The Department of Homeland Security has unique careers that will challenge your mind and utilize your individual skills and talents. Exciting professional growth opportunities include general mission support, national security, law enforcement and protection, immigration and travel security, anti-terrorism, intelligence, fraud detection, public safety and crisis response, and many more.
Our online degree program in Homeland Security has a three-part focus.
- Foundational courses that will provide you with the communication and thinking skills necessary to face ethical and critical issues in a contemporary, global society.
- Core Homeland Security courses to prepare you for any position within the Homeland Security profession.
- Specialized concentration courses give you extra expertise in your specific area of interest.
Those majoring in Homeland Security will receive a Bachelor of Science in Homeland Security with concentrations available in the following areas.
In the years since 9/11, public institutions, from government agencies to private firms, increasingly rely on trained counterterrorism experts to keep the public, the government, and the business community safe. Provide training in counterterrorism research, threat management, and counterterrorist techniques, focusing on analytical rigor, contingency planning, and proactive security measures.
- Job Outlook
- US government agencies and private defense companies have increased their counter terrorism operations. As a result of these new efforts to prevent terrorism, demand for high-paying jobs related to counter terrorism has increased.
- Counterintelligence Division of FBI
- Emergency Management Director
- Intelligence Production and Analysis
- Corporate Security
- First-line Supervisor for Police/Detectives
- Special Forces
The major in cyber security prepares graduates to be leaders in the protection of data assets. The curriculum focuses on the techniques, policies, operational procedures, and technologies that secure and defend the availability, integrity, authentication, confidentiality, and non-repudiation of information and information systems, in local as well as more broadly-based domains.
- Job Outlook
- The Bureau of Labor Statistics reports that the need for computer specialists is expected to increase 30% from 2008 to 2018. This exceptional job growth is in direct correlation to the increasingly sophisticated cyber attacks that have been occurring in recent years.
- Information Systems Security Professionals
- Senior System Managers
- Senior administrators responsible for information systems and security of those systems.
- Installation of security software.
- Planning and coordination of computerized security.
- Monitoring of computerized networks for breaches in security.
- Response to cyber attacks.
- Gathering of data and evidence of cyber attacks and criminal activity.
Earn a bachelor's degree in Homeland Security with a concentration in Emergency Management to take advantage of growing opportunities in mitigation, preparedness, response, or recovery activities for natural disasters.
- Job Outlook
- Emergency management is a growing profession and is projected to continue growing at a rate of 20% or more.
- Increased demand for education and experience for employees.
- Emergency Planner
- Emergency Management System Director
- Emergency Preparedness Program Specialist
- Hazard Mitigation Officer
Working in the Intelligence community is a unique career. You may live and work anywhere in the world and so you may be asked to learn a foreign language. The ability to establish and build interpersonal relationships is essential. The arts of persuasion, negotiation, interviewing, and problem solving are coveted qualities for careers in this field as well as the ability to work in ambiguous and unstructured situations. Information is crucial to the Intelligence community. As an Intelligence Collector, your work has a profound impact on national security. You may work closely with intelligence analysts to determine and acquire vital information needed for policymakers to make crucial decisions.
- Job Outlook
- The overall job outlook for Intelligence Analyst careers has been positive since 2004. Vacancies for this career have increased by 27.30 percent nationwide in that time.
- Demand for Intelligence Analysts is expected to go up, with an expected 20,300 new jobs filled by 2018.
- Science and Technology
- Information Technology
- Intelligence Collection
- Acquisitions and Financial Management
(18 credit hours.)
CT 304. Fundamentals of Threat Assessment (3) This course explores the various aspects of threat assessments. All types of threats such as criminal, terrorist, natural, and accidental will be examined. Sources of information and data on threats will be examined.
CT 314. Counterterrorism (3) This course explores the methods used to prevent, detect, and defend the United States and United States interests from acts of terrorism. Potential threats such as those from sleeper cells, lone wolf activities, and financial support networks within the United States will be introduced. Techniques to dismantle or disrupt these activities will also be examined.
CT 324. Terrorism and Technology (3) This course addresses the various technologies employed by terrorists, to include existing technology, the application of emerging technologies, and the quest of terrorists to capitalize on technology in order to improve their lethality.
CT 334. Counter Intelligence (3) This course examines efforts to protect the United States against foreign intelligence operations and espionage. The interaction between the US law enforcement and intelligence communities in an effort to neutralize the intelligence activities of foreign countries and entities that pose a significant threat to the United States will be explored.
