Cybersecurity Bachelor's Degree Completion Program

 

Line graphic

From the Equifax breach to interference in the 2016 Presidential election, no target has proven too big for cyberspace’s bad actors. And as thousands of would-be criminals, terrorists and spies are using their knowledge to exploit vulnerabilities worldwide, those who wear the white hat need to stay a step ahead in safeguarding society.

Our Cybersecurity Bachelor’s Degree Completion program combines highly technical, hands-on curriculum in labs and virtual environments with invaluable collaboration with government agencies, private companies and the military experts fighting every day on cyberspace’s front lines. Designed for students with associate’s, applied associate's or non-technical bachelor’s degrees who are looking to advance in the field, you will learn the ins and outs of attack tools, IT defense countermeasures, encryption and more to help solve cyber’s toughest problems.

Line graphic

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 
 
Line graphic

Program at a Glance

 

Complete the program in two years

 

You can complete your bachelor's degree in two years through evening and weekend courses, convenient for working professionals.

 

Shield, Instructors are experts

 

The instructors are nationally and internationally recognized experts, and bring first-hand experience and real-life scenarios to the classroom.

 

Program News

 

Excellence badge with star in the middle, Federal Center for Academic Excellence in Information Assurance Research

 

GW has been designated a Federal Center for Academic Excellence in Information Assurance Research by the National Security Agency and the Department of Homeland Security.

 

Line graphic

 

Where You'll Study

You can study at the Virginia Science & Technology Campus in Ashburn, VA or Northern Virginia Community College in Woodbridge, VA

Classes are held at three Virginia locations, including the GW Education Center in Arlington, the GW Virginia Science and Technology Campus in Ashburn and the Northern Virginia Community College Woodbridge Campus.
 

Line graphic

What You'll Study

The program targets competencies defined by the National Initiative for Cyber Security Education (NICE). Through significant technical and hands-on learning using computer labs and virtual environments, as well as our collaboration with government agencies, private companies and the military, you will learn to:

  • Understand and implement Cybersecurity requirements
  • Investigate and analyze Cybersecurity incidents
  • Protect and effectively defend computer networks against malicious activities
  • Identify and correct computer network vulnerabilities through penetration testing and hacking techniques
  • Initiate and undertake critical analysis of security issues to develop and implement security policies and to solve problems
  • Interact with others in groups or teams in ways that contribute to effective working relationships and the achievement of goals

PSCS 2301:  Cyber Investigation (4 credits)

The investigative framework and tools needed for the investigation of cyber crime. Crimes that involve computer technology; procedural and tactical issues associated with the prosecution of cyber crime.

PSCS 2302: Digital Forensics (4 credits)

An introduction to digital forensic science and the systematic process of acquiring, authenticating, and analyzing digital evidence. Forensic methods and laboratories; tools, techniques, and methods used to perform computer forensics and investigation; and emerging technologies. Theoretical and practical experience using forensic equipment and software.

PSCS 2303: Compliance and Risk Management (4 Credits)

Data protection from a risk management perspective. Data retention; security and protection technologies; technology requirements for compliance, governance, and data security; the importance of e-discovery for civil litigation; the impact of third-party services in conjunction with data protection; and data processing facets, such as the role of tiering and server and storage virtualization.

PSCS 2304: Incident Response (4 credits)

Principles and techniques for detecting and responding to current and emerging computer security threats. Data breaches, advanced malware, and targeted attacks. Law and policy related to incident response.

PSCS 3100: Principles of Cybersecurity (4 Credits)

Basic principles and concepts in information security and information assurance; technical, operational, and organizational issues of securing information systems.

PSCS 3103: Ethics, Law, and Policy (4 credits)

Overview of ethical, legal and policy issues related to the impact of modern technology on society; ethical theories and decision making, professional responsibility and codes of ethics, copyright and intellectual property, information accountability, freedom of information and privacy, the Internet and considerations associated with information sharing and social networking.

PSCS 3107: IP Security and VPN Technology (4 Credits)

Risks associated with an organization’s network being connected to the public Internet; defensive technologies, types of encryption, enterprise firewalls, intrusion detection/prevention, and access control technologies; active threat agents and exploitation techniques used to compromise the digital infrastructure.

PSCS 3109: Network Security (4 Credits)

Security aspects of networks and network technology; intrusion detection, virtual private networks (VPN), and firewalls; types of security threats, security policy design and management; and security technologies, products, and solutions.

