Prepare for an Exciting Career Fighting Cyber Crime with an Online Cybersecurity Degree
Hackers and cyber criminals launch new, sophisticated computer viruses, malware, and scams every day that threaten the data our society relies on. In fact, research shows that hackers drain an estimated $600 billion annually from the world economy. WGU's online cybersecurity bachelor's degree will help you be prepared to outsmart these cybercriminals and be the frontline of support for governments and top organizations as a cyber security pro. WGU’s online B.S. Cybersecurity and Information Assurance degree program was designed with input from cyber security experts and leading IT employers to meet the most recent Department of Homeland Security (DHS), and National Security Agency (NSA) guidelines. This program has also helped WGU receive the designation of a National Center of Academic Excellence in Cyber Defense through 2026.
The WGU cybersecurity program also boasts 14 top certifications that allow you to start boosting your résumé before you even graduate. This whole online cybersecurity program is designed to help you earn while you learn, giving you cyber security certification options and allowing you to continue to work while pursuing your online cyber security degree.
70% of students finish within
WGU lets you move more quickly through material you already know and advance as soon as you're ready. The result: You may finish faster.
Tuition per six-month term is
Tuition charged per term—rather than per credit—helps you control the ultimate cost of your degree. Finish faster, pay less!
Certifications in this program
This online cybersecurity and information assurance program includes 14 top industry certifications, helping enhance your résumé before you even graduate.
Ready to Start Your WGU Journey?
Next Start Date: August 1
Start Dates the 1st of Every Month
COURSES & COMPETENCIES
The bachelor’s online degree program in cybersecurity and information assurance was designed, and is regularly updated, with input from the experts on our Information Technology Program Council, ensuring you learn best practices in systems and services, networking and security, scripting and programming, data management, and the business of IT. Your online cyber security degree is sure to boost your résumé and prepare you for an exciting future.
Earning this degree in cyber security, designed by industry experts, adds theoretical depth to the practical IT knowledge you already have. Our Information Technology Program Council are industry experts who know exactly what it takes for a tech graduate with a online degree in cyber security to be successful in their field.
This program consists of the following courses. Some may be waived through transfer from your previous college experience. The rest you typically will complete one at a time as you make your way through your degree program, working with your Program Mentor each term to build your personalized Degree Plan. You’ll work through each course as quickly as you can study and learn the material. As soon as you’re ready, you’ll pass the assessment, complete the course, and move on. This means you can finish as many courses as you're able in a term at no additional cost.
This course lays the foundation for understanding terminology, principles, processes and best practices of information security at local and global levels. It further provides an overview of basic security vulnerabilities and countermeasures for protecting information assets through planning and administrative controls within an organization.
IT security professionals must be prepared for the operational demands and responsibilities of security practitioners including authentication, security testing, intrusion detection and prevention, incident response and recovery, attacks and countermeasures, cryptography, and malicious code countermeasures. This course provides a comprehensive, up-to-date global body of knowledge that ensures students have the right information, security knowledge, and skills to be successful in IT operational roles to mitigate security concerns and guard against the impact of malicious activity. Students demonstrate how to manage and restrict access control systems; administer policies, procedures, and guidelines that are ethical and compliant with laws and regulations; implement risk management and incident handling processes; execute cryptographic systems to protect data; manage network security; and analyze common attack vectors and countermeasures to assure information integrity and confidentiality in various systems. This course prepares students for the Systems Security Certified Practitioner (ISC2 SSCP) certification exam.
Introduction to IT examines information technology as a discipline and the various roles and functions of the IT department as business support. Students are presented with various IT disciplines including systems and services, network and security, scripting and programming, data management, and business of IT, with a survey of technologies in every area and how they relate to each other and to the business.
IT Foundations focuses mostly on hardware and will afford you the skills you need to support five core components: mobile devices; networking; hardware; virtualization and cloud computing; and network and hardware troubleshooting. These are essential skills to set up and troubleshoot any system. Whether you work in a data center or an office, most of your work as an IT professional will execute in a hardware platform; understanding the hardware layer of the IT infrastructure will allow you to work more efficiently, provide solutions for business requirements, and be a key contributor in your company. The course prepares learners for the CompTIA A+ Core 1 certification exam.
