B.S. in Cyber Threat Intelligence & Defense

Providence

 

INTAKE: Jan & Aug

Program Overview

The Bachelor of Science in Cyber Threat Intelligence & Defense at Johnson & Wales University is designed to address the growing need for cybersecurity professionals adept at identifying, analyzing, and defending against cyber threats. This program provides students with a robust foundation in cybersecurity principles and practices, focusing on threat intelligence, defense strategies, and incident response. Graduates are prepared to protect organizations from cyber threats and contribute to the evolving field of cybersecurity through hands-on experience and specialized knowledge.

Curriculum: The curriculum for the B.S. in Cyber Threat Intelligence & Defense combines theoretical knowledge with practical skills. Core courses include Introduction to Cybersecurity, Network Security, Cyber Threat Intelligence, and Digital Forensics. Students also study subjects such as Ethical Hacking, Security Operations, and Risk Management. The program emphasizes real-world application through labs, simulations, and projects, ensuring that students gain practical experience in identifying and mitigating cybersecurity threats. Additionally, coursework is designed to prepare students for industry-recognized certifications, enhancing their employability and expertise.

Research Focus: Research in the B.S. in Cyber Threat Intelligence & Defense program centers on advancing cybersecurity knowledge and practices. Key research areas include threat detection and analysis, cybersecurity risk management, and the development of defense mechanisms against emerging cyber threats. Students and faculty engage in research projects that address current challenges in the cybersecurity landscape, such as developing new tools for threat intelligence or exploring methods to enhance data protection and incident response.

Industry Engagement: Industry engagement is a crucial component of the B.S. in Cyber Threat Intelligence & Defense program. Johnson & Wales University collaborates with cybersecurity firms, government agencies, and industry experts to provide students with valuable networking and professional opportunities. Internships, externships, and industry-sponsored projects offer students hands-on experience and insight into real-world cybersecurity practices. These connections help students stay abreast of industry trends, gain practical skills, and build a professional network in the cybersecurity field.

Global Perspective: The program incorporates a global perspective by examining international cybersecurity challenges and practices. Students study global cyber threats, international data protection regulations, and cross-border cybersecurity issues. Opportunities for global learning experiences, such as study abroad programs and international cybersecurity conferences, allow students to gain insights into how different countries approach cybersecurity and threat defense. This global perspective prepares graduates to work in an increasingly interconnected world and address diverse cybersecurity challenges.

Pollster Education

Location

Providence

Pollster Education

Score

IELTS 6

Pollster Education

Tuition Fee

USD 39792

Undergraduate Entry Requirements

Academic Qualifications: Applicants for undergraduate programs typically require a minimum academic achievement of 65% or above in their previous academic qualifications.

English Language Proficiency:

  • IELTS: Overall band score of 6.0 with a minimum of 5.5 in each component.
  • TOEFL: Overall score of 75 or higher.
  • PTE: Overall score of 53 or higher.
  • DET (Duolingo English Test): Overall score of 105.

Johnson & Wales University (JWU) in the United States offers several scholarship opportunities to international students to support their academic pursuits. These scholarships are typically merit-based and are awarded based on academic achievements, leadership qualities, and other criteria. 

International Academic Scholarship: This scholarship is open to undergraduate and graduate international students. Eligibility is based on academic achievement, with scholarships awarded to students with exceptional academic records. The scholarship amount varies depending on the academic achievements of the applicant.

Phi Theta Kappa (PTK) Scholarship: International transfer students who are members of the Phi Theta Kappa Honor Society may be eligible for this scholarship. Eligibility is based on PTK membership and academic performance. The scholarship amount is determined by the applicant's academic achievements.

International Student Work-Study Award: JWU offers work-study programs that allow international students to work on campus while pursuing their studies. This program provides students with the opportunity to gain practical experience and offset their educational expenses.

Presidential Academic Scholarship: High-achieving undergraduate students, including international students, may be eligible for the Presidential Academic Scholarship. Eligibility is based on academic excellence, leadership, and involvement in extracurricular activities. The scholarship amount varies and is renewable for multiple years.

Transfer Student Scholarship: International transfer students who have completed college coursework prior to enrolling at JWU may be eligible for this scholarship. Scholarship amounts are determined by the applicant's academic record and vary based on the number of credits transferred.

Culinary Arts Scholarship: JWU is known for its culinary programs, and scholarships are available specifically for students pursuing culinary arts degrees. Eligibility is based on culinary experience, passion, and academic achievement. The scholarship amount varies.

Athletic Scholarships: Talented student-athletes, including international students, may be eligible for athletic scholarships based on their performance in sports. Eligibility criteria and scholarship amounts vary by sport and skill level.

Talent Scholarships: JWU offers talent scholarships in areas such as the arts, design, and business. These scholarships are awarded to students who demonstrate exceptional talent and creativity in their chosen field.

Alumni Legacy Scholarship: Children or grandchildren of JWU alumni may be eligible for this scholarship. Eligibility is based on the applicant's status as a legacy student.

Foundation Scholarships: JWU has partnerships with various foundations and organizations that offer scholarships to international students. These scholarships may have specific eligibility criteria and application processes.

Graduates of the B.S. in Cyber Threat Intelligence & Defense from Johnson & Wales University are well-prepared for a range of roles in the cybersecurity field. The program’s focus on threat intelligence and defense strategies equips students with the skills needed to tackle complex cybersecurity challenges. 

Cybersecurity Analyst: Monitor and analyze an organization's IT infrastructure to identify and respond to potential threats. Cybersecurity analysts use various tools and techniques to detect vulnerabilities, assess risks, and implement protective measures.

Threat Intelligence Specialist: Focus on gathering and analyzing information about potential cyber threats. Threat intelligence specialists provide insights and recommendations to help organizations anticipate and defend against emerging threats and cyberattacks.

Incident Responder: Manage and respond to security incidents, such as data breaches or cyberattacks. Incident responders work to contain and mitigate damage, investigate the cause of incidents, and develop strategies to prevent future occurrences.

Network Security Engineer: Design and implement secure network infrastructures to protect against cyber threats. Network security engineers configure and manage firewalls, intrusion detection systems, and other security measures to safeguard network integrity.

Penetration Tester (Ethical Hacker): Conduct simulated attacks on an organization’s systems to identify and exploit vulnerabilities. Penetration testers provide detailed reports on security weaknesses and recommend improvements to strengthen defenses.

Security Consultant: Advise organizations on cybersecurity best practices and risk management. Security consultants assess current security measures, identify vulnerabilities, and recommend strategies to enhance overall security posture.

Digital Forensics Investigator: Investigate and analyze digital evidence to uncover information related to cybercrimes or security incidents. Digital forensics investigators work with law enforcement or private firms to support criminal investigations and legal proceedings.

Security Operations Center (SOC) Analyst: Operate within a Security Operations Center to monitor, detect, and respond to security incidents in real-time. SOC analysts use advanced tools to analyze security alerts and coordinate incident response efforts.

Risk Management Specialist: Evaluate and manage risks associated with cybersecurity threats. Risk management specialists develop strategies to minimize the impact of potential threats and ensure compliance with industry regulations and standards.

Chief Information Security Officer (CISO): Oversee and manage an organization’s overall cybersecurity strategy. CISOs are responsible for setting security policies, leading security teams, and ensuring that the organization’s information assets are protected.


Similar Courses
WhatsApp Enquiry Call Enquiry