Cybersecurity Bachelor's Degree Completion Program
From the Equifax breach to interference in the 2016 Presidential election, no target has proven too big for cyberspace’s bad actors. And as thousands of would-be criminals, terrorists and spies are using their knowledge to exploit vulnerabilities worldwide, those who wear the white hat need to stay a step ahead in safeguarding society.
Our Cybersecurity Bachelor’s Degree Completion program combines highly technical, hands-on curriculum in labs and virtual environments with invaluable collaboration with government agencies, private companies and the military experts fighting every day on cyberspace’s front lines. Designed for students with associate’s, applied associate's or non-technical bachelor’s degrees who are looking to advance in the field, you will learn the ins and outs of attack tools, IT defense countermeasures, encryption and more to help solve cyber’s toughest problems.
Program at a Glance
You can complete your bachelor's degree in two years through evening and weekend courses, convenient for working professionals.
The instructors are nationally and internationally recognized experts, and bring first-hand experience and real-life scenarios to the classroom.
GW has been designated a Federal Center for Academic Excellence in Information Assurance Research by the National Security Agency and the Department of Homeland Security.
Where You'll Study
Classes are held at three Virginia locations, including the GW Education Center in Arlington, the GW Virginia Science and Technology Campus in Ashburn and the Northern Virginia Community College Woodbridge Campus.
What You'll Study
The program targets competencies defined by the National Initiative for Cyber Security Education (NICE). Through significant technical and hands-on learning using computer labs and virtual environments, as well as our collaboration with government agencies, private companies and the military, you will learn to:
- Understand and implement Cybersecurity requirements
- Investigate and analyze Cybersecurity incidents
- Protect and effectively defend computer networks against malicious activities
- Identify and correct computer network vulnerabilities through penetration testing and hacking techniques
- Initiate and undertake critical analysis of security issues to develop and implement security policies and to solve problems
- Interact with others in groups or teams in ways that contribute to effective working relationships and the achievement of goals
- Course Schedule
-
Students take 60 credits of required courses. There are 15 courses, each 4 credits, and they are taken in lockstep as part of a cohort group of students.
To graduate within two years, students take 12 credits per semester and are advised to discuss scheduling with a faculty advisor.Fall Semester/Year 1
PSCS 3100: Principles of Cybersecurity (4 credits)
PSCS 3103: Ethics, Law & Policy (4 credits)
PSCS 4110: Data Communications & Networking Technology (4 credits)Spring Semester/Year 1
PSCS 2303: Compliance & Risk Assessment (4 credits)
PSCS 3107: IP Security & VPN Technology (4 credits)
PSCS 2304: Incident Response (4 credits)Summer Semester/Year 1
PSCS 3109: Network Security (4 credits)
PSCS 3110: Cloud Security (4 credits)
PSCS 3111: IT Security System Audits (4 credits)Fall Semester/Year 2
PSCS 4102: Intrusion Detection & Vulnerability Management (4 credits)
PSCS 3113: IT Security Defense Countermeasures – BLUE TEAM (4 credits)
PSCS 2301: Cyber Investigation (4 credits)Spring Semester/Year 2
PSCS 4202: Attacker Tools & Techniques – RED TEAM (4 credits)
PSCS 2302: Digital Forensics (4 credits)
PSCS 3117: Project Management for IT (4 credits) - Course Descriptions
-
PSCS 2301: Cyber Investigation (4 credits)
The investigative framework and tools needed for the investigation of cyber crime. Crimes that involve computer technology; procedural and tactical issues associated with the prosecution of cyber crime.
PSCS 2302: Digital Forensics (4 credits)
An introduction to digital forensic science and the systematic process of acquiring, authenticating, and analyzing digital evidence. Forensic methods and laboratories; tools, techniques, and methods used to perform computer forensics and investigation; and emerging technologies. Theoretical and practical experience using forensic equipment and software.
PSCS 2303: Compliance and Risk Management (4 Credits)
Data protection from a risk management perspective. Data retention; security and protection technologies; technology requirements for compliance, governance, and data security; the importance of e-discovery for civil litigation; the impact of third-party services in conjunction with data protection; and data processing facets, such as the role of tiering and server and storage virtualization.
PSCS 2304: Incident Response (4 credits)
Principles and techniques for detecting and responding to current and emerging computer security threats. Data breaches, advanced malware, and targeted attacks. Law and policy related to incident response.