CT 344. Religious Extremism (3) This course will examine the role of religious extremism and its relationship to terrorism, the effect of process justification and the doctrine of necessity, as well as the mindset of religious terrorists and how that serves to magnify their threat.
CT 354. Terrorist Support Networks (3) The course will study the various methods of support networks required to keep terrorist organizations operational and will examine financial aspects, support groups, and the administration and logistics necessary required to mount a successful terrorist campaign.
(18 credit hours.)
CS 274. Networking Fundamentals CMIT 265 (3) This course is an introduction to networking technologies for local area networks, wide area networks, and wireless networks. The aim is to recognize the type of network design appropriate for a given scenario. Topics include the OSI (open system interconnection) model, security, and networking protocols. This course will also help prepare students to take the CompTIA Network + certification exam.
CS 284. Introduction to Problem Solving and Algorithm Design (3) This course introduces the principles of computer programming, the logic of constructing a computer program, and the practical aspects of integrating program modules into a cohesive application. Algorithms are used to demonstrate programming as an approach to problem solving and a study of techniques for finding solutions to problems through structured programming are explored. In this course, the student will design programs using pseudocode and participate in hands-on debugging, testing, and documenting activities.
CS 374. Foundations of Cybersecurity (3) This course provides an introduction to the protection of business information and the systems that support business processes. Prerequisite: CS 284.
CS 384. Network Security (3) This course focuses on the fundamental concepts of computer security and its implementation. The aim is to assess and mitigate risk, evaluate and select appropriate technologies, and apply proper security safeguards. This course will help prepare students to take the CompTIA Security + certification exam.
CS 475. Security Policy Implementation (3) This course examines the contents of a security policy; general procedures related to secure use of data; general awareness; training and education plans; and general countermeasures and safeguards, including access controls, auditing, management oversight, and configuration management. Prerequisite: HS 374.
CS 476. Advanced Information Systems Security (3) This course provides a comprehensive study of information systems security to enhance organizational security. The goal is to manage risks by identifying and mitigating them before they become a risk to the organization. This course is designed to help prepare students for the (ISC)2 Certified Information System Security Professional (CISSP) certification exam. Prerequisite: CS 475.
(18 credit hours.)
EM 304. Introduction to Emergency Management (3) This course looks at emergency management and its role in responding to natural, man-made, and criminal/terrorist acts and examines the aspect of administration, planning, operations, and logistics.
EM 314. Disaster Response (3) This course examines disasters and the elements essential to proper response, with particular focus on the National Incident Management System and the Incident Command System.
EM 324. Emergency Planning (3) The focus of this course is to provide the student with the elements essential in proper planning and management and will discuss pre-planning, site surveys, risk analysis, and the development of standard operating procedures.
EM 334. Terrorism and Emergency Management (3) This course examines the impact of acts of terrorism on emergency management with emphasis on the complicating factor of the chaos experienced during the early stages of the incident, as well as successful strategies that afford the responders the ability to manage that chaos and establish effective incident command.
EM 344. Crisis Intervention (3) This course explores crisis intervention programs and crisis intervention strategies designed to aid emergency responders. Special emphasis will be given to pre-crisis preparation, demobilizations, crisis management briefings, defusings, critical incident stress debriefings, and individual crisis interventions and their role in response and recovery from Homeland Security related incidents.
EM 354. Technology in Emergency Management (3) This course explores the role of technology in emergency management. The use of technology and how that technology is employed in the response to, and mitigation of, emergency situations will be examined. New and evolving technologies will be explored.
(39 credit hours.)
HS 104. Introduction to Homeland Security (3) This course provides students with an overview of homeland security in the United States and explores the function of the Department of Homeland Security as well as the contributions and responsibilities of state and local agencies.
HS 204. International and Domestic Terrorism (3) This course examines international and domestic terrorism by looking at the roots of terrorism and its effect on homeland security. The course will focus on the history of terrorism to present day threats.
HS 214. Weapons of Mass Destruction (3) The course provides insights into weapons of mass destruction, including chemical, biological, radiological, nuclear, and explosive devices; their potential use by terrorist groups; and response to threats and protocols for dealing with exposures to WMD.
HS 224. Transportation Infrastructure and Homeland Security (3) This course looks at all aspects of the transportation infrastructure and its vulnerability to natural, man-made, and terrorist threats. Specific focus is directed toward the impact of an attack on infrastructure and methods to increase security and redundancy.
