Bachelor of Applied Arts and Sciences – Emphasis in Cybersecurity Online

Divider

Take the next bold step in your career with this flexible, accelerated program for AAS graduates. Complete your cybersecurity bachelor’s degree online and finish faster, whether you're ready to level up your skills or enter this exciting field.

Apply by: 7/28/26
Start class: 8/18/26

Program Overview

Earn your cybersecurity bachelor’s degree online and meet the evolution of technology with future-focused skills

The fast-track Lamar University Bachelor of Applied Arts and Sciences – Emphasis in Cybersecurity program is tailored to AAS graduates, providing an efficient pathway to degree completion. Finish your remaining undergraduate coursework and focus on developing professional leadership, problem-solving and communication skills that prepare you for promotion or a career pivot to this exciting industry.

Build on your AAS transfer credits with cybersecurity courses in networking, programming, AI and cybercrime forensics. Study whenever you choose from any location with 100% online courses that are available 24/7.

Upon graduation, your diploma will reflect the Bachelor of Applied Arts and Sciences degree. Emphasis areas will not be noted.

In this cybersecurity BAAS program, you will:

  • Learn personal productivity concepts to help achieve goals in a professional context
  • Create a clear and compelling vision statement and apply strategies to time management in your profession
  • Develop and apply strategies for goal setting and task prioritization around various professional roles
  • Develop a technology and energy management plan for use in professional environments
  • Learn personal productivity concepts to help achieve goals in a professional context
  • Create a clear and compelling vision statement and apply strategies to time management in your profession
  • Develop and apply strategies for goal setting and task prioritization around various professional roles
  • Develop a technology and energy management plan for use in professional environments

Career opportunities with a BAAS Cybersecurity degree include:

  • Cybersecurity Technician
  • IT Security Support Specialist
  • Network Security Assistant
  • Governance, Risk and Compliance (GRC) Technician
  • Cybersecurity Technician
  • IT Security Support Specialist
  • Network Security Assistant
  • Governance, Risk and Compliance (GRC) Technician

Also available:

Lamar University offers a range of online BAAS degree programs in high-growth professional fields, each built around a distinct emphasis area.

Per Credit Hour $314*
Transfer Credits Up to 90
Credit Hours 120

*Price includes distance learning fee.

Apply Now

Need More Information?

Call 866-223-7675

Call 866-223-7675

Tuition

Learn about tuition for the cybersecurity BAAS program

The following is the tuition breakdown for students pursuing the BAAS – Emphasis in Cybersecurity online program. Our affordable, pay-by-the-course tuition helps you keep your education costs in check.

Financial Aid

Ready to get started on your degree program online but need help finding ways to fund your education? We can help you discover student financing sources that include grants, loans and other payment options. Learn more about financial aid here.

Tuition breakdown:

Per Credit Hour $314*

Calendar

Discover program start dates and deadlines

Our BAAS Cybersecurity undergraduate degree program features multiple start dates to accommodate your busy schedule. Choose the application deadline that works best for you and begin earning your degree any time of year.

8 week coursesProgram Start DateApplication DeadlineDocument DeadlinePayment DueLast Class Day
Fall 18/18/267/28/268/4/268/11/2610/9/26
Fall 110/12/269/21/269/28/2610/6/2612/10/26

Now enrolling:

Apply Date 7/28/26
Class Starts 8/18/26

Have questions or need more information about our online programs?

Ready to take the rewarding path toward earning your degree online?

Admissions

Review admission guidelines for the BAAS Cybersecurity undergraduate degree

The BAAS Cybersecurity program has specific requirements that applicants must meet to enroll. Please read the admission guidelines carefully to ensure you qualify.

Admission Requirements:

  • AAS Degree in Cybersecurity
  • Official Transcripts

University Admission Requirements

All applicants must complete an application packet, consisting of:

  • Complete online application and pay an application fee of $25
  • Submit official transcripts from all high schools, colleges and universities you have attended
    • All transcripts are required regardless of accreditation. Only regionally accredited institutions will be eligible for transfer credit.
  • Verify specific requirements associated with chosen degree program

BAAS – Emphasis in Cybersecurity Admission Requirements

  • Completed AAS degree from a regionally accredited community college, with a major in cybersecurity
  • Proficiency in programming, demonstrated through programming courses completed for the AAS degree (grade of B or higher required)

If you have not completed previous programming courses or do not meet the programming grade requirement, you must complete UNIX/C++ (COSC 3306) with a grade of B or higher before enrolling in other Cybersecurity BAAS courses.

Courses

Explore the BAAS curriculum, including cybersecurity courses

The cybersecurity BAAS degree is comprised of 120 hours, including up to 42 hours in AAS transfer credit, 33 hours in emphasis-area classes and general education coursework needed to meet bachelor's degree requirements.


Duration: 8 Weeks weeks
Credit Hours: 3
Programming in C ++ in a UNIX environment.

By the end of this course, students should be able to:

  • Apply appropriate C++ programming techniques to design project
  • Solve real-world problem using C++ programming language
  • Compare and evaluate the effectiveness of various programming techniques
Duration: 8 Weeks weeks
Credit Hours: 3
This course introduces the ethical style of good writing in computer science and presents the social, legal, philosophical, and economic issues related to computers.

This course does not need computer programming. There are six main objectives of this course:

  • Give an introduction to the ethical style of good writing in computer science
  • Present the social, legal, philosophical and economic business issues related to computers that members of a technological society might face in their professional and civic lives
  • To discuss copyright laws/issues and business model ethical acquisition and use of digital information, citing sources using established methods
  • Describe proper business etiquette and knowledge of acceptable use policies when using networks, especially resources on the internet and intranet
  • Discuss measures, such as passwords or virus detection/prevention, to protect computer systems and databases from unauthorized use and tampering
  • Describe the impact of computer programming on the World Wide Web (WWW) community
Duration: 8 Weeks weeks
Credit Hours: 3
Systems analysis, software requirements analysis and definition, specification techniques, software design methodologies, performance measurement, validation and verification and quality assurance techniques.

By the end of this course, students should be able to:

  • Demonstrate understanding of the fundamental principles and concepts of software engineering
  • Applying appropriate software engineering principles in software development
  • Illustrate confidence in object-oriented programming, based software design
  • Applying software quality assurance concepts in the development process
  • Demonstrate the skills required to work in a team to develop a software system
Duration: 8 Weeks weeks
Credit Hours: 3
This course covers five main secure software engineering topics, such as security, defensive programming, reliability, program understandability and programmer misconception.

Upon successful completion of this course, students will be able to:

  • Examine software programs to determine software security threats
  • Apply defensive programming strategies and modify object-oriented software code to eliminate software security threats
  • Design the proper documentation of previous security breaches in the software system
  • Demonstrate the secure software mindset by recognizing risks, threats and defenses in real-world context.
  • Design and build secure software systems by applying vulnerability identification and mitigation techniques
  • Ensure software reliability through effective testing, validation and error-handling procedures
  • Enhance program understandability by producing maintainable, modular code and clear documentation
  • Identify and correct common programmer misconceptions that lead to insecure systems
  • Perform offensive security assessments, including vulnerability scanning, malware defense and CVSS scoring, to evaluate software resilience
  • Apply ethical, compliant and professional practices, demonstrating teamwork and awareness of the societal impact of secure software engineering
Duration: 8 Weeks weeks
Credit Hours: 3
Introduction to concepts and ideas in artificial intelligence. Topics include search techniques, knowledge representation, control strategies and advanced problem-solving architecture.

After the completion of this course, students should be able to:

  • Apply both uninformed and informed search algorithms to solve complex problems and optimize search efficiency
  • Utilize formal logic and constraint satisfaction methods to model and solve AI problems, ensuring sound reasoning in decision-making processes
  • Implement probabilistic reasoning techniques to manage uncertainty and make informed predictions.
  • Analyze and apply decision theory, Markov Decision Process and Hidden Markov Model to develop AI agents capable of making optimal decisions under uncertainty
  • Design and evaluate reinforcement learning algorithms to enable agents to learn optimal policies through interaction with their environment
  • Demonstrate skills for implementing AI-based solutions in groups
Duration: 8 Weeks weeks
Credit Hours: 3
This course provides a hands-on study of various attacks and defending techniques on computer software and hardware, including malware, OS security, web security, smartphone security and hardware security. Basics of C programming, OS and HTML will also be covered.

