Cybersecurity, Bachelor of Science

Bachelor of Science in Cybersecurity 

Cybersecurity (CYBR) is an emerging, rapidly expanding science that addresses problems in the fundamental understanding of the design, development, implementation and lifecycle support of secure information systems. The need for secure information systems has become a paramount concern as the computer-enabled, internet-connected, digital-based global society of the 21st century continues to emerge. The lack of adequately secure information systems has been cited as one of the likely impediments to the emergence of the digital society.

Student Groups

NULLify is UNO’s student-led computer security group.  Contact the group at unonullify@gmail.com.

Visit NULLify on Facebook at nullifyuno.

Fast Track

The School of Interdisciplinary Informatics (SI2) has developed a Fast Track program for highly qualified and motivated students providing the opportunity to complete a bachelor’s degree and a master’s degree in an accelerated time frame.  With Fast Track, students may count up to 9 graduate credit hours towards the completion of their undergraduate program as well as the graduate degree program. Students will work with both undergraduate and graduate advisors to ensure graduate classes selected will count toward both programs, should a student wish to earn a graduate degree in a separate College of Information Science & Technology (CIST) area than their undergraduate degree.

Program Specifics:

  • This program is available for undergraduate students pursuing any CIST undergraduate degree desiring to pursue an MS in either the same or a related CIST field. 
  • Students must have completed no less than 60 undergraduate hours.
  • Students must have a minimum undergraduate GPA of 3.0.
  • Students must complete the Fast Track Approval form and obtain all signatures and submit to the Office of Graduate Studies prior to first enrollment in a graduate course.
  • Students will work with their undergraduate advisor to register for the graduate courses.
  • A minimum cumulative GPA of 3.0 is required for graduate coursework to remain in good standing.
  • Students remain undergraduates until they meet all the requirements for the undergraduate degree and are eligible for all rights and privileges granted undergraduate status including financial aid.
  • Near the end of the undergraduate program, formal application to the graduate program is requiredAll applicants will need to meet any other admission requirements established for the MS in selected CIST program. The application fee will be waived if the applicant contacts the Office of Graduate Studies for a fee waiver code prior to submitting the MS application.
    • Admission to Fast Track does NOT guarantee admission to the graduate program. 
    • The admit term must be after the completion term of the undergraduate degree.

Contact

For more information, contact the College of IS&T Academic Advising Office at 402.554.3819.

Website

Cybersecurity, Bachelor of Science in Cybersecurity Requirements

A minimum of 120 credit hours is required for a Bachelor of Science degree in Cybersecurity. Thirty of the last 36 hours must be University of Nebraska at Omaha courses. Registering for courses without having taken the stated prerequisites could result in administrative withdrawal.

To obtain a Bachelor of Science in Cybersecurity, a student must fulfill the University General Education, College, and Departmental requirements. Some courses may satisfy requirements in more than one area, but credit is awarded only once, thereby reducing the total number of credit hours for the degree to 120. (This total does not include prerequisites.)

