- Xin Guo, China
Prevent. Protect. Respond. Get cutting-edge, real-life experience with TU’s cyber security program. Students perform security and vulnerability assessments for businesses, participate in hack-a-thons, conduct research and attend professional conferences. With hands-on learning and research opportunities, TU has placed interns at the FBI, NSA, United States Coast Guard Research and Development Center as well as the Center for Cyber Defense and Forensics.
The beauty of the Tiffin University Cyber Security major is that it is not narrowly focused. The curriculum addresses the entire range of cyber operations, from analyzing the largest national and international cyber policy issues, to collecting data off the smallest hand-held devices. Through this major, students are exposed to the entire breadth of the field.
The Cyber Security major addresses the evolving threats to our economy and society in cyberspace. The curriculum is designed to give students a solid background in technology applications, threat assessment, and mitigation. Using real-world case scenarios and threat actors, the program challenges students to think critically about interconnected systems and vulnerabilities. This diversified program culminates in a senior seminar that includes both digital forensics and cyber security students participating in a red team/blue team scenario, providing both teams the opportunity to manage an intrusion incident from inception to forensic analysis and reporting.
Tiffin University has been designated as a Center of Academic Excellence in Cyber Defense by the National Security Agency and the Department of Homeland Security.
The National Security Agency (NSA) and Department of Homeland Security (DHS) have designated Tiffin University as a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE) through 2025. Tiffin University’s B.A. in Cybersecurity received the designation.
The NSA and DHS jointly sponsor the National Centers of Academic Excellence (CAE) program. The program’s goal is to promote higher education and research in cyber defense to produce professionals with cyber defense expertise.
Ohio Police Officer Training Academy (OPOTA)
To be a sworn police officer in Ohio, you must successfully complete the Ohio Police Officer Training Academy (OPOTA). Tiffin University partners with Terra State Community College to include the cost of the academy in tuition and can be earned in just one semester.
This unique training academy is state mandated for all police officers and covers firearms, legal administration, human relations, traffic, patrol, driving, subject control, investigations, civil disorder, physical conditioning and other aspects of law enforcement. Students apply direct, hands-on practice in the crime lab, firing range and police cruisers. With experienced, certified instructors and hands-on application, our students consistently achieve passing rates on the state-certified exam.
Once graduates of the program earn the certification, they are immediately eligible for full-time employment.
“Tiffin University gave me my best friend and pushed me to my highest potential. The OPOTA program put me ahead in the hiring process and my bachelor’s degree set me apart from other candidates.”
Hometown: Marion, Ohio
Graduation: Spring, 2019
Major: Bachelor of Criminal Justice in Law Enforcement
Position: Police Officer with the City of Marysville Division of Police
Cyber Security Core 12 hours
- CDS152 Introduction to Cyber Defense
- CDS345 Cyber Law & Ethics
- POL151 Introduction to National Security Studies
- POL313 American National Security Policy
Cyber Security Major 54 hours
- CDS244 Cyber Security
- CDS348 Incident Management
- CDS355 Penetration Testing and Vulnerability Analysis
- CDS424 Applied Network Security
- CDS444 Wireless Security
- CDS445 Cyber Warfare
- CDS491 Senior Seminar In Cyber Defense (w)
- CST155 Introduction to Operating Systems
- CST201 Introduction to Programming
- CST230 Networking Fundamentals
- CST280 Database I
- CST301 Advanced Programming Techniques
- CST325 Linux
- CST330 Network Infrastructure I
- CST412 IT Project Management
- POL225 Introduction to Intelligence Studies
- SCS300 Reearch Design (w)
- SCS470 Internship
Total BA hours 121-123 hours
This is a sample course sequence to illustrate course offerings for this major. Consult the official Academic Bulletin for detailed registration and advising information.
On Campus - Offered in a 15-week semester format with start dates of January and August
There are no related concentrations available
Penetration Testing & Vulnerability Analysis (CDS355) - This course will equip students to evaluate a network to discover potential security vulnerabilities and rectify those issues. Students will learn the most common security mistakes as well as the necessary corrective action, and will be able to probe networks to determine if any of those common vulnerabilities can be exploited. The roles, missions, and appropriate applications of Red Teams and Blue Teams will be discussed.
Information Security (CDS344) - This course will introduce information security as an essential component in our war against terrorism. All information must be secure or the probability of winning the war will be diminished. With advances in technology and software, cyber-terrorism has become very real. Computer hackers and terrorists can shut down our nation’s most critical infrastructures. There can be no doubt that cyber-terror can pose a very real threat to this nation’s security. Students will become familiar with the entire arena of information security.
Cyber Warfare (CDS445) - This course explores the past, current, and future threats of information warfare and cyber terrorism. It provides an overview of information warfare and cyber terrorism techniques and capabilities of state and non-state actors through case study analysis. An exploration of current and future technology and development of information warfare and cyber terrorism techniques is utilized to develop future threat matrices and countermeasures.
Incident Management (CDS348) - This course will train students in methods used to work through and recover from a network incident, be it the result of network failure, natural disaster, or cyber-attack. Course material will include the various Mission Assurance Levels used by major portions of the U.S. Government, as well as how to plan, conduct, and gather lessons-learned from war games where Intentional failures have been planned in as part of the exercise. Finally, the role that damage assessment plays in post-incident response/recovery will be emphasized.
- Cyber Security Analyst
- Cyber Security Incident Responder
- Cybersecurity & Infrastructure Security Agency (CISA)
- Forensics Computer Analyst
- Intrusion Analyst
- National Security Agency (NSA)
- Penetration Tester
- Security Audit & Risk Management Specialist
- Security Operations Center Analyst
- Threat Hunter
- United States Cyber Command
- U.S. Department of Energy
While it is extremely competitive to obtain such appointments, TU alumni have gone on to careers in these agencies:
- Department of Homeland Security Agencies
- Private Enterprise Providing Cyber Services
- Department of Defense Agencies
Have a Question?