Skip to content
844-351-9389

Bachelor of Science in Information Assurance and Cyber Defense Online

Overview

Complete Coursework: varies Credit Hours: 124 total Tuition: $395 per credit hour

Develop the relevant skills to build, maintain and protect networks and computer systems in both government and industry with Eastern Michigan University’s 100% online Bachelor of Science in Information Assurance and Cyber Defense program. Prepare for great career opportunities in a fast-growing and dynamic high-tech field.

The curriculum emphasizes the design, integration, administration, hardening and protection of all types of computer information systems and network infrastructures in modern cyber environments. You will be immersed in solid theories as well as intensive hands-on practical experiences to enhance critical-thinking and problem-solving capabilities applied to all elements in modern computing disciplines.

Since 2005, EMU has been designated by the Department of Homeland Security and National Security Agency as a Center of Academic Excellence in Information Assurance and Cyber Defense education (DHS/NSA CAE-IA/CD).

Computer and information technology occupations are projected to grow 13 percent from 2016 to 2026, faster than the average for all occupations, according to the U.S. Department of Labor. Recent graduates have held positions at Amazon, Dell SecureWorks, Duo Security, Google, Snapchat, General Electric and more.

The B.S. in Information Assurance and Cyber Defense is tied for the ninth most in-demand online bachelor‘s program in Michigan, according to data from Gray Associates. EMU houses one of only two cyber-range sites in the country partnered with the NSA and the Department of Homeland Security, and it has a high job-placement rate within a short time upon graduation.

Upon completion of your degree, you will be prepared to take the Cisco Certified Network Associate (CCNA) certification exam.

Graduates of this 100% online program will be able to:

  • Comprehend the file, hardware, user account management, TCP/IP protocols and installation of the Linux client and server
  • Build and administer a basic network
  • Understand the tools, techniques and methodologies to perform computer system and network security vulnerability-risk analyses
  • Discern and apply computing and networking theories and practices
  • Apply system architecture and administration, integration and troubleshooting in real-world situations
  • Interpret cybersecurity threat/risk evaluation
  • Create incident-response analysis
  • Perform network/digital forensics and investigation
  • Understand cyber laws, legislation, policy/compliance and project management

Courses

In order to graduate from Eastern Michigan University with a Bachelor of Science in Information Assurance and Cyber Defense degree, students must complete 124 total credit hours, including 12 credit hours of foundational requirements, 51 credit hours of major core courses, and 21 credit hours of electives.

To see the full list of our Bachelor of Science in Information Assurance and Cyber Defense online courses, view courses.

General Education courses may be needed for the completion of degree. After admission to the University, your academic adviser will assist in determining which courses are required to ensure your degree completion. Required general education courses can be taken online at the same program rate.

Admissions

To be considered for this program, applicants to the Bachelor of Science in Information Assurance and Cyber Defense online degree must have a minimum of 30 credits from a four-year college or university; courses taken at community colleges cannot be used to meet this requirement. Complete or transfer credit of IA 103 and IT 110 with a grade of B- or above. Applicants must have a minimum cumulative GPA of 2.0 or higher on previous college coursework.

To learn more about our Bachelor of Science in Information Assurance and Cyber Defense online admission requirements, view admissions.

Tuition

Tuition for the Bachelor of Science in Information Assurance and Cyber Defense online degree is $395 per credit hour, including fees. Tuition is the same for students living inside or outside Michigan and is paid by the course.

To learn more about our Bachelor of Science in Information Assurance and Cyber Defense online tuition, view tuition.

Calendar

With multiple start dates each year, the Bachelor of Science in Information Assurance and Cyber Defense online degree is convenient and accessible. After selecting your desired start date, you should review deadlines for completing your application, turning in all required documentation and fees, registering for classes and paying tuition.

To see the full calendar of upcoming start dates for the Bachelor of Science in Information Assurance and Cyber Defense online, view calendar.

[close-]

Courses

To graduate with a Bachelor of Science in Information Assurance and Cyber Defense degree from Eastern Michigan University, students must complete 124 credit hours total, including 12 credit hours of foundational requirements, 51 credit hours of core courses, and 21 credit hours of electives. Students also must meet the general education requirements.

