US
Cybersecurity Courses Online – Bachelor’s Degree | WGU
Cybersecurity Courses Online – Bachelor’s Degree | WGU
Skip to content
Skip to Chat
Bachelor of Science
Online Cybersecurity
and Information Assurance Degree
Apply Now
3rd Party Certifications and Recognition
OVERVIEW
Fight Cybercrime with an AI-Enhanced, Expert-Driven Cybersecurity Degree
Hackers and cybercriminals launch new, sophisticated computer viruses, malware, and scams every day that threaten the data our society relies on. WGU's online degree in cybersecurity will help you be
prepared to outsmart cybercriminals
and be the front line of support for governments and top organizations.
Designed with input from industry experts, this program has received
ABET-accreditation
. The cybersecurity information assurance bachelor’s degree program provides a solid background in IT security principles such as:
Secure Systems Analysis & Design
Artificial Intelligence
Web and Cloud Security
Hacking Countermeasures and Techniques
Digital Forensics and Incident Response
Data Management and Analytics
WGU’s online B.S. Cybersecurity and Information Assurance degree program combines theoretical depth with the technical leading IT employers to meet the most recent Department of Homeland Security (DHS) and National Security Agency (NSA) guidelines. This program has also received the designation of a National Center of Academic Excellence in Cyber Defense through 2026.
This program is also accredited by ABET (Accreditation Board for Engineering and Technology). A global seal of approval for students and employers as it is a guarantee of quality, a pathway to good jobs, and rigorous recognition. You’ll build skills across core areas like systems and services, networking, programming, and data management—plus advanced topics including cybersecurity, cloud security, digital forensics, intrusion detection, cryptography, AI, data analytics, and identity and access management (IAM).
Our curriculum is shaped and continually updated by experts and industry leaders to ensure you’re learning the tools, best practices, and hands-on methods that matter most in today’s fast-changing tech world. Along the way, you’ll earn résumé-boosting certifications and graduate prepared to prevent, detect, and mitigate cyber threats while shaping the future of technology.
60% of graduates finish within
29 Months*
Students who have experience in cybersecurity, transfer credits, and time to dedicate to their schooling may be able to finish their bachelor's degree faster than a traditional bachelor's degree.
*WGU Internal Data
Flexible Schedule
Tuition per six-month term is
$4,410
Tuition charged per term—rather than per credit—helps students control the ultimate cost of their business management degree. Finish faster, pay less!
Cost & Time
Certifications in this program
16
This online cybersecurity and information assurance program includes 16 top industry certifications, helping enhance your résumé before you even graduate.
Certifications
Ready to Start Your WGU Journey?
Next Start Date:
{{startdate}}
Start Dates the 1st of Every Month
Apply Today
COURSES
Cybersecurity Courses
Program consists of 38 courses
At WGU, we design our curriculum to be timely, relevant, and practical—all to help you show that you know your stuff.
Program Guide
The bachelor’s degree program in cybersecurity and information assurance was designed, and is routinely updated, with input from the cybersecurity specialists on our Cybersecurity Advisory Board, ensuring you learn best practices in systems and services, networking, scripting and programming, data management, and cybersecurity and information assurance. Our courses deliver proven methods for information security in the topics of penetration testing, network security, cloud security, scripting, intrusion detection, digital forensics, security operations, project management, cryptography, Artificial Intelligence (AI), data analytics, and Identity and Access Management (IAM) to prevent, detect, and mitigate cyberattacks. Your online cyber security degree is sure to boost your résumé and prepare you for an exciting future.
This program consists of the following courses. Some may be waived through transfer from your previous college experience. The rest you typically will complete one at a time as you make your way through your degree program, working with your Program Mentor each term to build your personalized Degree Plan. You’ll work through each course as quickly as you can study and learn the material. As soon as you’re ready, you’ll pass the assessment, complete the course, and move on. This means you can finish as many courses as you're able in a term at no additional cost.
WHAT ABOUT TRANSFER CREDITS?
