BACHELOR'S ONLINE
Cybersecurity Degree and Information Assurance Programs
This Online Cyber Security Degree Includes 14 Top Industry Certs, Preparing You for an Exciting Career Dedicated to Fighting Cyber Crime
WGU's online cybersecurity bachelor's degree will help you be prepared to outsmart these cybercriminals and be the frontline of support for governments and top organizations as a cyber security pro. The WGU cybersecurity program boasts 14 top certifications that allow you to start boosting your résumé before you even graduate.

70% of graduates finish within
29 months
WGU lets you move more quickly through material you already know and advance as soon as you're ready. The result: You may finish faster and get started in an exciting cybersecurity career.
Tuition per 6-month term is
$3,950
Tuition charged per term—rather than per credit—helps students control the ultimate cost of their degrees. Plus, your certifications are included in your tuition costs—no extra fees involved.
On average students transfer
37 credits
Certifications, an associate's degree, or previous college credit may waive some courses. A transcript review will determine your transfer credits.
Tuition as of August 1, 2021.
Our online university degree programs start on the first of every month, all year long.
No need to wait for spring or fall semester. It's back-to-school time at WGU year-round. Get started by talking to an Enrollment Counselor today, and you'll be on your way to realizing your dream of a bachelor's or master's degree—sooner than you might think!
Courses In This Program
This program consists of the following courses. Some may be waived through transfer from your previous college experience. The rest you typically will complete one at a time as you make your way through your degree program, working with your Program Mentor each term to build your personalized Degree Plan. You’ll work through each course as quickly as you can study and learn the material. As soon as you’re ready, you’ll pass the assessment, complete the course, and move on. This means you can finish as many courses as you're able in a term at no additional cost.
This course lays the foundation for understanding terminology, principles, processes and best practices of information security at local and global levels. It further provides an overview of basic security vulnerabilities and countermeasures for protecting information assets through planning and administrative controls within an organization.
IT security professionals must be prepared for the operational demands and responsibilities of security practitioners including authentication, security testing, intrusion detection and prevention, incident response and recovery, attacks and countermeasures, cryptography, and malicious code countermeasures. This course provides a comprehensive, up-to-date global body of knowledge that ensures students have the right information, security knowledge, and skills to be successful in IT operational roles to mitigate security concerns and guard against the impact of malicious activity. Students demonstrate how to manage and restrict access control systems; administer policies, procedures, and guidelines that are ethical and compliant with laws and regulations; implement risk management and incident handling processes; execute cryptographic systems to protect data; manage network security; and analyze common attack vectors and countermeasures to assure information integrity and confidentiality in various systems. This course prepares students for the Systems Security Certified Practitioner (ISC2 SSCP) certification exam.
Introduction to IT examines information technology as a discipline and the various roles and functions of the IT department as business support. Students are presented with various IT disciplines including systems and services, network and security, scripting and programming, data management, and business of IT, with a survey of technologies in every area and how they relate to each other and to the business.
IT Foundations is the first course in a two-part series that will prepare you for the CompTIA A+ exam, Part I. This course focuses mostly on hardware and will afford you the skills you need to support five core components: mobile devices; networking; hardware; virtualization and cloud computing; and network and hardware troubleshooting. These are essential skills to set up and troubleshoot any system. Whether you work in a data center or an office, most of your work as an IT professional will execute in a hardware platform; understanding the hardware layer of the IT infrastructure will allow you to work more efficiently, provide solutions for business requirements, and be a key contributor in your company.
IT Applications explores personal computer components and their functions in a desktop system. Topics cover computer data storage and retrieval, including classifying, installing, configuring, optimizing, upgrading, and troubleshooting printers, laptops, portable devices, operating systems, networks, and system security. Other areas in this course include recommending appropriate tools, diagnostic procedures, preventive maintenance, and troubleshooting techniques for personal computer components in a desktop system. The course then finishes with strategies for identifying, preventing, and reporting safety hazards in a technological environment; effective communication with colleagues and clients; and job-related professional behavior. This course is designed to build the skills to support four core components: operating systems, security, software troubleshooting, and operational procedures. These are core competencies for IT professionals from cloud engineers to data analysts, and these competencies will empower students with a better understanding of the tools used during their careers.
Reasoning and Problem Solving helps candidates internalize a systematic process for exploring issues that takes them beyond an unexamined point of view and encourages them to become more self-aware thinkers by applying principles of problem identification and clarification, planning and information gathering, identifying assumptions and values, analyzing and interpreting information and data, reaching well-founded conclusions, and identifying the role of critical thinking in disciplines and professions.
This course will discuss geographic concepts, places and regions, physical and human systems, and the environment.
This course provides students with an overview of the basic principles and unifying ideas of the physical sciences: physics, chemistry, and earth sciences. Course materials focus on scientific reasoning and practical, everyday applications of physical science concepts to help students integrate conceptual knowledge with practical skills.
Ethics in Technology examines the ethical considerations of technology in each of four categories: privacy, accuracy, property, and access. The course presents a range of technologies and issues that challenge technologists in the field of information ethics. Students are introduced to a decision-making process as informed by ethical frameworks that outline key ethical considerations within the technologies presented. Students will study specific cases to help inform their professional responsibilities in how to navigate the important controversies in topics such as surveillance, social media, hacking, data manipulation, plagiarism and piracy, artificial intelligence, responsible innovation, and the digital divide. This course has no prerequisites.
Applied Probability and Statistics is designed to help students develop competence in the fundamental concepts of basic statistics including: introductory algebra and graphing; descriptive statistics; regression and correlation; and probability. Statistical data and probability are often used in everyday life, science, business, information technology, and educational settings to make informed decisions about the validity of studies and the effect of data on decisions. This course discusses what constitutes sound research design and how to appropriately model phenomena using statistical data. Additionally, the content covers simple probability calculations, based on events that occur in the business and IT industries. No prerequisites are required for this course.
English Composition I introduces candidates to the types of writing and thinking that are valued in college and beyond. Candidates will practice writing in several genres with emphasis placed on writing and revising academic arguments. Instruction and exercises in grammar, mechanics, research documentation, and style are paired with each module so that writers can practice these skills as necessary. Composition I is a foundational course designed to help candidates prepare for success at the college level. There are no prerequisites for English Composition I.
This introductory communication course allows candidates to become familiar with the fundamental communication theories and practices necessary to engage in healthy professional and personal relationships. Candidates will survey human communication on multiple levels and critically apply the theoretical grounding of the course to interpersonal, intercultural, small group, and public presentational contexts. The course also encourages candidates to consider the influence of language, perception, culture, and media on their daily communicative interactions. In addition to theory, candidates will engage in the application of effective communication skills through systematically preparing and delivering an oral presentation. By practicing these fundamental skills in human communication, candidates become more competent communicators as they develop more flexible, useful, and discriminatory communicative practices in a variety of contexts. Note: There are references within this video to Taskstream. If Taskstream is not part of your student experience, please disregard, and locate your task(s) within your course.
Applied Algebra is designed to help you develop competence in working with functions, the algebra of functions, and using some applied properties of functions. You will start learning about how we can apply different kinds of functions to relevant, real-life examples. From there, the algebra of several families of functions will be explored, including linear, polynomial, exponential, and logistic functions. You will also learn about relevant, applicable mathematical properties of each family of functions, including rate of change, concavity, maximizing/minimizing, and asymptotes. These properties will be used to solve problems related to your major and make sense of everyday living problems. Students should complete Applied Probability and Statistics or its equivalent prior to engaging in Applied Algebra.