IT Applications explores personal computer components and their functions in a desktop system. Topics cover computer data storage and retrieval, including classifying, installing, configuring, optimizing, upgrading, and troubleshooting printers, laptops, portable devices, operating systems, networks, and system security. Other areas in this course include recommending appropriate tools, diagnostic procedures, preventive maintenance, and troubleshooting techniques for personal computer components in a desktop system. The course finishes with strategies for identifying, preventing, and reporting safety hazards in a technological environment; effective communication with colleagues and clients; and job-related professional behavior. This course is designed to build the skills to support four core components: operating systems, security, software troubleshooting, and operational procedures. These are core competencies for IT professionals from cloud engineers to data analysts, and these competencies will empower students with a better understanding of the tools used during their careers. The course prepares learners for the CompTIA A+ Core 2 certification exam.
This course introduces students to web design and development by presenting them with HTML5 and Cascading Style Sheets (CSS), the foundational languages of the web, by reviewing media strategies and by using tools and techniques commonly employed in web development.
Network and Security - Foundations introduces students to the components of a computer network and the concept and role of communication protocols. The course covers widely used categorical classifications of networks (e.g., LAN, MAN, WAN, WLAN, PAN, SAN, CAN, and VPN) as well as network topologies, physical devices, and layered abstraction. The course also introduces students to basic concepts of security, covering vulnerabilities of networks and mitigation techniques, security of physical media, and security policies and procedures. This course has no prerequisites.
Networks for undergraduates focuses on the general concepts and applications of computer operating systems and network topologies. The fundamental knowledge and skills gained in this course prepares students for the CompTIA Network+ certification exam. Network and Security – Foundations is a pre-requisite for this course.
Network and Security - Applications prepares students for the CompTIA Security+ certification exam. Successfully completing the course ensures the student will demonstrate the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform a threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. The following course is a prerequisite: C480 Networks.
Scripting and Programming - Foundations provides an introduction to programming, covering basic elements such as variables, data types, flow control, and design concepts. The course is language-agnostic in nature, ending in a survey of languages and introduces the distinction between interpreted and compiled languages. There are no prerequisites for this course.
Introduction to Cryptography provides students with knowledge of cryptographic algorithms, protocols, and their uses in the protection of information in various states. This course has no prerequisites.
Security information professionals have the role and responsibility for knowing and applying ethical and legal principles and processes that define specific needs and demands to assure data integrity within an organization. This course addresses the laws, regulations, authorities, and directives that inform the development of operational policies, best practices, and training to assure legal compliance and to minimize internal and external threats. Students analyze legal constraints and liability concerns that threaten information security within an organization and develop disaster recovery plans to assure business continuity.
Penetration Testing and Vulnerability Analysis introduces students to the skills necessary to perform penetration testing and vulnerability management within an organization. The course covers widely used penetration testing techniques that focus on planning and scoping, information gathering, vulnerability identification, and attacks and exploits. The course also introduces students to tools that can be used for penetration testing, reporting, and communication.
Traditional defenses—such as firewalls, security protocols, and encryption—sometimes fail to stop attackers determined to access and compromise data. This course provides the fundamental skills to handle and respond to computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students learn how to leverage intelligence and threat detection techniques; analyze and interpret data; identify and address vulnerabilities; suggest preventative measures; effectively respond to and recover from incidents; and handle various types of incidents, risk assessment methodologies, and various laws and policies related to incident handling. This course prepares students for the CompTIA Cybersecurity Analyst (CySA+) certification exam. The following courses are prerequisites: Networks and Network and Security - Applications.
Digital forensics, the science of investigating cybercrimes, seeks evidence that reveals who, what, when, where, and how threats compromise information. This course examines the relationships between incident categories, evidence handling, and incident management. Students identify consequences associated with cyber threats and security laws using a variety of tools to recognize and recover from unauthorized, malicious activities.
This course introduces students to the concepts and terminology used in the field of data management. Students will be introduced to Structured Query Language (SQL) and will learn how to use Data Definition Language (DDL) and Data Manipulation Language (DML) commands to define, retrieve, and manipulate data. This course covers differentiations of data—structured vs. unstructured and quasi-structured (relational, hierarchical, XML, textual, visual, etc); it also covers aspects of data management (quality, policy, storage methodologies). Foundational concepts of data security are included.
This course covers conceptual data modeling and provides an introduction to MySQL. Students will learn how to create simple to complex SELECT queries including subqueries and joins, and students will also learn how to use SQL to update and delete data. Topics covered in this course include exposure to MySQL; developing physical schemas; creating and modifying databases, tables, views, foreign keys/primary keys (FKs/PKs), and indexes; populating tables; and developing simple Select-From-Where (SFW) queries to complex 3+ table join queries.
