Call Now
General Inquiries
1-866-684-7237
Master's Admissions
1-800-460-5597 (US & Canada)
+1-647-722-6642 (International)
Bachelor's and Certificate Admissions
1-866-684-7237
As humankind’s reliance on information technology grows—and with it, the prevalence of cyber crime—Norwich University’s Bachelor of Science in Cybersecurity program remains increasingly valuable. Through this program of study, you will experience Norwich’s renowned cybersecurity education and benefit from highly relevant, skills-based instruction via a flexible online classroom.
The cybersecurity curriculum is designed with working adults in mind, and combines core principles of cybersecurity with elective and project-based courses that allow you to explore topics in depth while strengthening your skills in critical thinking, communication, and research and analysis. You may also customize your degree by choosing a concentration in computer forensics and vulnerability management, or information warfare and security management.
Elective courses allow you to tailor your studies to suit your personal and professional interests.
Transfer up to 90 semester credits and complete your cyber security degree in fewer than two years.
Norwich is designated a Center of Academic Excellence in Cyber Defense Education by the National Security Agency and the Department of Homeland Security.
Several start dates per year offer you the ability to enroll when it fits your schedule.
All classes taken online
Transfer up to 90 credits
Average time to program completion
Next Start Date
Application Deadline
Norwich University is accredited by the New England Commission of Higher Education (formerly the Commission on Institutions of Higher Education of the New England Association of Schools and Colleges, Inc.).
The National Security Agency and Department of Homeland Security have designated Norwich University as a Center of Academic Excellence in Cyber Defense Education.
The Bachelor of Science in Cybersecurity program curriculum includes the following areas of instruction. For a Norwich bachelor's degree, you must earn at least 120 semester credits, including transfer credits.
Earn credits toward your degree with SecureSet Academy’s CORE Technical Bootcamp or HUNT Analyst program, made possible by the strategic partnership between Norwich and SecureSet Academy.
Students need to fulfill general education requirements as part of this program, which can be met through prior coursework or the equivalent, or through taking some of the elective options listed below.
This course is devoted chiefly to the principles of written organization, exposition, argumentation, and research.
An investigation of mathematical concepts and methods with emphasis given to their impact on current and ancient problems. Topics include mathematics of voting systems, basic graph theory including Euler circuits and the traveling salesman problem, the mathematics of population growth, statistics, and finding fair shares. Emphasis is on techniques of problem solving.
This course will focus on the scientific principles behind the recognition, collection, preservation, analysis, and interpretation of physical evidence found at a crime scene. Designed for non-science majors, this course presents the science and technology used by modern forensic professionals and emphasizes practical forensic applications of scientific principles in the areas of chemistry, physics, biology, geology, and more. Each week the student will have an online lab activity or case study in which to apply the various principles of forensic science covered in the course. Pre-requisites: none.
A study of the political, economic, and social contexts of the creation of the Constitution and the significant amendments to it. Emphasis is on the role of the judicial branch in constitutional matters; the effects of social change in the 19th, 20th, and 21st centuries; and the impact of technology on contemporary constitutional issues.
A study of human communication and the effect of modern technology on it. Students review basic communication theory, including non-verbal and intercultural communication, and then evaluate the impact of technology on the effectiveness and efficiency of communication. Topics include: spoken vs. written communication; synchronous vs. asynchronous communication; the status of world languages on the internet; the impact of social media; modern workplace communication; and trends in the development of communication technology.
This course covers the study of frequency distributions, averages and standard deviations, normal curve, probability, decision-making, sampling techniques, testing hypotheses, chi-square, students-t and F-distributions, correlation, and linear regression. Prerequisite: A college level mathematics course or equivalent as determined by departmental placement testing.
In this course, students read and discuss works of literature that explore the ethical, social, and philosophical implications of criminal behavior and society's response to it.
Based upon myth and built upon ritual, religious thought affects politics, economics, international relations, and security. In this course, you will explore and analyze the similarities and differences among world religions to better understand the impact of belief systems and religious themes on culture, human history, and current affairs. Prerequisites: none.
Most of the world’s crucial environmental issues and many regional conflicts are related to the degradation and/or overuse of the Earth’s basic resources, including air and climate, water, soils, and energy. This course will focus on the physical and chemical processes associated with the degradation of these resources, as well as an examination of potential solutions. This course will also address and incorporate two underlying themes to all environmental issues: sustainability and human population dynamics. Pre-requisites: none.
This course introduces the basic methods, concepts, and substance of comparative politics and focuses on institutions and behaviors as well as development and modernization theories. Issues covered include: the nature of political systems; the different varieties of democracies and authoritarian regimes; and the impact of geography on the political, economic, and social development of a region.