Program consists of:
38 courses
An unofficial estimated 14 courses are fulfilled by your associate degree leaving 27 courses.
I Have an Associate Degree
Estimate My Transfer Credits
Courses Fulfilled By Your Associate Degree
This is an unofficial estimate of your transfer credit. You may recieve more or less credits depending upon the specific courses taken to complete your degree and other credits you may have.
Below are the anticipated courses that will be fulfilled based on your indication that you have earned an associate degree. During the enrollment process this information will be verified.
General Education
Natural Science Lab
This course provides students an introduction to using the scientific method and engaging in scientific research to reach conclusions about the natural world. Students will design and carry out an experiment in the natural sciences to investigate a hypothesis by gathering quantitative data. They will also research a specific topic in the natural sciences using academic sources and draw conclusions from their findings.
Ethics in Technology
Ethics in Technology examines the ethical considerations of technology use in the 21st century and introduces students to a decision-making process informed by ethical frameworks. Students will study specific cases related to important topics such as surveillance, social media, hacking, data manipulation, plagiarism and piracy, artificial intelligence, responsible innovation, and the digital divide. This course has no prerequisites.
Applied Probability and Statistics
Applied Probability and Statistics is designed to help students develop competence in the fundamental concepts of basic statistics including: introductory algebra and graphing; descriptive statistics; regression and correlation; and probability. Statistical data and probability are often used in everyday life, science, business, information technology, and educational settings to make informed decisions about the validity of studies and the effect of data on decisions. This course discusses what constitutes sound research design and how to appropriately model phenomena using statistical data. Additionally, the content covers simple probability calculations, based on events that occur in the business and IT industries. No prerequisites are required for this course.
Composition: Successful Self-Expression
Welcome to Composition: Successful Self-Expression! In this course, you will focus on four main topics: professional writing for a cross-cultural audience, narrowing research topics and questions, researching for content to support a topic, and referencing research sources. Each section includes learning opportunities through readings, videos, audio, and other relevant resources. Assessment activities with feedback also provide opportunities to check your learning, practice, and show how well you understand course content. Because the course is self-paced, you may move through the material as quickly or as slowly as you need to gain proficiency in the seven competencies that will be covered in the final assessment. If you have no prior knowledge or experience, you can expect to spend 30-40 hours on the course content. You will demonstrate competency through a performance assessment. There is no prerequisite for this course and there is no specific technical knowledge needed.
Applied Algebra
Applied Algebra is designed to help you develop competence in working with functions, the algebra of functions, and using some applied properties of functions. You will start learning about how we can apply different kinds of functions to relevant, real-life examples. From there, the algebra of several families of functions will be explored, including linear, polynomial, exponential, and logistic functions. You will also learn about relevant, applicable mathematical properties of each family of functions, including rate of change, concavity, maximizing/minimizing, and asymptotes. These properties will be used to solve problems related to your major and make sense of everyday living problems. Students should complete Applied Probability and Statistics or its equivalent prior to engaging in Applied Algebra.
Critical Thinking: Reason and Evidence
In this course you will learn key critical thinking concepts and how to apply them in the analysis and evaluation of reasons and evidence. The course examines the basic components of an argument, the credibility of evidence sources, the impact of bias, and how to construct an argument that provides good support for a claim. The course consists of an introduction and four major sections. Each section includes learning opportunities through readings, videos, audio, and other relevant resources. Assessment activities with feedback also provide opportunities to check your learning, practice, and show how well you understand course content. Because the course is self-paced, you may move through the material as quickly or as slowly as you need to gain proficiency in the four competencies that will be covered in the final assessment. If you have no prior knowledge or experience, you can expect to spend 30-40 hours on the course content.
Introduction to Communication: Connecting with Others
Welcome to Introduction to Communication: Connecting with Others! It may seem like common knowledge that communication skills are important, and that communicating with others is inescapable in our everyday lives. While this may appear simplistic, the study of communication is actually complex, dynamic, and multifaceted. Strong communication skills are invaluable to strengthening a multitude of aspects of life. Specifically, this course will focus on communication in the professional setting, and present material from multiple vantage points, including communicating with others in a variety of contexts, across situations, and with diverse populations. Upon completion, you will have a deeper understanding of both your own and others’ communication behaviors, and a toolbox of effective behaviors to enhance your experience in the workplace.
