WGU IT Cybersecurity Degree Plan: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
== Cybersecurity Degree Plan == | == Cybersecurity Degree Plan == | ||
Here is a Cybersecurity Degree plan for [[Western Governors University]] (WGU) as of approximately | Here is a Cybersecurity Degree plan for [[Western Governors University]] (WGU) as of approximately June of 2023. Please make sure that the suggestions are still valid before beginning to follow this plan. | ||
The alternative credit courses were handpicked using experience from previous students as to what courses will be the easiest and quickest courses to take. In places with multiple courses listed, the first course is assumed to be the fastest/easiest course to take. | The alternative credit courses were handpicked using experience from previous students as to what courses will be the easiest and quickest courses to take. In places with multiple courses listed, the first course is assumed to be the fastest/easiest course to take. | ||
Line 11: | Line 11: | ||
* You wanted to maximize the 90 credits of transfer credits | * You wanted to maximize the 90 credits of transfer credits | ||
* You were trying to do a WGU degree in 1 term or few terms as possible | * You were trying to do a WGU degree in 1 term or few terms as possible | ||
=== Advantages of a Cybersecurity Degree === | === Advantages of a Cybersecurity Degree === | ||
Line 40: | Line 38: | ||
Provider | Provider | ||
!Course Name | !Course Name | ||
!WGU Credit | !WGU Credit | ||
|- | |- | ||
| | |Composition: Successful Self-Expression | ||
|3 | |3 | ||
|Sophia | |Sophia | ||
| | |English Composition I | ||
|3 | |3 | ||
|- | |- | ||
| | |Critical Thinking and Logic | ||
|3 | |3 | ||
| | |Sophia | ||
|Critical Thinking | |||
| | |||
|3 | |3 | ||
|- | |- | ||
| | |Introduction to Systems Thinking | ||
|3 | |||
| | |||
| | | | ||
| | | | ||
|- | |- | ||
|Introduction to Communication | |Introduction to Communication | ||
|3 | |3 | ||
|Sophia | |Sophia | ||
| | |Pubic Speaking, Workplace Communication, Business Communication | ||
|3 | |3 | ||
|- | |- | ||
|Ethics in Technology | |Ethics in Technology | ||
|3 | |3 | ||
| | | | ||
| | | | ||
Line 94: | Line 71: | ||
|- | |- | ||
|American Politics and the US Constitution | |American Politics and the US Constitution | ||
|3 | |3 | ||
|Sophia | |Sophia | ||
| | |U.S. Government | ||
|3 | |3 | ||
|- | |- | ||
Line 112: | Line 80: | ||
|Sophia | |Sophia | ||
|College Algebra | |College Algebra | ||
|3 | |3 | ||
|- | |- | ||
Line 119: | Line 86: | ||
|Sophia | |Sophia | ||
|Foundations of Statistics, Introduction to Statistics | |Foundations of Statistics, Introduction to Statistics | ||
|3 | |3 | ||
|- | |- | ||
| | |Health, Fitness and Wellness | ||
|4 | |||
|Sophia | |||
|Introduction to Nutrition | |||
|3 | |3 | ||
|- | |||
|Natural Science Lab | |||
|2 | |||
|Sophia | |Sophia | ||
| | |Human Biology Lab, Introduction to Chemistry Lab, Microbiology Lab | ||
|3 | |3 | ||
|- | |- | ||
!Totals | !Totals | ||
! | !30 | ||
! | ! | ||
! | ! | ||
! | !24 | ||
|} | |} | ||
Line 146: | Line 116: | ||
Provider | Provider | ||
!Course Name | !Course Name | ||
!WGU Credit | !WGU Credit | ||
|- | |- | ||
Line 154: | Line 122: | ||
|Sophia | |Sophia | ||
|Introduction to Information Technology | |Introduction to Information Technology | ||
|4 | |4 | ||
|- | |- | ||
Line 162: | Line 129: | ||
|Computer Science 107: Database Fundamentals, | |Computer Science 107: Database Fundamentals, | ||
