{"id":2993,"date":"2022-07-12T19:49:15","date_gmt":"2022-07-12T19:49:15","guid":{"rendered":"https:\/\/home.hamptonu.edu\/science\/?page_id=2993"},"modified":"2024-06-10T15:35:16","modified_gmt":"2024-06-10T19:35:16","slug":"computer-science-bs-cyber-security","status":"publish","type":"page","link":"https:\/\/home.hamptonu.edu\/science\/computer-science-bs-cyber-security\/","title":{"rendered":"Computer Science &#8211; BS Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2993\" class=\"elementor elementor-2993\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7aee07a elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"7aee07a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8993afb\" data-id=\"8993afb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1eb785d elementor--h-position-center elementor--v-position-middle elementor-arrows-position-inside elementor-pagination-position-inside elementor-widget elementor-widget-slides\" data-id=\"1eb785d\" data-element_type=\"widget\" data-settings=\"{&quot;autoplay_speed&quot;:&quot;8000&quot;,&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;transition&quot;:&quot;slide&quot;,&quot;transition_speed&quot;:500}\" data-widget_type=\"slides.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-slides-wrapper elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\" dir=\"ltr\" data-animation=\"fadeInLeft\">\n\t\t\t\t<div class=\"swiper-wrapper elementor-slides\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-repeater-item-27725a0 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg elementor-ken-burns elementor-ken-burns--in\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><\/div><\/div><\/div><div class=\"elementor-repeater-item-a66cb51 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg elementor-ken-burns elementor-ken-burns--in\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><\/div><\/div><\/div><div class=\"elementor-repeater-item-33f948f swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg elementor-ken-burns elementor-ken-burns--in\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><\/div><\/div><\/div><div class=\"elementor-repeater-item-07595ad swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg elementor-ken-burns elementor-ken-burns--in\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><\/div><\/div><\/div><div class=\"elementor-repeater-item-5969204 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg elementor-ken-burns elementor-ken-burns--in\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Previous slide\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-left\"><\/i>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"Next slide\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-right\"><\/i>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d7cc6d1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d7cc6d1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b305be0\" data-id=\"b305be0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4680941 elementor-widget elementor-widget-spacer\" data-id=\"4680941\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90101a4 elementor-widget elementor-widget-heading\" data-id=\"90101a4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">BS in Cyber Security \u2013 Computer Science<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9077ccd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9077ccd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c45eb85\" data-id=\"c45eb85\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c02f9d0 elementor-widget elementor-widget-text-editor\" data-id=\"c02f9d0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Bachelor of Science in Cyber Security \u2013 Computer Science Track (B.S. in Computer Science Cyber Security, CYS) focuses on providing a broad interdisciplinary information assurance and cyber security education that prepares graduates to successfully defend, protect, design, implement and maintain secure information and information systems.<\/p><h2>Program Educational Objectives &#8211; BS in Cyber Security \u2013 Computer Science Track<\/h2><h2>PEO-1: Demonstrate the knowledge and skills acquired within the Computer Science (CYS).<\/h2><table><tbody><tr><td>PEO-1-1:<\/td><td>CYS graduates will be provided with a broad general education that will prepare them to function in the world-at-large as productive and ethical professionals and as responsible citizens.<\/td><\/tr><tr><td>PEO-1-2:<\/td><td>CYS graduates will be able to serve as productive and ethical members of society and the profession. They will have a very good understanding of ethical issues and their applications.<\/td><\/tr><tr><td>PEO-1-3:<\/td><td>CYS graduates will be prepared for tasks involving the design, development, and maintenance of software in industry.<\/td><\/tr><tr><td>PEO-1-4:<\/td><td>CYS graduates will be able to apply techniques, methodologies, tools and skills to build high-quality computer-based systems that function effectively and reliably in the emerging information infrastructure.<\/td><\/tr><tr><td>PEO-1-5:<\/td><td>CYS graduates will be able to work in teams, to apply theoretical and analytical methods, to apply principles of software engineering, and to model real-world processes and objects.<\/td><\/tr><tr><td>PEO-1-6:<\/td><td>CYS graduates will be aware that graduate study is a viable option. They will have the basic skills to be competitive.<\/td><\/tr><tr><td>PEO-1-7:<\/td><td>CYS graduates will understand and be able to apply mathematics, science and concepts of computer science to graduate studies.