American Politics and the US Constitution
American Politics and the U.S. Constitution examines the evolution of representative government in the United States and the changing interpretations of the civil rights and civil liberties protected by the Constitution. This course will give candidates an understanding of the powers of the branches of the federal government, the continual tensions inherent in a federal system, the shifting relationship between state and federal governments, and the interactions between elected officials and the ever-changing electorate. This course will focus on such topics as the role of a free press in a democracy, the impact of changing demographics on American politics, and the debates over and expansion of civil rights. Upon completion of the course, candidates should be able to explain the basic functions of the federal government, describe the forces that shape American policy and politics, and be better prepared to participate in America’s civic institutions. This course has no prerequisite.
Discrete Math: Logic
Discrete Math-Logic is designed to help students develop competence in the use of logic and proofs and Boolean Algebra and Boolean functions. Applied Probability and Statistics and Applied Algebra are prerequisites for this course.
Discrete Math: Functions and Relations
Discrete Math: Functions and Relations is designed to help students develop competence in the use of abstract discrete structures fundamental to systems networking. In particular, this course will introduce students to set theory, finite sequences, series, and relations. Discrete Math: Logic, Applied Probability and Statistics, and Applied Algebra are prerequisites for this course.
Discrete Math: Algorithms and Cryptography
Discrete Math: Algorithms and Cryptography addresses discrete computational methods, including searching and sorting algorithms, big-O estimates, and number theory and cryptography. Discrete Math Functions and Relations is a prerequisite for this course.
Health, Fitness, and Wellness
Health, Fitness, and Wellness focuses on the importance and foundations of good health and physical fitness—particularly for children and adolescents—addressing health, nutrition, fitness, and substance use and abuse.
Network and Security
Network and Security - Foundations
Network and Security - Foundations introduces learners to the basic network systems and concepts related to networking technologies. Learners will gain skills in applying network security concepts for business continuity, data access, and confidentiality, and in identifying solutions for compliance with security guidance.
Network and Security - Applications
Network and Security - Applications prepares learners for the CompTIA Security+ certification exam. The course introduces learners to skills in identifying threats, attacks, and vulnerabilities to organizational security. The learner will also gain skills in designing security solutions for enterprise infrastructures and architectures, as well as in implementing security solutions across hardware, applications, and network services. Learners will be able to execute operations and incident response with tools, policies, forensics, and mitigation techniques, and to analyze information security controls, governance, risk, and compliance.
IT Fundamentals
Introduction to IT
Introduction to IT examines information technology as a discipline and the various roles and functions of the IT department as business support. Students are presented with various IT disciplines, including systems and services, network and security, scripting and programming, data management, and business of IT, with a survey of technologies in every area and how they relate to each other and to the business.
IT Foundations
IT Foundations provides learners with an understanding of personal computer components and their functions in a desktop system; a knowledge of computer data storage and retrieval; and skills in classifying, installing, configuring, optimizing, upgrading, and troubleshooting printers, laptops, portable devices, operating systems, networks, and system security. This course also gives learners the ability to recommend appropriate tools, diagnostic procedures, preventative maintenance, and troubleshooting techniques for personal computer components in a desktop system; strategies for identifying, preventing, and reporting safety hazards and environmental or human accidents in technological environments; and effective communication skills for interacting with colleagues and clients, including job-related professional behavior. The course prepares learners for the CompTIA A+ Core 1 certification exam.
IT Applications
IT Applications introduces skills in identifying operating systems and their configurations and in implementing security principles across devices and networks. Learners will also gain skills in troubleshooting software, security, and malware issues, and in implementing basic operational procedures in documentation, change management, compliance, and communication. The course will introduce basic disaster recovery and business continuity procedures, scripting basics, and remote access technology solutions. The course prepares learners for the CompTIA A+ Core 2 certification exam.