General Education Requirements - 46 Hours Required
Minimum of “C-“required
Fundamental Academic Skills 15
ENGLISH COMPOSITION I
ENGLISH COMPOSITION II
Writing in the Discipline
PUBLIC SPEAKING FUNDS
ARGUMENTATION AND DEBATE
INTRODUCTION TO MATHEMATICAL AND COMPUTATIONAL THINKING
DATA LITERACY AND VISUALIZATION
QUANTITATIVE LITERACY
QUANTITATIVE REASONING FOR HEALTHCARE PROFESSIONALS
COLLEGE ALGEBRA WITH SUPPORT
DATA LITERACY AND VISUALIZATION
ELEMENTARY STATISTICS
Distribution Requirements 31
Natural Science - From two disciplines and at least one lab - 7 hrs
Social Science - From two disciplines - 9 hrs
Humanities and Fine Arts - From two disciplines - 9 hrs
Global Diversity - 3 hrs
US Diversity - 3 hrs
MAJOR REQUIREMENTS - 86 Hours Required
**Course will satisfy UNO's General Education Requirement
^Course requires pre-requisite(s)
All of the Following60
INTRODUCTION TO INFORMATION SECURITY (**)
INTRODUCTION TO COMPUTER SCIENCE I (^)
INTRODUCTION TO COMPUTER SCIENCE II (^)
ORGANIZATIONS, APPLICATIONS AND TECHNOLOGY (** ^)
LOW-LEVEL PROGRAMMING (^)
SYSTEM ADMINISTRATION (^)
ADVANCED COMPOSITION FOR IS&T (** ^)
INFORMATION TECHNOLOGY ETHICS (** ^)
DATA STRUCTURES (^)
COMMUNICATION NETWORKS (^)
CRYPTOGRAPHY (^)
CYBERSECURITY POLICY AND AWARENESS (^)
INTRODUCTION TO DIGITAL DESIGN AND COMPUTER ORGANIZATION (^)
COMPUTER ARCHITECTURE (^)
PRINCIPLES OF SECURE SYSTEM DESIGN (^)
DIGITAL FORENSICS (^)
ETHICAL HACKING - MALWARE ANALYSIS (^)
ETHICAL HACKING - NETWORK ANALYSIS (^)
OPERATING SYSTEMS (^)
CYBERSECURITY CAPSTONE (^)
Extension Courses - Select 18 credits from the following: 18
SPECIAL TOPICS IN CYBERSECURITY (^)
SPECIAL TOPICS IN CYBERSECURITY (^)
NATURAL LANGUAGE PROCESSING (^)
MOBILE DEVICE FORENSICS (^)
QUANTUM COMPUTING AND CRYPTOGRAPHY (^)
INDUSTRIAL CONTROL SYSTEM SECURITY (^)
COMPUTER SECURITY MANAGEMENT (^)
INTERNSHIP IN CYBERSECURITY (^)
INDEPENDENT STUDY IN CYBERSECURITY (^)
THEORY OF COMPUTATION (^)
PRINCIPLES OF PROGRAMMING LANGUAGES (^)
NUMBER THEORY & CRYPTOGRAPHY (^)
INTRODUCTION TO CLOUD COMPUTING (^)
INTRODUCTION SOFTWARE ENGINEERING (^)
MANAGING THE DATABASE ENVIRONMENT (^)
INTRODUCTION TO PROJECT MANAGEMENT (^)
AGILE DEVELOPMENT METHODS
DISTRIBUTED TECHNOLOGIES AND SYSTEMS (^)
INTELLIGENCE AND NATIONAL SECURITY (^)
INTERNATIONAL LAW (^)
Math Courses - All of the Following 8
CALCULUS I (^)
MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (^)
DISCRETE MATHEMATICS
ELECTIVES
 Elective hours as required to reach a total of 120 hours

Cyber Operations Designation (Optional)

The University of Nebraska at Omaha's undergraduate Cybersecurity degree program is one of the few National Security Agency (NSA) certified National Centers of Academic Excellence in Cyber Operations (CAE-CO).  As a result, UNO's College of Information Science and Technology (IS&T) is able to offer undergraduate students majoring in Cybersecurity the option to pursue a specialized Cyber Operations (CO) designation and complete the requirements set out by the NSA's CAE-CO program.  Students already enrolled in the Bachelor of Science in Cybersecurity degree program have very few additional requirements to meet in order to complete the Cyber Operations designation:

*These courses also apply towards the Cybersecurity extension requirements.

**Graduate level courses required for Cyber Operations designation.  Graduate level courses can be taken with special permission.  