<\/td><\/tr><tr><td>PEO-1-8:<\/td><td>CYS graduates will be aware of research areas within the discipline and basic research techniques.<\/td><\/tr><\/tbody><\/table><p>\u00a0<\/p><h2>PEO-2: Demonstrate analytical and critical thinking skills.<\/h2><table><tbody><tr><td>PEO-2-1:<\/td><td>CYS graduates will be able to work in teams, to apply theoretical and analytical methods, to apply principles of software engineering, and to model real-world processes and objects.<\/td><\/tr><tr><td>PEO-2-2:<\/td><td>CYS graduates will be provided with the necessary quantitative background for graduate studies and\/or employment in research-oriented institutions.<\/td><\/tr><\/tbody><\/table><p>\u00a0<\/p><h2>PEO-3: Demonstrate research, library and technology skills required for advanced study or employment in the discipline.<\/h2><table><tbody><tr><td>PEO-3-1:<\/td><td>CYS graduates will be able to understand and maintain computer science skills consistent with current trends and adapt to advances in technology of the computer science profession.<\/td><\/tr><tr><td>PEO-3-2:<\/td><td>CYS graduates will have the motivation and the ability to adapt to evolving methodologies of computing.<\/td><\/tr><tr><td>PEO-3-3:<\/td><td>CYS graduates will be provided with the necessary quantitative background for graduate studies and\/or employment in research-oriented institutions.<\/td><\/tr><\/tbody><\/table><p>\u00a0<\/p><h2>Student Outcomes \u2013 BS in Cyber Security<\/h2><p>By the time of graduation, students from this program are expected to know and are able to:<\/p><ol><li>Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.<\/li><li>Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the cyber security.<\/li><li>Communicate effectively in a variety of professional contexts.<\/li><li>Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.<\/li><li>Function effectively as a member or leader of a team engaged in activities appropriate to the cyber security.<\/li><li>Apply security principles and practices to maintain operations in the presence of risks and threats.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5089fd9\" data-id=\"5089fd9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f433d2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-global elementor-global-2917 elementor-widget-icon-list\" data-id=\"0f433d2\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/home.hamptonu.edu\/science\/computer-science\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Computer Science Home<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/home.hamptonu.edu\/science\/computer-science-departmental-data\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Departmental Data<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/home.hamptonu.edu\/science\/computer-science-news-events\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">News &amp; Events<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/home.hamptonu.edu\/science\/computer-science-research\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Research<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/home.hamptonu.edu\/science\/computer-science-curriculum-2\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Curriculum<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/home.hamptonu.edu\/science\/computer-science-bs-computer-science\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">BS Computer Science<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/home.hamptonu.edu\/science\/computer-science-bs-computer-info-system\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">BS Computer Info System<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/home.hamptonu.edu\/science\/computer-science-bs-cyber-security\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">BS Cyber Security<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/home.hamptonu.edu\/science\/computer-science-bs-artificial-intelligence-and-machine-learning\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">BS in Artificial Intelligence &amp; ML<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/home.hamptonu.edu\/science\/information-assurance-and-cyber-security\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Information Assurance Center<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/home.hamptonu.edu\/science\/computer-science-faculty-staff\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Faculty &amp; Staff<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/home.hamptonu.edu\/science\/computer-science-alumni\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Alumni<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Previous slide Next slide BS in Cyber Security \u2013 Computer Science The Bachelor of Science in Cyber Security \u2013 Computer Science Track (B.S. in Computer Science Cyber Security, CYS) focuses on providing a broad interdisciplinary information assurance and cyber security education that prepares graduates to successfully defend, protect, design, implement and maintain secure information and [&hellip;]<\/p>\n","protected":false},"author":119,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_mc_calendar":[],"footnotes":""},"class_list":["post-2993","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Computer Science - BS Cyber Security - School Of Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/home.hamptonu.edu\/science\/computer-science-bs-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Science - BS Cyber Security - School Of Science\" \/>\n<meta property=\"og:description\" content=\"Previous slide Next slide BS in Cyber Security \u2013 Computer Science The Bachelor of Science in Cyber Security \u2013 Computer Science