Data Management
Data Management - Foundations
Data Management Foundations offers an introduction in creating conceptual, logical and physical data models. Students gain skills in creating databases and tables in SQL-enabled database management systems, as well as skills in normalizing databases. No prerequisites are required for this course.
Risk Management
Managing Information Security
Managing Information Security expands on Fundamentals of Information Security by providing an in-depth analysis of the relationship between an information security program and broader business goals and objectives. Learners develop knowledge and experience in the development and management of an information security program essential to ongoing education, career progression, and value delivery to enterprises. Learners apply best practices to develop an information security governance framework, analyze mitigation in the context of compliance requirements, align security programs with security strategies and best practices, and recommend procedures for managing security strategies that minimize risk to an organization.
Web and Cloud Security
Managing Cloud Security
Managing Cloud Security prepares learners to safeguard cloud data with identity and access management and to implement secure solutions in cloud service models. Learners will be introduced to skills in identifying security policies and procedures for cloud applications and in implementing operational capabilities, procedures, and training in relation to organizational needs. Learners will also gain skills in conducting risk analysis and risk management in alignment with disaster recovery and business continuity plans and in identifying legal, compliance, and ethical concerns.
Ethics & Cyber Law
Legal Issues in Information Security
Legal Issues in Information Security provides learners with exposure to the laws and ethical issues of cybersecurity and the importance of compliance. Learners explore the fundamental standards, frameworks, and best practices of data privacy and data privacy protection. Next, learners are exposed to the legal requirements and frameworks necessary to ensure organizational policies and procedures are compliant. Finally, learners will analyze legal requirements and best practices for protecting organizations from security incidents and understand the training and education necessary for creating employee awareness.
Software
Software Security and Testing
This course prepares you to recognize security vulnerabilities in software, to plan interventions to address security vulnerabilities where they exist, and to develop and test these interventions. The course covers topics in Web security, permissions, and identity security; debugging; log file analysis; API security; and encryption and cryptography concepts.
Networking
Python for IT Automation
Python for IT Automation covers the fundamentals of the Python language and its features to control program flow, inform decisions, and automate IT tasks and processes. The course emphasizes a systematic approach to solving problems and the application of programming logic to administer secure, scalable, and resilient IT networks and systems.
Computer Science
Practical Applications of Prompt
The Practical Applications of Prompt course introduces learners to generative artificial intelligence (AI). This course aims to allow learners to gain skills for writing effective prompts and develop more effective conversations with artificial intelligence. Practical Applications of Prompt will lead learners to explore why prompt engineering is necessary. The course also aims to help learners, regardless of background, increase prompt fluency, which is fluency in using prompt effectively. The course teaches learners how to create effective prompts to elicit information with consideration of scope, specificity, and context; additionally, it teaches learners to evaluate the medium of the prompt and adjust prompts to output relevant results. The last section of the course focuses on ways to evaluate the efficacy of prompts and improve the depth and quality of analytical investigations. This approach prepares students to navigate the complexities of working with generative AI and use these skills effectively throughout their careers.
Operating Systems
Linux Foundations
Linux Foundations prepares learners for the LPI Linux Essentials certification, and is an introduction to Linux as an operating system as well as an introduction to open-source concepts and the basics of the Linux command line. Learners will gain skills in identifying the fundamentals of open-source software and to develop resources for data access and security.
Information Assurance
Introduction to Cryptography
Introduction to Cryptography introduces students to foundational cryptography concepts and explore implementing encryption methods with symmetric and asymmetric algorithms. Students analyze principles and operations of cryptographic algorithms and protocols in secure systems. Students use cryptography frameworks and standards in alignment with organizational and information security guidelines.
Scripting and Programming
Scripting and Programming - Foundations
Scripting and Programming - Foundations introduces programming basics such as variables, data types, flow control, and design concepts. The course is language-agnostic in nature, ending in a survey of languages, and introduces the distinction between interpreted and compiled languages. Learners will gain skills in identifying scripts for computer program requirements and in using fundamental programming elements as part of common computer programming tasks. Learners will also gain an understanding of the logic and outcome of simple algorithms.
