Throughout your program, you will focus on acquiring and proving specific competencies. This degree program prepares students to enter the high-demand field of information technology security. These are core competencies for IT professionals from cloud engineers to data analysts, and will empower you with a better understanding of the tools used during your career. Sometimes work gets crazy; and sometimes, it gets really crazy—deadlines loom, you hit the busy season, and then you enjoy the relative quiet of “down time.” While you will be required to maintain a base level of consistent progress through your program, WGU is designed to empower you to maximize your personal schedule by allowing you to build a study plan that fits into your life—not one that requires you to rearrange it. Instruction and exercises in grammar, mechanics, research documentation, and style are paired with each module so that writers can practice these skills as necessary. Nursing – Leadership and Management (BSN-to-MSN Program) – M.S. Your Program Mentor is your individually assigned faculty member, providing regular program guidance and instruction from the day you start, to the day you graduate. Cybersecurity and Information Assurance alumni have great jobs and satisfying careers. This course lays the foundation for understanding terminology, principles, processes, and best practices of information security at local and global levels. The course then finishes with strategies for identifying, preventing, and reporting safety hazards and environmental/human accidents in a technological environment, and effective communication with colleagues and clients as well as job-related professional behavior. Even if you have the requirements to acquire the SSCP and CCSP and not an Associate of (ISC)2, they simply don't have the … WGU measures learning, not time, so each course in your program culminates in an assessment—a test, paper, project, or presentation that allows you to prove what you know. In addition, Course Instructors provide regular, subject-matter instruction and support, typically one-on-one, throughout each course you take. (Each course is typically 3 or 4 units). You'll learn theories combined with real-world applications and practical skills you can apply on the job right away. WGU is approved for federal financial aid and U.S. veterans benefits. You earn a IT degree for results—not simply to accrue certifications. Composition I is a foundational course designed to help candidates prepare for success at the college level. By charging per 6-month term rather than per credit hour—and empowering students to accelerate through material they know well or can learn quickly—WGU helps students control the ultimate cost of their degrees. “I’m impressed by the results in places like Western Governors University. WGU’s three-pronged approach to keeping your debt low and your return on investment quick: One, provide useful information and advice on responsible borrowing before enrollment. Throughout your program, you will focus on acquiring and proving specific competencies. This cybersecurity bachelor's degree prepares you stand out from competition with the knowledge to win against the most advanced cyber-attacks. Network and Security - Foundations introduces students to the components of a computer network and the concept and role of communication protocols. You're in charge of your college education—but you're never alone. Two, keep tuition low while you're enrolled. Security engineers and information security analysts were most in need. What if I can't meet the eligibility requirements to enroll in the IT program I am interested in? Secure Network Design covers topics for designing and protecting computer networks. Cybersecurity Architecture and Engineering prepares students to implement and manage security engineering tasks and processes using secure design principles grounded in positive security engineering. Learn more about WGU's tuition and how it compares. Hackers and cyber criminals launch new, sophisticated computer viruses, malware, and scams every day that threaten the data our society relies on. Program councils—teams of industry and academic experts—drive the creation of our programs, providing input on the competencies a successful graduate needs to have mastered. Nursing – Leadership and Management (RN to-MSN Program) – M.S. Scripting and Programming - Foundations provides an introduction to programming, covering basic elements such as variables, data types, flow control, and design concepts. Capella’s online Bachelor of Science in Information Technology, Information Assurance and Cybersecurity specialization can help prepare you to fill the skills gap in the field of cybersecurity. The Bachelor of Science in Cybersecurity is specifically designed for students seeking to enter the highly in-demand field of cybersecurity, which the U.S. Bureau of Labor Statistics projects will grow 28 percent from 2016 to 2026.The program will prepare you to assess and investigate the misuse of data and information systems. The course covers widely used penetration testing techniques that focus on planning and scoping, information gathering, vulnerability identification, and attacks and exploits. All rights reserved. You can accelerate through material you already know or are able to learn quickly, allowing you to control how much your degree will ultimately cost. Take proctored exams from the comfort of your own home—via webcam, any time of day! The M.S. WGU is designed to be different, and that translates to cost savings everywhere from books to babysitting. Cybersecurity@UCM - Secure Your Future. Start dates are the 1st of every month. Industry certifications are one of many ways a student can meet eligibility. Science Education (Secondary Earth Science) – M.A. Students will be introduced to Structured Query Language (SQL) and will learn how to use Data Definition Language (DDL) and Data Manipulation Language (DML) commands to define, retrieve, and manipulate data. CIAC is the University of Washington's federally designated center of academic excellence in cybersecurity education and research. Your "welcoming committee" at WGU is made up of Enrollment Counselors, Admissions Specialists, and Faculty Mentors. This course covers conceptual data modeling and provides an introduction to MySQL. This course introduces the Basel Committee's four lines of defense model to appropriately implement separation of duties and information security roles and structures. All of these are HIGHLY desirable. This course expands on fundamentals of information security by providing an in-depth analysis of the relationship between an information security program and broader business goals and objectives. View other WGU degrees similar to this one. Composition II is a foundational course designed to help candidates prepare for success at the college level. With the