Introduction to Relational Databases | Introduction to Relational Databases | ||
|3 | |3 | ||
|- | |- | ||
|Network and Security - Foundations | |Network and Security - Foundations | ||
|3 | |3 | ||
|Study.com | |Study.com or CompTIA | ||
|Computer Science 108: Introduction to Networking | |Computer Science 108: Introduction to Networking, CySA+ | ||
|3 | |3 | ||
|- | |- | ||
Line 177: | Line 142: | ||
|Computer Science 115: Programming in Java, | |Computer Science 115: Programming in Java, | ||
Computer Science 109: Introduction to Programming | Computer Science 109: Introduction to Programming | ||
|3 | |3 | ||
|- | |- | ||
Line 184: | Line 148: | ||
|Sophia | |Sophia | ||
|Introduction to Web Development | |Introduction to Web Development | ||
|3 | |3 | ||
|- | |- | ||
|Business of IT - Applications | |Business of IT - Applications | ||
|4 | |4 | ||
| | |ITIL | ||
| | |ITIL Foundations Cert | ||
| | |4 | ||
|- | |- | ||
!Totals | !Totals | ||
Line 198: | Line 160: | ||
! | ! | ||
! | ! | ||
! | !20 | ||
|} | |} | ||
Line 211: | Line 172: | ||
Provider | Provider | ||
!Course Name | !Course Name | ||
!WGU Credit | !WGU Credit | ||
|- | |- | ||
Line 219: | Line 178: | ||
|Study.com | |Study.com | ||
|Computer Science 204: Database Programming | |Computer Science 204: Database Programming | ||
|4 | |4 | ||
|- | |- | ||
Line 229: | Line 187: | ||
Computer Science 202 | Computer Science 202 | ||
|3 | |3 | ||
|- | |||
|Introduction to Programming in Python | |||
|3 | |||
|Sophia | |||
|Intro to Python | |||
|3 | |||
|- | |||
|Linux Foundations | |||
|3 | |||
| | |||
| | |||
| | |||
|- | |- | ||
|Business of IT - Project Management | |Business of IT - Project Management | ||
Line 238: | Line 205: | ||
|Sophia | |Sophia | ||
|Project Management | |Project Management | ||
|4 | |4 | ||
|- | |- | ||
|Cyber Defense and Countermeasures | |Cyber Defense and Countermeasures | ||
|4 | |4 | ||
|Study.com | |Study.com or CompTIA | ||
|Computer Science 331: Cybersecurity Risk Analysis Management | |Computer Science 331: Cybersecurity Risk Analysis Management, CySA+ | ||
|4 | |4 | ||
|- | |- | ||
Line 251: | Line 216: | ||
|4 | |4 | ||
|Study.com | |Study.com | ||
| | |Computer Science 336: Network Forensics or | ||
Computer Science 336: Network Forensics or | |||
|4 | |4 | ||
|- | |- | ||
|Introduction to Cryptography | |Introduction to Cryptography | ||
|4 | |4 | ||
| | | | ||
| | | | ||
Line 270: | Line 227: | ||
|Managing Cloud Security | |Managing Cloud Security | ||
|4 | |4 | ||
| | | | ||
| | | | ||
Line 277: | Line 233: | ||
|Legal Issues in Information Security | |Legal Issues in Information Security | ||
|4 | |4 | ||
| | | | ||
| | | | ||
Line 284: | Line 239: | ||
|Information Systems Security | |Information Systems Security | ||
|4 | |4 | ||
| | | | ||
| | | | ||
Line 291: | Line 245: | ||
|Emerging Technologies in Cybersecurity | |Emerging Technologies in Cybersecurity | ||
|4 | |4 | ||
| | | | ||
| | | | ||
Line 298: | Line 251: | ||
|Managing Information Security | |Managing Information Security | ||
|6 | |6 | ||
| | | | ||
| | | | ||
Line 305: | Line 257: | ||
|Penetration Testing and Vulnerability Analysis | |Penetration Testing and Vulnerability Analysis | ||
|4 | |4 | ||
| | |CompTIA | ||
| | |Pentest+ | ||
| | |4 | ||
|- | |- | ||
|Networks | |Networks | ||
|4 | |4 | ||
| | |CompTIA | ||
| | |CompTIA Network+ | ||
| | |4 | ||
|- | |- | ||
|Network and Security - Applications | |Network and Security - Applications | ||
|4 | |4 | ||
| | |CompTIA | ||