HS 234. Intelligence and Homeland Security (3) This course examines the importance of intelligence collection to the homeland security mission and includes discussion of the collection process, risk analysis, and the role of policy makers.
HS 244. Homeland Security and the Role of Public Health (3) This course examines the expanding role of the healthcare system in relation to the homeland security mission; discussed are disaster response and planning, healthcare issues, and the public health response to WMD.
HS 254. Management of Critical Incidents (3) The course focuses on the emerging science of critical incident management, studying the principles and doctrines associated with the effective response, developing strategies, operations planning, and management.
HS 304. Homeland Security Strategy and Policy (3) This course examines the National Response Framework and the National Incident Management System, the challenge of protecting the homeland and civil liberties, and developing best practices to be employed.
HS 314. Criminal Law (3) This course provides students with the purpose and scope of American criminal law and it's applicability to Homeland Security; explains the definition of criminal conduct, the classification and definition of specific offenses, defenses to criminal liability, complicity and vicarious liability, and inchoate offenses.
HS 324. Criminal Procedure (3) This course is a detailed analysis of due process of law from initial investigation to the ultimate disposition of the case. The course includes topics concerning search and seizure, interrogation, hearings, motions, pleas and trial procedures, the role of the principal trial participants, basic rules of evidence, sentencing, and the appellate process. The course provides students with critical knowledge of the inner workings of the American criminal justice system and its application to Homeland Security.
HS 354. Studies in Critical Incident Response (3) This course requires the student to analyze a variety of critical incident responses in order to identify response strengths and weaknesses, critique inadequate responses, and recommend methods and procedures that would improve response.
HS 364. Foundations of Information System Security (3) This course shows the various methods of establishing and maintaining practical cyber and information security programs to protect key organizational assets. Topics include data protection, telecommunications systems, applications, and emerging technologies. Threats and vulnerabilities are assessed to determine the level of risk. This course teaches the student how to evaluate and recommend security tools that will support an organization's overall information security program. Prerequisite: TEC 101.
HS 374. Security Policy Analysis (3) This course studies the various aspects of information assurance and cyber security policy planning in an organizational context. The aim is to examine key analysis procedures, such as security requirements analysis and risk assessments, to determine their roles in policy formation. Topics include the impact of current legislation, judicial decisions, and government regulations directing the focus of policy formulation. One of the projects for this course will include generating an information security profile for an organization. Prerequisite: HS 364.
(18 credit hours.)
INT 314. Intelligence Collection (3) This course provides students with an introduction to intelligence and counterintelligence concepts and processes. The course explores historical and contemporary approaches to intelligence/counter intelligence. The intelligence cycle, including collection, analysis, research, dissemination, consumption, and feedback, is examined. Members of the United States intelligence community and their missions and responsibilities are also explored. Intelligence requirements both standing and ad hoc will be discussed.
INT 324. Critical and Threat Analysis (3) This course illustrates how to identify an organization's vulnerabilities and potential threats and examines how to measure the effectiveness of an organization's security program. The course develops students' abilities to examine and produce surveys, audits, questionnaires, and procedural guidelines that are commonly employed by security professionals to counter risks.
INT 334. Cyber Warfare (3) This course explores the realm of real-world security problems, issues, and situations. Course assignments will require the use of protection, detection, deterrence, and response techniques in addressing threats, vulnerabilities, and risks found in today's cyber environment.
INT 344. Foreign Intelligence Organizations (3) This course examines the history and development of selected foreign intelligence organizations and their methods, organization, operations, and tradecraft. Organizations will include MI6; the Mossad; and Iranian, Chinese, Korean, and Russian intelligence organizations.
INT 354. Research Methods in Intelligence Studies (3) This course identifies methods used to gather raw intelligence. Human intelligence (HUMINT), signals intelligence (SIGINT), imagery intelligence (IMINT), measurement and signatures intelligence (MASINT), and open source intelligence (OSINT) will be discussed. Analysis of these types of intelligence and the production of intelligence products from this analysis will be examined.
INT 364. Espionage/Counterespionage (3) This course will explore the history of espionage and counterespionage. The course will focus on the history and development of American intelligence agencies, emphasis will be on intelligence gathering methods and espionage carried out in the 20th century. The relation to national security will be examined. Intelligence methods used during the Cold War and post-9/11 developments in intelligence gathering will also be covered.