Managing Cloud Security will prepare students to design solutions for cloud-based platforms and operations that maintain data availability while protecting the confidentiality and integrity of information. Many of today’s companies and organizations have outsourced data management, availability, and operational processes through cloud computing. Topics include security controls, disaster recovery plans, and continuity management plans that address physical, logical, and human factors. It is recommended that the following courses be completed before attempting this course: Networks and IT Applications.
The continual evolution of technology means that cybersecurity professionals must be able to analyze and evaluate new technologies in information security such as wireless, mobile, and internet technologies. Students review the adoption process that prepares an organization for the risks and challenges of implementing new technologies. This course focuses on comparison of evolving technologies to address the security requirements of an organization. Students learn underlying principles critical to the operation of secure networks and adoption of new technologies.
This course expands on fundamentals of information security by providing an in-depth analysis of the relationship between an information security program and broader business goals and objectives. Students develop knowledge and experience in the development and management of an information security program essential to ongoing education, career progression, and value delivery to enterprises. Students apply best practices to develop an information security governance framework, analyze mitigation in the context of compliance requirements, align security programs with security strategies and best practices, and recommend procedures for managing security strategies that minimize risk to an organization.
This course covers basic elements of technical communication, including professional written communication proficiency; the ability to strategize approaches for differing audiences; and technical style, grammar, and syntax proficiency.
Business of IT—Applications examines Information Technology Infrastructure Library (ITIL®) terminology, structure, policies, and concepts. Focusing on the management of information technology (IT) infrastructure, development, and operations, students will explore the core principles of ITIL practices for service management to prepare them for careers as IT professionals, business managers, and business process owners. This course has no prerequisites. This course prepares students for the Axelos ITIL v4 certification exam.
In this course, students will build on industry standard concepts, techniques, and processes to develop a comprehensive foundation for project management activities. During a project's life cycle, students will develop the critical skills necessary to initiate, plan, execute, monitor, control, and close a project. Students will apply best practices in areas such as scope management, resource allocation, project planning, project scheduling, quality control, risk management, performance measurement, and project reporting. This course prepares students for the following certification exam: CompTIA Project+.
Reasoning and Problem Solving helps candidates internalize a systematic process for exploring issues that takes them beyond an unexamined point of view and encourages them to become more self-aware thinkers by applying principles of problem identification and clarification, planning and information gathering, identifying assumptions and values, analyzing and interpreting information and data, reaching well-founded conclusions, and identifying the role of critical thinking in disciplines and professions.
This course will discuss geographic concepts, places and regions, physical and human systems, and the environment.
This course provides students with an overview of the basic principles and unifying ideas of the physical sciences: physics, chemistry, and earth sciences. Course materials focus on scientific reasoning and practical, everyday applications of physical science concepts to help students integrate conceptual knowledge with practical skills.
Ethics in Technology examines the ethical considerations of technology in each of four categories: privacy, accuracy, property, and access. The course presents a range of technologies and issues that challenge technologists in the field of information ethics. Students are introduced to a decision-making process as informed by ethical frameworks that outline key ethical considerations within the technologies presented. Students will study specific cases to help inform their professional responsibilities in how to navigate the important controversies in topics such as surveillance, social media, hacking, data manipulation, plagiarism and piracy, artificial intelligence, responsible innovation, and the digital divide. This course has no prerequisites.
Applied Probability and Statistics is designed to help students develop competence in the fundamental concepts of basic statistics including: introductory algebra and graphing; descriptive statistics; regression and correlation; and probability. Statistical data and probability are often used in everyday life, science, business, information technology, and educational settings to make informed decisions about the validity of studies and the effect of data on decisions. This course discusses what constitutes sound research design and how to appropriately model phenomena using statistical data. Additionally, the content covers simple probability calculations, based on events that occur in the business and IT industries. No prerequisites are required for this course.
English Composition I introduces candidates to the types of writing and thinking that are valued in college and beyond. Candidates will practice writing in several genres with emphasis placed on writing and revising academic arguments. Instruction and exercises in grammar, mechanics, research documentation, and style are paired with each module so that writers can practice these skills as necessary. Composition I is a foundational course designed to help candidates prepare for success at the college level. There are no prerequisites for English Composition I.
