Love Where You’re Going!
Winthrop's Admissions Team is working hard to provide you with options
to learn more about Life as an Eagle. Please check our Visit Page to sign up for one of our Virtual Admissions Experiences.
Want a one on one meeting or have any questions? There are three ways you can contact
us:
Phone: 803/323-2191
Email: Admissions@winthrop.edu
Virtual Chat: Click here to register
For updates, announcements and special messages from Admissions, please follow us
on Instagram - @winthropadmissions
Protecting valuable data and critical infrastructure assets has become a significant problem for companies and government agencies in South Carolina and throughout the U.S. A significant problem for these employers is the lack of personnel with cybersecurity training. Winthrop University's Bachelor of Science in Cybersecurity degree (CYBR) draws on the university's existing strength in Computer Science and its values of Service, Excellence, Diversity, Community, and Leadership. The CYBR degree addresses pressing cybersecurity needs by providing students with specialized knowledge in forensics, ethical hacking, enterprise security, and more. Students gain hands-on experience with these concepts and prepare to actively contribute to ensuring the successful security posture of computing systems.
Winthrop and the computing faculty in particular are fanatical about student success
and ensuring that students have the skills they need to succeed outside the classroom.
The cybersecurity program is exciting because it is becoming every more evident why
it is important for us to pay attention to. The colonial pipeline ransomware attack
in May 21 put it on everyones radar as the president declared a state of emergency,
gas stations up and down the east coast ran out of gas, and even our own Charlotte
Douglas International Airport had to adjust flight schedules due to hack.
General Education Semester Hours
General Education | Class |
Hours | |
ACAD 101 | Principles of the Learning Academy | 1 | |
Shared Skills and Proficiencies Writing and Critical Thinking |
|||
WRIT 101 |
Composition |
3 |
|
HMXP 102 |
Human Experience |
3 |
|
CRTW 201 |
Critical Reading. Thinking & Writing |
3 |
|
Oral Communication |
Met in major with CSCI 327 |
0 |
|
Technology |
Met in major with CSCI 207 and 327 |
0 |
|
Intensive Writing |
Met in major |
0 |
|
Constitution Requirement |
See approved list; may be met with other requirement 0-3 | 0-3 |
|
Physical Activity |
See approved list |
1 |
|
Thinking Critically Across Disiplines |
|||
Global Perspectives | See approved list | 3 | |
Historical Perspectives | See approved list | 3 | |
Introducing Students to Broad Disciplinary Perspectives |
|||
Social Science | See approved list; must include 2 designators | 6 | |
Humanities and Arts | See approved list; must include 2 designators | 6 | |
Quantitative Skills and Natural Science (3 courses) | |||
Quantitative Skills | Met in major with MATH 105 or 201 and QMTH 205 | 0 | |
Natural Science | See approved list; must include a lab science | 3-4 | |
Subtotal | 32-36 | ||
Requirements for the Major |
68.5-69.5 |
||
ACCT 280 |
Introduction to Financial Accounting |
3 |
|
ACCT 281 |
|
3 |
|
ACCT 521 |
Fraud and Forensics |
3 |
|
CSCI 101B |
Using Microsoft Excel |
0.5 |
|
CSCI 207 & 208 |
|
8 |
|
CSCI 210 |
Programming Tools |
1 |
|
CSCI 224 |
|
3 |
|
CSCI 243 |
Web Programming |
3 |
|
CSCI 271 |
Algorithm Analysis and Data Strc |
4 |
|
CSCI 311 |
Computer Architecture and Org |
4 |
|
CSCI 324 |
|
3 |
|
CSCI 327 |
Social Implications of Computing |
3 |
|
CSCI 355 |
Database Processing |
3 |
|
CSCI 411 |
|
3 |
|
CSCI 421 |
Cyber Forensics |
3 |
|
CSCI 424 |
|
3 |
|
CSCI 453 |
Special Topics in Cybersecurity |
3 |
|
CSCI 466 |
Networking Processing |
3 |
|
CSCI 469 |
Cloud Computing |
3 |
|
MATH 105 or 201 |
Applied Calculus, Calculus I |
3-4 |
|
MATH 261 |
|
3 |
|
QMTH 205 |
|
3 |
|
Electives |
14.5 - 19.5 |
||
Total | 120 |
***NEED TO UPDATE WITH CYBERSECURITY GRAPHIC****
Graduates from the BS in Cybersecurity degree will be qualified for many careers,
including
• security administrator
• information security engineer
• incident responder
• security auditor
• penetration tester
• vulnerability analyst
There is a shortage of information security talent in both industry and government.
In, 2017 IT-oLogy in cooperation with the SC Coordinating Council on Workforce Development,
and the SC Department of Commerce issued a report on the state of South Carolina's
IT workforce challenges and opportunities. In it they discuss the major concerns related
to the supply of workers for the field. In the cybersecurity field alone they point
to a Forbes statistic of over 200,000 unfilled cybersecurity jobs nationwide and a
Cisco statistic puts it at 1M globally. The output of this survey, which included
117 SC companies, identified several gaps, including the:
• a limited supply of candidates in IT,
• lack of enough students currently in training,
• lack of diversity, and
• the demand for cybersecurity accelerating at a rate three times the rate of other
IT jobs.
These jobs are well paid. A 2019 workforce study by the SC Chamber of Commerce found an average salary of $97,760/year for Other Information Services within the Business & IT Services sector. It also showed a projected 10 year growth of 48.4%.