Minor Offered

Cybersecurity, Bachelor of Science in Cybersecurity Four Year Plan

Plan of Study Grid
First Year
FallCredits
ENGL 1150 ENGLISH COMPOSITION I 3
CYBR 1100 INTRODUCTION TO INFORMATION SECURITY 3
CIST 1400 INTRODUCTION TO COMPUTER SCIENCE I 3
MATH 1950 CALCULUS I 1 5
Free Elective 1
 Credits15
Spring
ENGL 1160 ENGLISH COMPOSITION II 3
CSCI 1620 INTRODUCTION TO COMPUTER SCIENCE II 3
CSCI 2030 MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 3
CMST 1110
PUBLIC SPEAKING FUNDS
or ARGUMENTATION AND DEBATE
3
Social Science Requirement 3
 Credits15
Second Year
Fall
CIST 2100 ORGANIZATIONS, APPLICATIONS AND TECHNOLOGY 3
CYBR 2250 LOW-LEVEL PROGRAMMING 3
CYBR 2600 SYSTEM ADMINISTRATION 3
Natural/Physical Science Requirement 3
Free Elective 2
 Credits14
Spring
CIST 3110 INFORMATION TECHNOLOGY ETHICS 3
CSCI 3320 DATA STRUCTURES 3
CSCI 3710 INTRODUCTION TO DIGITAL DESIGN AND COMPUTER ORGANIZATION 3
US Diversity/Social Science Requirement 3
Natural/Physical Sciences Requirement with Lab 4
 Credits16
Third Year
Fall
CIST 3000 ADVANCED COMPOSITION FOR IS&T 3
CYBR 3600 CYBERSECURITY POLICY AND AWARENESS 3
CYBR 3570 CRYPTOGRAPHY 3
CSCI 3550 COMMUNICATION NETWORKS 3
Cybersecurity Extension Course 3
 Credits15
Spring
CSCI 4350 COMPUTER ARCHITECTURE 3
CYBR 4360 PRINCIPLES OF SECURE SYSTEM DESIGN 3
CYBR 4450 ETHICAL HACKING - MALWARE ANALYSIS 3
Cybersecurity Extension Course 3
Cybersecurity Extension Course 3
 Credits15
Fourth Year
Fall
CYBR 4460 ETHICAL HACKING - NETWORK ANALYSIS 3
CSCI 4500 OPERATING SYSTEMS 3
Cybersecurity Extension Course 3
Cybersecurity Extension Course 3
Humanities & Fine Arts Requirement 3
 Credits15
Spring
CYBR 4380 DIGITAL FORENSICS 3
CYBR 4580 CYBERSECURITY CAPSTONE 3
Cybersecurity Extension Course 3
Humanities & Fine Arts 3
Free Elective 3
 Credits15
 Total Credits120
1

MATH 1950 - Satisfies General Education Quantitative Literacy requirement


Cybersecurity with Cyber Operations Designation - Optional

Plan of Study Grid
First Year
FallCredits
ENGL 1150 ENGLISH COMPOSITION I 3
CYBR 1100 INTRODUCTION TO INFORMATION SECURITY 3
CIST 1400 INTRODUCTION TO COMPUTER SCIENCE I 3
MATH 1950 CALCULUS I 1 5
Free Elective 1
 Credits15
Spring
ENGL 1160 ENGLISH COMPOSITION II 3
CSCI 1620 INTRODUCTION TO COMPUTER SCIENCE II 3
CSCI 2030 MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 3
CMST 1110
PUBLIC SPEAKING FUNDS
or ARGUMENTATION AND DEBATE
3
PSCI 2210 INTRODUCTION TO INTERNATIONAL RELATIONS 3
 Credits15
Second Year
Fall
CIST 2100 ORGANIZATIONS, APPLICATIONS AND TECHNOLOGY 3
CYBR 2250 LOW-LEVEL PROGRAMMING 3
CYBR 2600 SYSTEM ADMINISTRATION 3
Natural/Physical Sciences Requirement 3
Free Elective 2
 Credits14
Spring
CIST 3110 INFORMATION TECHNOLOGY ETHICS 3
CSCI 3320 DATA STRUCTURES 3
CSCI 3710 INTRODUCTION TO DIGITAL DESIGN AND COMPUTER ORGANIZATION 3
US Diversity/Social Science Requirement 3
Natural/Physical Sciences Requirement with Lab 4
 Credits16
Third Year
Fall
CSCI 3550 COMMUNICATION NETWORKS 3
CIST 3000 ADVANCED COMPOSITION FOR IS&T 3
CYBR 3600 CYBERSECURITY POLICY AND AWARENESS 3
CYBR 3570 CRYPTOGRAPHY 3
PSCI 4260 INTERNATIONAL LAW 3
 Credits15
Spring
CSCI 4350 COMPUTER ARCHITECTURE 3
CYBR 4360 PRINCIPLES OF SECURE SYSTEM DESIGN 3
CYBR 4450 ETHICAL HACKING - MALWARE ANALYSIS 3
CSCI 3660 THEORY OF COMPUTATION 3
Cybersecurity Extension Course 3
 Credits15
Fourth Year
Fall
CYBR 4460 ETHICAL HACKING - NETWORK ANALYSIS 3
CSCI 4500 OPERATING SYSTEMS 3
Cybersecurity Extension Course 3
Social Science Requirement 3
Humanities & Fine Arts Requirement 3
 Credits15
Spring
CYBR 4380 DIGITAL FORENSICS 3
CYBR 4580 CYBERSECURITY CAPSTONE 3
Cybersecurity Extension Course 3
Humanities & Fine Arts 3
Cybersecurity Extension Course 3
 Credits15
 Total Credits120
1

