APU’s cybersecurity bachelor’s degree program explores the tools, laws, and protocols that help protect information technology and digital assets. Students discuss how to secure systems from both internal and external attackers.
Today's cyber defense techniques include human surveillance, digital surveillance, and artificial intelligence. Courses explore how this combination enables security professionals to identify the early warning signs of an attack.
Our online bachelor's degree program also provides the opportunity to learn from highly experienced security practitioners. Cybersecurity faculty members have a wealth of expertise in cyber defense, data security, and homeland security. Students gain real-world knowledge by hearing firsthand from these industry veterans.
To further enrich the curriculum, courses integrate APU’s cyber range, a virtual environment where learners sharpen their technical skills through hands-on exercises. These assignments help cybersecurity majors better understand how hackers operate while they practice developing defensive strategies to counter cyber threats.
Cybersecurity Degree Concentrations
This online bachelor’s degree program enables students to explore the various ways cyberattackers exploit information technology. Through concentration tracks, learners deepen their understanding of the role cybersecurity professionals play in combating cyber crime and protecting digital data. Courses examine everything from the impact of artificial intelligence to the ethics of digital surveillance.
Select a concentration to learn more.
About the Concentration
This concentration for the Bachelors of Science in Cybersecurity will allow students to specialize in the methodologies used to secure the networks, hardware – devices, software – apps, and the laws and regulations, policies and procedures, and ethical responsibilities for privacy and security of mobile devices using mobile and wireless network infrastructures. The concentration will emphasize countermeasures taken to harden the security of various aspects of mobile technologies associated to government, military, industry, educational, and private enterprises.
Program Objectives
Upon successful completion of this concentration, the student will be able to:
- Extrapolate threats and vulnerabilities introduced into the network infrastructures of wireless, mobile, cellular, and satellite technologies.
- Examine current mobile application models, their security framework, and methodologies on hardening the security to safeguard the devices running them and adapt them to higher privacy standards.
- Appraise security hardening techniques for wireless or mobile device technologies based on wireless security principles and current industry standards.
- Investigate forensics of wireless network attacks caused by mobile and wireless peripheral devices, and then evaluate security and access procedures within wireless Internet use of subject search warrants and chain of custody in a forensic investigation.
About the Concentration
A general concentration allows you to take courses across a number of areas of study within your program based on your own interests.
Program Objectives
This general concentration allows you to choose from a variety of elective courses from homeland security, intelligence, information systems security, and IT project management.
About the Concentration
The Bachelor of Science in Cybersecurity with a concentration in Critical Infrastructure provides you with the knowledge to best understand the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems that run the everyday systems that we depend on from gas, electric, and other utilities to the production of your favorite foods. The concentration will delve into how these systems differ from the devices used by your average computer user, as well as how one can best protect these unique systems from hackers to nation states. You will be exposed to various aspects of systems from Programmable Logic Controllers (PLC) to nuclear power plants. This is a unique field with consistent growth as everyone depends on critical infrastructure virtually nonstop around the clock.
Program Objectives
Upon successful completion of this concentration, the student will be able to:
- Evaluate risks of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems.
- Explore various federal agencies’ roles in protecting the nation’s critical infrastructure.
- Identify critical infrastructure components.
- Determine appropriate solutions to mitigate critical infrastructure threats.
About the Concentration
Bringing cybercriminals to justice requires individuals with computer forensics skill sets who have the ability to quickly collect, analyze, and present cybercrime evidence. Become familiar with digital forensic measures for security incident response with a concentration in Digital Forensics.
Study how to prevent the loss of sensitive proprietary information and deter future cyberattacks. In addition, you’ll learn about common incident response procedures, web attacks, router forensics, email crime, corporate espionage, and steganography in your online courses in digital forensics.
Program Objectives
Upon successful completion of this concentration, the student will be able to:
- Demonstrate knowledge of incident response procedures, computer investigation processes, digital forensics lab work, and investigative reports.
- Illustrate understanding of wireless network attack forensics, wireless internet use security and access procedures, search warrants, and chain of custody.
About the Concentration
The Privacy and Surveillance concentration provides students with a multifaceted approach not only addressing commonly used tools and methods of surveillance but also privacy considerations. Students will be exposed to how surveillance is both intentional and unintentional. The risk of using various forms of hardware and software will be discussed. Legal and ethical consideration surrounding the impact surveillance has on privacy rights will be addressed.