This introductory communication course allows candidates to become familiar with the fundamental communication theories and practices necessary to engage in healthy professional and personal relationships. Candidates will survey human communication on multiple levels and critically apply the theoretical grounding of the course to interpersonal, intercultural, small group, and public presentational contexts. The course also encourages candidates to consider the influence of language, perception, culture, and media on their daily communicative interactions. In addition to theory, candidates will engage in the application of effective communication skills through systematically preparing and delivering an oral presentation. By practicing these fundamental skills in human communication, candidates become more competent communicators as they develop more flexible, useful, and discriminatory communicative practices in a variety of contexts. Note: There are references within this video to Taskstream. If Taskstream is not part of your student experience, please disregard, and locate your task(s) within your course.
Applied Algebra is designed to help you develop competence in working with functions, the algebra of functions, and using some applied properties of functions. You will start learning about how we can apply different kinds of functions to relevant, real-life examples. From there, the algebra of several families of functions will be explored, including linear, polynomial, exponential, and logistic functions. You will also learn about relevant, applicable mathematical properties of each family of functions, including rate of change, concavity, maximizing/minimizing, and asymptotes. These properties will be used to solve problems related to your major and make sense of everyday living problems. Students should complete Applied Probability and Statistics or its equivalent prior to engaging in Applied Algebra.
American Politics and the U.S. Constitution examines the evolution of representative government in the United States and the changing interpretations of the civil rights and civil liberties protected by the Constitution. This course will give candidates an understanding of the powers of the branches of the federal government, the continual tensions inherent in a federal system, the shifting relationship between state and federal governments, and the interactions between elected officials and the ever-changing electorate. This course will focus on such topics as the role of a free press in a democracy, the impact of changing demographics on American politics, and the debates over and expansion of civil rights. Upon completion of the course, candidates should be able to explain the basic functions of the federal government, describe the forces that shape American policy and politics, and be better prepared to participate in America’s civic institutions. This course has no prerequisite.
English Composition II introduces candidates to the types of research and writing that are valued in college and beyond. Candidates will practice writing, with emphasis placed on research, writing, and revising an academic argument. Instruction and exercises in grammar, mechanics, research documentation, and style are paired with each module so that writers can practice these skills as necessary. Composition II is a foundational course designed to help candidates prepare for success at the college level. Composition I is the prerequisite for Composition II.
The capstone project consists of a technical work proposal, the proposal’s implementation, and a post-implementation report that describes the graduate’s experience in developing and implementing the capstone project. The capstone project should be presented and approved by the course instructor in relation to the graduate’s technical emphasis.
Program consists of 34 courses
At WGU, we design our curriculum to be timely, relevant, and practical—all to ensure your degree is proof you really know your stuff.
Special requirements for this program
At the end of your program, you will complete a capstone project that represents the culmination of all your hard work—this project consists of a technical work proposal, the proposal’s implementation, and a post-implementation report that describes the graduate’s experience.
According to a 2021 Harris Poll, just two years after graduation, WGU grads report earning $18,200 more per year, and that amount increases to $25,900 four years after graduation.
On Your Schedule
No class times, no assignment deadlines. You are in charge of your learning and schedule. You can move through your courses as quickly as you master the material, meaning you can graduate faster.
The cloud computing bachelor's degree at WGU is 100% online, which means it works wherever you are. You can do your coursework at night after working at your full-time job, on weekends, while you're traveling the world or on vacation—it's entirely up to you.
One important measure of a degree’s value is the reputation of the university where it was earned. When employers, industry leaders, and academic experts hold your alma mater in high esteem, you reap the benefits of that respect. WGU is a pioneer in reinventing higher education for the 21st century, and our quality has been recognized.
3rd Party Cybersecurity Certifications Included
An online degree in cyber security can increase your career options, earning potential, and opportunities for advancement. The billion-dollar cyber security industry is facing a shortage of qualified cyber security professionals—and an online degree in cyber security that also includes top cyber security industry certifications at no extra cost qualifies you to join the field and start making a difference.
With no added time or cost to you, this cybersecurity program currently incorporates certifications including, but not limited to: CompTIA CySA+, CompTIA Project+, CompTIA Security+, (ISC)2 certs and more. The cost of these certifications are also included in your tuition price, helping you save money as you enhance your skills. Earning certifications on the path to your degree gives you the knowledge, skills, and credentials that will immediately boost your résumé—even before you complete your degree program.
- ITIL®*^ Foundation Certification
*Subject to vendor availability.
^ITIL® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.
As well as:
- Certified Cloud Security Professional (CCSP) – Associate of (ISC)² designation
- Systems Security Certified Practitioner (SSCP) – Associate of (ISC)² designation
COST & TIME
An Affordable Online Cybersecurity Degree
By charging per six-month term rather than per credit—and empowering students to accelerate through material they know well or learn quickly—WGU helps students control the ultimate cost of their degrees. The faster you complete your program, the less you pay for your degree.
