LET US HELP
Welcome to Capella
Select your program and we'll help guide you through important information as you prepare for the application process.
Ready to get started? We’re ready for you. Chat with an enrollment counselor or apply now to take the first step on the journey toward your future.
$50 application fee (waived w/promo SPRING)
*Based on the fastest 10% of students. Your program length and cost will vary by transfer credits, the per-session cost, and how quickly you complete courses. Books, supplies, and other fees apply.
Designated by the National Security Agency (NSA) and the Department of Homeland Security (DHS) as a National Center of Academic Excellence in Information Assurance/Cyber Defense (CAE IA/CD) for academic years 2014-2021.
Earn a badge on the way to completing this specialization, which can highlight your mastery and skills in information assurance and cybersecurity.
BS in IT students transfer an average of 63 credits, potentially saving over $22,400.
Your Certified Information Systems Security Professional (CISSP®) certification gives you the opportunity to save up to $8,581 on your BS in IT degree.*
*Savings inclusive of fees charged by Capella to evaluate and award academic credit for your prior learning. The documented credit fee of $50 is assessed each quarter you request documented credit. Capella reserves the right to change fees at any time. Learners who submit IAS-IT documented credit for the CISSP, CISM, CISA, CEH and SSCP may only be awarded a maximum of 5 courses through documented credit. They are able to submit regular petitions for the remaining credits allowed for PLA in their curriculum.
These experts will set you up for success. They’ll help you find the right degree and program, and answer all your questions about Capella.
Our team knows how to run the numbers and help find ways to save on costs.
Advisors know the details of your program. Got questions about courses? Instructors? Resources? Advisors have answers.
Sharpen your writing skills with our free tutoring services and other resources.
We know you’re busy—you need a learning experience tailored to your life, not the other way around. That's why Capella offers two 100% competency-based, online learning formats to best fit your needs. Which learning format is right for you? Take our Path Finder Quiz.
A more structured learning format with an active peer community and faculty guidance. We’ll set the schedule, you meet the deadlines.
A self-paced learning format that puts you in control. Take courses at your own speed, and move on to the next course whenever you’re ready.
*This is only an estimate, using general program pricing. Your price may be higher or lower depending on your specialization, transfer credits, tuition discounts, and (in FlexPath) the speed at which you move through the program. Fees, including application fees and resource kits, are not included in this estimate. The GuidedPath prices show the tuition you would pay if you brought in the average number of transfer credits or the maximum allowed transfer credits. The FlexPath prices show the tuition you would pay if you brought in an average number of transfer credits and you moved at the speed of a typical FlexPath student or as quickly as the fastest FlexPath students (90th percentile). New or recently revised programs base their estimate on comparable programs. Military Tuition Assistance (TA) is not available for FlexPath.
Speak with an enrollment counselor to get a personalized cost estimate for what you can expect to pay.
Our Information Security Career Central site is intended for individuals looking to enter or advance their careers in the growing field of information security. Hosted by Capella University, this site is devoted to sharing accurate, up-to-date information about hiring trends, jobs, skills development, industry certifications, educational opportunities, and other subjects related to information security.
Our bachelor’s in information technology, information assurance and cybersecurity degree helps you learn to evaluate security policies, social engineering, access control, authentication, perimeter security, disaster recovery, and more.
Cyber Defense and Countermeasures
Learners in this course examine principles of cyber defense and apply in-depth cyber countermeasure techniques to analyze and secure cyber infrastructure components. Learners also analyze relevant legal, ethical, policy, and risk considerations. Prerequisite(s): IT3355, IT4803.
|6 quarter credits|
Cyber Attacks and Ethical Hacking
Learners in this course use techniques, tools, and cybersecurity utilities to develop their understanding of strategies that hackers use to attack computers and networks. Learners investigate security threats and system vulnerabilities exploited by hackers, as well as consequences associated with being hacked. In addition, learners explore Intrusion Detection Systems (IDS), ethical hacking techniques, sniffers, protocols, social engineering, vulnerability analysis, and the use of penetration testing to ensure infrastructure security. Prerequisite(s): IT3355, IT4803.
|6 quarter credits|
Learners in this course scrutinize computer forensics as a discipline that supports law enforcement professionals in investigating white collar crime. Learners use computer forensics tools and techniques, and evaluate crime investigations, incident response and handling, and legal issues. Prerequisite(s): IT3355, IT4803.
|6 quarter credits|
Security Management and Policies
In this course, learners increase their knowledge of hands-on security management practices by analyzing security policies and procedures, risk management, and business continuity planning. Topics include security and business need trade-offs, risk assessments, designing security policies and procedures and a business continuity plan, and enforcement of security policies and procedures. Prerequisite(s): IT3355, IT4803.
|6 quarter credits|
Operating Systems and Application Security
Learners in this course use appropriate technologies to identify, investigate, and mitigate vulnerabilities, threats, and risks in operating systems and applications, including mobile and web applications, email, and databases. Prerequisite(s): IT4803.
|6 quarter credits|
The right education can change everything. Find your path to becoming a leader in cybersecurity and information assurance.
“The quality of [Capella’s] academic coursework is excellent and immediately applicable to your career. They’re always evolving their coursework to keep pace with the industry. Hearing about what they have planned makes me wish I were taking my coursework now.”
Not sure whether to pursue an IT certification or an IT degree? Learn more about which could be best for advancing your IT career.
Proactively finding holes in corporate IT programs and apps is done to prevent malicious hacker attacks.
Are you an information security professional? Keep on top of the latest InfoSec news with these seven blogs.
Here are just some of the career options you could explore with our bachelor's in information technology, information assurance and cybersecurity degree.
*These are examples intended to serve as a general guide. Some positions may prefer or even require previous experience, licensure, certifications, and/or other designations along with a degree. Because many factors determine what position an individual may attain, Capella cannot guarantee that a graduate will secure any specific job title, a promotion, salary increase, or other career outcome. We encourage you to research requirements for your job target and career goals.
While the information technology field offers a variety of career paths and focus areas, some of the more common paths include:
Design technical strategies for mitigating risks to information assets and carry out security measures to protect an organization’s computer networks, systems, and sensitive information.
Job titles to explore may include working as an information security analyst, security engineer, or security manager for a global tech company, information technology consulting firm, nonprofit organization, or corporation.
Build a secure architecture for an organization including data communication networks such as local area networks, wide area networks, and intranets.
Job titles to explore may include working as a network engineer, network security engineer, or security manager for a global tech company, information technology consulting firm, nonprofit organization, or corporation.
Design technical strategies for mitigating risks to information assets related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes.
Job titles to explore may include working as an information assurance engineer or information assurance analyst for a global tech company, information technology consulting firm, nonprofit organization, or corporation.
Multiple factors, including prior experience, geography, and degree field, affect career outcomes, and Capella does not guarantee a job, promotion, salary increase, or other career growth.
Is this program close to what you need, but maybe not a perfect fit? The programs below might be interesting. Check them out to find one that suits your academic and professional goals.