Office of Admissions

Our online cybersecurity degree stands at the forefront of this critical field. You’ll take extensive cybersecurity coursework offered online in topics like:
In short, there’s no better place than Utica University to earn your cybersecurity degree.
Your core coursework includes an introduction to cybersecurity, computer hardware and software, programming, information security, network security, cloud security, system threats, cryptography, cyber risk and compliance management, and more.
Plus, you can choose from three specializations in the online cybersecurity degree program to focus your coursework and align your education with your career goals and interests:
You’ll harness this knowledge to guard private information, identify network weaknesses, and defend against threats from hackers, malware, and other cyber threats.
Elevate your skills with real world simulations, earn a nationally recognized cybersecurity degree, and prepare for industry certification exams, all online with Utica University.
100%
online, part-time
4
years to complete
120
credit hours
$475
cost per credit
Put your cybersecurity skills to the test with Utica University’s upcoming cyber range. Made possible by a recent $150,000 award from the George I. Alden Trust and $90,000 from the Fred L. Emerson Foundation, this range will give you the opportunity to problem-solve real-world events like ransomware attacks or data breaches in a controlled environment.
With exposure to so many different simulations and experience with real, cutting-edged tools used by professionals, you’ll know from experience what interests you most and what you want to pursue after graduation. Utica University expects to open the range in Spring 2025.
In 2023, RangeForce was named the Most Comprehensive Cyber Defense Readiness Platform at the Global Infosec Awards.
Gain crucial cybersecurity experience and become a better cyber defender. Many of Utica University’s cybersecurity courses include RangeForce, an innovative cloud-based training platform, developed by the team that built the cyber range for NATO’s Cooperative Cyber Defense Center, that simulates real-world cybersecurity battles. You’ll work to conquer threats, beat hacking simulations, and perfect your approach through gamified activities. These immersive experiences are separated into Learning Paths. As you successfully complete each Learning Path, you’ll earn impressive digital badges that you can share on your résumé and on social media platforms like LinkedIn.
Experiences in RangeForce are organized into Learning Paths. Depending on your individual career goals, you can complete as many Learning Paths as you want while advancing through the Cybersecurity program. Choose from:
For each Learning Path you complete successfully, you’ll earn a RangeForce digital badge. Stand out from the competition by sharing these impressive cybersecurity credentials with potential employers and across your social media networks.
The skills you gain from Utica University’s RangeForce access are immediately applicable to the current cybersecurity landscape. These are just some of the well-established organizations that are using RangeForce to develop new skillsets for their employees:
“RangeForce offers a large list of challenges that I continually work on to try and learn as much as I can.”
– Thanhnhan Nguyen, Utica Cybersecurity Student
This online degree is also a completer program, which means that students may transfer credits into an undergraduate program at Utica University. Students may also complete all 120 credits at Utica University as a full, undergraduate degree. Candidates for the baccalaureate degree must satisfactorily complete a minimum of 30 credit hours of study at Utica University. A maximum of 90-98 credits may be transferred from four-year institutions, and 60-64 from two-year institutions, depending on one’s academic major. Transfer students who matriculate with 60 or more credits need to declare a major upon entering Utica University.
The National Security Agency and the Department of Homeland Security have designated Utica University as a National Center of Academic Excellence in Cyber Defense Education (CAE/CDE) through the academic year 2024.
Utica is a CompTIA academic partner, our online cybersecurity degree supports students’ preparation for A+, Security+, Cloud Essentials, and the Network+ certification exams.
Only an estimated 20-25% of cybersecurity roles are held by women. With a commitment to decreasing this gender disparity, Utica University is proud to be one of a select number of New York universities to have a Women in Cybersecurity (WiCyS) student chapter. Join a network that promotes the recruitment, retention, and advancement of women in cybersecurity and create lifelong connections. Members of WiCyS have priority access to security training, mentorships, job fairs, and conference scholarships.
Choose the general track or one of three specializations in the cybersecurity bachelor’s program. Each will provide you with the most up-to-date skills and expertise to hit the ground running in the industry segment of your choice.
