This undergraduate degree provides the foundational knowledge and practical skills to protect computer systems, networks, and data from digital attacks. The curriculum covers key areas such as network security, digital forensics, ethical hacking, risk management, and cryptography. Students learn to identify vulnerabilities, defend against threats, and develop strategies for securing infrastructure in a constantly evolving threat landscape.
The program integrates liberal arts foundations with advanced technical training in cybersecurity. It develops graduates who can protect digital assets, analyze threats, and lead security initiatives across industries.
Liberal arts + technical security expertise
Supports WHU’s goal of producing ethical, skilled, and innovative cyber defenders
Courses aligned with NIST, CompTIA Security+, CISSP, CEH frameworks
Electives allow specialization in forensics, cloud, or AI security
Capstone integrates real-world cyber defense scenarios
Our comprehensive curriculum is structured into different blocks. Each block combines theoretical foundations and practical applications:
Essential liberal arts competencies to support critical thinking, communication, ethics, and quantitative reasoning
Code | Course title | Credits | Type |
---|---|---|---|
ENG 101 | Writing and Composition | 4 | Core |
ENG 102 | Professional Writing | 4 | Core |
MATH 110 / MATH 115 | Precalculus / Calculus for Business | 4 | Core |
STAT 120 | Introductory Statistics | 4 | Core |
HUM 210 | Critical Thinking | 4 | Core |
PHIL 225 | Cybersecurity Ethics & Digital Rights | 4 | Core |
POLS 201 | Cyber Policy & International Security | 4 | Core |
ECON 102 | Microeconomics | 4 | Core |
--- | Natural Sciences or Arts | 4 | Core |
Credits required: 32 - 36 |
Foundational cybersecurity knowledge central to the major
Code | Course title | Credits | Type |
---|---|---|---|
CYB 201 | Fundamentals of Computing & Networking | 4 | Core |
CYB 210 | Cybersecurity Principles & Practices | 4 | Core |
CYB 220 | Secure Programming & Software Vulnerabilities | 4 | Core |
CYB 230 | Database Security & Administration | 4 | Core |
CYB 240 | Operating Systems & System Hardening | 4 | Core |
CYB 250 | Incident Response & Digital Forensics | 4 | Core |
Credits required: 24 |
Students select 5 courses based on interest and career path
Code | Course title | Credits | Type |
---|---|---|---|
CYB 301 | Ethical Hacking & Penetration Testing | --- | Elective |
CYB 302 | Cloud & Virtualization Security | --- | Elective |
CYB 303 | Malware Analysis & Reverse Engineering | --- | Elective |
CYB 304 | Risk Management & Compliance (ISO, NIST, GDPR) | --- | Elective |
CYB 305 | Cryptography & Secure Communications | --- | Elective |
CYB 306 | Security Operations Center (SOC) Management | --- | Elective |
CYB 307 | Artificial Intelligence in Cybersecurity | --- | Elective |
Credits required: 20 |
Senior Capstone Project — choose one
Code | Course title | Credits | Type |
---|---|---|---|
CYB 400 | Applied Cybersecurity Internship (with industry partner) | 4 | Core |
CYB 400 | Directed Research in Cyber Threat Analysis | 4 | Core |
Credits required: 4 |
Component | Credits |
---|---|
Foundation & General education | 32 - 36 |
Core Cybersecurity courses | 24 |
Advanced Cybersecurity electives | 20 |
Capstone experience | 4 |
Total credits: 128 |
As part of the program, students have the opportunity to earn industry-recognized certifications:
Foundational certification validating core cybersecurity skills in risk management, mitigation, and threat detection
Focuses on offensive security techniques, teaching how to think like a hacker to find and fix vulnerabilities
An advanced, industry-leading certification covering security architecture, engineering, and management
Focuses on behavioral analytics and security analytics to identify and combat malware and advanced threats
Validates skills in securing cloud environments and implementing cloud-specific security best practices
Graduates of this program have pursued various rewarding career paths:
Monitors networks for security breaches and investigates cyber incidents
Legally hacks systems to find vulnerabilities before malicious actors do
Works in a Security Operations Center to detect and respond to threats in real-time
To be considered for admission, applicants must meet the following requirements: