Skip to content

Online Bachelor's in Cybersecurity: Risk Management

Implement Effective Risk Management Strategies in Any Organization

100% Online

Transfer up to 90 Credits

Accelerated Program

Interdisciplinary Learning

Request More Information

Complete this form to receive information about coursework, admissions, tuition, and more.

  • Duration 3.5 years
  • Cost per Credit $410
  • Credit Hours 120

Program Benefits

  • No background in IT or computer science required
  • Specialize your cybersecurity degree by choosing a major
  • Small class sizes for personal attention

Learn to Analyze and Manage Digital Threats

The online BS in Cybersecurity: Risk Management major from The American Women’s College of Bay Path University (TAWC) delivers the tools and technical competencies you need to develop strategic plans to mitigate risk and prevent cyber attacks. Through an interdisciplinary curriculum that combines skills from areas ranging from project management to programming, you will graduate ready to protect your organization’s digital assets.

Risk Management Major Curriculum

14 major courses

3 credits per course

The Bachelor’s in Cybersecurity: Risk Management degree combines coursework in data privacy, crisis management, and incident recovery for a specialized skill set. You will also complete a capstone course focused on current issues in the field, preparing you to address real workplace challenges.

Students can also complete two graduate-level courses during their senior year. This option allows you to fast-track your master’s degree.

To view the complete list of program courses, visit the program curriculum page.

Required Major Courses

This course is intended to cover most of the fundamental aspects of modern project management (PM), both managerial and technical, as well as to give direct experience in implementing appropriate tools and techniques. By the end of this course, students should have a mastery of the basic theory and practice of PM, as described by the core knowledge modules (KMs) developed by Project Management Institute (PMI.) The course will draw extensively from the following three knowledge modules: Project Management Principles, Project Phases and Processes, and Project Planning and Integration.

The purpose of this course is to explore the evolving crime phenomenon resulting from the technology revolution over the last 60 years. An examination of the unique human-computer relationship will be conducted to develop an understanding of how criminal activity has adopted the use of new technologies to further their criminal activity. Additionally, a review of social constructs relating to high tech criminal activity will be provided.

Describes the legal and ethical issues associated with information security including access, use, and dissemination. It emphasizes legal infrastructure relating to information assurance, such as the Digital Millennium Copyright Act and Telecommunications Decency Act, and emerging technologies for management of digital rights. It examines the role of information security in various domains such as healthcare, scientific research, and personal communications such as email. It examines criminal activities such as computer fraud and abuse, desktop forgery, embezzlement, child pornography, computer trespass, and computer piracy.

This course will provide students with the knowledge and skills required to collect and interpret evidence related to network intrusions such as: network traffic, network devices, servers and operating systems. Specifically, students will learn crisis management skills while collecting and analyzing network traffic and protocols.

Prerequisite: CSC 210

This course is designed to provide students with ways to identify, manage, respond to and document risk-related events. Specifically, this course will address various stakeholders’ perspectives when considering risk. Students will understand concepts and develop a risk management mindset. Finally, students will learn to develop communication and documentation strategies related to risk management.

This course builds a common cross-disciplinary understanding in the foundations of information assurance. Presents an overview of basic principles and security concepts related to information systems, including workstation security, system security, and communications security. It introduces information security via database technology, discusses legal infrastructure such as DMCA, Telecommunications Act, wire fraud, and other ethical issues. Covers security methods, controls, procedures, economics of cybercrime, criminal procedure, and forensics. It describes the use of cryptography as a tool, software development processes, and protection.

This advanced course teaches specific skill sets so students will be cyber aware and have a cyber risk mindset across various industries. It provides examples of the evolution of contemporary risk strategies by using case studies from both large and small organizations (e.g., supply chains). By the end of the course, students will be able to communicate various cyber strategies to various stakeholders.

This course identifies legislation, policies and frameworks in the US and the EU related to computer and digital privacy, building upon earlier CBY curriculum. Students will learn concepts of personally identifiable information (PII) across multiple platforms and industries. From a risk management perspective, by the end of the course, students will understand how to protect PII and data privacy.

This capstone course is designed to provide an opportunity for the student to synthesize, reflect upon, and analyze the complex and robust field of cybersecurity. This course will highlight the major current issues in the field of cybersecurity.

Prerequisite: CBY 202, CBY 301, and CSC 210

In this course, students will be provided a baseline of knowledge of the fundamentals of computers and digital literacies to ensure they will be able to understand a constantly changing technology oriented landscape. In this course, students will be exposed to the fundamentals of computing technology, including computer hardware and software concepts; the Windows operating system and commands; drives, folders, and files; Google’s suite of applications; use of the Internet and growing connectivity with everyday devices; and digital literacy knowledge and skills. By mastering the fundamentals of computing technology and demonstrating digital literacy, students will have the skills needed to thrive in the 21st century workforce.

This course emphasizes technical computing concepts and the development of skills in a technology driven world. It further provides students with skills to perform basic operations involved in system administration, with an understanding of the roles of an operating system, its basic functions, and the services provided by the operating system. An introduction to coding languages is provided. Finally, the course provides students with the ability to create simple scripts/programs to automate and perform simple operations.