Some example areas of emphasis from past degrees include:

Expand All [+]

Duration: 7 weeks   |   Credit Hours: 3

Introduction to computer programming for the non-major. Basic programming constructs; variables, functions, assignment, control structures (conditionals, looping), primitive types and aggregate types. Boolean and logic operations (and, or, not, xor). Scripting for automating system tasks. Techniques for debugging.

Duration: 7 weeks   |   Credit Hours: 3

A basic understanding of where and how cryptography is used, symmetric and asymmetric techniques, use of cryptography in security functions (data protection, data integrity, authentication), key management, attacks.

Duration: 7 weeks   |   Credit Hours: 3

An in-depth examination of the law dealing with computers and the Internet, including such issues as intellectual property, electronic commerce, information privacy, freedom of expression, cybercrime and jurisdiction. Included are detailed analyses of significant legal case studies plus review of applicable federal and state legislation.

Duration: 7 weeks   |   Credit Hours: 3

An introduction to standard methods in statistics, emphasizing the rationale behind them and their application to problems in a variety of fields. Data summary and representation, measures of center and dispersion, correlation and regression, basic probability, point and interval estimation, and hypothesis testing.

Duration: 7 weeks   |   Credit Hours: 3

A study of the fundamentals of information assurance and security design principles that provide students with the basic knowledge necessary to help create and manage systems that may be trusted. Topics include threats and adversaries, vulnerabilities and risks, basic risk assessment. security life-cycle, intrusions detection and prevention systems, cryptography, data security, security models, access control models, confidentiality, integrity, availability, access, authentication, authorization, non-repudiation, privacy, security mechanisms, separation of domains, isolation, encapsulation, least privilege, simplicity of design, minimization of implementation, fails safe defaults/fail secure, modularity, and usability.

Duration: 7 weeks   |   Credit Hours: 3

The concepts and functions of networks and related business technology. The course emphasizes administration client/server and peer-to-peer networks. The course includes equipment, procedures and career opportunities.

Duration: 7 weeks   |   Credit Hours: 3

This course will provide students with a basic understanding of network components and how they interact. The course is focused on managing switches in practical environments. It prepares students for a portion of the Cisco Certified Network Associate (CCNA) certification exam and provides them with knowledge and skills necessary to install, configure, update, and troubleshoot switched LANS and VLANs.

Duration: 7 weeks   |   Credit Hours: 3

Tools, techniques, and methodologies in performing computer system and network security vulnerability-risk analyses. “Security best practices” and audit requirements for specific environments will be studied. Topics to be covered include internal and external penetration tests, wireless security technology, risk and analysis methodology, and security audits.

Duration: 7 weeks   |   Credit Hours: 3

Introduction to open source client/server networking, careers and basic information security and assurance concepts. Focusing on Linux as a platform and server operating system, students learn through theory and applied work. Topics included are: file and hardware management, user account management, TCP/IP protocols and installation of the Linux client and server. Students build and administer a basic network.

Duration: 7 weeks   |   Credit Hours: 3

Principles and practices of computer operating systems for networks in educational or small to mid-sized organizations. The course will emphasize the tasks the administrator must perform frequently.

Duration: 7 weeks   |   Credit Hours: 3

This course will teach students how to properly manage security projects by going through the well-established project management and systems analysis and design practices, with special attention to the unique requirements found in security projects.

Duration: 7 weeks   |   Credit Hours: 3

This course serves the essential aspects for developing sound information security policy. Organizational objectives, threats, risk mitigation and cost-benefit analysis will be explored. The student will utilize industry accepted methodologies to create practical security policy that will communicate the organization’s asset protection objectives.

Duration: 7 weeks   |   Credit Hours: 3

This course will focus on the connectivity required to build two- to n-tiered networks. Students will configure and administer routers utilizing CISCO IOS. Security concepts for LAN and WAN environments are discussed. This course builds on prerequisite knowledge of the TCP/IP protocol suite, networking, and WAN/LAN topology concepts.

Duration: 7 weeks   |   Credit Hours: 3

This course will cover key database concepts such as relational databases, database vulnerabilities, security issues and models. The student will be provided with the tools, techniques and industry accepted methodologies so that upon completion of the course they will be able to describe key concepts database security and how to apply those concepts to securing database management systems within their organization.

