Skip to content
844-351-9389

Bachelor of Science in Information Assurance and Cyber Defense Online

Gain a competitive edge in a fast-growing and dynamic high-tech field by earning a respected degree with this innovative, 100% online program.

12/16/20 Next Application Due Date
01/06/21 Start Classes

Program Overview

$395 Per Credit Hour
Up to 90 Hours Transfer Credits
124 Credit Hours

stageelop the relevant skills to build, maintain and protect networks and computer systems in both government and industry with Eastern Michigan University’s 100% online Bachelor of Science in Information Assurance and Cyber Defense program. Upon completion of your degree, you will be prepared to take the Cisco Certified Network Associate (CCNA) certification exam.

The curriculum emphasizes the design, integration, administration, hardening and protection of all types of computer information systems and network infrastructures in modern cyber environments. You will be immersed in solid theories as well as intensive hands-on practical experiences to enhance critical-thinking and problem-solving capabilities applied to all elements in modern computing disciplines.

EMU houses one of only two cyber-range sites in the country partnered with the NSA and the Department of Homeland Security, and it has a high job-placement rate within a short time upon graduation.

Graduates of the B.S. in Information Assurance and Cyber Defense online program will be able to:

  • Comprehend the file, hardware, user account management, TCP/IP protocols and installation of the Linux client and server
  • Build and administer a basic network
  • Understand the tools, techniques and methodologies to perform computer system and network security vulnerability-risk analyses
  • Discern and apply computing and networking theories and practices
  • Apply system architecture and administration, integration and troubleshooting in real-world situations
  • Interpret cybersecurity threat/risk evaluation
  • Create incident-response analysis
  • Perform network/digital forensics and investigation
  • Understand cyber laws, legislation, policy/compliance and project management

Career opportunities:

Computer and information technology occupations are projected to grow 13 percent from 2016 to 2026, faster than the average for all occupations, according to the U.S. Department of Labor. Recent graduates have held positions at Amazon, Dell SecureWorks, Duo Security, Google, Snapchat, General Electric and more.

Since 2005, EMU has been designated by the Department of Homeland Security and National Security Agency as a Center of Academic Excellence in Information Assurance and Cyber Defense education (DHS/NSA CAE-IA/CD).

Have questions or need more information about our online programs?

Tuition and Fees

The Bachelor of Science in Information Assurance and Cyber Defense online tuition is the same affordable, pay-by-the-course rate for in-state and out-of-state students. Financial aid may also be available for eligible students.

Tuition breakdown:

$395 Per Credit Hour
Varies Total Tuition

View full tuition breakdown

Program Per Credit Hour Per 3-Credit Hour Course
Bachelor of Science in Information Assurance and Cyber Defense $395 $1,185

Cost of tuition does not include applicable course fees, standard textbook fees or course materials.

View financial aid information

Federal Financial Aid

If you would like to be considered for financial aid at Eastern Michigan University, you will need to fill out a Free Application for Federal Student Aid (FAFSA).

The Federal School Code for Eastern Michigan University is 002259.

Designated a Gold-Level Veteran-Friendly School by the Michigan Veteran Affairs Agency (MVAA), 2017-2018

Calendar

The B.S. in Information Assurance and Cyber Defense online program features accelerated 7.5 week courses and 6 start dates a year. View the full calendar to find the best start date for you, along with corresponding deadlines for submitting your application and paying tuition.

Now Enrolling:

12/16/20 Next Application Due Date
01/06/21 Start Classes

View full calendar

Session Start Date Application Deadline Document Deadline Registration Deadline Payment Deadline
Fall I 08/31/20 08/10/20 08/17/20 08/24/20 08/20/20
Fall II 10/20/20 10/06/20 10/06/20 10/13/20 11/05/20
Winter I 01/06/21 12/16/20 12/23/20 12/30/20 01/08/21
Winter II 02/24/21 02/03/21 02/10/21 02/17/21 02/26/21

Ready to take the next step toward earning your degree online from Eastern Michigan University?

Admissions

The B.S. in Information Assurance and Cyber Defense online program admission process is streamlined and accessible to help you get started right away.