Track (B.S. in Computer Science Cyber Security, CYS) focuses on providing a broad interdisciplinary information assurance and cyber security education that prepares graduates to successfully defend, protect, design, implement and maintain secure information and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/home.hamptonu.edu\/science\/computer-science-bs-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"School Of Science\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-10T19:35:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/computer-science-bs-cyber-security\\\/\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/computer-science-bs-cyber-security\\\/\",\"name\":\"Computer Science - BS Cyber Security - School Of Science\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/#website\"},\"datePublished\":\"2022-07-12T19:49:15+00:00\",\"dateModified\":\"2024-06-10T19:35:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/computer-science-bs-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/computer-science-bs-cyber-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/computer-science-bs-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Science &#8211; BS Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/#website\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/\",\"name\":\"School Of Science\",\"description\":\"School of Science\",\"publisher\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/#organization\",\"name\":\"School Of Science\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/wp-content\\\/uploads\\\/sites\\\/47\\\/2025\\\/03\\\/cropped-cropped-cropped-school_of_science_rgb_1054x250.png\",\"contentUrl\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/wp-content\\\/uploads\\\/sites\\\/47\\\/2025\\\/03\\\/cropped-cropped-cropped-school_of_science_rgb_1054x250.png\",\"width\":1052,\"height\":248,\"caption\":\"School Of Science\"},\"image\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/science\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer Science - BS Cyber Security - School Of Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/home.hamptonu.edu\/science\/computer-science-bs-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Computer Science - BS Cyber Security - School Of Science","og_description":"Previous slide Next slide BS in Cyber Security \u2013 Computer Science The Bachelor of Science in Cyber Security \u2013 Computer Science Track (B.S. in Computer Science Cyber Security, CYS) focuses on providing a broad interdisciplinary information assurance and cyber security education that prepares graduates to successfully defend, protect, design, implement and maintain secure information and [&hellip;]","og_url":"https:\/\/home.hamptonu.edu\/science\/computer-science-bs-cyber-security\/","og_site_name":"School Of Science","article_modified_time":"2024-06-10T19:35:16+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/home.hamptonu.edu\/science\/computer-science-bs-cyber-security\/","url":"https:\/\/home.hamptonu.edu\/science\/computer-science-bs-cyber-security\/","name":"Computer Science - BS Cyber Security - School Of Science","isPartOf":{"@id":"https:\/\/home.hamptonu.edu\/science\/#website"},"datePublished":"2022-07-12T19:49:15+00:00","dateModified":"2024-06-10T19:35:16+00:00","breadcrumb":{"@id":"https:\/\/home.hamptonu.edu\/science\/computer-science-bs-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/home.hamptonu.edu\/science\/computer-science-bs-cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/home.hamptonu.edu\/science\/computer-science-bs-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/home.hamptonu.edu\/science\/"},{"@type":"ListItem","position":2,"name":"Computer Science &#8211; BS Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/home.hamptonu.edu\/science\/#website","url":"https:\/\/home.hamptonu.edu\/science\/","name":"School Of Science","description":"School of Science","publisher":{"@id":"https:\/\/home.hamptonu.edu\/science\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/home.hamptonu.edu\/science\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/home.hamptonu.edu\/science\/#organization","name":"School Of Science","url":"https:\/\/home.hamptonu.edu\/science\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/home.hamptonu.edu\/science\/#\/schema\/logo\/image\/","url":"https:\/\/home.hamptonu.edu\/science\/wp-content\/uploads\/sites\/47\/2025\/03\/cropped-cropped-cropped-school_of_science_rgb_1054x250.png","contentUrl":"https:\/\/home.hamptonu.edu\/science\/wp-content\/uploads\/sites\/47\/2025\/03\/cropped-cropped-cropped-school_of_science_rgb_1054x250.png","width":1052,"height":248,"caption":"School Of Science"},"image":{"@id":"https:\/\/home.hamptonu.edu\/science\/#\/schema\/logo\/image\/"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/home.hamptonu.edu\/science\/wp-json\/wp\/v2\/pages\/2993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/home.hamptonu.edu\/science\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/home.hamptonu.edu\/science\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/home.hamptonu.edu\/science\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/home.hamptonu.edu\/science\/wp-json\/wp\/v2\/comments?post=2993"}],"version-history":[{"count":19,"href":"https:\/\/home.hamptonu.edu\/science\/wp-json\/wp\/v2\/pages\/2993\/revisions"}],"predecessor-version":[{"id":8660,"href":"https:\/\/home.hamptonu.edu\/science\/wp-json\/wp\/v2\/pages\/2993\/revisions\/8660"}],"wp:attachment":[{"href":"https:\/\/home.hamptonu.edu\/science\/wp-json\/wp\/v2\/media?parent=2993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}