Photo of a blue-toned padlock superimposed over a microchip to promote a Cybersecurity WiFi hacking challenge at Assumption University in Worcester, Massachusetts
Undergraduate

Post- Bachelor’s Accelerated Cybersecurity Track

Pursue an accelerated cybersecurity degree and become a professional and leader who is armed with the necessary knowledge and technical ability to prevent, detect, respond, and recover from cybersecurity attacks.

The Post-Bachelor’s Accelerated Cybersecurity Track utilizes an innovative online delivery modality – allowing flexibility for adult learners who have already earned a bachelor’s degree from an accredited institution of higher education. All courses are delivered online with an appropriate balance of synchronous and asynchronous elements.

Assumption University is an ideal place to learn – offering small cohort sizes and competitive pricing. Graduates will be prepared for rewarding careers in as few as 14 months.

The mission of the Cybersecurity degree program is to educate the next generation of cybersecurity professionals and leaders who are armed with the necessary knowledge and technical ability to prevent, detect, respond, and recover from cybersecurity attacks. Graduates recognize their responsibility to perform their jobs ethically and with integrity, thereby helping to secure, develop, and sustain the cyberspace ecosystem.

The curriculum is recognized by the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) who sponsor the Centers of Academic Excellence in Cyber Defense (CAE-CD) program and is targeted at educating the next generation of leaders and architects in cybersecurity, who possess technological expertise and practical training to help secure, develop, and sustain the cyberspace ecosystem.

Assumption University has been designated as a National Center of Academic Excellence in Cyber Defense. Read about it here.

Program Contact

Susan M. Cahill

Sr. Associate Director of Post-Bachelor and Graduate Admissions
508-767-7365 Admissions House - Room 205

Raymond T. Albert, Ph.D.

Professor of Practice, Mathematics and Computer Science, Director of Cybersecurity
508-767-7594 Founders Hall - Room 107

Learn more about the Post-Bachelor's Accelerated Cybersecurity Track

  • The Post-Bachelor’s Accelerated Cybersecurity Track is for those individuals who already have a bachelor’s degree from an accredited institute of higher education. The program admits students at the start of the Spring, Summer, and Fall semesters.  Applicants to the program should have a good understanding of technology and how it works and must meet or exceed the following minimum criteria:

    1. An earned bachelor’s degree from an accredited institute of higher education with a cumulative GPA of 3.0;
    2. Completion of the following prerequisite course(s):

    Statistics (minimum final grade of C+ and taken within the last ten years)

     

    This program is only available to domestic students

     

  • The Post-Bachelor’s Accelerated Cybersecurity Track utilizes an innovative online delivery modality – allowing flexibility for adult learners who have already earned a bachelor’s degree from an accredited institution of higher education. All courses are delivered online with an appropriate balance of synchronous and asynchronous elements.

  • CSC 117A INTRODUCTION TO PROGRAMMING
    This course is an introduction to the field of computer science and structured programming in C++. Topics include basic computer architecture, the algorithmic approach to problem solving, various number systems, and logic. The programming language constructs introduced include types of variables, arithmetic operations, input/output, decision statements, loops, and functions.

    CSC 303A OPERATING SYSTEMS
    This course introduces operating system design emphasizing process management for multiuser and networked systems. Topics covered include: process scheduling, interprocess communication, race conditions and solutions, memory, device and file management.

    CSC 321A DATABASE MANAGEMENT SYSTEMS
    This course deals with both the operational and decision support environment of database systems. Topics include indexing, randomization, physical blocking, and relational and hierarchical structures. Previous experience at the level of CSC 175 or equivalent is recommended.

    CYB 115A CYBERSECURITY FUNDAMENTALS
    This course provides a bird’s eye view of the evolving cyberspace ecosystem, the interoperability of physical and social networks, and methods and techniques in securing that ecosystem. Students will explore the ethical, legal, and technical aspects of cybercrime and methods of prevention, detection, response and recovery. The value of strong moral character, integrity, and trust as prized attributes of cybersecurity practitioners will be highlighted. Students will be introduced to essential cybersecurity topics including operating system models and mechanisms for mandatory and discretionary controls, data models, basic cryptography and its applications, security in computer networks and distributed systems, inspection and protection of information assets, detection of and reaction to threats to information assets, and examination of pre- and post-incident procedures, technical and managerial responses, an overview of the information security planning and staffing functions, data mining and data science, and policy and assurance issues. The advantages and inherent value of being prepared as a life-long learner with a
    strong liberal-arts background will be emphasized with the opportunity for students to complete a service-learning project tailored to their academic/career goals. No prior computer programming experience is required. Basic competency in computer operation is required.

    CSC/CYB 230A NETWORKING AND DATA COMMUNICATIONS
    This course expands upon the principles and current trends in computer networks as identified in Cybersecurity Fundamentals. Students will deepen their understanding of wide area networks (WANs), local area networks (LANs) and their architectures across which data travels and communicates. Subjects will include the open systems interconnection (OSI) model, transmissions control protocol / internet protocol (TCP/IP), open systems, topologies and internet connected devices. Through in-class projects, theoretical and practical approaches toward building and maintaining local area networks will be covered.

