Live Chat Now
Available
Give us a call

Send us a text

855.890.3001

855.890.3001

Computer Information Systems

Bachelor's Degree Specialization in Cyber Security Programming

Develop Your Skills with Our Cyber Security Programming Specialization

Are you interested in keeping businesses secure from cybercrimes and cyberattacks? Get started with a Bachelor’s Degree Program Specialization in Cyber Security Programming. This program specialization will help you develop an understanding of coding and learn industry-relevant languages like Python, C# and Java. You’ll participate in hands-on learning instruction that will teach you important concepts which you can apply in both physical and virtual environments. As you engage in these real-world exercises and projects, you’ll develop the skills needed to plan, implement and monitor security solutions to protect data and networks and prevent future attacks. 

Get To Know Our Cyber Security Programming Specialization

Our Bachelor’s Degree Program in Computer Information Systems with a Cyber Security Programming Specialization prepares students to pursue a career in computer information systems, placing them at the forefront of technology innovation and business problem solving, especially in the areas of cyber security programming, code security, and secure applications.

Classes Start Every 8 Weeks
Accreditation and Recognition Matter

Being accredited means we’ve met rigorous quality standards and are committed to giving you the education you deserve. We're proud that DeVry University is accredited by The Higher Learning Commission (HLC), www.hlcommission.org
 

DeVry University has been designated as a National Center of Academic Excellence in Cyber Defense (CAE-CD) for the Bachelor of Science in Computer Information Systems with a specialization in Cyber Security Programming.

National Center of Academic Excellence in Cyber Defense logo
National Center of Academic Excellence in Cyber Defense logo

In addition, DeVry University’s Cyber Security curriculum is acknowledged and verified as an approved provider by National Initiative for Cybersecurity Careers and Studies (NICCS.)

#image
#image

DeVry University is accredited by The Higher Learning Commission (HLC), www.hlcommission.org. The University’s Keller Graduate School of Management is included in this accreditation.

Why DeVry?

Why Choose Cyber Security Programming at DeVry?

Work With IoT Technologies & Systems

Immerse yourself in the Internet of Things (IoT) world and obtain hands-on experience with IoT, cloud, software and security technologies and systems.

Certification Exam Reimbursement

Elements of this curriculum help you prepare to pursue industry certification opportunities that can validate your knowledge and skills to employers. Once you meet the program requirements, we’ll reimburse you for up to $300 toward the cost of one industry certification exam attempt. Certifications may include:   

 

CompTIA Linux+
CompTIA Network+
CompTIA Security+
CompTIA Project+
PCEP - Certified Entry-Level Python Programmer

Other certifications may also be eligible for reimbursement. Speak to your Student Support Advisor for additional information.

Complimentary Laptop

You’ll get a complimentary laptop as part of your technology program.1 It’s our way of investing in your education—and you.

Questions for our admissions team?

Request info about Cyber Security Programming Specialization now.

Scholars Program

Future Cyber Defenders Scholars Program

Take your ambition to the next level with a cybersecurity scholars program that helps you build your network, boost your skills and pursue the career you want.
Minimum Completion Time*
2 years
8 months
OR
Normal Completion Time
4 years

ACCELERATE ON YOUR SCHEDULE

Choose the schedule that best fits your goals and commitments. You can earn your Bachelor's Degree in as little as 2 years and 8 months.*

Or, follow a normal schedule and complete your program in 4 years.**
 

*Minimum completion time does not include breaks and assumes 3 semesters of year-round, full-time enrollment in 13-19 credit hours a semester per 12-month period.
**Normal completion time includes breaks and assumes 2 semesters of enrollment in 13-19 credit hours per semester per 12-month period.

Knowledge & Skills

What You'll Learn

When you pursue a Cyber Security Programming Specialization here at DeVry, you’ll learn the following:  

  • Information Security and Mobile Devices
    Focus on protecting information on mobile devices, types of mobile devices, risks, encryption, information at rest and in motion, attack scenarios and defense-in-depth controls.
  • Data Privacy and Security
    Understand the principles of information security and data privacy and develop and deploy information security policies and procedures.
  • Information Systems Security Planning and Audit
    Understand the risk factor analysis that must be performed in order to design a flexible and comprehensive security plan.
  • Logic and Design
    Study basic programming logic and algorithm design, including control structures for sequential, iterative and decision-based processing. Learn how computers think in order to set up complex patterns and controls.
Embedded Programs

Embedded Programs - Demonstrate Skills at Every Step

You can earn two additional credentials while earning your Computer Information Systems degree with a specialization in Cyber Security Programming. Courses in our Programming Essentials Certificate Program and Information Technology and Networking Associate Degree are embedded in this program, allowing you the opportunity to earn a certificate and an associate degree on the road to your Computer Information Systems - Cyber Security Programming Bachelor’s degree.2

Bachelor's*
124
Credit Hours*
Associate
60
Credit Hours*
Certificate
22
Credit Hours*

*The figures displayed represent the minimum credit hours required for graduation. Additional coursework may be necessary to complete program requirements.

Career

Career Opportunities in Cyber Security Programming

Graduates with our Cyber Security Programming Degree Specialization may consider the following careers:
  • Software Developer

    Research, design and develop computer and network software or specialized utility programs.