Delve into cyber-defense strategies that keep organizations safe from cyber threats. Learn to embed security measures directly into the emerging Global Information Grid and create encryption codes that allow users to pass information between systems securely.
Gain experience securing proprietary and personal data, protecting networks and cloud infrastructure, and developing techniques to detect malicious entry. Leverage the latest technologies to conduct cybercrime and fraud investigations and bring cyber criminals to justice.
Learn to collect and prepare evidence for computer crimes such as fraud, ransomware, and cyber espionage with courses that emphasize a comprehensive understanding of the forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence.
Learn More About Our Data Science Specializations
As of 2024, there is a worldwide gap of more than 4.7 million cybersecurity workers, and the average cost of a data breach has hit a record high of $4.88 million.1,2 Companies need qualified information security experts, with more than 457,000 cybersecurity jobs posted in the first four months of 2025 alone.3 That need is an opportunity for you.
In 2024, the median pay for information security analysts was $124,910.4 This entry-level cybersecurity position requires a bachelor’s degree, and job postings are expected to grow 33 percent by 2033, much faster than the national average for other career paths.4 Meanwhile, there’s a 17% gap in the number of workers needed to fill cybersecurity jobs across the U.S.3
Opportunities abound in this incredible field. Take advantage of them with your online cybersecurity degree.
With your Bachelor of Science in Cybersecurity, you’ll be well prepared to find a position in this fast-developing field.
As data breaches and intrusions make daily appearances in the news, it’s becoming clear that organizations of every size in every sector need skilled cybersecurity experts. Their need is an opportunity for you.
This 100-percent-online program readies you for success in this critical field. You’ll graduate with not only fundamental skills and knowledge in cybersecurity and computer science. You’ll also stand out to future employers with more intensive knowledge in one of three specializations.
► 1.35 Billion
Number of individuals affected by data breaches in 2024.9
► $124,910
Median pay for Information Security Analysts (ISA)4
► 33% Growth
in ISA job postings by 20334
► 457,000
Cybersecurity jobs posted January - May 2025 alone3
► 4.7 Million
Unfilled cybersecurity jobs in 20241
As an Information Security Analyst, you’ll protect an organization’s computer networks and systems by planning and carrying out security measures. You’ll monitor security breaches, use protective software such as firewalls and data encryption, protect sensitive information, conduct penetration testing, and more. This position is one of the fastest-growing in cybersecurity, with 33 percent growth projected from 2023 to 2033, much faster than the national average.4
As a Computer Network Security Administrator (also known as a computer security specialist, a network security analyst, or an internet security specialist), you’d perform many security-related tasks for your employer. That could include teaching colleagues about computer security, checking for violations and intrusions, installing protective software, and defending against cyberattacks.5
As an Information Assurance Engineer, you’d oversee your company’s processes to ensure data security — from storage to analysis. Whether you work directly for one company or consult with many, you will be able to step in and detect data security risks. You’ll work to find solutions, mitigate further risks, and prevent data breaches. You’ll also conduct periodic risk assessments to ensure the security measures you’ve put in place are working.6
Sources:
1. (ISC)2. (2024). Cybersecurity Workforce Study. Retrieved May 12, 2025, from https://www.isc2.org/Insights/2024/10/ISC2-2024-Cybersecurity-Workforce-Study
2. IBM (2025). Cost of a Data Breach Report 2025. Retrieved May 12, 2025, from https://www.ibm.com/reports/data-breach.
3. Cyberseek.org (2025). Cybersecurity Supply/Demand Heat Map. Retrieved May 12, 2025 from https://www.cyberseek.org/heatmap.html
4. Bureau of Labor Statistics (2025, April 18). Information Security Analysts. Retrieved on May 12, 2025, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
5. Payscale (2023). Security Administrator: Salary. Retrieved February 17, 2023, from https://www.payscale.com/research/US/Job=Security_Administrator%2C_Computer_Network/Salary
6. Payscale (2023). Information Assurance Engineer: Salary. Retrieved February 17, 2023, from https://www.payscale.com/research/US/Job=Information_Assurance_Engineer/Salary
7. CyberSeek (n.d.). Cybersecurity Supply/Demand Heat Map. Retrieved November 9, 2022, from https://www.cyberseek.org/heatmap.html.