American Politics and the U.S. Constitution examines the evolution of representative government in the United States and the changing interpretations of the civil rights and civil liberties protected by the Constitution. This course will give candidates an understanding of the powers of the branches of the federal government, the continual tensions inherent in a federal system, the shifting relationship between state and federal governments, and the interactions between elected officials and the ever-changing electorate. This course will focus on such topics as the role of a free press in a democracy, the impact of changing demographics on American politics, and the debates over and expansion of civil rights. Upon completion of the course, candidates should be able to explain the basic functions of the federal government, describe the forces that shape American policy and politics, and be better prepared to participate in America’s civic institutions. This course has no prerequisite.
English Composition II introduces candidates to the types of research and writing that are valued in college and beyond. Candidates will practice writing, with emphasis placed on research, writing, and revising an academic argument. Instruction and exercises in grammar, mechanics, research documentation, and style are paired with each module so that writers can practice these skills as necessary. Composition II is a foundational course designed to help candidates prepare for success at the college level. Composition I is the prerequisite for Composition II.
Business of IT—Applications examines Information Technology Infrastructure Library (ITIL®) terminology, structure, policies, and concepts. Focusing on the management of information technology (IT) infrastructure, development, and operations, students will explore the core principles of ITIL practices for service management to prepare them for careers as IT professionals, business managers, and business process owners. This course has no prerequisites. This course prepares students for the Axelos ITIL v4 certification exam.
In this course, students will build on industry standard concepts, techniques, and processes to develop a comprehensive foundation for project management activities. During a project's life cycle, students will develop the critical skills necessary to initiate, plan, execute, monitor, control, and close a project. Students will apply best practices in areas such as scope management, resource allocation, project planning, project scheduling, quality control, risk management, performance measurement, and project reporting. This course prepares students for the following certification exam: CompTIA Project+.
This course introduces students to web design and development by presenting them with HTML5 and Cascading Style Sheets (CSS), the foundational languages of the web, by reviewing media strategies and by using tools and techniques commonly employed in web development.
Network and Security - Foundations introduces students to the components of a computer network and the concept and role of communication protocols. The course covers widely used categorical classifications of networks (e.g., LAN, MAN, WAN, WLAN, PAN, SAN, CAN, and VPN) as well as network topologies, physical devices, and layered abstraction. The course also introduces students to basic concepts of security, covering vulnerabilities of networks and mitigation techniques, security of physical media, and security policies and procedures. This course has no prerequisites.
Networks for undergraduates focuses on the general concepts and applications of computer operating systems and network topologies. The fundamental knowledge and skills gained in this course prepares students for the CompTIA Network+ certification exam. Network and Security – Foundations is a pre-requisite for this course.
Network and Security - Applications prepares students for the CompTIA Security+ certification exam. Successfully completing the course ensures the student will demonstrate the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform a threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. The following course is a prerequisite: C480 Networks.
Scripting and Programming - Foundations provides an introduction to programming, covering basic elements such as variables, data types, flow control, and design concepts. The course is language-agnostic in nature, ending in a survey of languages and introduces the distinction between interpreted and compiled languages. There are no prerequisites for this course.
Introduction to Cryptography provides students with knowledge of cryptographic algorithms, protocols, and their uses in the protection of information in various states. This course has no prerequisites.
This course introduces students to the concepts and terminology used in the field of data management. Students will be introduced to Structured Query Language (SQL) and will learn how to use Data Definition Language (DDL) and Data Manipulation Language (DML) commands to define, retrieve, and manipulate data. This course covers differentiations of data—structured vs. unstructured and quasi-structured (relational, hierarchical, XML, textual, visual, etc); it also covers aspects of data management (quality, policy, storage methodologies). Foundational concepts of data security are included.
This course covers conceptual data modeling and provides an introduction to MySQL. Students will learn how to create simple to complex SELECT queries including subqueries and joins, and students will also learn how to use SQL to update and delete data. Topics covered in this course include exposure to MySQL; developing physical schemas; creating and modifying databases, tables, views, foreign keys/primary keys (FKs/PKs), and indexes; populating tables; and developing simple Select-From-Where (SFW) queries to complex 3+ table join queries.
Digital forensics, the science of investigating cybercrimes, seeks evidence that reveals who, what, when, where, and how threats compromise information. This course examines the relationships between incident categories, evidence handling, and incident management. Students identify consequences associated with cyber threats and security laws using a variety of tools to recognize and recover from unauthorized, malicious activities.
This course covers basic elements of technical communication, including professional written communication proficiency; the ability to strategize approaches for differing audiences; and technical style, grammar, and syntax proficiency.
Security information professionals have the role and responsibility for knowing and applying ethical and legal principles and processes that define specific needs and demands to assure data integrity within an organization. This course addresses the laws, regulations, authorities, and directives that inform the development of operational policies, best practices, and training to assure legal compliance and to minimize internal and external threats. Students analyze legal constraints and liability concerns that threaten information security within an organization and develop disaster recovery plans to assure business continuity.
Managing Cloud Security will prepare students to design solutions for cloud-based platforms and operations that maintain data availability while protecting the confidentiality and integrity of information. Many of today’s companies and organizations have outsourced data management, availability, and operational processes through cloud computing. Topics include security controls, disaster recovery plans, and continuity management plans that address physical, logical, and human factors. It is recommended that the following courses be completed before attempting this course: Networks and IT Applications.
The continual evolution of technology means that cybersecurity professionals must be able to analyze and evaluate new technologies in information security such as wireless, mobile, and internet technologies. Students review the adoption process that prepares an organization for the risks and challenges of implementing new technologies. This course focuses on comparison of evolving technologies to address the security requirements of an organization. Students learn underlying principles critical to the operation of secure networks and adoption of new technologies.
This course expands on fundamentals of information security by providing an in-depth analysis of the relationship between an information security program and broader business goals and objectives. Students develop knowledge and experience in the development and management of an information security program essential to ongoing education, career progression, and value delivery to enterprises. Students apply best practices to develop an information security governance framework, analyze mitigation in the context of compliance requirements, align security programs with security strategies and best practices, and recommend procedures for managing security strategies that minimize risk to an organization.
Traditional defenses—such as firewalls, security protocols, and encryption—sometimes fail to stop attackers determined to access and compromise data. This course provides the fundamental skills to handle and respond to computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students learn how to leverage intelligence and threat detection techniques; analyze and interpret data; identify and address vulnerabilities; suggest preventative measures; effectively respond to and recover from incidents; and handle various types of incidents, risk assessment methodologies, and various laws and policies related to incident handling. This course prepares students for the CompTIA Cybersecurity Analyst (CySA+) certification exam. The following courses are prerequisites: Networks and Network and Security - Applications.
The capstone project consists of a technical work proposal, the proposal’s implementation, and a post-implementation report that describes the graduate’s experience in developing and implementing the capstone project. The capstone project should be presented and approved by the course instructor in relation to the graduate’s technical emphasis.
Penetration Testing and Vulnerability Analysis introduces students to the skills necessary to perform penetration testing and vulnerability management within an organization. The course covers widely used penetration testing techniques that focus on planning and scoping, information gathering, vulnerability identification, and attacks and exploits. The course also introduces students to tools that can be used for penetration testing, reporting, and communication.
14 Certifications Included
Earn certifications with your degree.
In the IT field, certifications are extremely valuable along with your degree. That's why all of our IT degrees include top industry certifications, at no additional cost! We want to make sure your IT degree is as beneficial to you and your career as possible. WGU's B.S. in Cybersecurity and Information Assurance also encompasses three stackable certifications: Security Analytics, Network Security, and Network Vulnerability Assessment. These certifications demonstrate that you’ve earned multiple CompTIA certifications and have the knowledge and experience needed to grow your IT career. These professional-level certifications indicate mid-level IT professionals with 2–5 years of experience in the field. Discover which certifications you can earn.