Business of IT
Business of IT - Applications
Business of IT - Applications examines Information Technology Infrastructure Library (ITIL®) terminology, structure, policies, and concepts. Focusing on the management of information technology (IT) infrastructure, development, and operations, learners will explore the core principles of ITIL practices for service management to prepare them for careers as IT professionals, business managers, and business process owners. This course has no prerequisites.
Business of IT - Project Management
In this course, students will build on industry standard concepts, techniques, and processes to develop a comprehensive foundation for project management activities. During a project's life cycle, students will develop the critical skills necessary to initiate, plan, execute, monitor, control, and close a project. Students will apply best practices in areas such as scope management, resource allocation, project planning, project scheduling, quality control, risk management, performance measurement, and project reporting. This course prepares students for the following certification exam: CompTIA Project+.
Penetration Testing
Penetration Testing and Vulnerability Analysis
Penetration Testing and Vulnerability Analysis introduces learners to the skills necessary to perform penetration testing and vulnerability management within an organization. The course covers widely used penetration testing techniques and tools that focus on planning and scoping, information gathering, vulnerability identification, and attacks and exploits. In addition, it offers hands-on experience and a focus on penetration testing engagement plans.
Hacking Countermeasures and Techniques
Cyber Defense and Countermeasures
Traditional defenses—such as firewalls, security protocols, and encryption—sometimes fail to stop attackers determined to access and compromise data. This course provides the fundamental skills to handle and respond to computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students learn how to leverage intelligence and threat detection techniques; analyze and interpret data; identify and address vulnerabilities; suggest preventative measures; effectively respond to and recover from incidents; and handle various types of incidents, risk assessment methodologies, and various laws and policies related to incident handling. This course prepares students for the CompTIA Cybersecurity Analyst (CySA+) certification exam. The following courses are prerequisites: Networks and Network and Security – Applications.
Secure Systems Analysis & Design
Fundamentals of Information Security
Fundamentals of Information Security lays the foundation for understanding terminology, principles, processes, and best practices of information security at local and global levels. It further provides an overview of basic security vulnerabilities and countermeasures for protecting information assets through planning and administrative controls within an organization.
Information Systems Security
IT security professionals must be prepared for the operational demands and responsibilities of security practitioners including authentication, security testing, intrusion detection and prevention, incident response and recovery, attacks and countermeasures, cryptography, and malicious code countermeasures. This course provides a comprehensive, up-to-date global body of knowledge that ensures students have the right information, security knowledge, and skills to be successful in IT operational roles to mitigate security concerns and guard against the impact of malicious activity. Students demonstrate how to manage and restrict access control systems; administer policies, procedures, and guidelines that are ethical and compliant with laws and regulations; implement risk management and incident handling processes; execute cryptographic systems to protect data; manage network security; and analyze common attack vectors and countermeasures to assure information integrity and confidentiality in various systems.
Digital Forensics and Incident Response
Digital Forensics in Cybersecurity
Digital Forensics in Cybersecurity examines the specialized field of digital forensics within the context of computer security. This course focuses on the techniques, tools, and processes used to investigate cybercrimes and security breaches, analyzing digital evidence to report findings in preparation for a possible legal action. It bridges the gap between theoretical knowledge and practical skills, preparing students to tackle real-world security challenges through the lens of digital forensics.
Networks
Networks
Networks introduces skills in configuring networking components and a network infrastructure. Learners will gain skills in optimizing network operations for availability, performance, and security, and in troubleshooting network issues. The course prepares learners for the CompTIA Network+ certification exam. Network and Security - Foundations is a prerequisite for this course.
Data Science
Data Analytics - Applications
Data Analytics Applications covers advanced concepts across the various phases of the data product lifecycle. You will learn to choose and apply appropriate techniques for data management and data manipulation, statistical analysis, visualization, and data governance concepts to satisfy business needs.