PSCS 3111: Information Technology Security System Audits (4 Credits)

Theory, methodology, and procedures related to IT system audits; proper audit procedures for discovering system vulnerabilities; documenting findings according to the standards of compliance based auditing.

PSCS 3113: Topics in IT Security Defense Countermeasures (4 Credits)

Theory, methodology, and practical experience relating to IT defense countermeasures; system vulnerabilities and how adversaries can exploit them. Topics vary by semester. May be repeated for credit provided the topic differs. See department for more details.

PSCS 3117: Project Management in Information Technology (4 Credits)

Concepts and basic functions of the project management body of knowledge, including scope, quality, time, cost, risk, procurement, human resource, and communication management and integration of these functions into a project management system; roles and responsibilities of various project staff.

PSCS 4102: Intrusion Detection and Vulnerability Management (4 Credits)

The use of intrusion detection systems (IDS) as part of an organization’s overall security mechanisms; implementation and testing of IDS security plans, security monitoring, intrusion detection, alarm management, analysis of events and trends, and vulnerability management.

PSCS 4103: Securing Operating Systems (4 Credits)

The security techniques and technologies integrated into Microsoft operating systems, which are a frequent target of attacks; primary threats and protection mechanisms developed by Microsoft and others; tools used to defend against known risks and vulnerabilities; client and server operating systems, OS hardening, application security, and Active Directory.

PSCS 4110: Data Communication and Networking Technologies (4 Credits)

Overview of the networking technologies deployed by modern enterprises. Hardware and software used to transfer information from source to destination, including switches, routers, firewalls, Ethernet, and the TCP/IP protocols suite. (Same as PSIS 4141).

PSCS 4202: Cyber Attack Tools and Techniques (4 Credits)

Linux-based introduction to traditional and contemporary attack tools and technologies used by threat actors. Constructing an effective computer network defense.

 

Line graphic

Admissions Information

To be considered for admissions to the Cybersecurity BPS program, you must have: 

  • Normally, an overall GPA of 3.0 or higher on a 4.0 scale
  • Earned an Associate's degree or a non-technical bachelor's degree, if applying as a second bachelor's candidate from a regionally accredited college or university, or at least 60 transferable credit hours of suitable coursework
  • Proof of high school completion (final high school transcript, GED or copy of high school diploma), unless a university degree (Associate's, Bachelor's, Master's or Doctorate) was earned
  • Statement of purpose that is appropriate and relevant to the study of cybersecurity
  • Depending on the type of applicant you are, you may have additional requirements. 

Transfer Credits:

  • Up to 60 credits can be transferred from coursework taken at other regionally accredited institutions of higher education. Coursework must have been successfully completed with a grade of C or higher (C-, D and F do not transfer).

 

Line graphic

Deadlines

Applicants that have complete applications are eligible to request an application fee waiver by 11:59 p.m. on the Priority Deadline.* To request an application fee waiver, contact your program representative before submitting your application. Fee waiver details. Applications received after the Final Deadline will continue to be processed, space permitting.

 

leaf illustration

Fall Admissions

In-person program

  • Fall Priority Deadline: March 1*
  • Fall Final Deadline: July 31

 

flower illustration

Spring Admissions

In-person program

  • Not offered

 

illustration of a summer sun
Summer Admissions

In-person program

  • Not offered

Note for International Students: Applicants must submit their complete applications by the deadlines listed on the International Student Admissions page. These deadlines are at least two months before the deadline for admitted students to submit visa request paperwork.
 

Line graphic

Tuition & Aid

GW tuition and fees are comparable to the national average for private universities. These costs, set by the GW Board of Trustees, generally increase from year to year and may vary by program and location.

 


"We live, work, and play in cyberspace. However, our increasing reliance on cyber technologies makes us more vulnerable to those adversaries who would attack our digital infrastructure with the intent of undermining our security and our economic prosperity. Graduates of GW’s cybersecurity bachelor’s degree completion program are well prepared to address a variety of threats facing our nation today and in the future."

Dr. Scott J. White, Ph.D.
Associate Professor and Director,
GW Cybersecurity Bachelor’s Degree Completion Program


 

Contacts

 

Lynn McKnight
 
 

 

Scott White

 

 

 

Line graphic

Request Information

Information Sessions

We periodically offer online and in-person information sessions about the Cybersecurity Bachelor's Degree Completion Program. Contact the program representative to learn more about upcoming events.