The purpose of this course is an in-depth exploration of data security controls and techniques. This course will examine theoretical concepts of network security implementation. This course will examine network security tools and techniques and include hands-on practical applications. Networking has enabled the emergence of mobile and cloud computing, creating one of the most important technological paradigm shifts in computing of the past decade. Coming advancements in wireless networking are expected to transform the technological landscape over the next decade by enabling an endless possibility of new applications, including the Internet of Things and wireless virtual reality, through the emergence of wireless networks with gigabit speeds. In order to play a role in this era of new network-powered advancements, students must have a thorough understanding of emerging networking topics, especially in the wireless domain.

This course introduces a systematic approach to programming. Specifically, this course teaches students to use Python to solve real world problems. By the end of the course, students will be able to construct a program from a series of instructions in Python.

In this course students will apply the practices for effective reading and writing introduced in ENG 114 to the distinctive language and forms of various disciplines. This course lays the foundation for academic and professional research and stresses the use of appropriate and effective information sources. Readings for a variety of academic audiences will provide students with strategies to communicate in the sciences, business and technology, psychology, liberal studies, and the social sciences. Research and documentation skills appropriate to the disciplines are stressed. In addition to leading students through the research process from start to finish, this course will examine the many ramifications of academic honesty.

Prerequisite: ENG 114

The BS in Cybersecurity: Risk Management program requires 38 credits of general electives. Learn more about which courses apply to these credits by speaking with an enrollment counselor.

What You’ll Learn

Graduates of the online BS in Cybersecurity: Risk Management degree program are equipped with a balance of problem-solving, leadership, and technical knowledge. This unique combination of skills prepares you to create and implement effective risk management strategies.

By Graduation, You’ll Have Skills to:

Prepare to Excel in a Growing Industry

Risk management is an essential part of the information security strategies used by organizations of all sizes and across industries. With projections indicating the global cybersecurity market will increase at a compound annual growth rate of 12.3% from 2023 to 2030,1 now is an ideal time to expand your technical skill set with our online risk management bachelor’s degree.

  • $72,419 average annual salary for security analysts2
  • $122,171 average annual salary for information security managers3
Explore Careers

Learn from Industry Experts

At The American Women’s College, your learning is expanded by the rich workplace experience our faculty bring to the classroom. Faculty are professionals who hold an array of titles in the fields they teach. Their involvement in the day-to-day challenges of their role and industry brings curriculums to life with real-world examples as you connect what you learn to what they share.

Faculty Spotlight

Each faculty member at TAWC incorporates real industry experience into each lesson. As a student, you’ll receive personalized, one-on-one support and graduate fully prepared to face the challenges of your chosen field.

Douglas Keevers, EdD, Academic Program Director, Cybersecurity

Prior to joining Bay Path, Dr. Keevers served in academic positions as director of distance education, core faculty, methodologist, university research reviewer, and other academic appointments. Before entering academia, Dr. Keevers worked for IT-centric organizations such as Microsoft and Compaq/Hewlett Packard.

Dr. Keevers holds a Doctorate in eLearning & Instructional Technology from Northcentral University, a master’s degree in information technology management, and post-graduate coursework in business management and information security. He is also certified by the Department of Homeland Security (DHS) and the Federal Emergency Management Agency (FEMA) and holds a certification as a mobile forensics examiner.

Dr. Keevers’ research interests include eLearning, intrinsic motivational theory, and the Internet of Things (IoT). He is also an active member of InfraGard, a joint partnership run by the FBI and the private sector.

Choose Your Major

Customize your BS in Cybersecurity program by choosing from three career-focused majors designed to help you achieve your professional goals. In addition to this major, we offer majors in:

BS in Cybersecurity: Digital Forensics and Incident Response

Learn to identify and investigate cybercrime by developing skills for leveraging cutting-edge digital forensic tools and techniques.

BS in Cybersecurity: Information Assurance

Build the skills to protect digital infrastructure and help organizations keep valuable information secure.

Frequently Asked Questions

Explore our frequently asked questions for in-depth answers. If you don’t find what you’re looking for, reach out to us.

Choosing a major for your cybersecurity degree allows you to gain career-ready skills in a specific area of expertise. With these specialized skills, you can stand out to employers and qualify for specialist positions in the field.

While completing the Risk Management major, you’ll gain the expertise to identify, evaluate, and manage threats to digital assets using a combination of crisis management, project management, and risk management skills.

You’ll complete 120 credits, including 42 major-specific credits, to earn the BS in Cybersecurity: Risk Management. For more information, review the courses page.

Requirements include a high school diploma, a 2.0 GPA on a 4.0 scale, and official transcripts from your high school and, if applicable, all regionally accredited institutions you have attended. Learn more about our requirements on the program’s admissions page.

The online BS in Cybersecurity is offered 100% online at this time. This allows you to study at the times and locations that are best for you throughout your entire program without ever coming to campus.

Yes, it is possible to change your major after enrollment. Depending on the transferability of courses, you may lose credits by doing so. Contact us for more information.

Graduates of this program are prepared to take on roles like security analyst, information risk consultant, and information security manager. Learn more about your career options by visiting the careers page.

Visit our FAQ page

Sources

  1. Grand View Research. “Cyber Security Market Size, Share & Trends Analysis Report.” Retrieved from https://www.grandviewresearch.com/industry-analysis/cyber-security-market#:~:text=Report%20Overview,12.3%25%20from%202023%20to%202030.
  2. Payscale. “Average Security Analyst Salary.” Retrieved from https://www.payscale.com/research/US/Job=Security_Analyst/Salary.
  3. Payscale. “Average Information Security Manager Salary.” Retrieved from https://www.payscale.com/research/US/Job=Information_Security_Manager/Salary.