Get More Info

  • B.S. in Cybersecurity

    Because heroes can have desk jobs
    With the growing number of cyber attacks, there are numerous employment opportunities in government and corporate sectors,
    Degree:
    B.S.
    School:
    School of Liberal Arts
    Location:
    Dobbs Ferry, Bronx & Online
    Credits:
    120

Get More Info

Personal Information

Cybersecurity B.S. Curriculum

General Liberal Arts and Sciences
General Education Requirements 60 Credits
Cybersecurity Core 48 Credits
Open Electives 12 Credits
Total 120 Credits

Students who choose the major concentration in Cybersecurity must complete:

Foundation Courses

  • CISC 131 Foundations of Computing I*
  • CISC 231 Foundations of Computing II*
  • MATH 122 Statistics*
  • MATH 244 Discrete Structures
  • IASP 221 Linux Administration
  • IASP 230 Introduction to Cybersecurity**

Major Courses

  • IASP 330 Dster Recvry/Business Continut
  • CISC 335 Computer Network II
  • CISC 337 Database Mgmt Systems
  • IASP 355 Penetration Testing and Ethical Hacking
  • CISC 385 Cryptography/Computer Security
  • IASP 420 Network Security
  • IASP 430 Forensic/Electronic Discovery
  • IASP 455 Secure and Intelligent Programming
  • IASP 470 System Security

And five courses form the following:

  • CISC 311 Data Structures
  • CISC 339 Artificial Intelligence
  • IASP 340 Security Policy and Procedures
  • CISC 341 Computer Architecture
  • CISC 359 Web Site Administration
  • IASP 380 Workplace Experience in Cybersecurity Field I
  • IASP 381 Workplace Experience in Cybersecurity Field II
  • CISC 370 Systems Analysis & Design
  • CISC 395 Special Topics Comp Info Systm
  • CISC 411 Object/Structure/Algorithim II
  • CISC 421 Operating Systems
  • IASP 395 Special Topics in Cybersecurity
  • IASP 397 Independent Study in Cybersecurity

NOTE:
  • Mercy College's 15-credit residency requirement in the major concentrations of cybersecurity must be satisfied by courses numbered 200 or above.
  • Cybersecurity majors who have not had their mathematics core requirement waived should complete MATH 116 and MATH 201 (rather than MATH 115) as part of their General Education Requirement, hence can take MATH 244 in sequence. Students should contact their faculty advisors or department chair before taking MATH 115.
  • CISC 120 is a prerequisite for introductory courses, but may be waived if students pass the waive exam.
  • Some courses are offered once a year. Please check with the department for the current course offering schedule.
  • Undergraduate students may take a maximum of two graduate level courses (other than IASP 585) to fulfill the major elective requirement.
  • Students in B.S. program can apply for B.S. + M.S. dual degree during their junior or senior year. To get the benefit of dual degree, students should use their open electives to take as many graduates courses as possible. Students in the dual degree program may apply a maximum of twelve credits taken at the graduate level (other than IASP 585) to fulfill the requirements of their undergraduate degree.

* These courses fulfill part of the General Education requirements. The total of major concentration is 16 courses or 48 credits.

** This course can be transferred into if students have current security + certificate.

Students can choose to have a minor in cybersecurity (refer to the requirement in this catalog). We suggest students consider taking the following among the five necessary courses: IASP 230, IASP 330 and IASP 420.

Academic Program Sequence Map

Download a copy of the Cybersecurity BS Sequence Map.

What is the first step in the admissions process?
Click on "Apply Now" on the Mercy homepage or call 1.877.MERCY.GO to apply for admission to Mercy College and arrange for an appointment with an Admissions Counselor. Bring your completed application form and copies of your high school and/or college transcripts with you at the time of your appointment.
Are there English language requirements?
Yes. International Students who score 550 or better on the TOEFL within the last five years. Students will be eligible for admission and placement into ENGL111. They may be eligible for honors courses and/or to challenge some core requirements.
How long does earning a degree take?
Full-time students can complete the 120-credit degree program in four years.
Are department faculty available for academic advising?
Yes, faculty are always ready to help students with questions about what courses to take, the sequencing of courses, and career opportunities, including internships and cooperative education.
English isn’t my native language. Is there an English language requirement?
You must demonstrate proficiency in English. That means reading, writing, speaking and an understanding of the spoken language at a graduate level. Proficiency will be determined by a Test of English as a Foreign Language (TOEFL) or a test(s) approved by the Dean of Graduate Studies.
How many credits can be transferred from another institution?
Up to 75 credits from a two-year institution. Up to 90 from a four-year institution. Up to 90 credits combined however the credits may not exceed 75 credits from any combination of two-year institutions as they apply to your chosen degree. In addition you may only transfer in two courses of upper-level business credit (six credits) to apply to the major / specialization.
Is Mercy College a nonsectarian institution?
Yes. Qualified applicants are admitted without regard to race, religion, national or ethnic origin, gender, sexual orientation, marital status, age or physical disability.
Zhixiong Chen Professor, Cybersecurity
John Yoon Associate Professor, Cybersecurity
Christopher Frenz Adjunct Faculty

Cybersecurity Overview

We live in an information society. Nothing could be more important than protecting that information. Today, security software professionals are in high demand. Interested? Mercy College is the place for you.

With a Bachelor of Science in Cybersecurity, you can test, implement and configure any new security software and/or technologies, apply sound security policy to their daily jobs, and provide protection and disaster recovery to companies' business systems.

Our Dual Degree Program in Cybersecurity provides talented students the opportunity to complete both their bachelor's and master's degree in only five years. Graduates of this challenging but rewarding dual program go on to take leadership positions in business and in the government.

Cybersecurity FAQS

Are department faculty available for academic advising?
Yes, faculty are always ready to help students with questions about what courses to take, the sequencing of courses, and career opportunities, including internships and cooperative education.
English isn’t my native language. Is there an English language requirement?
You must demonstrate proficiency in English. That means reading, writing, speaking and an understanding of the spoken language at a graduate level. Proficiency will be determined by a Test of English as a Foreign Language (TOEFL) or a test(s) approved by the Dean of Graduate Studies.
Degree in Cybersecurity

Career Opportunities

Graduates are able to monitor security systems, including firewalls and intrusion detection systems; create, implement, and oversee security policies; plan disaster recovery; conduct regular compliance audits, and prepare to take the CISSP certification exam.

Cybersecurity Accolades

Designated as a National Center of Academic Excellence in Information Assurance Education by the National Security Agency and the Department of Homeland Security.

 

 

Program Outcomes

By the end of this program, students should be able to: 

  • Identify types of risks, cyber threats and vulnerabilities in IT infrastructures through wired and wireless networks
  • Design, develop, and implement to prove the concepts of cyber defense, cyber offense, cyber investigation and cyber management
  • Understand the privacy of information, information hiding, information assurance, information encryption/decryption
  • Function effectively in a team to complete prototyping of detection, prevention and protection for internal and external cyber attacks and cyber intrusions
  • Acquire evidence related to cyber crimes from personal computers, smartphones, infrastructure hosts, wired and wireless networks