8. U.S. News & World Report (n.d.). Online Cybersecurity Degree: An Overview. Retrieved December 3, 2018, from https://www.usnews.com/education/online-education/cyber-security-bachelors-degree
9. Statista (n.d.). Annual number of data compromises and individuals impacted in the United States from 2005 to 2024. Retrieved May 12, 2025, from https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
Build a solid foundation of cybersecurity expertise in our Bachelor of Science in Cybersecurity, then focus your learning in one of three specializations.
Our cybersecurity curriculum draws on expertise from leading subject matter experts, including the U.S. Secret Service, Citibank, MasterCard, Deloitte, Google, and K2 Intelligence.
You’ll learn best practices and complete cybersecurity courses in:
You can also design your own specialization and focus on work in the field of your choice.
In this program, students complete or transfer general education coursework requirements (37 credits). The Utica University General Education Program provides students with enriching learning experiences that are both foundational and integrative of scientific, humanistic, and technological contexts. After students complete a sequence of foundational courses providing a background, aptitude, and understanding necessary for success in their education and lives, they will explore knowledge areas by choosing to enroll in exciting themed pathways or to explore a broad range of engaging courses.
You’ll also complete:
At least 60 credit hours of the 120 required must be in the liberal arts and sciences.
The cybersecurity curriculum course abstracts on this page are meant to provide a high-level course overview and are subject to change based on term, faculty, and/or institutional requirements. View the official course descriptions as written in the Utica University Academic Catalog and in adherence to regional compliance. Select the appropriate Undergraduate Catalog from the dropdown.
Applying to our online master’s in data science program is straightforward, with no GRE or GMAT required. You’ll just need to submit the following:
Transfer credit is awarded for courses taken at a regionally accredited college that are equivalent to those taught at Utica University and you’ve received a grade of “B” or better. Note that we require official transcripts from all colleges you’ve attended, as well as a transcript showing degree awarded.
Shortly after you receive your letter of admission, you will receive an evaluation of your transfer credits from the Registrar’s Office. If you want to review possible credit eligibility ahead of time, use TES®.
International Credential Evaluation of transcripts showing equivalency to a U.S. bachelor’s degree with minimum GPA of 3.0 is required for this program.
If English is not your first language, submit your test scores from either the TOEFL or IELTS.
Utica requires a TOEFL score of 550 written, 213 computer-based, or 79 internet-based. Utica requires a IELTS score of 6.0.
Get StartedThis 120-credit program costs $475 per credit hour. Utica University is dedicated to making an advanced education accessible and affordable. Learn more about financial aid, including grants, student loans, and other options, on the Financial Aid tab of our Graduate Admissions page.
Learn moreChoose the general track or one of four specializations in the cybersecurity bachelor’s program. Each will provide you with the most up-to-date skills and expertise to hit the ground running in the industry segment of your choice.
Address one of the hottest topics in cybersecurity with the Cyber Operations specialization of Utica University’s online Bachelor of Science in Cybersecurity.
You’ll delve into cyber-defense strategies that keep organizations safe from cyber threats. Plus, you’ll learn to embed security measures directly into the emerging Global Information Grid and create encryption codes that allow users to pass information between systems securely.
Utica University is a leader in cybersecurity education, designated as a National Center of Academic Excellence by the Department of Homeland Security and the National Security Agency.
The rate of cyberattacks is outpacing the number of skilled professionals who can detect, prevent, stop, and mitigate their damage. There’s a worldwide gap of 4.7 million cybersecurity workers1, and 80% of IT decision-makers say they’ve had a breach due to a lack of cybersecurity skills or awareness at their company.2
The hardest jobs to fill involve cloud security, security operations, and network security2 — which are just some of the skills you can learn in our B.S. in Cybersecurity with a Cyber Operations specialization. Graduate prepared to qualify for cybersecurity postings that demand a bachelor’s degree, like penetration tester, which comes with an average salary of $99,945 per year.3
$99,945/year
As a penetration tester (also known as a white-hat hacker), you’d put your understanding of complex security measures to work to break the system. You would use a variety of tools — some of which you might create yourself — to find holes in your company’s security before bad actors do. You’d also search for passive threats to network integrity, such as poor passwords, and work to mitigate them.