30 or more transferable credits from a previously attended college or university
GPA of at least 2.0 on a 4.0 scale
Official transcripts from all previous coursework

View full admission requirements

Bachelor of Science in Information Assurance and Cyber Defense Online Admission Requirements

  • Must have 30 or more transferable credits from a four-year university or community college with a grade C or higher and above 100 level
  • IA 103 and IT 110 completed either at EMU or transferred in with a grade of B- or above
  • Must have a minimum cumulative GPA of 2.0 or higher on previous college coursework and once admitted maintain a 2.5 GPA in the major at Eastern Michigan University

Please note: Students transferring to Eastern Michigan University under a community college articulation agreement are not eligible as the program is not designed for degree completion or second bachelor’s applicants.

If you need to submit official documents by mail, send them to:

Office of Admissions
Eastern Michigan University
P.O. Box 970
Ypsilanti, MI 48197

Documentation can be sent via email to: transcripts_admissions@emich.edu.

Have a question? Call us at 844-351-9389.

Courses

To earn the Bachelor of Science in Information Assurance and Cyber Defense online program, students must complete 124 total credit hours, including 12 credit hours of foundational requirements, 51 credit hours of major core courses, and 21 credit hours of electives.

General Education courses may be needed for the completion of degree. After admission to the University, your academic adviser will assist in determining which courses are required to ensure your degree completion. Required general education courses can be taken online at the same program rate. For the complete listing of these requirements, visit the EMU general education page.

Example Bachelor of Science in Information Assurance and Cyber Defense Online Courses

Students will work with an advisor to create an Individualized Studies Program that incorporates previously earned college credits and outlines required coursework to define their specific degree plan. Upon completing 60 credit hours students will update their coursework plan with an advisor and apply to formally enter the Individualized Studies Program. As an online student you will take all your classes with EMU instructors, just like you would if you were here on campus.

For examples of general education courses and courses from selected areas of emphasis that students may choose from, see course lists, below. Course availability may vary according to academic calendar and/or start date. To see the full list of available online courses, view all courses.

Expand All [+]

Credit Hours: 3

Introduction to computer programming for the non-major. Basic programming constructs; variables, functions, assignment, control structures (conditionals, looping), primitive types and aggregate types. Boolean and logic operations (and, or, not, xor). Scripting for automating system tasks. Techniques for debugging.

Credit Hours: 3

A basic understanding of where and how cryptography is used, symmetric and asymmetric techniques, use of cryptography in security functions (data protection, data integrity, authentication), key management, attacks.

Credit Hours: 3

An in-depth examination of the law dealing with computers and the Internet, including such issues as intellectual property, electronic commerce, information privacy, freedom of expression, cybercrime and jurisdiction. Included are detailed analyses of significant legal case studies plus review of applicable federal and state legislation.

Credit Hours: 3

An introduction to standard methods in statistics, emphasizing the rationale behind them and their application to problems in a variety of fields. Data summary and representation, measures of center and dispersion, correlation and regression, basic probability, point and interval estimation, and hypothesis testing.

Credit Hours: 3

A study of the fundamentals of information assurance and security design principles that provide students with the basic knowledge necessary to help create and manage systems that may be trusted. Topics include threats and adversaries, vulnerabilities and risks, basic risk assessment. security life-cycle, intrusions detection and prevention systems, cryptography, data security, security models, access control models, confidentiality, integrity, availability, access, authentication, authorization, non-repudiation, privacy, security mechanisms, separation of domains, isolation, encapsulation, least privilege, simplicity of design, minimization of implementation, fails safe defaults/fail secure, modularity, and usability.

Credit Hours: 3

The concepts and functions of networks and related business technology. The course emphasizes administration client/server and peer-to-peer networks. The course includes equipment, procedures and career opportunities.

Credit Hours: 3

This course will provide students with a basic understanding of network components and how they interact. The course is focused on managing switches in practical environments. It prepares students for a portion of the Cisco Certified Network Associate (CCNA) certification exam and provides them with knowledge and skills necessary to install, configure, update, and troubleshoot switched LANS and VLANs.