In this course, you will explore tenets and characteristics of various economics systems, analyze economic indicators, conceptualize problems, and recommend possible solutions. Economic factors are explored in the context of the U.S. Army’s Political-Military-Economics-Social Infrastructure-Information Systems framework.
In this course students will identify strategic considerations which have influenced the outcome of political and military conflict. Topics including the Peloponnesian War between Athens and Sparta, the campaigns of Alexander the Great and Napoleon Bonaparte, the Anglo-Afghan wars of the nineteenth and early twentieth centuries, and the rise and fall of empires around the world.
In this course, you will learn key theoretical models of leadership and strategies for applying them in a range of situations, both military and non-military. You will identify key functions and skills of effective leaders, explore leadership styles through study of selected leaders, and evaluate the role of communication, negotiation, strategy, purpose, and ethics in leadership. You will evaluate your own leadership effectiveness and develop a leadership tool kit.
This course provides a sociological perspective of the military as both an institution and as an occupation. It examines the social structure and functions of the military and the social factors that influence behavior in and of the military. In terms of function, it examines the changing purposes of the military in view of changing national and international conditions. In terms of structure, it examines the norms, values, traditions, organizations, and culture of the military. The course will provide insight into the routine life within the military and contemporary issues confronting the military.
This course presents key concepts in the study of cultures and explores how culture and cultural contexts and language influence values, expectations, behavior, communication styles, and conflict resolution.
Utilizing an exposure to Norwich University’s unique history, mission, and guiding principles students will develop skills in information literacy, crafting a research paper, and scholarly ethics. Students will explore concepts such as leadership, community service, and citizenship in order to practice skills that are both embedded in the educational vision of Alden Partridge, Norwich’s founder, and that are essential to succeeding in college, post-graduate careers, and volunteer activities.
In this course students will gain a deeper understanding of the Cold War and its impact upon American and world history. Topics include the diplomatic relationship between the United States and the Soviet Union, the various crises of the Cold War such as the Berlin Airlift and Cuban Missile Crisis, the efforts to end the Cold War made by various presidential administrations, and significant events in Russo-American relations over the last quarter century. The views and experiences of General Gordon R. Sullivan are incorporated into this course.
Students are required to complete the following courses.
This course is the study of the core theories and protocols that are the foundation of computer networking. The Open Systems Interconnection (OSI) model and the Transmission Control Protocol/Internet Protocol (TCP/IP), protocol suite are discussed in detail. This course provides a detailed overview of networking terminology, while examining the different networking topologies and architectures. Pre-requisites: none.
A writing-intensive course that focuses on critical business and management documents including organizational and personnel performance reports; business proposals; communications with stakeholders; and marketing instruments. Emphasis is on proper use of the business register; audience analysis; and technology-mediated professional communication. Prerequisite: ENGL101 or its equivalent.
This course covers the fundamental concepts of computer programming, using a low-level scripted programming language. This course is designed to provide the skills necessary to understand basic computer architecture, allowing the cyber security specialist to better identify, understand and remove security threats at the machine level. Pre-requisites: none.
This course covers the fundamental concepts of computer programming, using a high level scripted programming language. The course will emphasizes design and implementation standards. This course is designed to provide the skills necessary to become an effective cyber security practitioner. Prerequisite: None.
This course is a study of ethics and its application to problems in everyday life, society, and the broader world. The course examines the principal moral theories and ethical systems that have shaped our personal values and behavior, including consequentialist and non-consequentialist theories, virtue ethics, and feminist ethics. Students explore the connections between ethics and religion and examine the challenges to morals posed by relativism, subjectivism and emotivism, egoism. Students also evaluate positions, theories, and arguments as they apply them to concrete matters of personal, socio-political, and global concern.
This course provides students with the skills necessary to design, implement, manage and protect a Microsoft Windows Server Active Directory Domain. Students will apply the lessons learned in this course by implementing an Active Directory Domain in a virtual environment. Pre-requisites: none.
This course provides students with the necessary knowledge and skills to install, configure, upgrade and manage a Linux operating system in an enterprise network. Additionally, students will learn to perform normal business operations using the Linux Operating system. Pre-requisites: none.
This course covers the fundamental concepts of relational databases and the scripted Structure Query Language (SQL) language used to manage them. Students will learn how to design functional relational databases that conform to industry standards. Prerequisite: None
This course includes extensive discussion of the legal constraints, both civil and criminal, that underlie acceptable behavior using computers and networks today. Special emphasis is placed upon the legal issues that affect information security, private and public use of digital forensics, and how information operations are performed.