Other titles you may qualify for:
With a unique focus on coursework in networks, defensive and offensive tactics, vulnerability assessments, penetration testing, and programming, this specialization provides you with skills to dominate in the area of Cyber Operations while keeping your organization safe. Explore incident response to system compromise, risk management decision-making, and legal and regulatory analyses. Learn about building and configuring secure environments, providing trusted solutions, and more.
This course addresses the theory and practice of penetration testing from scoping and information gathering through reporting. Identify and exploit host and network vulnerabilities; simulating the real-world activities of malicious threat actors. Prerequisite(s); CYB 339 and CYB 362.
Sources
1. (ISC)2. (2024). Cybersecurity Workforce Study. Retrieved May 12, 2025, from https://www.isc2.org/Insights/2024/10/ISC2-2024-Cybersecurity-Workforce-Study
2. Fortinet (2022). 2022 Cybersecurity Skills Gap. Retrieved February 17, 2023, from https://www.fortinet.com/content/dam/fortinet/assets/reports/report-2022-skills-gap-survey.pdf
3. Payscale (2025). “Penetration Tester Salary.” Retrieved May 14, 2025, from https://www.payscale.com/research/US/Job=Penetration_Tester/Salary.
According to the World Economic Forum, cybercrime is estimated to cost $10.5 trillion annually by 2025, and increase of more than $7 trillion from 2015.1
The number of ways fraud and cybercrime can be committed is dizzying: ransomware, espionage, advanced persistent threats, hacking, identity fraud, dissemination of malware. These are just a few of the ways cybercriminals inflict harm.
In Utica University’s online Bachelor of Science in Cybersecurity with the Cybercrime and Fraud Investigation specialization, you’ll gain experience securing proprietary and personal data, protecting networks and cloud infrastructure, and developing techniques to detect malicious entry. With the cybersecurity curriculum partnerships, you’ll learn to leverage the latest technologies to conduct cybercrime and fraud investigations and bring cyber criminals to justice.
Utica University is a leader in cybersecurity education, designated as a National Center of Academic Excellence in Cyber Defense by the National Security Agency.
Companies need cybersecurity professionals who can lead efforts to prevent and detect fraudulent activity, then minimize damage if or when it occurs. According to the 2022 Global Economic Crime and Fraud Survey:2
As cybercrimes and fraud make bigger headlines and people’s personal data is compromised, the pressure for CEOs to be held accountable for a lack of cybersecurity has increased. According to TrustPair Research, 90% of businesses in the United States experienced cyber fraud in 2024, with nearly half of U.S. companies suffering losses in excess of $10 million.2 As a result, organizations are enhancing technical capabilities and implementing stronger internal controls.2 That investment means more opportunities for you.
When you graduate from the cybercrime and fraud investigation specialization, you’ll have hands-on experience. Having worked directly with many of the tools and platforms used in the profession, you’ll stand out from other job applicants and possess the skills to make an immediate impact in your work.
$73,240/year
As a fraud investigator, you could work across industries in private companies and government agencies. You would be responsible for knowing the applicable laws to carry out an investigation so evidence can be efficiently gathered and used in a court of law. You would search physical and digital evidence, serve and execute warrants, and conduct surveillance.3
Other titles you may qualify for:
The topics covered in this specialization span the intersection of fraud and cybercrime and include economic crime theory, white-collar criminology, payment systems, and fraud prevention and detection technologies.
Learn how to tenaciously follow the money in pursuit of cybercriminals who violate the law for the purpose of financial gain. The number of ways that cybercrime and fraud intersect is dizzying. Cyberfraud professionals track and trace those who commit crimes such as wire fraud, identity theft, denial-of-service attacks, economic espionage, hacking, child pornography, money laundering, and digital currency fraud.