    CSC/CYB 235A SECURING WIRED AND WIRELESS NETWORKS
    This course provides students who have a basic understanding of computer networking and data communications with the methods and techniques used to secure networks. Students will be required to design and build a secure local area network, incorporating all elements of the seven layers of the OSI Model. Students will learn the capabilities, limitations and vulnerabilities of a cyber network that can be dynamic yet strong against aggressive hackers and virus outbreaks. Also, the goal of this course is to provide students with both technical and theoretical approaches to the deployment, securing and defending of wireless networks. Topics will address network attacks, intrusion detection, malware, rogue wireless networks and wireless networking through the cloud. Students must already possess a basic knowledge of information security and networks. Team projects and presentations are required for completion.

    CYB 265A OPERATING SYSTEMS ADMINISTRATION
    Learn how best to protect computers, the data they store, process, and transmit, and the users who use them, from a wide array of cybersecurity threats. This course will introduce students to operating systems administration within the context of cybersecurity. Students will learn how best to perform basic system administration operations with an emphasis on methods (e.g., managing applications, services, and network ports) to fortify the security of the computer’s operating system. The class will provide coverage of methods used in the Microsoft Windows® and Linux® operating systems.

    CYB 304A CRYPTOGRAPHY
    Cryptography is a key component in securing data while it is stored, processed, and transmitted. Cryptography components are found in computer applications and also utilized to secure network communications. This course will introduce students to the principles of cryptography, cryptographic number theory, including hash functions, symmetric and asymmetric cryptography, and their common applications in network security and corresponding susceptibility to attacks/failures. Students will learn how best to compare, select, and apply cryptographic approaches to fortify cybersecurity. Other topics include cryptographic algorithms and programming.

    CYB 318A SOFTWARE AND APPLICATION SECURITY
    Software security represents a key aspect in the field of cybersecurity. This course will ground students in the concepts of malware, malware analysis and preventive measures during software development that can mitigate malicious activity. Theoretical approaches to software security will be complemented by practical scenarios from which students can conduct future software design and investigations.

    CYB 328A COMPUTER NETWORK FORENSICS AND DIGITAL INVESTIGATIONS
    This course studies the technology and practice of investigating the abuse of computing systems and digital devices. As criminal and adversarial activity becomes faster and less visible over networks, students must understand how to search for, and extract information from, cyberspace. This course will provide unparalleled insight into digital forensics methods and laws, complemented with practical lab work. This course also introduces students to the theory and practice of network traffic analysis and intrusion detection. Students will learn “traceback” techniques and information retrieval methods to identify different attacks. Topics covered will include network forensics, intrusion detection and response, case studies, and issues of cyber law and ethics. Students must have basic knowledge of networking, and operating systems. Team projects and presentations are required for completion.

    CYB 338A ETHICAL HACKING
    This course will introduce students to ethical hacking and penetration testing methods, learning to think like a cyber-criminal and develop secure countermeasures. Students will learn the systematic approaches to planning, reconnaissance, vulnerability identification and exploitation methods used by hackers around the world to compromise the security of existing networks, systems, and applications. A variety of penetration-testing tools and techniques will be explored through hands-on activities. Identification of corresponding cybersecurity control recommendations will be highlighted.

    CYB 401A PREPARING FOR CYBER DISASTERS
    This course will provide students a full picture of securing a firm from a cyberattack. Topics will include preparatory measures that continuously investigate network integrity, data security, and backup archives. Students will also develop Cyber Disaster Response Plans that consider the legal, economic, and physical requirements needed to recover from a cyberattack.

    CYB 438A INDEPENDENT CYBERSECURITY PROJECT OR INTERNSHIP
    Students in the Cybersecurity program will have the option during one semester to conduct and present an independent cybersecurity project or intern part time with a cybersecurity employer in the business, government or nonprofit sectors. This course is designed to provide a culminating experience that avails students the opportunity to apply what they have learned to a contemporary cybersecurity project or internship experience that is framed by current cybersecurity industry trends and concerns. The course also helps students continue to improve skills critical to success in pursuit of their future academic and career aspirations.

  • For the 2024- 2025 academic year, tuition is $850 per credit. There are no fees associated with this program.

  • Assumption University Cybersecurity program graduates will be able to: 

    • Apply knowledge of computing and information technologies and use software development and security analysis tools to produce effective designs and solutions for specific cybersecurity problems within a variety of computing platforms and employing an approved secure systems development process model; 
    • Identify, analyze, and synthesize scholarly and professional literature relating to the fields of cybersecurity, information security, or information assurance, to help solve specific problems and to stay abreast of the rapidly changing security context; 
    • Participate as an active and effective member of a project team engaged in achieving specific computer-based cybersecurity results or solutions; 
    • Communicate, both orally and in writing, and negotiate with colleagues and other stakeholders including employees, managers, and executives within and between organizations; 
    • Demonstrate sensitivity to and sound judgment on ethical issues as they arise in cybersecurity and will adhere to accepted norms of professional responsibility; 
    • Integrate their technical expertise with knowledge from other disciplines, such as computer science, data analytics, economics, management science, psychology and human factors, to arrive at practical cybersecurity solutions that are effective in real organizations; and 
    • Use appropriate tools to prevent, detect, respond, and recover from cyber-attacks.
  • NSA LogoNCAE Logo