Artificial Intelligence
Introduction to AI and Security
Introduction to AI and Security provides an overview of critical terminology and key concepts for artificial intelligence (AI). Students explore the history, development, and evolution of AI along with its limitations and ethical issues. Students further explore best practices for securing AI within professional environments. Contextualized examples offer students an opportunity explore how AI is used in security operations.
Capstone
Cybersecurity and Information Assurance Capstone
Cybersecurity and Information Assurance Capstone is the capstone experience for security and information assurance practitioners. Throughout the program, learners have learned best practices, compliance guidelines, and frameworks necessary in information security. This capstone puts learner knowledge to the test by having them respond to an information security scenario, research and create a proposal, provide an executive summary, and ultimately create a technical report that utilizes feedback from their peers.
38 Courses
Program consists of 38 courses
At WGU, we design our curriculum to be timely, relevant, and practical—all to help you show that you know your stuff.
Program Guide
Capstone Project
Special requirements for this program
At the end of your program, you will complete a capstone project—this project consists of a technical work proposal, the proposal’s implementation, and a post-implementation report that describes the graduate’s experience. The capstone will have a collaborative element, allowing students to work together to iterate on cybersecurity challenges and innovative solutions
Request Info
WGU vs. Traditional Universities
Compare the Difference
Traditional Universities
AVG. cost
For 3RD PARTY IT CERTIFICATIONS
$350*
Included with your tuition cost
TUITION STRUCTURE
Per credit hour
Flat rate per 6-month term
SUPPORT
Schedule and wait days or even weeks to meet with one of many counselors
Simply email or call to connect with your designated Program Mentor who supports you from day one
EXAMS
Scheduled time
Whenever you feel ready
SCHEDULE
Professor led lectures at a certain time and place
Courses available anytime, from anywhere
TIME TO FINISH
Approximately 4 years, minimal acceleration options
As quickly as you can master the material, typically less than 3 years
TRANSFER CREDITS
Few accepted, based on certain schools and specific courses
A generous transfer policy that is based on your specific situation
*The cost of valuable industry certification exams can range from $150 to $400. At WGU, we offer vouchers for certification exams, so the cost is included in your tuition price. Students may have to pay additional fees for membership to complete the certification requirements.
Apply Now
Traditional Universities
AVG. cost
For 3RD PARTY IT CERTIFICATIONS
$350*
AVG. cost
For 3RD PARTY IT CERTIFICATIONS
Included with your tuition cost
TUITION STRUCTURE
Per credit hour
TUITION STRUCTURE
Flat rate per 6-month term
SUPPORT
Schedule and wait days or even weeks to meet with one of many counselors
SUPPORT
Simply email or call to connect with your designated Program Mentor who supports you from day one
EXAMS
Scheduled time
EXAMS
Whenever you feel ready
SCHEDULE
Professor led lectures at a certain time and place
SCHEDULE
Courses available anytime, from anywhere
TIME TO FINISH
Approximately 4 years, minimal acceleration options
TIME TO FINISH
As quickly as you can master the material, typically less than 3 years
TRANSFER CREDITS
Few accepted, based on certain schools and specific courses
TRANSFER CREDITS
A generous transfer policy that is based on your specific situation
Apply Now
*The cost of valuable industry certification exams can range from $150 to $400. At WGU, we offer vouchers for certification exams, so the cost is included in your tuition price. Students may have to pay additional fees for membership to complete the certification requirements.
Why WGU?
Earning Potential
According to a 2024
Harris Poll
, just two years after graduation, WGU grads report earning $22,200 more per year, and that amount increases to $30,300 four years after graduation.
PAYING FOR SCHOOL
On Your Schedule
No class times, no assignment deadlines. You are in charge of your learning and schedule. You can move through your courses as quickly as you master the material, meaning you can graduate faster.
A FLEXIBLE SCHEDULE
Online Courses
The cybersecurity bachelor's degree at WGU is online, which means it works wherever you are. You can do your coursework at night after working at your full-time job, on weekends, while you're traveling the world or on vacation—it's up to you.