- Certified Cloud Security Professional (CCSP) – Associate of (ISC)² designation
- Systems Security Certified Practitioner (SSCP) – Associate of (ISC)² designation
- A+ (CompTIA)
- Cybersecurity Analyst Certification, CySA+ (CompTIA)
- Network+ (CompTIA)
- Network Vulnerability Assessment Professional (CompTIA)
1. ITIL® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.
*Subject to vendor availability.
- Network Security Professional (CompTIA)
- Security Analytics Professional (CompTIA)
- Security+ (CompTIA)
- Project+ (CompTIA)
- PenTest+ (CompTIA)
- IT Operations Specialist (CompTIA)
- Secure Infrastructure Specialist (CompTIA)
- ITIL®1 Foundation
A Cyber Security Degree Designed For Professionals Like You
Hackers and cyber criminals launch new, sophisticated computer viruses, malware, and scams every day that threaten the data our society relies on. In fact, research shows that hackers drain an estimated $600 billion annually from the world economy. WGU’s online B.S. Cybersecurity and Information Assurance degree program was designed with input from cyber security experts and leading IT employers to meet the most recent Department of Homeland Security (DHS), and National Security Agency (NSA) guidelines.
An online degree in cyber security can increase your career options, earning potential, and opportunities for advancement. The billion-dollar cyber security industry is facing a shortage of qualified cyber security professionals—and an online degree in cyber security that also includes top cyber security industry certifications at no extra cost qualifies you to join the field and start making a difference. CompTIA and ISC² industry certifications are built into the curriculum and do not add time or cost. This whole online cybersecurity program is designed to help you earn while you learn, giving you cyber security certification options and allowing you to continue to work while pursuing your online cyber security degree.
Why WGU?
Discover Why WGU is an Ideal Choice for an Online Cybersecurity Degree
- Respect. An online cybersecurity degree at WGU features the skills and credentials your employer will respect. With top industry certifications, accreditation, and recognition, you can be sure that your degree is valuable.
- Flexible schedule. You don't have to log in at a certain time, you don't have deadlines or due dates. You are in charge of your education and online cyber security degree program, allowing you to move faster and graduate sooner.
- Affordability. WGU tuition for your online cyber security degree is charged per six-month term, not per credit. That means if you want to move faster through the program, you'll pay less.
A Cyber Security Degree That Leads to a Lucrative and In-Demand Career
This online cybersecurity degree helps you outsmart top cybercriminals with your skills and knowledge. Every industry and private citizen is counting on our cybersecurity and information assurance experts to detect system vulnerabilities and protect sensitive data. An online degree in cybersecurity allows you to become a crucial member of any security team, protecting reputable organizations and government agencies from attackers. A career in cybersecurity is lucrative, rewarding, and always exciting. Get your online cyber security degree today!