Credit Hours: 3

Tools, techniques, and methodologies in performing computer system and network security vulnerability-risk analyses. “Security best practices” and audit requirements for specific environments will be studied. Topics to be covered include internal and external penetration tests, wireless security technology, risk and analysis methodology, and security audits.

Credit Hours: 3

Introduction to open source client/server networking, careers and basic information security and assurance concepts. Focusing on Linux as a platform and server operating system, students learn through theory and applied work. Topics included are: file and hardware management, user account management, TCP/IP protocols and installation of the Linux client and server. Students build and administer a basic network.

Credit Hours: 3

Principles and practices of computer operating systems for networks in educational or small to mid-sized organizations. The course will emphasize the tasks the administrator must perform frequently.

Credit Hours: 3

This course will teach students how to properly manage security projects by going through the well-established project management and systems analysis and design practices, with special attention to the unique requirements found in security projects.

Credit Hours: 3

This course serves the essential aspects for developing sound information security policy. Organizational objectives, threats, risk mitigation and cost-benefit analysis will be explored. The student will utilize industry accepted methodologies to create practical security policy that will communicate the organization’s asset protection objectives.

Credit Hours: 3

This course will focus on the connectivity required to build two- to n-tiered networks. Students will configure and administer routers utilizing CISCO IOS. Security concepts for LAN and WAN environments are discussed. This course builds on prerequisite knowledge of the TCP/IP protocol suite, networking, and WAN/LAN topology concepts.

Credit Hours: 3

This course will cover key database concepts such as relational databases, database vulnerabilities, security issues and models. The student will be provided with the tools, techniques and industry accepted methodologies so that upon completion of the course they will be able to describe key concepts database security and how to apply those concepts to securing database management systems within their organization.

Credit Hours: 3

This course adopts a practical approach in detecting, analyzing, reverse engineering, and eradicating malicious software (or malware). It uses a standard methodology, which includes setting up an inexpensive laboratory and utilizing a selected set of forensic tools to dissect a malware, discover its characteristics, and neutralize its effects.

Credit Hours: 3

This course addresses the comprehension and application of Digital Forensic Investigations. Students will evaluate and synthesize technical and legal issues in relation to digital evidence. Students will apply various skills and techniques, combined with numerous investigative software tools to analyze seized electronic media. Students subject to background investigation prior to admittance.

Credit Hours: 3

This course will use hacking techniques used by malicious, black hat hackers as a means to learn best defense from these same hackers. The course is an in-depth study using hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization.

Credit Hours: 3

This course will introduce the student to the essential aspects of information security and incident response. The student will be provided with the tools, techniques and industry accepted methodologies so that upon completion of the course the student will be able to describe key concepts of network security and incident response and how those concepts apply to themselves and their organization.

Credit Hours: 3

This course will focus on advanced operating systems administration and security. Students will learn about key features in existing operating systems, such as Linux and Windows. They will also learn how to properly configure and administer such systems/servers to make them more reliable, secure and robust against vulnerabilities and threats.

Credit Hours: 3

This course will introduce the student to the essential aspects of information security and network forensics. The student will be provided with the tools, techniques and industry accepted methodologies to gather, process, store and visualize network security related data. Students will also be taught how to apply some statistics and machines learning techniques to recognize instruction patterns and malicious activities.

Credit Hours: 3

This capstone course is a culmination of the learning that students achieve in the IA/CD program. Students will engage in a practical experiment and/or research that utilize key principles in IA, by building on the concepts of all IA courses students have taken as part of their degree plans and ensure that they are ready for the real-world jobs/research endeavors.

Students must choose 21 hours from the following courses. A maximum of 9 hours can be taken with an IA prefix. Students may also choose any 300-level or above IA, IT, COSC, or CIS course not already taken.

Credit Hours: 3

An introductory intelligence analysis course designed to prepare intelligence products, hypothesis, along with collection and dissemination planning. Students will explore historical, legal, and ethical basis for intelligence collection, retention and of the analytical product.

Credit Hours: 3

Employment in an appropriate setting, chosen to provide supervised practical experience.