ADMISSIONS INFO
Accredited, Respected,
Recognized™
One important measure of a degree’s value is the reputation of the university where it was earned. When employers, industry leaders, and academic experts hold your alma mater in high esteem, you reap the benefits of that respect. WGU is a pioneer in reinventing higher education for the 21st century, and our quality has been recognized.
ABET logo
IT CERTIFICATIONS
3rd Party Cybersecurity Certifications Included
Industry certifications in this degree program currently include, but not limited to: CompTIA CySA+, CompTIA Project+, CompTIA Security+, (ISC)2 certs and more.
The cost of these certifications is
included in your tuition
, helping you save money as you enhance your skills in IT security. Earning certifications before you’ve even finished your degree gives you the knowledge, skills, and credentials that will immediately boost your résumé.
SEE MORE ABOUT CERTIFICATIONS
ITIL® 4 Foundation Certification
A+
Data +
Network+
Security+
Project+
CySA+
Network Vulnerability Assessment Professional
Network Security Professional
Security Analytics Professional
PenTest+
IT Operations Specialist
Secure Infrastructure Specialist
Linux Essentials
As well as:
Certified Cloud Security Professional (CCSP) – Optional Voucher
Systems Security Certified Practitioner (SSCP) – Optional Voucher
COST & TIME
An Affordable Cybersecurity Bachelor's Degree
By charging per six-month term rather than per credit—and empowering students to accelerate through material they know well or learn quickly—WGU helps students control the ultimate cost of their degrees. The faster you complete your program, the less you pay for your degree.
Apply FREE
Tuition Calculator
Pay less by completing your program faster
TOTAL COST:
YEARS
Cost Breakdown
Tuition
4,410
E-Books and Resources Fee
200
TOTAL (per 6-month term)
6-month terms
Total Cost
A College Degree Within Reach
There is help available to make paying for school possible for you:
The average student loan debt of WGU graduates in 2022 (among those who borrowed) was less than half* the national average.
Responsible Borrowing Initiative
Most WGU students qualify for financial aid, and WGU is approved for federal financial aid and U.S. veterans benefits.
Financial Aid
Find out if you're eligible for the $5,000
WGU Cybersecurity Scholarship
Scholarships
WGU undergraduate students have approximately half the debt at graduation compared to the national average, according to the Institute for College Access and Success (2022).
FLEXIBLE SCHEDULE
A Different Way to Learn: Degree Programs Designed to Fit Your Life—and All the Demands on Your Time
Professional responsibilities. Family obligations. Personal commitments. At WGU, we understand schedules are tight and often unpredictable for adult students. That’s why we offer a
flexible, personalized
approach to how education should be. No rigid class schedules. Just a solid, career-focused teaching program that meshes with your current lifestyle. You'll be challenged. You'll work hard. But if you commit yourself and put in the hours needed, WGU makes it possible for you to earn a
highly respected degree
as a busy working adult.
REQUEST MORE INFO
"Honestly, for my lifestyle and career path, WGU has been the best. I've been working in IT for over 20 years. The classes were, for the most part, directly tied to my experience, which made it easier. The certifications are great. Each instructor was helpful as needed and the resources that the program offers are very helpful.”
—Matthew
B.S. Cybersecurity and Information Assurance
CAREER OUTLOOK
An IT Degree that Leads to an In-Demand Career
So much of modern life takes place online: social interactions, work, banking, shopping, and more—which only increases the demand for experts who can protect sensitive information from cyberattacks. The
knowledge, techniques, and certifications
you’ll earn as you complete your cybersecurity and information assurance degree will prepare you to successfully fill the ever-growing demand for information security specialists.
Every industry
and private citizens are counting on our cybersecurity and information assurance experts to detect system vulnerabilities and protect sensitive data. An online degree in cybersecurity from WGU allows you to
become a key member
of any security team, protecting reputable organizations and government agencies from attackers.