Frequently asked questions about online cyber security degree programs.
What is the best online school for cyber security?
WGU is one of the highest rated schools for cyber security, receiving top accreditation and awards for the program. This degree program also gives you the opportunity to earn top industry certifications as part of the degree program at no extra cost.
Is a cybersecurity degree worth it?
Absolutely. Research shows that 84 percent of cybersecurity job postings require at least a bachelor's degree, while nearly a quarter require at least a master's degree. So earning a bachelor's degree in cyber security is critical in helping you be trained and qualified for job opportunities. Cyber security degree programs don't have to be expensive or time consuming, making them even more worth your time and money.
What kind of online degrees can you get?
There are many kinds of degrees you can earn online including:
- Cybersecurity
- Accounting
- Nursing
- Elementary education
- Software development
- Cloud computing
- Healthcare management
- Marketing
- IT management
- Business management
How hard is cyber security?
Cyber security degrees tend to be challenging in their computing, coding, and scripting aspects. However, if you have a mind for that kind of work, cyber security can be exciting and extremely rewarding. Cybersecurity tends to be less labor intensive than lab-based work, but does take time and dedication to master.
What will I learn in an information security degree program?
An online bachelor's degree in information systems security or cybersecurity can prepare students for career paths focused on network systems, application security, business continuity, and more. An online bachelor's degree may also be ideal for students who are also working professionals.
Cost & Time
An Affordable Online Cyber Security Degree Built for You
$3,950
Tuition per 6-month term
Resource and Program Fees, per term
TOTAL PER TERM
+$65
One-time application fee
Tuition rate effective August 1, 2021. $295 per-term fees include Resource Fee of $145 (covers all e-books and learning resources, saving you hundreds per term) and Program Fee of $150 (covers additional costs specific to this program).
Control the Cost of Your Program: Our Tuition Links Cost to Time
By charging per term rather than per credit, WGU empowers students to get the most for their education dollars. You can accelerate through material you already know or are able to learn quickly, allowing you to control how much your degree will ultimately cost.
Flat-rate tuition of $4,245 per term links cost to time.
By charging per 6-month term rather than per credit hour—and empowering students to accelerate through material they know well or can learn quickly—WGU helps students control the ultimate cost of their degrees.
Adjust the time and see your costs change
Your time
2 yrs
Your cost
- 1 yr
- 1.5 yrs
- 2 yrs
- 2.5 yrs
- 3 yrs
- 1 yr
- 1.5 yrs
- 2 yrs
- 2.5 yrs
- 3 yrs