PSCS 3100: Principles of Cybersecurity (4 Credits)
Basic principles and concepts in information security and information assurance; technical, operational, and organizational issues of securing information systems.
PSCS 3103: Ethics, Law, and Policy (4 credits)
Overview of ethical, legal and policy issues related to the impact of modern technology on society; ethical theories and decision making, professional responsibility and codes of ethics, copyright and intellectual property, information accountability, freedom of information and privacy, the Internet and considerations associated with information sharing and social networking.
PSCS 3107: IP Security and VPN Technology (4 Credits)
Risks associated with an organization’s network being connected to the public Internet; defensive technologies, types of encryption, enterprise firewalls, intrusion detection/prevention, and access control technologies; active threat agents and exploitation techniques used to compromise the digital infrastructure.
PSCS 3109: Network Security (4 Credits)
Security aspects of networks and network technology; intrusion detection, virtual private networks (VPN), and firewalls; types of security threats, security policy design and management; and security technologies, products, and solutions.
PSCS 3110: Cloud Security (4 Credits)
This course will examine Cloud Security architecture and explore: security design principles, design patterns, industry standards, applied technologies and address regulatory compliance requirements critical to the design, implementation, delivery and management of secure Cloud-based services. In addition, this course will examine risks to Cloud Security architecture, by identifying and mitigating threats and vulnerabilities and protecting and isolating physical and logical infrastructures.
PSCS 3111: Information Technology Security System Audits (4 Credits)
Theory, methodology, and procedures related to IT system audits; proper audit procedures for discovering system vulnerabilities; documenting findings according to the standards of compliance based auditing.
PSCS 3113: Topics in IT Security Defense Countermeasures (4 Credits)
Theory, methodology, and practical experience relating to IT defense countermeasures; system vulnerabilities and how adversaries can exploit them. Topics vary by semester. May be repeated for credit provided the topic differs. See department for more details.
PSCS 3117: Project Management in Information Technology (4 Credits)
Concepts and basic functions of the project management body of knowledge, including scope, quality, time, cost, risk, procurement, human resource, and communication management and integration of these functions into a project management system; roles and responsibilities of various project staff.
PSCS 4102: Intrusion Detection and Vulnerability Management (4 Credits)
The use of intrusion detection systems (IDS) as part of an organization’s overall security mechanisms; implementation and testing of IDS security plans, security monitoring, intrusion detection, alarm management, analysis of events and trends, and vulnerability management.
PSCS 4110: Data Communication and Networking Technologies (4 Credits)
Overview of the networking technologies deployed by modern enterprises. Hardware and software used to transfer information from source to destination, including switches, routers, firewalls, Ethernet, and the TCP/IP protocols suite. (Same as PSIS 4141).
PSCS 4202: Cyber Attack Tools and Techniques (4 Credits)
Linux-based introduction to traditional and contemporary attack tools and technologies used by threat actors. Constructing an effective computer network defense.
PSCS 2301: Cyber Investigation (4 credits)
The investigative framework and tools needed for the investigation of cyber crime. Crimes that involve computer technology; procedural and tactical issues associated with the prosecution of cyber crime.
PSCS 2302: Digital Forensics (4 credits)
An introduction to digital forensic science and the systematic process of acquiring, authenticating, and analyzing digital evidence. Forensic methods and laboratories; tools, techniques, and methods used to perform computer forensics and investigation; and emerging technologies. Theoretical and practical experience using forensic equipment and software.
PSCS 2303: Compliance and Risk Management (4 Credits)
Data protection from a risk management perspective. Data retention; security and protection technologies; technology requirements for compliance, governance, and data security; the importance of e-discovery for civil litigation; the impact of third-party services in conjunction with data protection; and data processing facets, such as the role of tiering and server and storage virtualization.
PSCS 2304: Incident Response (4 credits)
Principles and techniques for detecting and responding to current and emerging computer security threats. Data breaches, advanced malware, and targeted attacks. Law and policy related to incident response.
PSCS 3100: Principles of Cybersecurity (4 Credits)
Basic principles and concepts in information security and information assurance; technical, operational, and organizational issues of securing information systems.
PSCS 3103: Ethics, Law, and Policy (4 credits)
Overview of ethical, legal and policy issues related to the impact of modern technology on society; ethical theories and decision making, professional responsibility and codes of ethics, copyright and intellectual property, information accountability, freedom of information and privacy, the Internet and considerations associated with information sharing and social networking.
