Boston CollegeWebsiteAcademic Catalog
Computer ScienceDepartment Website
BA Degree in Cybersecuritysource 1source 2
CS Courses
- PythonorADIT1985 (4)introADIT1985: Python
This course is meant for any student interested in learning computer programming concepts with the Python programming language. We will cultivate our problem-solving abilities as we develop programs in Python. This course is suitable for students with little to no programming experience. The course will start with the basics as we discuss logical decisions and loops. Further, we will explore Python data structures such as tuples, sets, lists, and dictionaries. We will couple this knowledge to make our own classes as we learn about object-oriented programming. Throughout the semester we will discover and implement basic debugging techniques. By the end of this course, students will compose Python programs that solve problems on their own.
C++ADIT1990 (4)introADIT1990: C++An introduction to programming with C++. This course is meant for students with little or no programming experience. We will start with the basics of programming using the C++ programming language. C++ is the cornerstone programming language used to develop many of the fundamental applications we use on a daily basis. For example operating systems, web browsers and other programming languages such as Java, Python, and SQL are built with C++. We will use the low level nature of the C++ programming language to learn about the fundamental aspects of how a computer works. In this course we will develop basic command line applications, explore how data is stored in memory and how we may use logic to manipulate the data to produce different results.
- Computer SecurityADIT2000 (4)sysADIT2000: Computer Security
This course provides a strong starting foundation for understanding the complex threats system managers face today and what they need to do to harden their systems against attack. Today's business system managers need to understand these threats and know how to protect their digital assets. Students in this course will look at computer security through a variety of lenses. Specific topics will include: protecting the physical infrastructure, computer system design considerations, identity and access management functions and how they fit in, the role of network security tools, the importance of audits and having the right security processes and policies in place, business continuity and disaster recover planning, managing vendor contracts and special consideration for cloud-based systems, and ethical considerations.
- Computer NetworksADIT2100 (4)sysADIT2100: Computer Networks
This course is an in-depth study of networking utilizing the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models. A granular discussion of each layer of the model structure included reviewing core components, security vulnerabilities and options for mitigating risk. The building blocks of the Internet will be discussed including ethernet, routing, and secure communication. Network related software and utilities will be utilized throughout the class to provide a greater understanding of the technologies.
- Cybersecurity FundamentalsADIT2500 (4)sysADIT2500: Cybersecurity Fundamentals
This course introduces students to the field of, and concepts and principles of cybersecurity. Students will be introduced to various security topics including security awareness through discussing common security threats and attacks, cybersecurity infrastructure, cryptography, and an overview of risk management.
- Laws, Frameworks, and Policies in CybersecurityADIT3500 (4)impactADIT3500: Laws, Frameworks, and Policies in Cybersecurity
This course will provide an introduction to three critical areas of cybersecurity: laws, policies, and frameworks. In this course a review of data security compliance and regulatory laws including: General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley Act (SOX), Federal Information Security Modernization Act (FISMA), Family Educational Rights and Privacy Act (FERPA), Gramm-Leach-Bliley Act (GLBA), Payment Card Industry Data Security Standards (PCI DSS) will be discussed. A review of internal and external cybersecurity policies will be conducted including real-world examples. In addition, frameworks including the National Institute of Standards and Technology (NIST-800) framework will also be discussed. All of these topics will be discussed in terms of risk management and risk mitigation.
- Incident Response and Disaster RecoveryADIT3650 (4)sysADIT3650: Incident Response and Disaster Recovery
This course provides an overview of contingency planning, including incident response, disaster recovery, and business continuity planning. Effective techniques to minimize risk and downtime in emergency situations will be discussed. Tabletop exercises will be utilized to mimic actual incidents to prepare students for incident management.
Math/Stat Courses
Science Courses
Other Courses
Learning outcomes
Upon successful completion of this program, students will be able to:
- Discuss articulately and efficiently with large groups of diverse stakeholders, both technical and non-technical, to effectively demonstrate and communicate security concepts and the value of a modern cybersecurity program.
- Detect, analyze, identify, prioritize, and resolve security vulnerabilities, threats, risks, and breaches using appropriate tools.
- Develop cybersecurity programs, policies, and procedures to manage enterprise security risks.
- Apply security principles and practices to maintain operations in the presence of risks and threats.
- Demonstrate foundational knowledge of risk management strategies, including calculation of risk, evaluating risk tolerance, compensating controls, and risk management planning.
- Evaluate and communicate the human role in security systems with an emphasis on ethics, social engineering vulnerabilities and training.
- Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
- Discuss relevant laws, regulations, and frameworks as they apply to cybersecurity operations.
- Describe professional, ethical, legal, security, and social issues and responsibilities related to computing and cybersecurity.
- Upon additional review, the ability to achieve the following industry certifications: Cisco - CCNA, CompTIA - Network+, CompTIA - Security+, CompTIA - CySA+, EC-Council Ethical Hacking, ISACA - CRISC, ISACA - CISA, ISACA - CISM, (ISC)² - CCSP, (ISC)² - SSCP, (ISC)² - CISSP, ITIL Foundations.
History of the Major
2024 | Drop Woods "College Formative Seminar" and "The Purposeful Life". Replace ADIT 3010 (Technical Writing) → ADEN 2650 (Writing with Precision). |
2023 | |
2022 | New major. |