B.S. in Computer Networks and Cybersecurity

Bronx, New York

 

INTAKE: Jan, April & Sept

Program Overview

Monroe College’s Bachelor of Science (B.S.) in Computer Networks and Cybersecurity is designed to provide students with a comprehensive understanding of network infrastructure, information security, and cybersecurity principles. The program aims to equip students with the skills necessary to protect and manage computer systems and networks against cyber threats. It combines theoretical knowledge with practical applications, preparing graduates for critical roles in the ever-evolving field of cybersecurity.

STEM-Designated: The B.S. in Computer Networks and Cybersecurity is designated as a STEM (Science, Technology, Engineering, and Mathematics) program. This designation underscores the program’s focus on technical and analytical skills in the fields of computer science and cybersecurity. STEM designation also highlights the program’s commitment to preparing students for technical careers that are essential in today’s digital landscape.

Curriculum: The curriculum for the B.S. in Computer Networks and Cybersecurity includes core courses in network design, cybersecurity principles, and systems administration. Key courses cover topics such as Network Security, Ethical Hacking, Digital Forensics, and Information Security Management. The program also includes hands-on labs and practical projects that allow students to apply their knowledge in real-world scenarios. Students gain expertise in configuring and securing networks, analyzing security breaches, and implementing security protocols.

Research Focus: The program emphasizes research in cutting-edge areas of computer networks and cybersecurity. Students have the opportunity to engage in research projects related to network vulnerability assessments, advanced persistent threats, and cybersecurity risk management. Research activities help students stay current with emerging threats and technologies, contributing to the advancement of the field.

Industry Engagement: Monroe College fosters strong industry engagement through partnerships with technology companies and cybersecurity organizations. Students benefit from internships, industry workshops, and networking events that provide practical experience and professional connections. These opportunities help students understand industry trends and enhance their employability in the cybersecurity sector.

Global Perspective: The B.S. in Computer Networks and Cybersecurity program incorporates a global perspective by addressing international cybersecurity issues and practices. The curriculum includes discussions on global cyber threats, international data protection regulations, and cross-border cybersecurity challenges. This global approach ensures that students are prepared to tackle cybersecurity issues in a diverse and interconnected world.

Pollster Education

Location

Bronx, New York

Pollster Education

Score

IELTS 6

Pollster Education

Tuition Fee

USD 15912

Undergraduate Entry Requirements

Application Fee: $35

Academic Qualifications: Applicants for undergraduate programs typically require a minimum academic achievement of 65% or above in their previous academic qualifications.

English Language Proficiency:

  • IELTS: Overall band score of 6.0 with a minimum of 5.5 in each component.
  • TOEFL: Overall score of 70 or higher.
  • PTE: Overall score of 45 or higher.
  • DET (Duolingo English Test): Minimum score of 90.

Monroe College, located in New Rochelle, New York, offers a range of scholarships for international students to support their academic journey.

Monroe College International Student Scholarships: These are merit-based scholarships awarded to outstanding international students based on their academic achievements, leadership skills, and potential for success in their chosen field. The application process typically involves submitting academic transcripts, letters of recommendation, and a personal statement.

President’s Scholarship: This prestigious scholarship is offered to exceptional international students who demonstrate exceptional academic performance and leadership potential. Recipients of the President’s Scholarship receive significant financial support to cover tuition and other educational expenses.

International Student Grants: Monroe College provides need-based grants to international students who require financial assistance to cover their educational costs. These grants are awarded based on the student’s financial need and academic performance.

Merit-Based Awards: International students with outstanding academic records may be eligible for merit-based awards that recognize their achievements and potential. These awards are often renewable for the duration of the student’s program, provided they maintain a high academic standard.

Specialized Scholarships: Monroe College also offers scholarships for specific programs and fields of study. International students pursuing degrees in areas such as business, health, or hospitality management may have access to specialized scholarships tailored to their academic interests.

Graduates of Monroe College’s Bachelor of Science (B.S.) in Computer Networks and Cybersecurity are well-positioned to enter the dynamic and growing field of cybersecurity and network management. This program prepares students for a range of roles that involve protecting and managing computer systems and networks. 

Cybersecurity Analyst: Cybersecurity analysts are responsible for monitoring and protecting an organization’s computer systems and networks from cyber threats. They analyze security breaches, implement security measures, and respond to incidents to ensure the integrity and confidentiality of data.

Network Security Engineer: Network security engineers design, implement, and manage security solutions to safeguard an organization’s network infrastructure. They work on securing network connections, configuring firewalls, and conducting vulnerability assessments to protect against cyber attacks.

Information Security Manager: Information security managers oversee an organization’s information security strategy. They develop and enforce security policies, manage security teams, and ensure compliance with regulatory requirements. Their role is crucial in mitigating risks and protecting sensitive information.

Ethical Hacker (Penetration Tester): Ethical hackers, or penetration testers, simulate cyber attacks to identify and address vulnerabilities in an organization’s systems. They conduct security assessments, provide recommendations for improvements, and help organizations strengthen their defenses.

Security Consultant: Security consultants provide expert advice to organizations on improving their security posture. They assess current security practices, recommend enhancements, and assist in implementing security solutions tailored to the specific needs of their clients.

Network Administrator: Network administrators manage and maintain an organization’s network infrastructure. They ensure the network’s performance, security, and availability by configuring network devices, troubleshooting issues, and performing regular updates and backups.

Digital Forensics Specialist: Digital forensics specialists investigate and analyze digital evidence related to cyber crimes. They recover and examine data from electronic devices to support legal cases, identify perpetrators, and understand the impact of security breaches.

Systems Analyst: Systems analysts assess and design information systems to meet an organization’s needs. They analyze system requirements, recommend solutions, and work on integrating security measures into new and existing systems to ensure data protection.

Chief Information Security Officer (CISO): CISOs are senior executives responsible for the overall security strategy of an organization. They oversee the implementation of security policies, manage security budgets, and ensure that security practices align with business objectives.

IT Auditor: IT auditors evaluate an organization’s information systems and processes to ensure compliance with security policies and regulations. They conduct audits, identify weaknesses, and recommend improvements to enhance the organization’s security posture.


Similar Courses
WhatsApp Enquiry Call Enquiry