When you complete the Cybercrime and Fraud Investigation specialization, you’ll have the skills to prevent and combat white-collar crime and conduct investigations.
Types of proactive technology programs and tools used to prevent and detect the occurrence of fraud in face-to-face transactions, e-commerce and e-business. Includes development and implementation of business models for production of prevention and detection products and techniques.
Sources
1. World Economic Forum (January 16, 2025). How AI-driven fraud challenges the global economy – and ways to combat it. Retrieved on May 14, 2025, from https://www.weforum.org/stories/2025/01/how-ai-driven-fraud-challenges-the-global-economy-and-ways-to-combat-it/.
2. Businesswire (February 4, 2025). Ninety Percent of U.S. Companies Experienced Cyber Fraud in 2024, According to New Trustpair Research. Retrieved on May 15, 2025, from https://www.businesswire.com/news/home/20250204557247/en/Ninety-Percent-of-U.S.-Companies-Experienced-Cyber-Fraud-in-2024-According-to-New-Trustpair-Research.
3. O*Net Online (2025). “Summary Report for: 13-2099.04 – Fraud Examiners, Investigators and Analysts.” Retrieved on May 15, 2025, from https://www.onetonline.org/link/summary/13-2099.04.
Utica University’s online Digital Forensics and Incident Response specialization in the Bachelor of Science in Cybersecurity program prepares you with the exciting knowledge and skills to conduct computer network investigations when cyber-related incidents occur.
This specialization prepares you to collect and prepare evidence for computer crimes such as fraud, ransomware, and cyber espionage with courses that emphasize a comprehensive understanding of the forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence.
Utica University is a leader in cybersecurity education, designated as a National Center of Academic Excellence in Cybersecurity Defense by the Department of Homeland Security and the National Security Agency.
Cyber incidents have been identified as the most important business risk across the globe.1 It’s no wonder employment for careers like information security analyst are growing much faster than average and on pace for up to 239,100 jobs by 2033.2
As a graduate of this specialization, you’ll be prepared for entry-level opportunities in industries like law enforcement, health care information security, and corporate or industrial security.
$66,000/year
As a digital forensics investigator, you would work with law enforcement agencies and private firms to obtain digital information in a way that’s vital to closing investigations and prosecuting cybercriminals. You’d also be the expert that rebuilds the system to recover lost data if equipment has been damaged.3
$96,000/year
As a network security administrator, you’d be in charge of tasks like monitoring suspicious activity, running regular backups, and maintaining user accounts. You’d be the person to detect weakness in an organization’s network and develop internal procedures to find those vulnerabilities.4
Utica’s hands-on curriculum integrates the latest technologies and data available in criminology, criminal justice, financial crime, and computer forensics. Through an innovative, multidisciplinary approach, you’ll learn critical cybersecurity skills like information system audits and incident response tools.
This course explores practical methodologies for digital forensic examinations and intrusion detection. Students will learn how to acquire, authenticate, recover, and analyze forensic data to track user activity. Industry-leading tools are used to perform an in-depth analysis of Windows operating system artifacts providing students with the necessary skills to investigate a multitude of incident types. Prerequisite(s): CYB 205.
Sources
1. Allianz. (2023). Allianz Risk Barometer. Retrieved February 17, 2023 from https://www.agcs.allianz.com/news-and-insights/reports/allianz-risk-barometer.html.
2. Bureau of Labor Statistics. (2025). Information Security Analysts. Retrieved May 15, 2025 from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm.
3. Glassdoor (2025). “Digital Forensics Investigator: Salary.” Retrieved May 15, 2025 from https://www.glassdoor.com/Salaries/digital-forensics-investigator-salary-SRCH_KO0,30.htm.
4. Glassdoor (2025). “Network Security Administrator: Salary.” Retrieved May 15, 2025 from https://www.glassdoor.com/Salaries/network-security-administrator-salary-SRCH_KO0,30.htm.
For a general list of frequently used logins, you can also visit our logins page.