This course provides an overview of design considerations involved with the security of site design. The course will also provide an understanding of the Levels of Trust and system accreditation/certification processes. Life cycle management of software, hardware, and physical plant, from planning through destruction will be examined and reinforced using case studies. Additionally understanding of the variety of security systems involving computers and networks and an ability to evaluate vulnerabilities will be discussed.
This course focuses on management of the information assurance process. Topics include human factors in reducing security breaches, security incident detection and response, remediation, management’s role in information assurance, and other considerations in framing and implementing information assurance policies. The final section reviews current topics of particular interest and activity in the field of information assurance.
A study of the functions of modern management: planning, organization, staffing, leading, and controlling. This study is applicable to the management of military, government, educational and non-profit, as well as business organizations. The ethical and social responsibilities of management and contemporary challenges such as the internationalization of organizations are integrated in all aspects of this course.
The Computer Forensics and Vulnerability Management concentration allows you to develop a comprehensive understanding of forensic processes and cybersecurity protocols. Coursework will help strengthen your investigatory prowess through hands-on exercises in cyber investigation and vulnerability testing.
This course provides the student with an ability to perform basic forensic techniques and use appropriate media analysis software. Knowledge of the security, structure and protocols of network operating systems and devices will be covered as students learn to gather evidence in a networked environment and to image and restore evidence properly without destroying its value. The student will learn and practice gaining evidence from a computer system while maintaining its integrity and a solid chain of custody. Within the laboratory, the student will gain hands-on experience in the use of current investigative tools.
This course is an introduction to network forensics. In this course the student will be introduced to digital forensic concepts and practices on local area networks, wide area networks and large scale networks such as the Internet. Use of tools such as packet monitors, security information and event managers (SIEMs), network forensic tools, tracing tools and other tools useful for analyzing events on a network will make up a large part of the course. Material will be covered through lecture, demonstration and student hands-on labs. Many of the labs will involve analysis of pcaps of both actual attacks and theoretical malfeasance by offenders. Some of the lecture will involve investigative techniques, how to conduct an investigation, manage evidence and follow a cyber-trail.
This predominantly laboratory-based course is an introduction to malware forensics including both static and dynamic analysis. Students will study profiling, malware behavior, behavior of malware on computer networks, anti-reversing and anti-debugging techniques, and packers.
This course is an introduction to cyber investigation. It includes elements of cyber crime, cyber warfare and cyber terrorism. The course will examine investigative techniques for cyber investigators, case studies of representative cyber crimes and cyber warfare incidents, some cyber investigation tools and expert witnessing. The course builds up to a mock trial where students act as a cyber investigation task force on an actual case of cyber crime. This is a course that incorporates extensive reading as well as hands-on lab exercises. No prerequisites.
This course presents the concepts, tools, and techniques used for penetration testing, vulnerability exploitation, assessment, reporting, and forensics; teaches multiple attack vectors as well as the defensive measures protecting against such attacks; focuses heavily on post- attack forensics allowing for a complete picture of the attack process. The seminar introduces several open- source tools such as the Metasploit framework. This seminar includes lab exercises using a virtual computer environment.
This course is the second of a two-part introduction to Penetration Testing and Vulnerability Assessment. This course presents the concepts, tools, and techniques used for penetration testing, vulnerability exploitation, assessment, reporting, and forensics; teaches multiple attack vectors as well as the defensive measures protecting against such attacks; focuses heavily on post-attack forensics allowing for a complete picture of the attack process. The course introduces several open- source tools such as the Metasploit framework, Nmap, Nessus, Wireshark, Vistumbler, BurpSuite, Nikto, Cain and Abel, Aircrack-ng Suite, John the Ripper, Social Engineer Toolkit and Kali Linux. This course includes lab exercises using a virtual computer environment. Pre-requisite: CYBR320
The Information Warfare and Security Management concentration introduces you to the international power dynamics of the Internet, and the ways in which professionals in cybersecurity analyze intelligence and assess threats in order to protect national sovereignty in cyberspace.
This course introduces students to the overall concept of Information Warfare (IW) and Information Operations (IO), particularly with regard to the US Federal government and the Department of Defense. Introduction to IW / IO surveys the development of Information Warfare (IW) and Information Operations (IO) as these elements of power have become more important for the United States Department of Defense (DoD) and Federal Government as a whole. The course assumes only a rudimentary familiarity with the basic concepts and terminology of modern Internet usage and computing and is not a technology-focused course.
This course introduces students to the overall concept of Defensive Information Operations (D-IO), which are conducted across the range of military operations at every level of war to achieve mission objectives. Combatant commanders and mission owners must carefully consider their defensive posture and strategy in order to deter and defeat adversary intrusion while providing mission assurance. Upon completion of this course, students will be able to develop a defensive strategy by analyzing risk, cyberspace terrain, mission priorities, and utilizing threat intelligence. Pre-requisite CYBR 370 or Permission of Instructor.