| | |CySA+, CompTIA Security+ | ||
| | |4 | ||
|- | |- | ||
|IT Foundations | |IT Foundations | ||
|4 | |4 | ||
| | |CompTIA | ||
| | |CompTIA A+ | ||
| | |4 | ||
|- | |- | ||
|IT Applications | |IT Applications | ||
|4 | |4 | ||
| | |CompTIA | ||
| | |CompTIA A+ | ||
| | |4 | ||
|- | |- | ||
!Total | !Total | ||
! | !71 | ||
! | ! | ||
! | ! | ||
! | !42 | ||
|} | |} | ||
Line 355: | Line 301: | ||
Provider | Provider | ||
!Course Name | !Course Name | ||
!WGU Credit | !WGU Credit | ||
|- | |- | ||
|IT Capstone | |IT Capstone | ||
|4 | |4 | ||
| | | | ||
| | | | ||
Line 368: | Line 311: | ||
!Totals | !Totals | ||
!4 | !4 | ||
! | ! | ||
! | ! | ||
Line 383: | Line 325: | ||
Provider | Provider | ||
!Course Name | !Course Name | ||
!WGU | !WGU | ||
Transfer Credit | Transfer Credit | ||
90 max | |||
|- | |- | ||
|General Education Requirements | |General Education Requirements | ||
| | |30 | ||
| | | | ||
| | | | ||
| | |26 | ||
|- | |- | ||
|Core Courses | |Core Courses | ||
Line 399: | Line 340: | ||
| | | | ||
| | | | ||
| | |20 | ||
|- | |- | ||
|Additional Courses | |Additional Courses | ||
| | |71 | ||
| | | | ||
| | | | ||
| | |42 | ||
|- | |- | ||
|Non-Transferable Courses | |Non-Transferable Courses | ||
|4 | |4 | ||
| | | | ||
| | | | ||
Line 420: | Line 358: | ||
! | ! | ||
! | ! | ||
! | !88 | ||
|} | |} | ||
<small>*To copy this degree plan, hold down left mouse button, drag to select tables, then copy/paste (CTR+C/CTR+P) to Sheets or Excel.</small> | <small>*To copy this degree plan, hold down left mouse button, drag to select tables, then copy/paste (CTR+C/CTR+P) to Sheets or Excel.</small> | ||
[[Category:Degree Plans]][[Category:WGU]] | [[Category:Degree Plans]][[Category:WGU]] |
Revision as of 02:28, 3 June 2023
Cybersecurity Degree Plan
Here is a Cybersecurity Degree plan for Western Governors University (WGU) as of approximately June of 2023. Please make sure that the suggestions are still valid before beginning to follow this plan.
The alternative credit courses were handpicked using experience from previous students as to what courses will be the easiest and quickest courses to take. In places with multiple courses listed, the first course is assumed to be the fastest/easiest course to take.
Doing Certifications at WGU vs Transferring Them In
Certifications are free at WGU, so it's optional if you want to pay the fees to transfer in certifications.
You would want to do certifications outside WGU if:
- You wanted to maximize the 90 credits of transfer credits
- You were trying to do a WGU degree in 1 term or few terms as possible
Advantages of a Cybersecurity Degree
- Lots of certs, is sort of like an upgraded IT degree
- Flexible degree that can be used for a large variety of careers such as coding or IT
Tips on Order in Which to Complete Courses
Start with Sophia, do English Composition first. Unfortunately, Sophia only allows 2 courses open at one time, so after you start English Comp, do a course that doesn't have any touchstones (written assignments). Once done with Sophia, start doing Study.com courses.
How Long Will It Take To Complete This Degree Once I Finish All the Alterative Credits?
How long to complete depends on various factors such as experience, time commitment, the efficiency of studying, etc. However, considering you spend at least 20 hours a week on your studies, completing this degree should take 1-2 terms.
Source of Credit
This degree plan was made using this source to map out all the alternative credits.