MATH 1950 - Satisfies General Education Quantitative Literacy requirement


This roadmap is a suggested plan of study and does not replace meeting with an advisor. Please note that students may need to adjust the actual sequence of courses based on course availability. Please consult an advisor in your major program for further guidance.


This plan is not a contract and curriculum is subject to change.


Additional Information About this Plan:
University Degree Requirements: The minimum number of hours for a UNO undergraduate degree is 120 credit hours. Please review the requirements for your specific degree program to determine all requirements for the program. In order to graduate on time (four years for an undergraduate degree), you need to take 30 credit hours each year.


Placement Exams: For Math, English, and Foreign Languages, a placement exam may be required. More information on these exams can be found at https://www.unomaha.edu/enrollment-management/testing-center/placement-exams/information.php


Please note that transfer credit or placement exam scores may change a suggested plan of study.

CYBR 1100  INTRODUCTION TO INFORMATION SECURITY (3 credits)

This course emphasizes our current dependence on information technology and how its security in cyberspace (or lack thereof) is shaping the global landscape. Several historical and contemporary global events that have been influenced by the exploitation of information technology motivates topics on cyber crime, malware, intrusion detection, cryptography, among others, and how to secure one's own data and computer system. Several aspects of this course are geared towards developing an understanding of the "cyberspace" as a new medium that breaks all geographical boundaries, while highlighting noticeable influences on it from social, political, economic and cultural factors of a geographical region.

Distribution: Global Diversity General Education course

CYBR 2250  LOW-LEVEL PROGRAMMING (3 credits)

This course will teach the cybersecurity (CYBR) students low-level programming in the 'C' and assembly languages, and the interrelationship between these two programming paradigms. The student will learn the various control structures in 'C' and how they are implemented in machine code, memory allocation and management, and the basics of allocation classes such as static versus automatic variables. The students will also learn assembly language in the 'C' environment and will be able to write useful, functional, stand-alone assembly language programs with no help from external libraries.

Prerequisite(s): CSCI 1620. Not open to non-degree graduate students.

CYBR 2600  SYSTEM ADMINISTRATION (3 credits)

This course covers topics a system administrator would encounter in their profession. The student will learn how a system administrator fulfills various computer management requirements using both Windows and Linux operating systems on both physical and virtual machines. Topics include installation, creating and maintaining file systems, user and group administration, backup and restore processes, network configuration, system services, virtualization, and security administration.

Prerequisite(s): CIST 1400 or CIST 1600 or Instructor Permission

CYBR 2980  SPECIAL TOPICS IN CYBERSECURITY (3 credits)

The course provides a format for exploring subject areas in Cybersecurity and related fields for sophomore undergraduate students. Specific topics vary, in keeping with research interests of faculty and students. Examples include network configuration, network security, forensics, regulatory compliance, web services and applications, vulnerability assessments, cloud computing security, and other issues in Cybersecurity.

Prerequisite(s): Instructor permission required. Not open to non-degree graduate students.

