Jill Test Page
Cybersecurity Bachelor's Degree Program
why our program at GW cps?
sdfsdfsdfsdfsdfsdf
intro copy speaking to need for program/industry background - Does it belong here? From the Equifax breach to interference in the 2016 Presidential election, no target has proven too big for cyberspace’s bad actors. And as thousands of would-be criminals, terrorists and spies are using their knowledge to exploit vulnerabilities worldwide, those who wear the white hat need to stay a step ahead in safeguarding society.
Our Cybersecurity Bachelor’s Degree Completion program combines highly technical, hands-on curriculum in labs and virtual environments with invaluable collaboration with government agencies, private companies and the military experts fighting every day on cyberspace’s front lines. Designed for students with associate’s, applied associate's or non-technical bachelor’s degrees who are looking to advance in the field, you will learn the ins and outs of attack tools, IT defense countermeasures, encryption and more to help solve cyber’s toughest problems.
Tie copy in with the vertical? Selling the prestige??? Badges top of the page or the bottom?
Program at a Glance 1
Body Copy: Lorem ipsum dolor sit amet, consectetur adipisici elit, sed eiusmod tempor incidunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud
Program at a Glance 2
Body Copy: Lorem ipsum dolor sit amet, consectetur adipisici elit, sed eiusmod tempor incidunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud
Program at a Glance 3
Body Copy: Lorem ipsum dolor sit amet, consectetur adipisici elit, sed eiusmod tempor incidunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud
Program at a Glance 4
Body Copy: Lorem ipsum dolor sit amet, consectetur adipisici elit, sed eiusmod tempor incidunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud
Item 1
Ex consequat commodo adipisicing exercitation aute excepteur occaecat ullamco duis aliqua id magna ullamco eu. Do aute ipsum ipsum ullamco cillum consectetur ut et aute consectetur labore. Fugiat laborum incididunt tempor eu consequat enim dolore proident. Qui laborum do non excepteur nulla magna eiusmod consectetur in. Aliqua et aliqua officia quis et incididunt voluptate non anim reprehenderit adipisicing dolore ut consequat deserunt mollit dolore. Aliquip nulla enim veniam non fugiat id cupidatat nulla elit cupidatat commodo velit ut eiusmod cupidatat elit dolore.
Item 2
Quis magna Lorem anim amet ipsum do mollit sit cillum voluptate ex nulla tempor. Laborum consequat non elit enim exercitation cillum aliqua consequat id aliqua. Esse ex consectetur mollit voluptate est in duis laboris ad sit ipsum anim Lorem. Incididunt veniam velit elit elit veniam Lorem aliqua quis ullamco deserunt sit enim elit aliqua esse irure. Laborum nisi sit est tempor laborum mollit labore officia laborum excepteur commodo non commodo dolor excepteur commodo. Ipsum fugiat ex est consectetur ipsum commodo tempor sunt in proident.
Item 3
Quis anim sit do amet fugiat dolor velit sit ea ea do reprehenderit culpa duis. Nostrud aliqua ipsum fugiat minim proident occaecat excepteur aliquip culpa aute tempor reprehenderit. Deserunt tempor mollit elit ex pariatur dolore velit fugiat mollit culpa irure ullamco est ex ullamco excepteur.
Item 4
Quis anim sit do amet fugiat dolor velit sit ea ea do reprehenderit culpa duis. Nostrud aliqua ipsum fugiat minim proident occaecat excepteur aliquip culpa aute tempor reprehenderit. Deserunt tempor mollit elit ex pariatur dolore velit fugiat mollit culpa irure ullamco est ex ullamco excepteur.
What will you study?
Our cybersecurity programs are comprehensive and nationally recognized.
Delve into topics such as:
-
Attacker Tools & Techniques
-
Cyber Conflict
-
Data Communications & Networking Technology
-
Digital Forensics
-
Ethics, Law & Policy
-
Intrusion Detection & Vulnerability Management
-
IP Security & VPN Technology
-
IT Security Defense Countermeasures
Bulletin
Vestibulum, lectus mauris ultrices eros, in cursus turpis. Nec ultrices dui sapien eget mi proin. Ut pharetra sit amet, aliquam id diam maecenas. Sapien, faucibus et molestie ac, feugiat sed lectus vestibulum. Vitae proin sagittis, nisl rhoncus. Justo donec enim diam, vulputate. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Duis at consectetur lorem donec massa sapien, faucibus. Eu ultrices vitae, auctor eu augue ut lectus arcu. Turpis massa tincidunt dui ut ornare lectus sit. Elementum, nibh tellus molestie nunc, non blandit. Ipsum dolor sit amet, consectetur adipiscing. Cras sed felis eget velit aliquet. Accumsan sit amet nulla facilisi. Diam maecenas sed enim ut. Lectus mauris ultrices eros, in. At volutpat diam ut venenatis tellus. Nisi est, sit amet facilisis magna etiam tempor. Ac turpis egestas integer eget aliquet nibh.
The following requirements must be fulfilled: 120 credits, including 21 or 22 credits in general education courses and 38 credits in elective courses, which can be completed at any regionally accredited institution; and 60 credits in core courses, which must be taken at GW.
Code | Title | Credits |
---|---|---|
University General Education Requirement* | ||
One course in critical thinking in the humanities. | ||
Two courses in critical thinking, quantitative reasoning, or scientific reasoning in the social sciences. | ||
Two courses in English composition. | ||
One course in quantitative reasoning (must be in mathematics or statistics). | ||
One course in scientific reasoning (must be in natural and/or physical laboratory sciences). | ||
Electives * | ||
38 credits in courses taken at another institution that are approved for transfer to GW as elective courses. |
Code | Title | Credits |
---|---|---|
60 credits in core courses for the major, which must be taken at GW | ||
PSCS 2304W | Incident Response | |
PSCS 2302 | Digital Forensics | |
PSCS 3100 | Principles of Cybersecurity | |
PSCS 3103W | Ethics, Law, and Policy ** | |
PSCS 3105 | Governance, Risk Management, and Compliance | |
PSCS 3107 | IP Security and VPN Technology | |
PSCS 3109 | Network Security | |
PSCS 3110 | Cloud Security | |
PSCS 3111 | Information Technology Security System Audits | |
PSCS 3113 | Topics in IT Security Defense Countermeasures | |
PSCS 3115 | Cyber Investigations and Threat Intelligence | |
PSCS 3117 | Project Management in Information Technology | |
PSCS 4102 | Intrusion Detection and Vulnerability Management | |
PSCS 4110 | Data Communication and Networking Technologies | |
PSCS 4202 | Cyber Attack Tools and Techniques |
*University General Education and elective courses can be completed at any regionally accredited institution. A minimum grade of C- is required for transfer credit to be approved. General Education and elective coursework must be completed before beginning the bachelor's degree program.
**PSCS 3103W fulfills the General Education requirement for one approved course in oral communication.
WHo WILL YOU STUDY with?
Information about our faculty....
- View The Faculty
-
Tony Julien
Publication Design; Creative Director, 720 Strategies, and Adjunct Professor, M.P.S. in Publishing, George Washington University.
Dean SmithDirector, Duke University Press & Adjunct Professor, MPS in Publishing, George Washington University