Requirements Accordion Open
A minor is earned in conjunction with a bachelor's degree.
To receive a minor (18 to 24 units) at Northern Arizona University, you must complete a planned group of courses from one or more subject matter areas with a cumulative grade point average of at least 2.0. At least 12 units of the minor must be unique to that minor and not applied to any other minor.
Overview Accordion Closed
In addition to University Requirements:
- Complete individual plan requirements.
Please note that students may be able to use some courses to meet more than one requirement. Contact your advisor for details.
No more than 50% of the units used to satisfy minor requirements may be used to satisfy major requirements.
|Minimum Units for Completion||20|
|Highest Mathematics Required||MAT 226|
|Some online/blended coursework||Required|
Computing has become integral to the infrastructure of modern society. From banking and health to education and business, our world runs on algorithms and computing machines. Software and hardware are ubiquitous in every aspect of modern life. This infrastructure is powerful, complex—and highly vulnerable. Small design flaws or less than vigilant safety guards can lead to attacks and exploits that can cost businesses hundreds of billions of dollars and valuable consumer trust, and loss of infrastructure critical to modern civilization. At the same time there is a shortage of workers with the skills needed to secure these systems. The Minor in Cybersecurity prepares students for jobs that touch on cybersecurity but also require deep disciplinary knowledge and preparation in another area of study. The minor requires that students take the first core courses in the Cybersecurity undergraduate major, thus providing students with significant breadth. Students can apply this foundation to many other areas of study where cybersecurity expertise is critical such as business, management, software engineering, computer engineering, law enforcement, and pre-law.
Student Learning Outcomes
- Analyze a complex computing problem and apply principles of computing to identify solutions.
- Design, implement, and evaluate a computing-based to meet a given set of computing requirements.
- Apply security principles and practices to maintain operations in the presence of risks and threats.
Details Accordion Closed
Take the following 20 units:
Students enrolled in this minor may not enroll in or pursue the following due to the number of overlapping units:
- Cybersecurity, BS
Be aware that some courses may have prerequisites that you must also successfully complete. For prerequisite information, click on the course or see your advisor.