Students learn how Offensive Information Warfare is executed at the technical level and the defensive measures cybersecurity professionals use to prevent them. The following principles from the National Security Agency and Department of Homeland Security Information Assurance/Cyber Defense Knowledge Units are examined: Cyber, Defense, Cyber Threats, IA Fundamentals, Policy, Legal, Ethics, and Compliance, Network Defense and Networking Technology and Protocols. Prereqs: CYBR 370 or Program Manager permission.
This course explores the interrelations of modern computing and communications technology with politics, power, news, privacy, crime, and creativity. The course assumes only a rudimentary familiarity with the basic concepts and terminology of modern Internet usage and computing and is not a technology-focused course.
This course introduces the issues and institutions of national security policy. Students gain an appreciation of strategic thought and strategy formulation, the ability to assess national security issues and threats, and an understanding of the political and military institutions involved in the making and execution of national security policy.
This course focuses on the design considerations involved with the security of site design. The course will also provide and understanding of the Levels of Trust and system accreditation/certificate processes. Life cycle management of software, hardware, and physical plant, from planning through destruction will be examined and reinforced using case studies. Additionally, understanding of the variety of security systems involving computers and networks and an ability to evaluate vulnerabilities will be discussed.
Students analyze and synthesize program learning by examining a chosen organization's network infrastructure and security posture. Students will present and in-depth analysis paper as their final deliverable. Pre-requisites: completion of all BSCS courses or permission of the Program Manager.
The global pivot to a more digital society has created an unprecedented demand in the workforce for skilled cyber security professionals. According to a report from CyberSeek, over 15,000 jobs in cyber security go unfilled each year, and with the majority of U.S. government specialists in network security preparing for retirement with the next decade, Norwich University has built a program to address this considerable talent gap. Whether you’re looking to further your career or embark on a new professional path entirely, Norwich’s Bachelor of Science in Cybersecurity online program can help you make the most of your opportunity through emphasis on education in computer forensics, compliance, and knowledge and vulnerability management.
Norwich’s online cybersecurity degree program speaks to the critical needs of employers in government, the military, and the private sector. Our graduates have a competitive edge when applying for positions or promotions, and have proven their skills in high-level information security positions with a number of organizations.
The cybersecurity bachelor's program can also serve as a steppingstone to earning a graduate degree, such as a master's degree in information security and assurance from Norwich.
Examples of Career Paths
Types of Employers
Dr. Henry Collier is the Director of Technology Programs for Norwich University's College of Graduate and Continuing Studies. Dr. Collier manages the online programs at CGCS which include the Master of Science in Cybersecurity program, the Master of Science in Information Systems, the Bachelor of Science in Cybersecurity and Bachelor of Science in Computer Science & Information Systems programs. His areas of research include networking and the human firewall. Dr. Collier is an internationally recognized expert in the human firewall and has published several peer reviewed articles through international venues. Currently he is leading a team of international researchers in researching how culture plays a role in susceptibility to cybercrime. Prior to coming to Norwich, he was the Program Director for Computer Technology and Cybersecurity & Healthcare IT at River Valley Community College where he rejuvenated the Cisco Networking Academy and managed a National Science Foundation Advanced Technological Education grant to develop the Cybersecurity & Healthcare IT program. Before entering the academic arena, he worked for several years in the private industry as a telecommunications/information technology specialist. Dr. Collier served six years on active duty in the Army, stationed in Korea and Kentucky, and he currently has 25 years in the Army Reserves, where he has risen to the rank of Chief Warrant Officer 3. He has a Ph.D. in Engineering with a concentration in Security from the University of Colorado Colorado Springs, a master’s degree in Managing Innovations and Information Technology from Champlain College, a bachelor's degree in Information Technology with a concentration in systems analysis and design from Granite State College and an Associates Degree in Computer Technology from River Valley Community College. In his free time, he enjoys writing short stories, riding his bike, playing the guitar, cooking, gardening, painting, and woodworking.
Our first graduates of the Cybersecurity program graduated in 2017. Below are graduates from our bachelor's programs.
My motivation was to be competitive in the workforce following my active duty retirement and to leverage Air Force tuition assistance to help pay for my Norwich degree.
I have always dreamed about graduating from Norwich University. Going to college was always on my bucket list and this was my motivation.
One of the key things to me for having a Norwich education is the name that comes with it; there’s pride and tradition that comes with having a Norwich University diploma. It’s finishing what I started here many years ago and I wanted something I can be proud to hang in my office.