Read about our Responsible Borrowing Initiative.

Learn about Financial Aid options.
Scholarships Make Our Low Tuition Even More Affordable
Many scholarship opportunities are available. Here are a few you may be eligible to apply for:
$5,000
Cybersecurity Scholarship
$2,500
Back to School Scholarship
$2,000
Institutional Partner Scholarship
Courses & Competencies
Curriculum That Ensures you Graduate With the Skills and Knowledge Employers Want
At WGU, we design our curriculum to be timely, relevant, and practical—all to ensure your degree is proof you really know your stuff.
Every course focuses on a set of clearly defined competencies that you must prove you’ve learned—through tests, papers, projects, or other assessments. Demonstrating mastery is how you pass a course, so learning what it takes to be outstanding in your career is at the heart of WGU’s Bachelor of Science Cybersecurity and Information Assurance curriculum.
The B.S. Cybersecurity and Information Assurance degree program is an all-online program that you will complete by studying and working independently with instruction and support from WGU faculty. You will be expected to complete at least 12 competency units (WGU's equivalent of the credit hour) each 6-month term. (Each course is typically 3 or 4 units).
The first person you speak with at WGU will be your Enrollment Counselor, who can explain requirements and expectations in more detail. You can also read more about each course in the Program Guide.
Courses Fulfilled by Your Associate's Degree
This is an unofficial estimate of your transferable credits. You may receive more or less credits depending upon the specific courses taken to complete your degree and other credits you may have.
Below are the anticipated courses that will be fulfilled based on your indication that you have earned an associate's degree. During the enrollment process this information will be verified.
- Integrated Physical Sciences
- Critical Thinking and Logic
- Introduction to Geography
- Introduction to Communication
- English Composition I
- English Composition II
- Applied Algebra
- Applied Probability and Statistics
- Ethics in Technology
- American Politics and the US Constitution
Special Requirements for This Program
Capstone project: At the end of your program, you will complete a capstone project that represents the culmination of all your hard work—a research project applicable to the field of cybersecurity and Information assurance that aims to expand the body of knowledge in the profession.