PSCS 3107: IP Security and VPN Technology (4 Credits)
Risks associated with an organization’s network being connected to the public Internet; defensive technologies, types of encryption, enterprise firewalls, intrusion detection/prevention, and access control technologies; active threat agents and exploitation techniques used to compromise the digital infrastructure.
PSCS 3109: Network Security (4 Credits)
Security aspects of networks and network technology; intrusion detection, virtual private networks (VPN), and firewalls; types of security threats, security policy design and management; and security technologies, products, and solutions.
PSCS 3111: Information Technology Security System Audits (4 Credits)
Theory, methodology, and procedures related to IT system audits; proper audit procedures for discovering system vulnerabilities; documenting findings according to the standards of compliance based auditing.
PSCS 3113: Topics in IT Security Defense Countermeasures (4 Credits)
Theory, methodology, and practical experience relating to IT defense countermeasures; system vulnerabilities and how adversaries can exploit them. Topics vary by semester. May be repeated for credit provided the topic differs. See department for more details.
PSCS 3117: Project Management in Information Technology (4 Credits)
Concepts and basic functions of the project management body of knowledge, including scope, quality, time, cost, risk, procurement, human resource, and communication management and integration of these functions into a project management system; roles and responsibilities of various project staff.
PSCS 4102: Intrusion Detection and Vulnerability Management (4 Credits)
The use of intrusion detection systems (IDS) as part of an organization’s overall security mechanisms; implementation and testing of IDS security plans, security monitoring, intrusion detection, alarm management, analysis of events and trends, and vulnerability management.
PSCS 4103: Securing Operating Systems (4 Credits)
The security techniques and technologies integrated into Microsoft operating systems, which are a frequent target of attacks; primary threats and protection mechanisms developed by Microsoft and others; tools used to defend against known risks and vulnerabilities; client and server operating systems, OS hardening, application security, and Active Directory.
PSCS 4110: Data Communication and Networking Technologies (4 Credits)
Overview of the networking technologies deployed by modern enterprises. Hardware and software used to transfer information from source to destination, including switches, routers, firewalls, Ethernet, and the TCP/IP protocols suite. (Same as PSIS 4141).
PSCS 4202: Cyber Attack Tools and Techniques (4 Credits)
Linux-based introduction to traditional and contemporary attack tools and technologies used by threat actors. Constructing an effective computer network defense.
Admissions Information
To be considered for admissions to the Cybersecurity BPS program, you must have:
- Normally, an overall GPA of 3.0 or higher on a 4.0 scale
- Earned an Associate's degree or a non-technical bachelor's degree, if applying as a second bachelor's candidate from a regionally accredited college or university, or at least 60 transferable credit hours of suitable coursework
- Proof of high school completion (final high school transcript, GED or copy of high school diploma), unless a university degree (Associate's, Bachelor's, Master's or Doctorate) was earned
- Statement of purpose that is appropriate and relevant to the study of cybersecurity
- Depending on the type of applicant you are, you may have additional requirements.
Transfer Credits:
- Up to 60 credits can be transferred from coursework taken at other regionally accredited institutions of higher education. Coursework must have been successfully completed with a grade of C or higher (C-, D and F do not transfer).
- Students from Northern Virginia Community College (NOVA)
-
Students from NOVA can apply to the Cybersecurity bachelor’s degree completion program with these credentials:
- Associate of Science (A.S.) degree in Information Technology, Business Administration, Computer Science, or Engineering
- Associate of Applied Science (A.A.S.) degree in Information Technology or Cybersecurity
- 60 transferable credits with required general education distribution with a grade of C or higher (C-, D and F do not transfer).
All other degrees will be evaluated and bridge courses may be recommended.
For students without a technical degree, these bridge courses are recommended (choose one class from each of the categories):
Networking
- ITN 100: Introduction to Telecommunications (or)
- ITN 101: Introduction to Network Concepts
Hardware & Software
- ITE 221: PC Hardware and OS Architecture (or)
- ITN 107: Personal Computer Hardware and Troubleshooting
Linux & Unix
- ITN 170: Linux System Administration (or)
- ITN 171: UNIX 1
Please apply online after carefully reviewing the detailed application instructions. International students need to note additional requirements. If you need assistance please contact us.
- Applicants without an Associate's Degree
-
You need 60 credit hours that are transferrable from a regionally accredited institution of higher education, with a grade of C or higher (C-, D and F do not transfer).