MORE ABOUT CAREERS
Return on Your Investment
Many WGU graduates may see an increase in income post-graduation
Average income increase in annual salary vs. pre-enrollment salary from all degrees. Source:
2024 Harris Poll
of 1,655 WGU graduates.
Survey was sent to a representative sample of WGU graduates from all colleges. Respondents received at least one WGU degree since 2017.
33%
The number of positions for information security analysts is projected to
grow by 33% through 2033
—U.S. Bureau of Labor Statistics
WGU's Cybersecurity and Information Assurance Grads are Doing Crucial White-Hat Work
Our B.S. Cybersecurity and Information Assurance alumni have great jobs and satisfying careers. Examples of work our cybersecurity grads are doing include:
Job Titles
Cybersecurity Analyst
Cybersecurity Engineer
Vulnerability Assessment Analyst
Cybersecurity Architect
Penetration Tester
Diverse Industries
Private business
Government
Military
Healthcare
Colleges and universities
Major Employers
U.S. Department of Defense
Northrop Grumman
Microsoft
Kaiser Permanente
Booz Allen Hamilton
WGU Grads Hold Positions With Top Employers
Explore More
ADMISSIONS
Bachelor of Science in Cybersecurity Admission Requirements
To be considered for enrollment into this program, you must possess a high school diploma or its equivalent AND demonstrate program readiness through
one
of the following:
Option 1:
Submit all transcripts documenting completion of college-level coursework with a minimum of 2.75 cumulative GPA or higher.
Option 2:
Possess a bachelors or associate degree (A.A, A.S. or A.A.S. acceptable) from an accredited post-secondary institution.
Option 3:
Submit official record of completion of a transferable IT certification, some of which
may provide transfer credit
into various programs.
Option 4:
Submit all high school transcripts with a minimum cumulative GPA of 3.0
Option 5:
Submit all transcripts documenting completion of previous IT coursework. IT coursework must be 300 level or higher.
NOTE: You do not need to take the ACT or SAT to be admitted to this program.
Learn why we don't require these tests.
GENERAL ADMISSION REQUIREMENTS
Get Your Enrollment Checklist
Download your step-by-step guide to enrollment.
VIEW CHECKLIST
Get Your Questions Answered
Talk to an WGU Enrollment Counselor.
CONTACT AN ENROLLMENT COUNSELOR
Transfer Credits
TRANSFER INFORMATION
Frequently Asked Questions About Online Cybersecurity Degree Programs
WGU is one of the highest rated schools for cybersecurity, receiving top accreditation and awards for the program. This degree program also gives you the opportunity to earn top industry certifications as part of the degree program at no extra cost.
Absolutely. Research shows that
45 percent of cybersecurity job postings r
equire at least a bachelor's degree, and 45 percent require at least a master's degree. So earning a bachelor's degree in cybersecurity is critical in helping you be trained and qualified for job opportunities. Cybersecurity degree programs don't have to be expensive or time consuming, making them even more worth your time and money.
There are many kinds of degrees you can earn online including:
Cybersecurity
Accounting
Nursing
Elementary education
Software development
Cloud computing
Healthcare management
Marketing
IT management
Business management
Cybersecurity degrees tend to be challenging in their computing, coding, and scripting aspects. However, if you have a mind for that kind of work, cybersecurity can be exciting and extremely rewarding. Cybersecurity tends to be less labor intensive than lab-based work, but does take time and dedication to master.
An online bachelor's degree in information systems security or cybersecurity can prepare students for career paths focused on network systems, application security, business continuity, and more. An online bachelor's degree may also be ideal for students who are also working professionals.
Ready to Start?
Apply Today
The University
Accreditation
Newsroom
Careers
WGU Store
For Students
Student Portal
Admissions
Catalog
Title IX
Alumni Services
Achievement Wallet
Most Visited Links
Business Programs
Bachelor's Degrees
Student Experience
Online Degrees
Scholarships
Support
Military
Scholarships
Financial Aid
Faculty
Testimonials
Student Communities
Cookie Policy