Admissions : Undergraduate Degree Programs

BBA Cybersecurity

Why study Cybersecurity at WCSU?

The Cybersecurity degree provides undergraduate students with an emphasis on education and training on the managerial and business side of Cybersecurity.  The degree incorporates two general categories agreed upon by industry experts. The first is knowledge of the technical aspects of security including databases, networks, anti-malware systems, and penetration testing. The second knowledge area involves managerial tasks such as developing security programs, policy formation, compliance with government regulations, privacy ethics, continuity planning and risk management.

Skilled Cybersecurity specialists: protect networks and data from unauthorized access including hackers

Cybersecurity specialists are in high demand and needed to protect business and personal information in the face of ever more sophisticated hackers.

Cybersecurity degrees from WCSU lead to . . .  opportunities in a wide range of government and business careers

Networks, computers, programs and data all need protection in our high tech world. A degree from Western provides a solid foundation and experience for the technical and managerial requirements of a successful career in Cybersecurity.

    • Program type: Bachelor of Business Administration
    • School: Ancell School of Business
    • Primary Location: Westside Campus
    • Faculty: Listing
    • Program Sheets:
The degree is designed to provide students with an understanding of the technical and managerial areas of Cybersecurity; prepare students for a wide range of positions in Cybersecurity; provide a learning environment in which students can experience real-world organizational security scenarios supported by state of the art technology and equipment.
A graduate of the MIS department should be able to:

  • Develop solutions for networking and security problems, balancing business concerns, technical issues and security.
  • Demonstrate an understanding of the core concepts, tools and methods used to secure computer systems.
  • Explain the concepts of confidentiality, availability and integrity in Cybersecurity including physical, software, devices, policies and people.
  • Plan, implement and evaluate penetration testing and ethical hacking of computer systems.
  • Identify, analyze and mitigate threats to internal computer systems.

To learn more about the Management Information Systems degree, please follow the links below