Please contact us for guidance regarding core curriculum requirements.
- Applicants without a Bachelor's Degree
-
You need one of these degrees:
- Associate of Science (A.S.) degree in Information Technology, Business Administration, Computer Science, or Engineering;
- Associate of Applied Science (A.A.S.) degree in Information Technology or Cybersecurity;
- Or 60 transferable credits from a regionally accredited institution of higher education, with a grade of C or higher (C-, D and F do not transfer).
- Applicants for a Second Bachelor's Degree
-
You need a bachelor’s degree in a non-technical field from a regionally accredited institution of higher learning.
Please contact us for guidance regarding core curriculum requirements. Student transcripts will be reviewed and recommendations made on a case-by-case basis.
Deadlines
Applicants that have complete applications are eligible to request an application fee waiver by 11:59 p.m. on the Priority Deadline.* To request an application fee waiver, contact your program representative before submitting your application. Fee waiver details. Applications received after the Final Deadline will continue to be processed, space permitting.
Note for International Students: Applicants must submit their complete applications by the deadlines listed on the International Student Admissions page. These deadlines are at least two months before the deadline for admitted students to submit visa request paperwork.
Tuition & Aid
GW tuition and fees are comparable to the national average for private universities. These costs, set by the GW Board of Trustees, generally increase from year to year and may vary by program and location.
- Costs and Aid
-
Please use this information as an estimate based on current tuition rates and fee structures. Total tuition and fees will vary according to the courses taken and the timeframe in which you complete your coursework. If needed, you can find financial aid opportunities as well as specific grants offered for students in this program. If applying for loans, keep deadlines in mind.
2024-2025 Rates in Effect for Summer 2024, Fall 2024 and Spring 2025 Terms
Tuition: 60 credits @ $975 per credit hour
15 courses (typically completed in 2 years)
$58,500 Registration fees: 5 registration sessions @ $35 each
$175 TOTAL: Tuition + fees over the average completion time
$58,675 (approx.)
Other Costs to Consider: Application fee: $80*; Texbooks: $1,800 (approx.); Matriculation fee (one time): $200. Students admitted to the program will be required to have a laptop computer.*The application fee may be waived for students submitting complete applications by the priority deadline.
Grants
- Virginia State Grants: The Commonwealth of Virginia has two grant programs which students attending Virginia-based programs may qualify for. These programs include the Two-Year College Transfer Grant Program and the Virginia Tuition Assistance Grant. More information about these programs, eligibility and application steps are available through GW's Office of Student Financial Assistance.
- National Science Foundation Scholarships for Service (NSF-SFS Grant): There are five scholarships available for eligible students attending Prince George’s, Northern Virginia and Anne Arundel Community Colleges. Contact your community college's academic advisor for more information.
Veteran's Benefits
Information regarding veteran's education benefits may be obtained from the Office of Military and Veteran Student Services, Foggy Bottom Campus. Students should contact at vetserve@gwu.edu or 202-994-2083 with questions. A signed certificate attesting to the student's status must be obtained from the appropriate dean's office and mailed with the registration schedule and statement at the time of payment. Those students who are veterans and requesting benefits must communicate their status to the Veterans Benefits Office, at least 30 days prior to course start date, in order to obtain an advance payment from the VA. Payment takes approximately 6-8 weeks.
- Virginia State Grants: The Commonwealth of Virginia has two grant programs which students attending Virginia-based programs may qualify for. These programs include the Two-Year College Transfer Grant Program and the Virginia Tuition Assistance Grant. More information about these programs, eligibility and application steps are available through GW's Office of Student Financial Assistance.
"We live, work, and play in cyberspace. However, our increasing reliance on cyber technologies makes us more vulnerable to those adversaries who would attack our digital infrastructure with the intent of undermining our security and our economic prosperity. Graduates of GW’s cybersecurity bachelor’s degree completion program are well prepared to address a variety of threats facing our nation today and in the future."
Dr. Scott J. White, Ph.D.
Associate Professor and Director,
GW Cybersecurity Bachelor’s Degree Completion Program
Contacts
Lynn McKnight
Assistant Director,
Recruitment & Admissions
lamck28@gwu.edu
(571) 553-0328
Schedule a time to talk to me
Dr. Scott White
Associate Professor
Director, Cybersecurity Program
cybersec@gwu.edu