Program Objectives
Upon successful completion of this concentration, the student will be able to:
- Demonstrate knowledge of common surveillance technologies.
- Illustrate understanding of how technology impacts population segments differently.
Gain Career-Relevant Knowledge and Skills Through APU’s Cybersecurity Bachelor’s Degree Program
This online cybersecurity degree program provides an in-depth understanding of the techniques that security professionals use to protect information assets. Students discuss the latest security standards as they prepare to pursue careers in the field.
Learn how to think like a cyber criminal as you study the strategies cybersecurity experts employ to thwart attacks and safeguard sensitive data. This bachelor’s degree program familiarizes students with practical security measures for protecting IT in public- and private-sector settings.
Graduates may pursue a diverse range of careers, including roles as:
- Information security analysts, who monitor networks and implement policies to protect computer systems
- Network/systems administrators, who secure organizational networks and enforce access controls
- Digital forensics analysts, who investigate cybercrimes, help to restore lost data, and collect evidence for legal cases
- IT auditors/compliance specialists, who audit IT systems to ensure compliance with security standards
- Penetration testers/vulnerability analysts, who simulate cyberattacks to identify and remedy system weaknesses
- Cybersecurity consultants, who help support develop effective security policies and plan incident responses to support organizational security
In this bachelor’s degree program, you will study the proactive and reactive measures that security practitioners take to safeguard information technology. You will also consider how to navigate ethical issues related to surveillance, security, and privacy.
Cybersecurity courses prepare students to:
- Apply foundational concepts to design and evaluate secure systems
- Identify, evaluate, and prioritize risks and implement mitigation plans that balance security with usability and business continuity
- Ensure security practices comply with privacy regulations
- Detect system weaknesses and safeguard against attacks with threat intelligence, vulnerability scanning, and security analytics tools
- Interpret technical information to communicate clear, actionable recommendations for diverse audiences, including technical teams, executives, and policymakers
- Navigate ethical dilemmas and ensure legally compliant operations that follow codes of conduct in both civilian and defense contexts
- Implement evidence collection, chain of custody, and analysis techniques after cybersecurity incidents
- Support long-term organizational security through leadership, teamwork, and strategic planning skills
APU’s Bachelor of Science in Cybersecurity is designed to prepare you to protect information assets. Courses cover how security practitioners identify system vulnerabilities to help prevent data breaches. In this program you will also:
- Understand cybersecurity aspects, including cyber defense, cyber operations, cyber exploitations, cyber intelligence, cybercrime, and cyber law within federal and state laws.
- Learn digital forensics processes and investigation goals, including the importance of search warrants and chain of custody for computer-related crimes.
- Create strategies and plans for security architecture using information security tools, techniques, and information technology for intrusion detection, incident response, and cybersecurity countermeasures.
- Grow your knowledge of network security designs, topologies, architectures, protocols, communications, administration, operations, and resource management for minimizing security risks across wired, wireless, and satellite networks.
Browse Courses from APU’s Online Cybersecurity Degree Program
Build Lasting Connections While You Earn Your Cybersecurity Degree
APU’s student-led organizations provide countless networking opportunities you can pursue while enrolled in this cybersecurity program. Explore dozens of virtual communities and clubs, such as:
- The Technology Professionals Group
- The National Security Policy and Analysis Organization
- Women in STEM
- The Society for Advancement of Chicanos/Hispanics & Native Americans in Science
- wSEC (an organization for women in the security field)
Learn more about student life at American Public University.
APU offers real-life support, designed for real students
From your first class to your next big move, APU surrounds you with support. Whether you need a coach to help you plan your career, a mentor to keep you motivated, or 24/7 mental health resources to stay grounded, we’re here for the whole you.
Learn More About APU Career ServicesCareer Services
Explore career paths, connect with career coaches, attend virtual career fairs, prepare for interviews, and have your resume professionally evaluated so you can hit the ground running.
Learn More about APU Career Services24/7 Mental Health Support
Admissions & Advising Support
APU students have access to personalized support from the admission and advising offices throughout their academic journey.
Learn How We Support YouStudent Life & CareerLink
Tap into a vast network of fellow service-minded, lifelong learners via a variety of student organizations and through our CareerLink platform.