  • Computer and Information Systems Manager

    Plan, direct or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming.

  • Information Security Analyst​

    Information security analysts protect computer systems and networks from cyber threats by monitoring, analyzing and responding to security incidents, as well as implementing security measures and protocols to safeguard sensitive information. 

  • Cybersecurity Specialist​

    Lead security-related technical projects, such as needs assessment, business risk/benefit analysis, technology vendor selection and related topics. Monitor, analyze and report key security performance metrics and aid in incident response procedures, which includes providing input into incident response policy. Manage and maintain security infrastructure and applications.

  • Cybersecurity Analyst​

    Analyze security logs from firewalls, SIEMs, web filtering, security profiles and security software to detect and remediate potential security threats. Lead security-related technical projects, such as needs assessment, business risk/benefit analysis, technology vendor selection and more. Monitor, analyze and report key security performance metrics.

Learn more about
Cyber Security Programming
Program Courses

Cyber Security Programming Specialization

General Education Courses
Communication Skills
ENGL112*
Composition
ENGL135
Advanced Composition
ENGL216
Technical Writing


+ Choose one below:

SPCH275
Public Speaking
SPCH276
Intercultural Communication
Humanities
LAS432
Technology, Society and Culture


+ Choose one below:

ETHC232
Ethical and Legal Issues in the Professions
ETHC334
Diversity, Equity and Inclusion in the Workplace
Social Sciences
ECON312
Principles of Economics
SOCS185
Culture and Society


+ Choose one below:

SOCS325^
Environmental Sociology
SOCS350
Cultural Diversity in the Professions
Mathematics and Natural Sciences
MATH114
Algebra for College Students
TECH204
Everyday Physics
TECH221
Data-Driven Decision-Making
Personal and Professional Development
CARD405
Career Development
COLL148
Critical Thinking and Problem-Solving
Tech Core Courses
Tech Core
CEIS101
Introduction to Technology and Information Systems
CEIS106
Introduction to Operating Systems
CEIS110
Introduction to Programming
CEIS114
Introduction to Digital Devices
NETW191
Fundamentals of Information Technology and Networking
NETW212
Introduction to Cloud Computing
SEC285
Fundamentals of Information Systems Security
Program Courses
Information Systems and Programming
CEIS150
Programming with Objects
CEIS209
Intermediate Programming
CEIS236
Database Systems and Programming Fundamentals
CIS313
AI-Driven Business Application Coding
CIS355A
Business Application Programming with Lab
Information Technology and Networking
SEC290
Fundamentals of Infrastructure Security
SEC305
Cybersecurity and Data Privacy
SEC311
Ethical Hacking
SEC322
Penetration Testing
Career Preparation
CEIS298
Introduction to Technical Project Management
CEIS499
Preparation for the Profession
MGMT404
Project Management
TECH460
Senior Project
Specialized Courses
Cyber Security Programming
NETW411
Information Security and Mobile Devices
SEC380
Cloud Computing Security
SEC440
Information Systems Security Planning and Audit
SEC395
Cybersecurity Architecture and Engineering

3 Students enrolled at a New Jersey location take ENGL108 in lieu of this course.
4 Students enrolled at a Nevada location must take POLI332 in lieu of this requirement.

 

FAQs: Cyber Security Programming Specialization

What programming languages does Cyber Security use?

Some of the cyber security programming languages used by cyber security professionals include Python, Java, JavaScript, PHP, Ruby, Shell Scripting, SQL, Golang and C. These languages enable cyber security programmers to bolster the defenses of their organizations, and in some cases make it possible for them to use hacking capabilities to test their own defense measures.

Is Cyber Security Programming hard to learn?

As with any discipline, how challenging a subject is depends on the individual, and cyber security programming is no different. In many ways, learning cyber security programming is like learning other types of programming. A good way of thinking about learning cyber security programming is to compare it to learning a foreign language; you have to learn the rules and logic of a programming language much like you would have to learn the grammatical rules of a different spoken language. 

Is Cyber Security Programming a good career?

According to the U.S. Bureau of Labor Statistics employment for Information Security Analysts is expected to grow 32% between 2022 and 2032, which is much faster than the national average for all occupations. This growth is projected on a national level and local growth will vary by location. This projection is not specific to DeVry University graduates and may include earners at all stages of their career and not just entry level.

Academic Catalog
2023 - 2024 Academic Catalog
Program Guides
Program Overview

1As part of this program, one complimentary laptop is provided to students enrolled in the Associate in Cybersecurity and Networking, Associate in Information Technology and Networking, Associate in Engineering Technology, Bachelor’s in Information Technology and Networking, Bachelor’s in Software Development, Bachelor’s in Engineering Technology, Bachelor’s in Cybersecurity and Networking and Bachelor’s in Computer Information Systems. The laptop is issued during the student’s second session. Certain restrictions apply.
2Future programmatic changes could impact the ability to earn additional credentials en route to an eligible degree program. Refer to the academic catalog for details.
Students enrolled at a New Jersey location take ENGL108 in lieu of this course.
Students enrolled at a Nevada location must take POLI332 in lieu of this requirement.