Bachelor of Science in Cybersecurity
(3-Year Program)

The Bachelor of Science in Cybersecurity program cultivates a comprehensive understanding of information security principles and practices. Through a curriculum that integrates technical expertise with legal and ethical frameworks, the program equips students with the necessary skills to analyze cyber threats, design secure systems, and implement effective incident response strategies. This interdisciplinary approach fosters graduates prepared to address the ever-growing challenges of the digital landscape.

 

INSTITUTIONAL MANDATE, PHILOSOPHIES AND GOALS:

Institutional Mandate:

The Bachelor of Science in Cybersecurity program aligns with the institution’s mandate to prepare graduates for careers that address critical societal needs. In today’s digital age, cybersecurity is a paramount concern, and this program directly contributes to fostering a skilled workforce capable of safeguarding information systems and infrastructure.

Philosophies:

Interdisciplinarity: The program integrates technical knowledge with legal and ethical frameworks, recognizing the multifaceted nature of cybersecurity challenges.

Active Learning: Students are encouraged to develop critical thinking and problem-solving skills through hands-on exercises, simulations, and practical applications.

Lifelong Learning: The program emphasizes the importance of continuous learning in the ever-evolving cybersecurity landscape.

Download Curriculum

The complete program curriculum for Bachelor of Science in Cybersecurity

Download Student Manual

The Student Manual for Bachelor of Science in Cybersecurity (BS-CYBER)

LEVEL OUTCOMES

  • Produce graduates with a deep understanding of cybersecurity principles and practices. This includes technical expertise in network security, digital forensics, cryptography, and system administration.
  • Develop critical thinking and analytical skills to identify and mitigate cyber threats.
  • Foster ethical and responsible practices in the use and protection of information systems.
  • Prepare graduates for successful careers in various cybersecurity specializations, including network defense, digital forensics, and security management.
  • Contribute to a more secure digital landscape by empowering graduates to protect information systems and infrastructure.
  • so(a.) Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
  • so(b.) Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  • so(c.) Communicate effectively in a variety of professional contexts.
  • so(d.) Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • so(e.) Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  • so(f.) Use systemic approaches to select, develop, apply, integrate and administer secure computing technologies to accomplish user goals.
Program Educational Objectives (PEO)
  • Produce graduates with a deep understanding of cybersecurity principles and practices. This includes technical expertise in network security, digital forensics, cryptography, and system administration.
  • Develop critical thinking and analytical skills to identify and mitigate cyber threats.
  • Foster ethical and responsible practices in the use and protection of information systems.
  • Prepare graduates for successful careers in various cybersecurity specializations, including network defense, digital forensics, and security management.
  • Contribute to a more secure digital landscape by empowering graduates to protect information systems and infrastructure.
Student Outcomes (SO)
  • so(a.) Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
  • so(b.) Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  • so(c.) Communicate effectively in a variety of professional contexts.
  • so(d.) Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • so(e.) Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  • so(f.) Use systemic approaches to select, develop, apply, integrate and administer secure computing technologies to accomplish user goals.

EMPLOYMENT OPPORTUNITIES

Employment opportunities for graduates encompass a wide range of cybersecurity specializations, including:

  • Security Analyst: Identify and analyze vulnerabilities in computer networks and systems.
  • Security Engineer: Design, implement, and maintain secure network infrastructure.
  • Penetration Tester: Ethically exploit vulnerabilities in systems to identify weaknesses and improve security posture.
  • Digital Forensics Investigator: Collect and analyze digital evidence in the wake of cyberattacks.
  • Security Architect: Develop and implement comprehensive information security strategies for organizations.
  • Salary: Prospects for cybersecurity professionals are highly competitive, reflecting the critical nature of their work and the skills gap in the workforce. This program positions graduates to capitalize on this flourishing field and pursue rewarding careers safeguarding the digital landscape.

Contact Information

Dr. Melody R. Dimaano

Department Chair – College of Computing, Arts and Sciences

[email protected]

Dr. Arnie Christian D. Villena

Dean, College of Computings Arts and Sciences

[email protected]

Office Location

Admin Building, Main Campus

 

Contact Number

(043) 723-0706 Loc 131

 

Email

[email protected]

TALK TO US TODAY!

Send us your inquiries and we would be glad to answer them.