Duration: 7 weeks   |   Credit Hours: 3

This course adopts a practical approach in detecting, analyzing, reverse engineering, and eradicating malicious software (or malware). It uses a standard methodology, which includes setting up an inexpensive laboratory and utilizing a selected set of forensic tools to dissect a malware, discover its characteristics, and neutralize its effects.

Duration: 7 weeks   |   Credit Hours: 3

This course addresses the comprehension and application of Digital Forensic Investigations. Students will evaluate and synthesize technical and legal issues in relation to digital evidence. Students will apply various skills and techniques, combined with numerous investigative software tools to analyze seized electronic media. Students subject to background investigation prior to admittance.

Duration: 7 weeks   |   Credit Hours: 3

This course will use hacking techniques used by malicious, black hat hackers as a means to learn best defense from these same hackers. The course is an in-depth study using hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization.

Duration: 7 weeks   |   Credit Hours: 3

This course will introduce the student to the essential aspects of information security and incident response. The student will be provided with the tools, techniques and industry accepted methodologies so that upon completion of the course the student will be able to describe key concepts of network security and incident response and how those concepts apply to themselves and their organization.

Duration: 7 weeks   |   Credit Hours: 3

This course will focus on advanced operating systems administration and security. Students will learn about key features in existing operating systems, such as Linux and Windows. They will also learn how to properly configure and administer such systems/servers to make them more reliable, secure and robust against vulnerabilities and threats.

Duration: 7 weeks   |   Credit Hours: 3

This course will introduce the student to the essential aspects of information security and network forensics. The student will be provided with the tools, techniques and industry accepted methodologies to gather, process, store and visualize network security related data. Students will also be taught how to apply some statistics and machines learning techniques to recognize instruction patterns and malicious activities.

Duration: 7 weeks   |   Credit Hours: 3

This capstone course is a culmination of the learning that students achieve in the IA/CD program. Students will engage in a practical experiment and/or research that utilize key principles in IA, by building on the concepts of all IA courses students have taken as part of their degree plans and ensure that they are ready for the real-world jobs/research endeavors.

Students must choose 21 hours from the following courses. A maximum of 9 hours can be taken with an IA prefix. Students may also choose any 300-level or above IA, IT, COSC, or CIS course not already taken.

Duration: 7 weeks   |   Credit Hours: 3

An introductory intelligence analysis course designed to prepare intelligence products, hypothesis, along with collection and dissemination planning. Students will explore historical, legal, and ethical basis for intelligence collection, retention and of the analytical product.

Duration: 7 weeks   |   Credit Hours: 3

Employment in an appropriate setting, chosen to provide supervised practical experience.

Duration: 7 weeks   |   Credit Hours: 3

This course is part one of a two sequence course of study. It is designed to prepare students to become effective cyber crime investigators. The course examines the basic steps required in hardware identification, TCP-IP, rules of electronic evidence, DOS, network investigation, case management and intrusion detection.

Duration: 7 weeks   |   Credit Hours: 3

This advanced course addresses the comprehension and application of Digital Forensic Investigations. Students will evaluate and synthesize technical and legal issues in relation to digital evidence. Students will apply various skills and techniques, combined with numerous investigative software tools to analyze seized electronic media. Students subject to background investigation prior to admittance.

Duration: 7 weeks   |   Credit Hours: 3

Recent years have witnessed a surge in data production in various walks of life. From social networking posts, to E-commerce Web server transaction logs, to publicly available aggregate databases, such as census data, weather data, etc. Some of these are fairly innocuous while others, when manipulated with the right tools, could potentially expose people’s identities and violate their privacy. Another dimension to this exponential growth in data is manifested in the bigger challenges that face those who secure such data. This course provides an overview of data security and privacy, while providing a concise coverage of the various relevant matters, such as data science, Big Data, and Data Mining; as well as pertinent laws, regulations, and codes of ethics. It follows a progressive approach that prepares students for more advanced topics related to data security and privacy.

Duration: 7 weeks   |   Credit Hours: 3

The rise of big data has the potential to inform decisions, and visual representations can play a crucial intermediate role in our daily information consumption. This course is designed to the interdisciplinary and emerging field of data science. It will cover techniques and algorithms for creating effective visualizations based on principles form graphic design, visual art, perceptual psychology, and cognitive science to enhance the understanding of complex data.

