Discover the Emerging Field of Cybersecurity

Undergraduate Cybersecurity Program

Started in the fall of 2015, the Bachelor of Science in Cybersecurity degree program promotes the study and advancement of Cybersecurity, with focus areas (described below) in Cyber Forensics, Information Assurance, and Network Security. Topics of study include threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure.

View the official UMA Catalog for required courses and course descriptions.

National Centers of Academic Excellence (CAE) Desgination

The National Security Agency (NSA) and the Department of Homeland Security (DHS) jointly sponsor the National Centers of Academic Excellence Program. The goal of Cyber Defense Education (CAE-CDE) is to reduce vulnerability in our national information infrastructure by promoting higher education and research in cyber defense and producing professionals with cyber defense expertise. This program contributes significantly to the advancement of state-of-the-art cyber defense knowledge and practice.

As of April 2019, the University of Maine at Augusta Bachelor of Science in Cybersecurity program was designated as a National Center of Academic Excellence in Cyber Defense Education for academic years 2019-2024. This designation was awarded because the curriculum has been designed to meet the stringent academic standards of the CAE-CD program. This NSA/DHS recognition program serves as the de facto accreditation standard for Cybersecurity. We are the only 4-year program in Maine to be recognized.

Below is a brief description of each Focus Area currently being offered at UMA.

General Focus

The focus is an overview of the different areas of cybersecurity for the management of security risks. It is learning the identification and investigation of malicious attacks, and the application of mitigations. Courses include:

  • Wireless & Mobile Security
  • Cloud Security
  • Security Monitoring
  • System Forensics I
  • Incident Response
  • Any two (300 level or higher) ISS electives

Information Assurance

The focus is learning the practices of assuring information through the application of security compliance, policies, and its governance. It is learning about managing the risks of the information and the environment the information resides in. Courses include:

  • System Analysis
  • Security Risk Management
  • Auditing IT Infrastructures
  • Identity Security & Management
  • Information Security Architecture
  • Security Monitoring
  • Incident Response

Cyber Analyst

The focus is learning the techniques, processes, and tools to design secure information systems and networks. It is learning how to identify malicious attacks through monitoring and log analysis, and the application of security mitigations. Courses include:

  • Cyber Operations
  • Security Monitoring
  • Incident Response
  • Cyberwarfare & Cyberterrorism
  • Malware Analysis
  • Cybersecurity II
  • Cyber Investigations

Cyber Forensics

The focus is learning the techniques, processes, and tools for gathering digital evidence in cyber investigations. It is learning how to derive useful information to support the environment’s security policies in computing. Courses include:

  • System Forensics I
  • Cyber Law
  • Incident Response
  • System Forensics II
  • Mobile Forensics
  • Digital Evidence Analysis
  • Cyber Investigations

B.S. Cybersecurity Student Learning Outcomes

Bachelor of Science in Cybersecurity program graduates will be able to:

  1. Apply knowledge of computing and information technologies and use software development and security analysis tools to produce effective designs and solutions for specific cybersecurity problems within a variety of computing platforms and employing an approved secure systems development process model;
  2. Identify, analyze, and synthesize scholarly and professional literature relating to the fields of cybersecurity, information security, or information assurance, to help solve specific problems and to stay abreast of the rapidly changing security context;
  3. Participate as an active and effective member of a project team engaged in achieving specific computer-based results or solutions;
  4. Communicate, both orally and in writing, and negotiate with colleagues and other stakeholders including employees, managers, and executives. Negotiation and communication skills should also extend to all relevant external persons and organizations;
  5. Demonstrate sensitivity to and sound judgment on ethical issues as they arise in information security and cyber defense and will adhere to accepted norms of professional responsibility;
  6. Integrate knowledge from other disciplines, such as economics, management science, psychology and human factors, with their technical expertise to arrive at practical solutions that work successfully in real organizations;
  7. Use appropriate tools to detect an attack and determine appropriate remedial action based on its progress.

Henry Felch

“The goal of the program is to provide a lot of hands-on experience so that when students graduate, they have skills that can be applied in the workplace on day one.”

— Henry Felch, DCS
Associate Professor of Computer Information Systems & Cybersecurity


  • CPU: Intel core i7 or higher
  • Memory (RAM): 16GB
  • Hard Drive: 500GB/1TB Solid state drive (SSD)
  • Operating System: Windows 10 Educational or Pro version, MAC
  • Internet Speed: 10 mb/s or higher
  • Internet Browser: Only two browsers are fully supported for access to our virtual lab systems-Google Chrome & Mozilla Firefox

Virtual Machine

Some classes may require virtualization software. Please ask you Instructor about the VMware Workstation education license/download. For MAC users, we recommend using Boot Camp (utility that comes with your MAC, and allows you to switch between MAC OS and Windows OS). An open source option is Oracle VM VirtualBox, but it is not widely used in the curriculum.

Online Storage

Students should backup homework and important documents. UMA provides you access to Google Drive and One Drive.