General Education Requirements
Course | Competency
Units Value |
Course
Provider |
Course Name | WGU Credit |
---|---|---|---|---|
Composition: Successful Self-Expression | 3 | Sophia | English Composition I | 3 |
Critical Thinking and Logic | 3 | Sophia | Critical Thinking | 3 |
Introduction to Systems Thinking | 3 | |||
Introduction to Communication | 3 | Sophia | Pubic Speaking, Workplace Communication, Business Communication | 3 |
Ethics in Technology | 3 | |||
American Politics and the US Constitution | 3 | Sophia | U.S. Government | 3 |
Applied Algebra | 3 | Sophia | College Algebra | 3 |
Applied Probability and Statistics | 3 | Sophia | Foundations of Statistics, Introduction to Statistics | 3 |
Health, Fitness and Wellness | 4 | Sophia | Introduction to Nutrition | 3 |
Natural Science Lab | 2 | Sophia | Human Biology Lab, Introduction to Chemistry Lab, Microbiology Lab | 3 |
Totals | 30 | 24 |
Core Courses
Course | Competency
Units Value |
Course
Provider |
Course Name | WGU Credit |
---|---|---|---|---|
Introduction to IT | 4 | Sophia | Introduction to Information Technology | 4 |
Data Management - Foundations | 3 | Study.com or Sophia | Computer Science 107: Database Fundamentals,
Introduction to Relational Databases |
3 |
Network and Security - Foundations | 3 | Study.com or CompTIA | Computer Science 108: Introduction to Networking, CySA+ | 3 |
Scripting and Programming - Foundations | 3 | Study.com | Computer Science 115: Programming in Java,
Computer Science 109: Introduction to Programming |
3 |
Web Development Foundations | 3 | Sophia | Introduction to Web Development | 3 |
Business of IT - Applications | 4 | ITIL | ITIL Foundations Cert | 4 |
Totals | 20 | 20 |
Additional Courses
Course | Competency
Units Value |
Course
Provider |
Course Name | WGU Credit |
---|---|---|---|---|
Data Management - Applications | 4 | Study.com | Computer Science 204: Database Programming | 4 |
Fundamentals of Information Security | 3 | Study.com | Computer
Science 110 or Computer Science 202 |
3 |
Introduction to Programming in Python | 3 | Sophia | Intro to Python | 3 |
Linux Foundations | 3 | |||
Business of IT - Project Management | 4 | Sophia | Project Management | 4 |
Cyber Defense and Countermeasures | 4 | Study.com or CompTIA | Computer Science 331: Cybersecurity Risk Analysis Management, CySA+ | 4 |
Digital Forensics in Cybersecurity | 4 | Study.com | Computer Science 336: Network Forensics or | 4 |
Introduction to Cryptography | 4 | |||
Managing Cloud Security | 4 | |||
Legal Issues in Information Security | 4 | |||
Information Systems Security | 4 | |||
Emerging Technologies in Cybersecurity | 4 | |||
Managing Information Security | 6 | |||
Penetration Testing and Vulnerability Analysis | 4 | CompTIA | Pentest+ | 4 |
Networks | 4 | CompTIA | CompTIA Network+ | 4 |
Network and Security - Applications | 4 | CompTIA | CySA+, CompTIA Security+ | 4 |
IT Foundations | 4 | CompTIA | CompTIA A+ | 4 |
IT Applications | 4 | CompTIA | CompTIA A+ | 4 |
Total | 71 | 42 |
Non-Transferable Courses
Course | Competency
Units Value |
Course
Provider |
Course Name | WGU Credit |
---|---|---|---|---|
IT Capstone | 4 | |||
Totals | 4 | 0 |
Total Transfer Credit
Course | Competency
Units Value |
Course
Provider |
Course Name | WGU
Transfer Credit 90 max |
---|---|---|---|---|
General Education Requirements | 30 | 26 | ||
Core Courses | 20 | 20 | ||
Additional Courses | 71 | 42 | ||
Non-Transferable Courses | 4 | 0 | ||
Total | 122 | 88 |
*To copy this degree plan, hold down left mouse button, drag to select tables, then copy/paste (CTR+C/CTR+P) to Sheets or Excel.