Addressing the cybersecurity skills shortage

Bachelor of Science in Cybersecurity

Started in the fall of 2015, the Bachelor of Science in Cybersecurity degree program promotes the study and advancement of Cybersecurity, with focus areas (described below) in Cyber Forensics, Information Assurance, and Network Security. Topics of study include threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure.


 

National Centers of Academic Excellence (CAE) Desgination

The National Security Agency (NSA) and the Department of Homeland Security (DHS) jointly sponsor the National Centers of Academic Excellence Program. The goal of Cyber Defense Education (CAE-CDE) is to reduce vulnerability in our national information infrastructure by promoting higher education and research in cyber defense and producing professionals with cyber defense expertise. This program contributes significantly to the advancement of state-of-the-art cyber defense knowledge and practice.

In April 2019, the University of Maine at Augusta Bachelor of Science in Cybersecurity program was redesignated as a National Center of Academic Excellence in Cyber Defense Education for academic years 2019-2024. This designation is awarded because our curriculum has been designed to meet the stringent academic standards of the CAE-CD program. This NSA/DHS recognition program serves as the de facto accreditation standard for Cybersecurity.

An official certificate that reads "University of Maine at Augusta is hereby designated as a National Center of Academic Excellence in Cyber Defense Education"

B.S. in Cybersecurity Focus Areas

Cyber Analyst

The focus is learning the techniques, processes, and tools to design secure information systems and networks. It is learning how to identify malicious attacks through monitoring and log analysis, and the application of security mitigations. Courses include:

  • Cyber Operations
  • Security Monitoring
  • Incident Response
  • Cyberwarfare & Cyberterrorism
  • Malware Analysis
  • Cybersecurity II
  • Cyber Investigations

Cyber Forensics

The focus is learning the techniques, processes, and tools for gathering digital evidence in cyber investigations. It is learning how to derive useful information to support the environment’s security policies in computing. Courses include:

  • System Forensics I
  • Cyber Law
  • Incident Response
  • System Forensics II
  • Mobile Forensics
  • Digital Evidence Analysis
  • Cyber Investigations

Information Assurance

The focus is learning the practices of assuring information through the application of security compliance, policies, and its governance. It is learning about managing the risks of the information and the environment the information resides in. Courses include:

  • System Analysis
  • Security Risk Management
  • Auditing IT Infrastructures
  • Identity Security & Management
  • Information Security Architecture
  • Security Monitoring
  • Incident Response

General Focus

The focus is an overview of the different areas of cybersecurity for the management of security risks. It is learning the identification and investigation of malicious attacks, and the application of mitigations. Courses include:

  • Wireless & Mobile Security
  • Cloud Security
  • Security Monitoring
  • System Forensics I
  • Incident Response
  • Any two (300 level or higher) ISS electives

B.S. in Cybersecurity Student Learning Outcomes

Bachelor of Science in Cybersecurity program graduates will be able to:

  1. Apply knowledge of computing and information technologies and use software development and security analysis tools to produce effective designs and solutions for specific cybersecurity problems within a variety of computing platforms and employing an approved secure systems development process model;
  2. Identify, analyze, and synthesize scholarly and professional literature relating to the fields of cybersecurity, information security, or information assurance, to help solve specific problems and to stay abreast of the rapidly changing security context;
  3. Participate as an active and effective member of a project team engaged in achieving specific computer-based results or solutions;
  4. Communicate, both orally and in writing, and negotiate with colleagues and other stakeholders including employees, managers, and executives. Negotiation and communication skills should also extend to all relevant external persons and organizations;
  5. Demonstrate sensitivity to and sound judgment on ethical issues as they arise in information security and cyber defense and will adhere to accepted norms of professional responsibility;
  6. Integrate knowledge from other disciplines, such as economics, management science, psychology and human factors, with their technical expertise to arrive at practical solutions that work successfully in real organizations;
  7. Use appropriate tools to detect an attack and determine appropriate remedial action based on its progress.

B.S. in Cybersecurity Internship Requirement

The program recognizes the value of relevant work experience and partners with technology-based organizations to provide students with an opportunity to broaden their skills base in information technology, cultivate mature life and workplace skills that prepare the student for personal and professional challenges, and establish a network of professional contacts in the information technology field.

Required at the Bachelor level, an Internship provides the student with an opportunity to build a professional portfolio of relevant work experience. With guidance from a Faculty Coordinator, students are required to locate and arrange an internship within the field of cybersecurity. To help prepare for an internship, students are encouraged to do a little research about a company, just as you would prepare for a job interview or job fair. This can help them stand out from the crowd of other applicants, and give insight into the organizational culture and industry operating conditions.

The work completed by the student intern is expected to parallel or exceed job performance expectations. These expectations include responsibility, productivity, professionalism, and well-defined IT skill sets.

Credit for Prior Learning (CPL) may also be an option to receive credit for the Cybersecurity Internship. If you think you might qualify, request a CPL Review.