Learn More about Student Life & CareerLinkChoose APU for Affordable Cybersecurity Education
With a low cost per credit hour and generous transfer credit opportunities, pursuing a Bachelor of Science in Cybersecurity is affordable at APU. University grants help to further reduce the cost of completing this online degree program.
Students learn how to safeguard computer networks and other information systems, without sacrificing the time and expense of attending classes in person.
- $0 Application Fee
- $0 Textbooks & eBooks
- $0 Transfer Credit Evaluation
- $0 Optional Label Goes Here
APU Removes Barriers
Quality Education Shouldn’t Break the Bank
We offer special rates and grants for eligible students and limit fees to help keep the cost of higher education within reach. Find out how you can save on tuition expenses with our:
- Opportunity Grant
- Everyday Heroes Grant
- Preferred Military Rate
- Veteran Grant
Transfer Credits
Your previous education, military service, certifications, on-the-job training, and real-world experience may count as transferable academic credit.
Learn More about Transfer CreditFinancial Student Aid
Financial aid typically covers the cost of tuition, university fees, and course materials for those who qualify.
Learn more about Financial AidPrivate Loans & Scholarships
Additional resources help cover the cost of education.
Learn More about Private Loans & ScholarshipsMilitary & Veterans Benefits
APU offers multiple resources to help active-duty servicemembers, veterans, and their families save on education expenses.
Learn More about Military & Veterans BenefitsApply Today to the Bachelor of Science in Cybersecurity Program
This online cyber security degree consists of classes with monthly start dates and no set login times. Through hands-on learning, students develop practical experience as they learn how today’s security practitioners protect information assets.
Concentration tracks provide the opportunity to study specialty areas ranging from wireless and mobile security to digital forensics.
Ready to get started? Apply to this bachelor’s degree program online today.
- No Entrance Exams Label goes here
- No Application Fee Label goes here
- Courses Start Monthly Label goes here
- Fourth Stat Text Here Label goes here
- All APU undergraduate programs require a minimum of a high school diploma or equivalent (i.e., GED). Please read all undergraduate admission requirements before applying to this program and be prepared to submit the required documentation.
- There is no fee to complete the APU admission application for this program. View steps to apply.
Find Out More About Cybersecurity Degree Programs
Learn more about how cybersecurity programs provide career-relevant education and familiarize students with the latest security protocols. Get answers to common questions about cybersecurity coursework, online degree programs, and certification opportunities for cybersecurity professionals.
Cyber criminals work tirelessly to infiltrate networking technologies and access sensitive information. They pose countless threats, from disrupting supply chains to disabling computers and stealing personal data. Cybersecurity professionals apply many strategies to help thwart cyber threats by:
- Monitoring computer networks and mobile devices to identify threats
- Educating employees about security principles
- Using emerging technology to address system vulnerabilities
Not all cybersecurity careers require industry certifications, though they are desirable in some cases. After completing their bachelor’s degrees in cybersecurity, many students go on to earn industry certifications, such as:
- Certified Ethical Hacker® (CEH®)4 – Demonstrates an understanding of penetration testing, incident response, and incident prevention
- Certified Information Systems Security Professional (CISSP®) – Demonstrates competency in information technology security and the ability to design and implement a cybersecurity program
- Certified Information Systems Auditor® (CISA®) – Demonstrates expertise in assessing security vulnerabilities, designing controls, and providing compliance reporting
- Certified Information Security Manager (CISM®) – Demonstrates competency on the management side of information security, such as governance, program development, and risk management
- CompTIA Security+® – Demonstrates the ability to assess an organization's security; monitor and secure cloud, mobile, and Internet of Things (IoT) environments; and respond to security incidents
NOTE: This bachelor’s in cybersecurity does not award any professional certifications, but may be helpful in preparing to earn such certifications.
Yes. This online bachelor’s degree program incorporates lab exercises that use simulations to teach students how to:
- Identify security vulnerabilities in information systems
- Protect sensitive data
- Apply intrusion detection tools
- Encrypt files and harden operating systems Inject and disable malware
APU’s cybersecurity students also learn to use a wide range of information technologies, including:
- Industry-standard operating systems like Windows and Linux
- Computer networking devices and simulation tools like Cisco Packet Tracer
- Computer programming and scripting languages like Python, Linux Shells, and MS PowerShell
- Security software, such as OpenVAS, Snort, Kali Linux, and Metasploit
- Vulnerability assessment and security analytics tools