If protecting the security of computer database systems sounds interesting, then you might benefit from California Baptist University's online Bachelor of Science in Cybersecurity. Keep reading for more information.

    <h2 id="section---FrequentlyAskedQuestions">Frequently Asked Questions</h2> <h3 id="section---WhatKindOfProgramIsIt">What Kind of Program Is It?</h3> <p>The Bachelor of Science in Cybersecurity program at California Baptist University is designed to teach students the skills necessary to protect the database and network systems for organizations. You'll have the opportunity to learn about the most up-to-date technology and best practices in the field, including critical thinking and leadership skills. The curriculum includes topics such as security design, database security, computer forensics, cybersecurity management, and computer and operating system architecture, among others. You'll also have the chance to work on a cybersecurity capstone project to show the knowledge and skills gained. </p> <h3 id="section---WhatAreThePrerequisites">What Are the Prerequisites?</h3> <p>If you're interested in applying to the Bachelor of Science in Cybersecurity program at California Baptist University, you'll need to have a background in computer technology. All applicants to California Baptist University must have a high school diploma or equivalent, and a minimum 2.0 GPA. </p> <h3 id="section---WhatAreTheCourseRequirements">What Are the Course Requirements?</h3> <p>There are a couple of prerequisite courses students must take before officially entering the cybersecurity program. Once in the program, you'll have 48 credits worth of courses related to your major in addition to 40-43 credits of general education. Some prerequisite courses can also count as general education. </p> <p><u>Prerequisite Courses</u> </p> <p /> <table border="1"><tr><th>Course Code</th><th>Course Title</th></tr> <tr><td>CIS 265 <br /> <br /> CIS 270</td><td>Information Systems Essentials <br /><b>OR</b><br /> Business IT Application</td></tr> <tr><td>ENG 113</td><td>Composition</td></tr> <tr><td>ENG 123</td><td>Intermediate Composition</td></tr> <tr><td>MAT 115</td><td>Intermediate Algebra</td></tr> <tr><td>STA 144</td><td>Introduction to Statistics</td></tr> </table><p><u>Lower Division Courses (6 Credits)</u> </p> <p /> <table border="1"><tr><th>Course Code</th><th>Course Title</th></tr> <tr><td>CYB 220</td><td>Security by Design</td></tr> <tr><td>EGR 121</td><td>Introduction to Computer Programming in C++</td></tr> </table><p><u>Upper Division Courses (33 Credits)</u> </p> <p /> <table border="1"><tr><th>Course Code</th><th>Course Title</th></tr> <tr><td>CIT 360</td><td>Ethics and Legal Issues in Information Technology</td></tr> <tr><td>CIT 380</td><td>Computer and Network Security</td></tr> <tr><td>CIT 460</td><td>Business Networking</td></tr> <tr><td>CYB 390</td><td>Database Security</td></tr> <tr><td>CYB 410</td><td>Defensive Security</td></tr> <tr><td>CYB 420</td><td>Offensive Security</td></tr> <tr><td>CYB 430</td><td>Computer Forensics</td></tr> <tr><td>CYB 440</td><td>Cybersecurity Management</td></tr> <tr><td>CYB 470</td><td>Network Defense</td></tr> <tr><td>CYB 480</td><td>Essential Tenets of Cybersecurity</td></tr> <tr><td>CYB 495</td><td>Cybersecurity Capstone</td></tr> <tr><td>NAM 320</td><td>Computer and Operating System Architecture</td></tr> </table><p><u>Additional Required Courses (6 Credits)</u> </p> <p /> <table border="1"><tr><th>Course Code</th><th>Course Title</th></tr> <tr><td>CST 100</td><td>Overview of the Bible</td></tr> <tr><td>CST 3xx</td><td>Upper-Division Christian Studies</td></tr> </table><h3 id="section---WhatCouldIDoAfterIGraduate">What Could I Do After I Graduate?</h3> <h4 id="section---CareerOpportunities">Career Opportunities</h4> <p>Upon graduation, students could pursue a number of jobs in the IT field, particularly in areas of cybersecurity and computer systems. This could include leading a team of analysts, designing or maintaining networks, or ensuring computer networks are secure and running smoothly, among other things. The program's capstone project requirement could be a useful tool for demonstrating to employers any skills you've gained hands-on. </p> <ul><li>Computer support specialist </li><li>Computer systems analyst </li><li>Information security analyst </li><li>Computer and information research scientist </li></ul><h4 id="section---AdvancedDegrees">Advanced Degrees</h4> <p>You could additionally seek a master's degree after graduation in cybersecurity or a similar field. A master's degree can be useful for keeping up-to-date on new technologies and best practices in the field and may lead to higher job positions or more advanced duties, such as managing a team or department. Additionally, if you want to take your career in a specific direction, such as cyber forensics or web development, a master's degree could give you a more targeted curriculum. </p> <ul><li>Master of Science in Information Technology Management </li><li>Master of Science in Information and Communications Technology </li><li>Master of Science in Web Development and Design </li><li>Master of Science in Cybersecurity </li><li>Master of Science in Digital Forensics</li></ul>