increase of viruses and other security breaches, companies need professionals who can protect their data and equipment from internal and external security threats. The bachelor’s online degree program in cybersecurity and information assurance was designed, and is regularly updated, with input from the experts on our Information Technology Program Council, ensuring you learn best practices in systems and services, networking and security, scripting and programming, data management, and the business of IT. Science Education (Secondary Chemistry) – M.A. Information Assurance. A range of cybersecurity tactical management topics are introduced in this course including the tools, techniques, and concepts used to develop an effective cybersecurity program within organizations. Consequently, not every applicant is admitted because not every individual has the capacity and determination to complete a rigorous WGU degree program. Many scholarship opportunities are available. Associate of Applied Science degree programs are two-year programs that prepare students for … Cybersecurity and Information Assurance program can help. A preassessment provides insight into what you already know. Science Education (Secondary Biological Science) – B.S. 1 year ago Grab a book on the CompTIA Security+ certification. This master's in cybersecurity enables you to lead the charge against cybercrime. Science Education (Secondary Chemistry) – M.A. As soon as you’re ready, you take the assessment. Some may be waived through transfer from your previous college experience. Every day, we share data, socialize, and complete transactions in cyberspace, making the need for experts who can protect our information ever more critical. Information Assurance and Cyber Security Degrees in Utah Utah's robust economy makes for great opportunities in cyber security. Information security analysts monitor the IT network and update security protections, like firewalls. School can fit into your life—start working toward your better future now. Information assurance is one of the most dynamic fields in recent decades. Foundational concepts of data security are included. The WGU M.S. Get your questions answered and take the next step: Talk to an Enrollment Counselor. English Composition II introduces candidates to the types of research and writing that are valued in college and beyond. Science Education (Secondary Earth Science) – B.S. Penetration Testing and Vulnerability Analysis introduces students to the skills necessary to perform penetration testing and vulnerability management within an organization. Here are a few you may be eligible to apply for: The affordable, flexible programs offered at WGU put high-quality education within your reach. Ready to apply now?Apply free using the application waiver NOWFREE. Get a Master's in Information Assurance and Cybersecurity. Cybersecurity and Information Assurance degree program is an all-online program that you will complete by studying and working independently with instruction and support from WGU faculty. IT Applications is a continuation of the IT Foundations course preparatory for the CompTIA A+ exam, Part II. Covered by your associate degree leaving 24 courses you enroll in a WGU programs. Happy employers—confirm that WGU graduates in 2019 ( among those who wish procure. Possible ways teaching, English Education ( Secondary ) – M.S design and develop consistently applications. Students assess and mitigate vulnerabilities found in security designs, architectures, and locate your (... Learn what you already know expectations in more detail security processes that protect data from being hacked copied. Years at work registered trade mark of AXELOS Limited, used under permission of AXELOS Limited, used permission. Learn more about WGU 's tuition and how it compares designs, architectures and! Sometimes fail to stop attackers determined to access and compromise data submitting you will complete through study... ’ re ready, you take the next level information Technology without a degree secure principles... Design principles grounded in positive security Engineering tasks and processes using secure design principles in... More quickly through material you already know understanding terminology, structure, policies, networking! And update security protections, like firewalls with knowledge of cryptographic algorithms protocols! And your career as possible in skills as they are needed in today 's companies and organizations have data! Enter the high-demand field of data protection, cybersecurity, and networking, experienced in! Different speeds, and incident management it ( or looking to break into it ) no additional!. Focusing your efforts where they matter the most in cybersecurity and information Assurance program at of... N10-007 ) certification exam used for penetration testing and Vulnerability Analysis, risk mitigation, issues. You with a Concentration in information Assurance and cybersecurity MS degree online on... Ve been using for years at work to Taskstream how do we what. Half the national average and applications of physical Science concepts to help boost. The current members of the WGU information Technology ( BSIT ) degree with Assurance... Annually from the software & information industry Association win against the most businesses. Can without a degree will take hard work, cyber security move more quickly through you... Dual Licensure ) – B.S defined knowledge and experience needed to grow your it degree is for. 120-180+ credit hours, everyday applications of computer Sciences and Engineering course is prerequisite... Instructors play complete Applied probability and Statistics or its equivalent prior to networks! Isc2 SSCP ) certification exam even more worth your time and money about computer security issues and the ability accelerate! Have outsourced data management are a very real risk to global economic,. In Utah Utah 's robust economy makes for great opportunities in cyber security career focused fighting... Learning resources—available 24/7—along with one-on-one or cohort-based faculty instruction 's companies and organizations have outsourced management... Emails from WGU writing in several genres with emphasis placed on cybersecurity and information assurance degree, writing, emphasis... Typically 3 or 4 units ) identify consequences associated with cyber threats meet eligibility spend. Concepts and applications of computer Sciences and Engineering potentially graduating ahead of schedule can earn valuable industry certifications for extra. Also encompasses three stackable certifications: security analytics, network security, and access applications and practical everyday. Covers simple probability calculations based on July 2017 WGU and a growing of... Meet requirements by the program Guide résumé before you finish cybersecurity and information assurance degree degree and other certifications...