Students who successfully complete this course will be able to:

  • Describe the nature of threats and vulnerabilities in most software, networks, systems, websites and applications
  • Explain a network intrusion, breach or attack, and then design methods for its secure protocol
  • Secure systems that are not vulnerable to application program attack, such as a buffer overflow attack
  • Construct websites that are not vulnerable to attack, such as XSS attacks or SQL injection attacks
  • Know cryptography techniques, such as RSA and MAC
  • Infer the vulnerabilities in emerging technologies
Duration: 8 Weeks weeks
Credit Hours: 3
This course analyzes the phases, processes and challenges of cybercrime investigations, and it examines technical, legal and social issues relating to the search and seizure of digital evidence and computer forensics.
Duration: 8 Weeks weeks
Credit Hours: 3
This course provides a hands-on study of various network attacks and defending techniques, including main vulnerabilities of TCP/IP protocols, attacks on DNS servers, DoS attacks, Firewalls, VPN's, TLS and Blockchain. Basics of TCP/IP protocols and cryptography will also be covered.

Students who successfully complete this course will be able to:

  • Explain how the internet works
  • Describe and generalize various network vulnerabilities
  • Simulate common attacks on TCP/IP, such as IP spoofing and TCP session hijacking
  • Simulate and compare various network security mechanisms, such as firewalls and VPNs
Duration: 8 Weeks weeks
Credit Hours: 3
To introduce the major concept areas of operating systems principles develop an understanding of the organization and architecture of computer systems at the register-transfer and programming levels of system description and the inter-relationships between the operating system and the architecture of computer systems.

By the end of this course, students will understand:

  • Master fundamental concepts of operating systems, such as device management, process management, memory management and file management
  • Device drivers and I/O management, such as polling and interrupt-driven I/O operations
  • Process management, such as abstract machines, address space, context switch, process, thread, state transition diagram and resource models
  • Memory management such as virtual memory, segmentation, paging and swapping
  • File management, such as basic read and write file operations
  • CPU scheduling, such as design and implementation of scheduler, preemptive scheduling policies and non-preemptive scheduling policies
  • Basic and high-level synchronization principles, such as critical section, deadlock, binary semaphore, general semaphore, readers–writers problem, bounded–buffer problem, dining philosophersproblem, monitor, conditional variable, signals and basic inter-process communication
  • How to develop corresponding programs using Unix system calls, such as fork(), signal(), pthread_create(), fopen(), sleep(), sem_ init() and wait()
  • How to analyze software development problems, design and implement software solutions, and write technical reports. There will be a term project, in which a complex problem will be analyzed, designed, implemented and documented.
Duration: 8 Weeks weeks
Credit Hours: 3
This is an introductory course in Android programming. Topics include history of Android, hardware, development tools, text-based applications, multi-media applications, accessing the Internet from an application, and user interface design.

Students who successfully complete this course will be able to:

  • Identify, install and evaluate software for Android using the Java programming language
  • Create interactive Android applications using layouts, buttons and preferences
  • Create interactive Android applications that draw 2D graphics on a full-screen view
  • Create Android applications that launch other applications and access the internet
  • Demonstrate an understanding of new technological developments in Android
Duration: 8 Weeks weeks
Credit Hours: 3
Logical and physical database system organization; logical models; design issues; secondary storage considerations. Design issues emphasizing the normal decomposition theory of the n-ary relational data model, the RM/T model and an introduction to logical implementations of databases.

The student who successfully completes the course will be able to:

  • Understand the design and implementation of a working database system for a real-world project
  • Understand structured query language for query and manipulation of data as well as formaintaining the integrity of stored data in a database
  • Apply mathematical and theoretical underpinnings of database systems
  • Investigate the major operational issues associated with database management systems, such as issues related to database design and queries
  • Create a brief technical report or presentation of selected research areas of database management systems
Duration: 8 Weeks weeks
Credit Hours: 3
This course is an introduction to machine learning, the study of how to make a machine change its actions automatically to improve its performance.