Credit Hours: 3

This course is part one of a two sequence course of study. It is designed to prepare students to become effective cyber crime investigators. The course examines the basic steps required in hardware identification, TCP-IP, rules of electronic evidence, DOS, network investigation, case management and intrusion detection.

Credit Hours: 3

This advanced course addresses the comprehension and application of Digital Forensic Investigations. Students will evaluate and synthesize technical and legal issues in relation to digital evidence. Students will apply various skills and techniques, combined with numerous investigative software tools to analyze seized electronic media. Students subject to background investigation prior to admittance.

Credit Hours: 3

Recent years have witnessed a surge in data production in various walks of life. From social networking posts, to E-commerce Web server transaction logs, to publicly available aggregate databases, such as census data, weather data, etc. Some of these are fairly innocuous while others, when manipulated with the right tools, could potentially expose people’s identities and violate their privacy. Another dimension to this exponential growth in data is manifested in the bigger challenges that face those who secure such data. This course provides an overview of data security and privacy, while providing a concise coverage of the various relevant matters, such as data science, Big Data, and Data Mining; as well as pertinent laws, regulations, and codes of ethics. It follows a progressive approach that prepares students for more advanced topics related to data security and privacy.

Credit Hours: 3

The rise of big data has the potential to inform decisions, and visual representations can play a crucial intermediate role in our daily information consumption. This course is designed to the interdisciplinary and emerging field of data science. It will cover techniques and algorithms for creating effective visualizations based on principles form graphic design, visual art, perceptual psychology, and cognitive science to enhance the understanding of complex data.

Credit Hours: 3

This course instructs students on the management and implementation of advanced topics in information security and cyber defense. Topics include implementation and application cloud computing, mobile security, etc.

Credit Hours: 3

This course covers serious threats that modern enterprises face as hackers are increasingly targeting their intellectual property. It covers the different security domains and the strategic use of data analytics to identify weaknesses in the enterprise's security posture, along with effective methods to combat such threats.

Credit Hours: 3

This course will provide students with necessary skills and tools to serve in firms as a Systems administrator (or Sysadmin). Students will learn how to automate tasks with the Python (or other) language to solve various system administration problems.

Credit Hours: 3

This course teaches students the key Human-Computer Interaction (HCI) concepts that, among other benefits, will help them build "useful" system functionality and design "usable" interfaces in order to maximize the value of these systems. They will also gain a better understanding of the needs of system users, ensure positive customer experience or improve an organization's brand.

Credit Hours: 3

Web presence has become a necessity for today’s modern enterprises. This course teaches students how to install, configure, and administer a Web Server. It will also delve into best practices about Web application fundamentals and best practices in secure development.

Credit Hours: 3

Virtualization enables software-based machines with fully-functioning operating systems. Cloud Computing creates an on-demand computing infrastructure with convenient network access to a shared pool of configurable computing resources. Both concepts are valuable to modern organizations and will help students become effective contributors in their future jobs and more valuable to their employers.

Credit Hours: 3

Wireless technology has penetrated almost every sector of the national and global economies and grew to enormous proportions in the past decade. This course prepares students to play an effective role in various types of organizations that employ 802.11 and WLAN technologies and helps them prepare for the CWNA certification exam.

Credit Hours: 3

The course addresses key concepts in the security of embedded systems that constitute the foundation for the Internet of Things (IoT) security. This includes their privacy, architecture and access control, as well as risk assessments, threats, vulnerabilities, and mitigation strategies.

Credit Hours: 3

This course covers technology and security of modern vehicles. This includes their architecture, protocols, and access control, as well as privacy, risk assessments, threats, vulnerabilities, and mitigation strategies. Students will engage in solving practical problems in vehicle security.

Request Information
*All fields required.
or call 844-351-9389 844-351-9389
By submitting this form, I am providing my digital signature agreeing that Eastern Michigan University (EMU) may email me or contact me regarding educational services by telephone and/or text message utilizing automated technology or a pre-recorded message at the telephone number(s) provided above. I understand this consent is not a condition to attend EMU or to purchase any other goods or services.