CYBR 3450  NATURAL LANGUAGE PROCESSING (3 credits)

The course will provide overview of the topics in natural language processing such as word and sentence tokenization, syntactic parsing, semantic role labeling, text classification. We will discuss fundamental algorithms and mathematical models for processing natural language, and how these can be used to solve practical problems. We will touch on such applications of natural language processing technology as information extraction and sentiment analysis. (Cross-listed with CSCI 3450).

Prerequisite(s): Prereq: CSCI 2030 with C- or better; Co-req: CSCI 3320 with C- or better; Students should be comfortable w/ scripting (Python is the language extensively used in natural language processing tools including NLTK). Not open to non-degree graduate students.

CYBR 3570  CRYPTOGRAPHY (3 credits)

The course will provide a broad overview of the concepts, fundamental ideas, vocabulary, and literature base central to the study and development of cryptography and cryptanalysis. This course will explore historical development of cryptography, as well as methods used to defeat it. In addition, the course will cover the mathematical foundations of cryptography today, as well as some current uses of such cryptography, such as public key infrastructures, the Internet Key Exchange protocol, and more.

Prerequisite(s): CSCI 3320 or ISQA 3300. Not open to non-degree graduate students.

CYBR 3600  INFORMATION SECURITY POLICY AND AWARENESS (3 credits)

This course will cover the planning and development for information governance, security policies and procedures, and security awareness.

Prerequisite(s): CIST 2100; CIST 3110, which may be taken concurrently.

CYBR 4360  PRINCIPLES OF SECURE SYSTEM DESIGN (3 credits)

Contemporary issues in computer security, including sources for computer security threats and appropriate reactions; basic encryption and decryption; secure encryption systems; program security, trusted operating systems; database security, network and distributed systems security, administering security; legal and ethical issues. (Cross-listed with CYBR 8366, CSCI 8366).

Prerequisite(s): CSCI 3320 or CSCI 8325 OR ISQA 3400 OR By instructor permission

CYBR 4380  DIGITAL FORENSICS (3 credits)

Digital forensics involves the preservation, identification, extraction, analysis and documentation of digital evidence stored on a variety of electronic devices. The aim of this course is to introduce students to acceptable approaches for collecting, analyzing and reporting data from a forensics investigation. Topics include: an introduction to digital forensics, data acquisition, first response, memory forensics, operating system forensics, and network forensics. Students will be required to perform several forensics analyses in a controlled lab environment, including acquiring forensically sound hard drive images, memory images and analyzing these using industry standard tools, such as Forensic Toolkit (FTK). The Digital Forensics class is designed for Cybersecurity, Computer Science and other qualified students to learn what actions are both appropriate and required for preserving, collecting and analyzing digital evidence in cases of intrusion, data theft or other cybercrimes. (Cross-listed with CSCI 4380).

Prerequisite(s): CYBR 3600 or CIST 3600; CSCI 3550 or ISQA 3400; CYBR 2600 or CYBR 3350 or CYBR 3370.

CYBR 4390  MOBILE DEVICE FORENSICS (3 credits)

Mobile device forensics is the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods. The aim of this course is to introduce students to acceptable approaches for collecting, analyzing and reporting data from a mobile device forensics investigation. Topics include: an introduction to digital and mobile device forensics, mobile forensics standards, acquisition methods (manual, logical, physical and provider-side), Android and iOS filesystem analysis, decoding approaches, application data analysis, and report writing. Students will be required to perform several investigations in a controlled lab environment, including acquiring forensically sound evidence and analyzing these using industry standard tools. (Cross-listed with CYBR 8396).

Prerequisite(s): CYBR 4380/8386 - Computer and Network Forensics or Instructors Permission

CYBR 4430  QUANTUM COMPUTING AND CRYPTOGRAPHY (3 credits)

The course builds an understanding of exciting concepts behind quantum computing and quantum cryptography. In doing so it will introduce the principles of qubits, superposition, entanglement, teleportation, measurement, quantum error correction, quantum algorithms such as quantum Fourier transformation, Shor's algorithm and Grover's algorithm, quantum key exchange, quantum encryption, and secure quantum channels that are built using these principles. It will also discuss advantages of quantum computing and cryptography over classical computing and cryptography and limitations thereof. The students will come out with a working understanding of the field of quantum computing and quantum cryptography. During the course, students will also implement several of the quantum algorithms. (Cross-listed with CYBR 8436, CSCI 4430).

