLTH 435 Strategic Healthcare Planning
  • MGMT 411 Total Quality Management

Information Management Concentration Courses

  • CBSC 320 Information Security
  • MCAP 303 Organization and Technology of Information Management
  • MCAP 351 Management Support Systems

  • MICS 341 Systems Analysis and Design
  • MICS 455 Computer Networking and Telecommunications
  • MICS 461 Database Management

International Business

  • BUS 310 Export/Import Marketing
  • MGMT 303 International Business Management
  • MGMT 311 Supply Chain Management

  • MGMT 440 International Organizational Development Strategies
  • MRKT 424 International Marketing
  • MRKT 450 New Product Development (US and Global) Management Concentration

Management Concentration Courses

  • MCAP 303 Organization and Technology of Information Management
  • MGMT 360 Leadership
  • MGMT 365 Managing Conflict and Change
  • MGMT 417 Human Resource Management

  • MGMT 424 Negotiations Management
  • MGMT 427 Operations Management
  • MGMT 435 Strategic Management and Planning

Bachelor of Science in Cybersecurity Career Opportunities

Cyber Security is the acquisition, discovery, collection, analysis, and reporting of evidence found on computers and networks. Anti-cybercrime professionals work with these devices, as well as routers, servers, and the Internet to analyze increasingly complex digital crime scenes. More and more, digital evidence is used for civil, criminal, and administrative proceedings, so the evidence must be obtained and used in a way that ensures the admissibility in a court of law. Cyber Security is a young and growing field. Graduates will be entering a market where opportunities are expanding and companies are looking for the brightest in a new tech revolution.

Accounting GE Disclosure


Ready To Apply? Great! Here's What You Need To Do:

  • Complete an admissions interview conducted in person or via online methods.
  • Sign and submit an attestation of high school (or equivalent) completion.
  • Equivalencies include a GED Certificate. Home schooled students must present a diploma that meets the requirements of the state in which it was issued. (Students with non-US credentials please see International Student Admissions Requirements below).
  • Submit a completed application
  • Arrange for official transcripts from all colleges/universities previously attended to be submitted to the Office of Records and Registration, University of the Potomac.
  • Submit grade reports or scores from any recognized college equivalency examinations (e.g., CLEP, DANTES, and Advanced Placement).
  • Submit certificates from any corporate education training or professional development programs. (Note: An ACE evaluation form may be required to determine appropriate credit for corporate educational training.)
  • Submit military training documents. (Note: An ACE military evaluation form may be required to determine appropriate credit for military training.)
Fill Out The Application

Need More Information?

Learn more about the admissions process, cost, aid and our faculty.


Learn about our requirements and process.

View Admissions Requirements

Tuition & Fees

View the associated program costs.

See All Tuition & Fees

Financial Aid

Learn about available aid and how to apply.

Financial Aid Options

Staff & Faculty

Meet the academic and support teams.

View Faculty Members