A College Degree Within Reach
There is help available to make paying for school possible for you:
Designed for Professionals with Tech Talent, Competency-Based Education Puts You in the Driver’s Seat of Your Cybersecurity Degree
You’ve worked in tech for years. Your experience, skill, and hard work have gotten you this far, but the next step requires something you don't have: your degree. We believe your experience should count for something. You deserve a bachelor’s degree program that will take into account all the know-how you’ve gained over the years, allowing you to move through courses as quickly as you can prove you've mastered the material. No waiting for other students or the end of the semester. No sitting through classes you could teach. Just a smart, direct path to the degree your career needs and the respect you deserve.
A Cyber Security Degree that Leads to a Lucrative and In-Demand Career
Every day, we share data, socialize, and complete transactions in cyberspace, making the need for experts who can protect our information increasingly critical. The knowledge, techniques, and certifications you’ll earn as you complete your cybersecurity and information assurance degree will prepare you to successfully fill the ever-growing demand for information security specialists.
This online cybersecurity degree helps you outsmart top cybercriminals with your skills and knowledge. Every industry and private citizen is counting on our cybersecurity and information assurance experts to detect system vulnerabilities and protect sensitive data. An online degree in cybersecurity allows you to become a crucial member of any security team, protecting reputable organizations and government agencies from attackers. A career in cybersecurity is lucrative, rewarding, and always exciting. Get your online cyber security degree today!
Return on Your Investment
WGU's Cybersecurity and Information Assurance Grads are Doing Crucial White-Hat Work
Our B.S. Cybersecurity and Information Assurance alumni have great jobs and satisfying careers. Examples of work our cybersecurity grads are doing include:
- Cybersecurity Analyst
- Cybersecurity Engineer
- Vulnerability Assessment Analyst
- Cybersecurity Architect
- Penetration Tester
- Private business
- Law enforcement
- Colleges and universities
- U.S. Department of Defense
- U.S. Air Force
WGU Grads Hold Positions With Top Employers
Cybersecurity Admissions Requirements
To be considered for enrollment into this bachelor's degree program, students must possess a high school diploma or its equivalent AND demonstrate program readiness through one of the following:
- Option 1: Submit transcripts documenting completion of previous IT coursework. IT coursework must be 300-level or higher.
- Option 2: Possess a bachelor’s or associate degree (A.A, A.S. or A.A.S. acceptable) from an accredited post-secondary institution.
- Option 3: Demonstrate at least two years of IT work experience through resume review.
- Option 4: Submit official records of completion of current and active IT certifications, some of which may provide transfer credit into various programs.
- Option 5: Submit high school transcripts with a minimum GPA of 2.75 GPA and a B grade or higher in a S.T.E.M. (Science, Technology, Engineering, and Mathematics) course. *Only advanced mathematics courses will satisfy this requirement.
NOTE: You do not need to take the ACT or SAT to be admitted to this program. Learn why we don't require these tests.
Get Your Enrollment Checklist
Download your step-by-step guide to enrollment.
Get Your Questions Answered
Talk to an WGU Enrollment Counselor.
Frequently Asked Questions About Online Cybersecurity Degree Programs
WGU is one of the highest rated schools for cybersecurity, receiving top accreditation and awards for the program. This degree program also gives you the opportunity to earn top industry certifications as part of the degree program at no extra cost.
Absolutely. Research shows that 84 percent of cybersecurity job postings require at least a bachelor's degree, while nearly a quarter require at least a master's degree. So earning a bachelor's degree in cybersecurity is critical in helping you be trained and qualified for job opportunities. Cybersecurity degree programs don't have to be expensive or time consuming, making them even more worth your time and money.
There are many kinds of degrees you can earn online including:
- Elementary education
- Software development
- Cloud computing
- Healthcare management
- IT management
- Business management
Cybersecurity degrees tend to be challenging in their computing, coding, and scripting aspects. However, if you have a mind for that kind of work, cybersecurity can be exciting and extremely rewarding. Cybersecurity tends to be less labor intensive than lab-based work, but does take time and dedication to master.
An online bachelor's degree in information systems security or cybersecurity can prepare students for career paths focused on network systems, application security, business continuity, and more. An online bachelor's degree may also be ideal for students who are also working professionals.
Ready to Start Your WGU Journey?