Skip to content

Online Cyber Security Degree Requirements

Curriculum Details

120 total credits required

Lindenwood’s online cybersecurity degree requirements consist of 120 total credit hours, including 66–67 from cybersecurity courses. As a student, you will complete a capstone course, but there is no internship or practicum requirement.

Foundation (66-67 hours)

This course will give students foundational knowledge in Information Technology. Topics covered will include the topics tested in the ITIL – Foundations certification. Extra study and experience may be required outside of the course work to prepare the student to pass the certification examination. Taking this course does not guarantee the student will pass the certification examination.

This course will give students foundational knowledge in cybersecurity. Topics covered will include the topics tested in the CompTIA Network+ certification. Extra study and experience may be required outside of the course work to prepare the student to pass the certification examination. Taking this course does not guarantee the student will pass the certification examination.
This course will give students foundational knowledge in cybersecurity. Topics covered will include the topics tested in the CompTIA Security+ certification. Extra study and experience may be required outside of the course work to prepare the student to pass the certification examination. Taking this course does not guarantee the student will pass the certification examination.
This course provides students with insights into securing enterprise networks including the cloud. Basic techniques and tools for securing a network and the cloud will be explored. Physical security, data security, and specific network and cloud security concerns and vulnerabilities, as well as security best practices, will be explored.

This course focuses on the use of the most popular forensics tools and provides specific guidance on dealing with civil and criminal matters relating to the law and technology. The course will include discussions on how to manage a digital forensics operation in today’s business environment. Some topics covered includes, Data Acquisition, Live Acquisitions, E-Mails and Social Media Investigations.

This course will give students intermediate knowledge related to installation and configuration of Microsoft Windows Server. Topics covered will include the topics tested in the Microsoft 70-740 certification. This course prepares the student to be a practitioner in the network field of Information Technology. Extra study and experience may be required outside of the course work to prepare the student to pass the certification examination. Taking this course does not guarantee the student will pass the certification examination.

This course will give students intermediate knowledge related to installation and configuration of Linux Server. Topics covered will include the topics tested in the CompTIA Linux+ certification. This course prepares the student to be a practitioner in the network field of Information Technology. Extra study and experience may be required outside of the course work to prepare the student to pass the certification examination. Taking this course does not guarantee the student will pass the certification examination.

This course will give students intermediate knowledge related to server identity administration. Topics covered will include the topics tested in the Microsoft 70-742 certification. This course prepares the student to be a practitioner in the network field of Information Technology. Extra study and experience may be required outside of the course work to prepare the student to pass the certification examination. Taking this course does not guarantee the student will pass the certification examination.

This course will introduce students to computer incident response and computer forensics. Topics covered will include the topics tested in the EC Council Certified Ethical hacker certification. This course prepares the student to be a practitioner in the network field of Information Technology. Extra study and experience may be required outside of the course work to prepare the student to pass the certification examination. Taking this course alone does not guarantee the student will pass the certification examination.
This course educates students in the specific security discipline of computer forensics from a vendor-neutral perspective. Topics covered will include the topics tested in the EC Council Certified Ethical Hacker certification. This course prepares the student to be a practitioner in the network field of Information Technology. Extra study and experience may be required outside of the course work to prepare the student to pass the certification examination. Taking this course alone does not guarantee the student will pass the certification examination.
This course will give students intermediate knowledge related to the skills necessary to successfully perform the duties of a security analyst. Topics covered will include the topics tested in the EC Council Certified Security Analyst certification. Extra study and experience may be required outside of the course work to prepare the student to pass the certification examination. Taking this course does not guarantee the student will pass the certification examination.
This course exposes students to the concept of secure software development by teaching them the methods, techniques, and tools within software development relating to cybersecurity and how they are used to develop software securely. Specific application security configuration techniques and security concepts applicable to each phase of the Software Development Life Cycle (SDLC) will be explored. Security testing and the role of project management in ensuring secure software development will be studied.

This course covers the techniques and tools for developing, implementing, managing, and/or protecting web applications. Students will study web safety and browser vulnerabilities, privacy concerns, and other web related security issues and concerns. Students will explore how to avoid vulnerabilities in web applications and the tools used to program web application servers. Finally, students will be introduced to the Open Web Application Security Project (OWASP) and its top 10 vulnerabilities.

This course will be a culminating project course for the student’s degree program. The instructor will act as a mentor to guide students through the completion of a portfolio, or other project documents, or an internship that will demonstrate their successful completion of the goals of the degree.

This course will introduce students to computer programming concepts and approaches to computer logic. A popular programming language will be used to demonstrate these concepts.
This course introduces students to computer operating systems and hardware and the interactions between these two critical components of the functioning and architecture of computers. Common operating systems and hardware issues that could affect the function of computers and how to address them will be analyzed. Additionally, students will learn about different operating systems and how to install and configure them with special attention to security issues, embedded tools and features to ensure security of hardware and operating systems.

This course will discuss information technology law and ethics. Students will investigate real-world cases through a law and ethics filter. Students will develop a personal code of ethics for use as information technology professionals.

This course discusses the invention of Bitcoin and blockchain technology. Blockchain is now entering the business world to enhance transparency, traceability, and efficiency in many areas. The uses for blockchain are just now being discovered and this course will explore the areas in which blockchain will enable businesses to compete in the global economy in the future.
This course explains the components of a database system. It stresses data modeling, data normalization, and database design.

This course prepares students to implement the project management body of knowledge and prepare to perform project management functions. It is an introduction to the theory and applications of project cost and schedule estimating including life cycle cost, staffing profiles, GUI, and objects metrics, and cost by phase and activity, lines of code, and project risks. It is a course in the theory of project management involving planning, organizing, staffing, tracking, measurement, and evaluation. Topics include defining projects, developing networks, managing risk, scheduling resources; inter organizational relations, Agile methods and international projects. In addition, the student will learn the real-world implications of the technologies as they are actually used in the current technological climate. This course prepares the student to be a practitioner in the network field of Information Technology.

This course is an introduction to the theory and applications of statistics, including probability, descriptive statistics, random variables, expected values, distribution functions, and hypothesis testing.

Any 3 hour general education math course will satisfy this requirement.

Request Information

As you’re making your decision about pursuing an online degree, you are likely to have questions. From program information to details about the application process, we’re here to help you find the answers you need.