Flexible Schedule
A Bachelor’s Degree in Cybersecurity and Information Assurance Designed to Fit Your Life
Competency-based education puts working, busy, adult students in the driver’s seat of their education. At most other schools—including other online programs—you move through the curriculum at a set pace, driven by semesters and hours in class. At WGU, your progress is driven by your ability to prove what you know, so how quickly you progress is largely up to you. Once you’ve mastered the defined competencies (knowledge and skills), you prove what you know through tests, papers, projects, or other assessments.
“Because of WGU's competency-based model I was able to leverage my experience and progress through the courses at my rate. My degrees have opened many doors for me and prepared me with the skills and knowledge I need to succeed.” Jason Franklin,
MS Cybersecurity & Info. Assurance

“WGU’s competency-based model is such a gem because it is a true competency-based model. If you know it, you know it. You don’t have to do it again. Great for me. I enrolled in a course and as soon as I could show I was competent in it, I got credit for it. Fantastic!” Jeff Rahmlo,
BS IT Network Admin
Career Outlook
A Degree in Cybersecurity and Information Assurance will Pave the Way to a Strong Career
Every day, we share data, socialize, and complete transactions in cyberspace, making the need for experts who can protect our information increasingly critical. The knowledge, techniques, and certifications you’ll earn as you complete your cybersecurity and information assurance degree will prepare you to successfully fill the ever-growing demand for information security specialists.
WGU's Cybersecurity Grads are Doing Crucial White-Hat Work in Highly Satisfying Jobs
Our approximately 100 B.S. Cybersecurity and Information Assurance alumni have great jobs and satisfying careers. Examples of work our IT security and cybersecurity grads are doing include:
Job Titles
- Cyber security analyst
- Cyber security engineer
- Vulnerability assessment analyst
- Cyber security architect
- Penetration tester
Diverse Industries
- Private business
- Government
- Military
- Law enforcement
- Colleges and universities
Major Employers
- AT&T
- U.S. Department of Defense
- U.S. Air Force
- Verizon
High-Performing Alumni = Happy Employers
WGU graduates boast degrees that prepare them to succeed in their careers. The data below, from a 2020 survey of 300 employers of WGU graduates by Harris Poll, prove it:

95% of employers said that WGU graduates were prepared for their jobs.

96% of employers said they would hire another WGU graduate.

98% of employers said WGU graduates met or exceeded expectations.
Source: 2020 Harris Poll survey of 300 employers
Graduates Reports Strong Satisfaction and Salary Outcomes
WGU graduates are happy with their education:
- 96% of WGU graduates reported that they would recommend WGU to others, compared with 82% nationally.
- 85% of WGU graduates were satisfied with their overall experience, compared with 75% nationally.
Impressive average salary increases:
- WGU graduates reported an average increase on income of $12,300 within two years of graduation, compared with salary pre-enrollment.
- Four years after graduation, the average increase was $21,800, significantly higher than the national average of $11,500.
Source: 2020 Harris Poll survey of 1,400 new college graduates nationwide compared with survey of 1,340 WGU graduates.
WGU Grads Hold Positions with Top Employers


Admissions
Your Bachelor's Degree in Cybersecurity is Attainable—Start by Applying for Admission Today
Next Possible Start
Start dates are the 1st of every month. Meet requirements by the 15th to start next month. Discuss steps and deadlines with your Enrollment Counselor.
APPLY TODAYAdmission Requirements Unique to this Degree
To be considered for enrollment into this bachelor's degree program, students must possess a high school diploma or its equivalent AND demonstrate program readiness through one of the following:
- Option 1: Submit transcripts documenting completion of previous IT coursework. IT coursework must be 300-level or higher.
- Option 2: Possess a bachelor’s or associate degree (A.A, A.S. or A.A.S. acceptable) from an accredited post-secondary institution.
- Option 3: Demonstrate at least two years of IT work experience through resume review.
- Option 4: Submit official records of completion of current and active IT certifications, some of which may provide transfer credit into various programs.
NOTE: You do not need to take the ACT or SAT to be admitted to this program. Learn why we don't require these tests.