Prerequisite(s): Co-requisites: CYBR 3570 or CSCI 4560; or Instructor permission.

CYBR 4440  INDUSTRIAL CONTROL SYSTEM SECURITY (3 credits)

The objective of this course is to research vulnerabilities into, and provide guidance for securing, industrial control systems (ICS). ICS is a general term that encompasses several types of control systems, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system items such as Programmable Logic Controllers (PLC). The student will learn to identify network and device vulnerabilities and potential countermeasures to these weaknesses. (Cross-listed with CYBR 8446)

Prerequisite(s): CSCI 3550.

CYBR 4450  HOST-BASED VULNERABILITY DISCOVERY (3 credits)

The class will cover security issues at an implementation and hardware level. The students will learn assembly language and the use of a reverse assembler and debugger. This will allow the student to analyze various "packing" algorithms for computer viruses, the viruses themselves, operating system "hooking", "fuzzing", and other machine code, host-based exploits. The class will be using both Windows and Linux as operating systems. (Cross-listed with CYBR 8456.)

Prerequisite(s): CSCI 3710 and CYBR 2250

CYBR 4460  NETWORK-BASED VULNERABILITY DISCOVERY (3 credits)

The course is an advanced class in which the students learn various techniques for testing for and identifying security flaws in network software and web applications. Internet technologies such as HTTP, DNS, DHCP, and others are examined in the context of cyber security. Students are expected to participate in numerous hands-on experiments related to Information Assurance with respect to web technologies. (Cross-listed with CYBR 8466)

Prerequisite(s): CSCI 3550

CYBR 4540  COMPUTER SECURITY MANAGEMENT (3 credits)

The purpose of this course is to integrate concepts and techniques from security assessment, risk mitigation, disaster planning, and auditing to identify, understand, and propose solutions to problems of computer security and security administration. (Cross-listed with CIST 4540, CYBR 8546, ISQA 8546)

Prerequisite(s): CYBR 4360 or permission of the instructor.

CYBR 4580  CYBERSECURITY CAPSTONE (3 credits)

In this course, students will extend and apply the knowledge they've accumulated in their undergraduate studies in the cybersecurity program. The capstone course facilitates project management and teamwork for students to define, implement, assess, and secure information systems. Implementation and assessment activities happen over a non-trivial, semester-long project, typically through a partnership with external stakeholders in the industry, academia, community organizations, or government. The projects are evaluated based on their effectiveness in meeting market or customer needs for assessment, certification, or development of secure systems.

Prerequisite(s): CYBR 2600; and CYBR 3600; and CYBR 4360; and CYBR 4460; and CYBR 4380 or CYBR 4450. Not open to non-degree graduate students.

CYBR 4950  INTERNSHIP IN CYBERSECURITY (1-3 credits)

The course provides a format for a student to work with a local or national industry partner in a cyber-security oriented position, and to receive credit for this practical experience. The internship may or may not be a paid position, but will definitely be directly related to the Cybersecurity degree program. The class is proposed and organized by the student, with participating faculty supervising and input provided by the industry partner.

Prerequisite(s): Instructor Permission

CYBR 4980  SPECIAL TOPICS IN CYBERSECURITY (3 credits)

The course provides a format for exploring advanced research areas for undergraduate and graduate students in Cybersecurity and related fields. Specific topics vary, in keeping with the research interests of faculty and students. Examples include applied data mining, mobile security, web services and applications, vulnerability assessments, cloud computing security, and other issues in Cybersecurity research. (Cross-listed with CYBR 8986)

Prerequisite(s): Instructor Permission.

CYBR 4990  INDEPENDENT STUDY IN CYBERSECURITY (1-3 credits)

The course provides a format for exploring advanced research areas for undergraduate students in Cybersecurity and related fields. The class is designed for students that would like to explore specific Cybersecurity topics at a greater depth, or topics which are not currently a part of the CYBR curriculum. The class is proposed and organized by the student, with participating faculty mentoring.

Prerequisite(s): Instructor Permission