    Assumption University’s cybersecurity program has achieved “Program of Study” validation. This validation is awarded by the National Academic Excellence in Cybersecurity (NCAE-C) program – which is managed by the NSA – and it means the University’s cybersecurity curricula and its B.S. in Cybersecurity degree meets or exceeds NSA standards in articulating cybersecurity education. In addition, the liberal arts foundation of the program directly aligns with and supports the following NCAE-C program core values and guiding principles:

    • The Ethical Behavior Core Value: The academic institution must encourage and support ethical behavior by students, faculty, administrators, and professional staff.
    • The Share Core Value: The institution enables an environment in which students, faculty, administrators, professional staff, and practitioners can share, interact, and collaborate with others in the cybersecurity field.
    • The Lead by Example Core Value: The institution demonstrates a commitment to address, engage, and respond to current and emerging cybersecurity issues in the classroom, the institution itself, and outside the institution.
  • Head shot of Assumption College cybersecurity professor Ray Albert.Professor Raymond T. Albert is Director of Cybersecurity Program and Professor of Practice at Assumption University and has formerly served as Director of the Maine Cyber Security Cluster (MCSC) at the University of Southern Maine (USM). Ray previously served as Chair of the Division of Natural and Behavioral Sciences at the University of Maine at Fort Kent (UMFK) during which time he orchestrated the effort to achieve program accreditation under the auspices of the International Assembly for Collegiate Business Education (IACBE). While at UMFK, he also successfully orchestrated and led a multi-campus initiative to attain National Security Agency (NSA)/Department of Homeland Security (DHS) recognition of the distributed University of Maine System (UMS) Center of Academic Excellence in Information Assurance and Cyber Defense Education. He now serves as a program reviewer for other institutions seeking recognition. Ray has also served the New England Association of Schools and Colleges (NEASC) Commission on Institutions of Higher Education (CIHE) as an on-site evaluator for higher education institutions in New England. In 2007, both chambers of the Maine State Legislature passed a legislative sentiment recognizing his work in higher education in the St. John Valley. The proclamation was sponsored, and later presented to Albert, by Fort Kent area Representative Troy Jackson and Senator John Martin. Ray’s industry experience includes serving NASA – Johnson Space Center as a Software Quality Assurance Engineer on its Space Station Freedom Project, Macro Development Corporation as a software developer, and QualityQuest, LLC as a CEO.

  • I’ve never taken asynchronous online classes.  What can I expect? 
    Asynchronous online classes provide wonderful flexibility for students to access course materials on the days and times that fit their schedule.  Our faculty use a variety of teaching methods to help meet various learning needs of our students. You can expect to have reading assignments (textbooks, articles, or other materials), interactive materials (ATI modules, audio/visual case studies, or discussion board activities), recorded lectures, or projects you may complete with classmates. Some students may struggle in the transition from face-to-face learning in the traditional format to asynchronous online courses.  Here are some important study tips to help make you a successful hybrid student:

    • Embrace independent learning: hold responsibility for the learning process
    • Create goals that will help you organize your responsibilities and coursework
    • Focus on becoming a proficient reader & communicator
    • Set a schedule and stick to it!
    • Learn basic computer skills and develop a general comfort level in cyberspace
    • Prioritize deadlines
    • Adhere to “netiquette”

    If I’m learning online, how will I connect with my professors? 
    Faculty in the Post-Bachelor’s Accelerated Cybersecurity Track are passionate about maintaining a supportive, intellectual learning community through the virtual platform.  You may have the opportunity to meet face-to-face on days you visit campus, or virtually through Zoom at other times during the week.  We know that flexibility and accessibility are important factors when learning in a hybrid environment!

Faculty

Raymond T. Albert, Ph.D.
Program Director Professor of Practice, Mathematics and Computer Science Director of Cybersecurity

Assumption is dedicated to providing a clear understanding of what your education will cost

We’ll help cut through the complexity of financing your education, ensuring you understand what you need, how to apply for aid, and what’s expected of you. You will be assigned a personal financial aid advisor who will guide you through the process and answer all of your financial aid-related questions.


Center for Cybersecurity

The mission of the Assumption University Center for Cybersecurity (AUCC) is to promote, coordinate, and implement education, research and innovation in Cyber Defense Education (CDE)

Veterans at Assumption

Assumption University recognizes that servicemen and women have demonstrated great courage and made tremendous sacrifices in service to our nation and its people. The University has introduced a number of programs and services to assist veterans during the application process and while veterans are attending Assumption. We also have a lounge designated only for our veteran students. Assumption University is committed to maintaining recognition as a Military Friendly institution.  We strive to eliminate barriers to success for our Service Members, Veterans, and their qualified dependents.