The International Council of E-Commerce Consultants (EC-Council) and University of Phoenix teamed up to launch the Associate of Science in Cybersecurity degree and elective courses that align with three EC-Council certification exams: Certified Ethical Hacker (CEH), Certified Network Defender (CND) and Certified Secure Computer User (CSCU). Awarded the EC-Council’s 2019 Academic Circle of Excellence Award as a result of this partnership, this program is designed to help you develop the problem-solving skills and techniques needed to defend the cyber domain.
Your prior eligible credits could help you graduate faster and for less.
Browse courses for your online cybersecurity degree
Education should hold practical value. That’s why our courses meet rigorous academic standards and provide you with skills and knowledge immediately applicable to your career.
Look for this icon to see which skills you’ll learn in a course.
This course provides comprehensive Cybersecurity awareness and a fundamental understanding of various computer and network security threats, such as: Identity Theft, Fraud, Online Scams, Viruses and Backdoors, Hacking, Social Engineering Attacks, and more.
This course provides network training on Computer Network Defense fundamentals; security threats, vulnerabilities, and attacks; controls, protocols and devices; and security policy design and implementation.
This course teaches the basics of an object-oriented scripting language capable of developing web apps, scripts, cross-platform apps, games, and pen-testing exercises.
Students reinforce foundational skills, and learn new topics such as modules, files, inheritance, recursion, plotting, and searching and sorting algorithms. Students apply programming skills and knowledge to basic forensic investigation, port scanning, and network analysis, needed in cybersecurity.
This course provides continued network training on Computer Network Defense. Introduced topics include physical and host security; firewall configuration and management; Intrusion Detection Systems (IDS) and Virtual Private Network (VPN) configuration and management.
This course provides continued network training on Computer Network Defense. Introduced topics include physical security, designing and implementing network security policies, network incident response and management, network backup and disaster recovery, and wireless defense.
This is an introductory course on Linux that provides sufficient command of the subject to meet the initial needs of penetration testing.
This course develops essential skills for network analysis by sniffing packets using a network protocol analyzer.
This course provides training on penetration testing. Introduced topics include Introduction to Ethical Hacking, Footprinting and Reconnaissance, Scanning Networks, Enumeration, System Hacking, and Malware Threats.
This course provides training on penetration testing. Introduced topics include sniffing, social engineering, denial-of-service, session hijacking, hacking webservers, evading IDS, firewalls, and honeypots.
This course provides training on penetration testing. Introduced topics include SQL injection attacks, hacking web applications, wireless networks, mobile platforms, operational technology, the Internet of things, and cloud platforms, and cryptography basics.
This project on Applied Ethical Hacking combines and demonstrates the acquired knowledge and skills from the five preceding courses in the Cyber Analyst Defender certificate.
General Education Courses
This course transitions students through the foundations of study at University of Phoenix. Students develop personal strategies for achieving educational goals and develop skills in critical thinking, collaboration, and communication.
The course introduces theories and concepts in psychology that will foster academic success and provide students with opportunities to synthesize and apply that knowledge.
This course develops the reading, writing, and critical thinking skills that are essential for academic and life success.
Students learn how to think critically, focusing on developing the necessary tools and skills to analyze problems, make decisions, and formulate well-supported points of view on key academic, social, and professional issues.
This course extends practice in critical reading, writing, and thinking. Emphasis is given to developing an effective writing process that takes into account audience and rhetorical purpose.
This course provides an overview of the key components of comprehensive wellness. Based on a preventive model, the course will allow learners to explore choices that promote wellness with goals of living longer and better.
This course defines the Cyber Domain that encompasses Cybersecurity as the discipline of securing computer information and communications systems, networks, infrastructures and assets, and protecting them against damage, unauthorized use, modification, or exploitation. The Cyber Domain must be managed ethically, politically, and physically in a similar collaborative fashion to the space, maritime, and physical domains of states and nations globally.
Students apply advanced quantitative reasoning skills to solve real-world problems. This course emphasizes modeling skills, statistical methods, and probability to create, analyze, and communicate solutions.
This applications-driven course prepares students to critically analyze and solve problems using quantitative reasoning. Students approach real-world scenarios using numerous reasoning skills and mathematical literacy to draw conclusions.
Requirements: 63 credits
You’ll need 63 credits to complete this Associate of Science in Cybersecurity. Your course schedule may vary based on transferable credits or credits earned through the University’s Prior Learning Assessment.
7 Core Courses
Here’s where you’ll pick up the bulk of your program-specific knowledge. By the time you finish these courses, you should have the confidence and skills to succeed in an IT environment.
9 Gen Ed Courses
These courses lay the foundation for all our degree programs. Because communication, math and writing skills aren’t just universally applicable in IT — they’re useful in daily life.
5 Elective Courses
Elective courses allow you to learn about topics you’re interested in, whether they’re related to your degree or not. That means you’ll have a degree that’s unique to you and your education goals.
Attend class whenever it fits your life, day or night because our online classroom is available 24/7/365. Your academic counselor will help schedule your courses for the Associate of Science in Cybersecurity.
Your prior eligible college credits can save you time and money, helping you graduate faster. That’s why we’ve accepted credits from 5,000+ institutions. Check to see if you can apply eligible transfer credits from an institutionally accredited university or college toward a degree of your choice.
You may have options when it comes to paying for college tuition and expenses, such as federal grants and loans. Our finance advisors can answer your questions about financial aid and can help guide you through the process.
When you earn your online degree, you’ll be equipped with a concrete set of skills you can apply on the job. You’ll learn how to:
Protect all assets of a computer infrastructure in the cyber domain
Explain security risk assessment and summarize a vulnerability mitigation plan
Outline technical problems and summarize computing requirements to solve them
According to the Bureau of Labor Statistics, job growth for Computer and Information System Managers is projected to be much faster than average between 2022 and 2032.
The BLS Projected Growth for 2022-2032 is published by the US Bureau of Labor Statistics. This data reflects the BLS’ projections of national (not local) conditions. These data points are not specific to University of Phoenix students or graduates.
Apply for free – no application fee, no obligation.
Starting your degree is a big decision — and we want you to feel great about it. That’s why we remove obstacles from your application.
No SAT/ACT required
No essay required
No cost, risk-free trial for eligible students
We’ll request transcripts at no cost to you, when possible, and we accept eligible credits from over 5,000 accredited institutions.
Your success is a top priority for our deans and faculty members. They bring an average of 26 years of experience and hands-on perspective to the classroom, and help bridge the gap between academics and industry knowledge.
I’m dedicated to equipping students with the knowledge, skills and abilities to meet their career goals.
Kathryn Uhles Dean, College of Business and IT, University of Phoenix
Count on the quality of your education
University of Phoenix has been continually accredited by the Higher Learning Commission (HLC), hlcommission.org, since 1978.