Upon successful completion of this course, students will be able to:

  • Implement machine learning algorithms like linear regression, logistic regression, decision trees and support vector machines to solve real-world problems across diverse domains
  • Use evaluation metrics (e.g., accuracy, precision, recall, F1-score) to assess the effectiveness and suitability of machine learning models for specific applications.
  • Implement unsupervised learning techniques by applying k-means clustering and principal component analysis (PCA) for pattern recognition, anomaly detection and dimensionality reduction in large data sets
  • Design and implement deep learning models (e.g., neural networks, CNNs, RNNs) for complex applications like image recognition, NLP and time-series forecasting
  • Integrate and utilize data preprocessing techniques, such as feature engineering, data cleaning and normalization to optimize data for machine learning algorithms
  • Work in teams to collaborate and complete machine learning projects, demonstrating skills in problem-solving, model implementation and performance evaluation
  • Evaluate model interpretability and ensure the explainability of machine learning models, particularly in sensitive domains like healthcare and finance
  • Utilize machine learning methods to address real-world challenges in healthcare, chemistry, autonomous vehicles and cybersecurity.
  • Use advanced machine learning methods like reinforcement learning, adversarial learning and probabilistic modeling to solve complex problems across multiple sectors
  • Actively attend and listen to research paper presentations by master's students to engage with advanced applications of machine learning, cutting-edge software development techniques and emerging technologies in the field. Engage critically by asking questions to further understand advanced methods that can inform and enrich their own work.
Duration: 8 Weeks weeks
Credit Hours: 3
Topics include system security, shell programming, setting up user accounts, system configuration, system startup, management of file systems and disks, and backup and restore operations.

By the end of this course, students will be able to:

  • Demonstrate successful Installation of a Linux system server and setup services
  • Perform various tasks in order to maintain network services, protocols and processes in a Linux environment
  • Configure multiple types of applications, servers and services
Duration: 8 Weeks weeks
Credit Hours: 3
This course is about principles and applications of computer communication, networking communication protocols, the internet, LANs, packet-switching networks, network architecture.

At the conclusion of this course, students will be able to:

  • Master fundamental concepts of computer networks and their applications: OSI layers, Telnet, Secure Shell and WWW
  • Understand socket programming and develop basic network protocol software and algorithms, such as socket(), bind(), listen(), accept(), send() and recv()
  • Understand OSI model layers: – physical layer, data link layer, network layer, transport layer and application layer
  • Understand fundamentals of data transmission
  • Understand Local Area Networks (LANs) and data link protocols: Carried Sense Multiple Access (CSMA)/collision detection, 802.3 and the Spanning Tree Algorithm
  • Understand internet working, IP, TCP and UDP: packet format, IP address, IP packet forwarding, IP encapsulation, fragmentation and reassembly, CIDR, port, TCP flow control and TCP congestion control
  • Understand routing: Distance Vector Routing, Link State Routing, RIP, OSPF and BGP
  • Understand client-server interaction
  • Understand high-level network services: DNS, FTP, HTTP and SMNP
  • Understand the basic concepts of network security, secret key, public/private key and hashing
  • Perform simulation of network protocols: metric to evaluate protocol performance and simulation of networking protocols
  • Understand ethical issues of computer networks: hacking and computer crimes, identity theft, anonymity, intellectual property, censorship, related laws and related cases
Duration: 8 Weeks weeks
Credit Hours: 3
This is an introductory course to the Internet of Things (IoT). The course provides an overview of three key modules for IoT: sensing, networking, and applications. It involves the study of the impact of existing wireless and mobile network architectures on different IoT designs and further focuses on those distinct characteristics that require a fundamental redesign. Protocols for medium access control, routing, and reliable transport, in addition to middleware and applications custom-made for IoT, will be dealt with.

Upon successful completion of this course, the student will be able to:

  • Identify the principles of cellular, Wi-Fi, Bluetooth, sensor and ad-hoc networking
  • Explain the impact of wireless network characteristics on existing network protocols in IoT
  • Apply network design principles to new protocols that are suited to the characteristics of different IoT applications

Communication - 6 Hours
Mathematics - 3 Hours
Life and Physical Sciences - 6 Hours
Language, Philosophy and Culture - 3 Hours
Creative Arts - 3 Hours
American History - 6 Hours
Government/Political Science - 6 Hours
Social/Behavioral Sciences - 3 Hours
Component Area Options - 6 Hours

Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 8 Weeks weeks
Credit Hours: 3
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks
Duration: 7 Weeks weeks

42 hours of technical or academic credit taken as part of completed AAS degree.

Request More Information

Submit this form, and an Enrollment Specialist will contact you to answer your questions.

Begin Application Process

Begin your application today!
Or call 866-223-7675 866-223-7675

to talk to a representative.