Duration: 7 weeks   |   Credit Hours: 3

This course instructs students on the management and implementation of advanced topics in information security and cyber defense. Topics include implementation and application cloud computing, mobile security, etc.

Duration: 7 weeks   |   Credit Hours: 3

Duration: 7 weeks   |   Credit Hours: 3

This course will provide students with necessary skills and tools to serve in firms as a Systems administrator (or Sysadmin). Students will learn how to automate tasks with the Python (or other) language to solve various system administration problems.

Duration: 7 weeks   |   Credit Hours: 3

This course teaches students the key Human-Computer Interaction (HCI) concepts that, among other benefits, will help them build "useful" system functionality and design "usable" interfaces in order to maximize the value of these systems. They will also gain a better understanding of the needs of system users, ensure positive customer experience or improve an organization's brand.

Duration: 7 weeks   |   Credit Hours: 3

Web presence has become a necessity for today’s modern enterprises. This course teaches students how to install, configure, and administer a Web Server. It will also delve into best practices about Web application fundamentals and best practices in secure development.

Duration: 7 weeks   |   Credit Hours: 3

Virtualization enables software-based machines with fully-functioning operating systems. Cloud Computing creates an on-demand computing infrastructure with convenient network access to a shared pool of configurable computing resources. Both concepts are valuable to modern organizations and will help students become effective contributors in their future jobs and more valuable to their employers.

Duration: 7 weeks   |   Credit Hours: 3

Wireless technology has penetrated almost every sector of the national and global economies and grew to enormous proportions in the past decade. This course prepares students to play an effective role in various types of organizations that employ 802.11 and WLAN technologies and helps them prepare for the CWNA certification exam.

Duration: 7 weeks   |   Credit Hours: 3

The course addresses key concepts in the security of embedded systems that constitute the foundation for the Internet of Things (IoT) security. This includes their privacy, architecture and access control, as well as risk assessments, threats, vulnerabilities, and mitigation strategies.

Duration: 7 weeks   |   Credit Hours: 3

This course covers technology and security of modern vehicles. This includes their architecture, protocols, and access control, as well as privacy, risk assessments, threats, vulnerabilities, and mitigation strategies. Students will engage in solving practical problems in vehicle security.

[close-]

Admissions

To be considered for this program, applicants to the Bachelor of Science in Information Assurance and Cyber Defense online degree must have a minimum of 30 credits from a four-year college or university; courses taken at community colleges cannot be used to meet this requirement. Complete or transfer credit of IA 103 and IT 110 with a grade of B- or above. Applicants must have a minimum cumulative GPA of 2.0 or higher on previous college coursework.

Please note: Students who are currently enrolled in an Eastern Michigan University on-campus bachelor's program are not eligible to transfer into this online program.

If you need to submit official documents by mail, send them to:

Office of Admissions
Eastern Michigan University
P.O. Box 921
Ypsilanti, MI 48197

Documentation can be sent via email to: transcripts_admissions@emich.edu.

Have a question? Call us at 844-351-9389.

[close-]

Tuition

The following is the tuition breakdown for students pursuing a Bachelor of Science in Information Assurance and Cyber Defense online. The tuition is the same for in-state and out-of-state students. The tuition cost includes all fees.

Degree Per Credit Hour Per 3-Credit Hour Course
Bachelor of Science in Information Assurance and Cyber Defense $395 $1,185
[close-]

Calendar

Session Start Date Application Deadline Document Deadline Registration Deadline Summer 2019 Due Dates
Summer II June 25, 2019 June 4, 2019 June 11, 2019 June 18, 2019 June 27, 2019
Fall September 04, 2019 August 14, 2019 August 21, 2019 August 28, 2019 August 25, 2019
Fall II October 22, 2019 October 1, 2019 October 8, 2019 October 15, 2019 October 10, 2019
[close-]
Request Information
*All fields required.
or call 844-351-9389 844-351-9389
By submitting this form, I am providing my digital signature agreeing that Eastern Michigan University (EMU) may email me or contact me regarding educational services by telephone and/or text message utilizing automated technology at the telephone number(s) provided above. I understand this consent is not a condition to attend EMU or to purchase any other goods or services.