Overlapping credentials
Overlapping credentials
Achieving multiple credentials
The general rule of thumb is that you can achieve multiple credentials if a credential does not have 50% or more overlap with your existing declared credentials (majors, minors, certificates). Sometimes this may require you to take extra courses to count for your additional credential that are not part of your other credentials. See your advisor for more specific guidance.
| Availability of other Cybersecurity Credentials |
|||
| Program | BS in CS | BS in C&I | BS in Cyber |
| MINOR: Computer Science | No | Yes | Yes |
| MINOR: Cybersecurity | Yes | Yes | No |
| CUGS: Cybersecurity | No | No | No |
| CUGS: Cybersecurity in IT | Yes | Yes | No |
| CUGS: Digital Forensics | Yes | Yes | Yes |
| CUGS: Ethical Hacking | Yes | Yes | Yes |
| CUGS: Intrusion Detection/Prevention | Yes | Yes | Yes |
- Students can also double minor, but then each minor must have 4 unique courses when compared to the major and the second minor.
- Students can declare a minor and a CUGS, but then the minor must have 4 unique courses compared to the CUGS and the major, and the CUGS must have 2 unique courses compared to the minor and the major.
College of Science & Mathematics
Main Menu
- Computer Science
- Academic Programs
- BA Computing & Informatics
- BA Computer Systems Technology
- BS Computer Science
- Minor in Computer Science
- Minor in Cybersecurity
- Concentrations BS CS
- Concentrations BA C&I
- Certificates of Undergraduate Study
- MS Computer Science
- MS Cybersecurity
- Certificates of Graduate Study
- Accelerated Dual Degree Program
- Cybersecurity
- Data Science Programs
- Compare University Computing Programs
- Compare our Undergraduate Programs
- Advising Materials
- Undergraduate
- BS Computer Science
- BA Computing & Informatics
- BA Computer Systems Technology
- BS CS Concentrations
- BA C&I Concentrations
- Certificate of Undergraduate Studies
- Computer Programming
- Mobile Apps CUGS
- Fundamental Computing CUGS
- Cybersecurity
- Blockchain Technologies and Cryptocurrencies
- Advanced Network Technology
- Azure Fundamentals
- Cybersecurity in Information Technology
- Database Development
- Database Fundamentals
- Digital Forensics
- Ethical Hacking
- Internet of Things
- Intrusion Detection/Prevention
- Linux Systems Administration
- Network Fundamentals
- Operating Systems Fundamentals
- Minor Degrees
- CS Undergraduate Catalog
- Graduate
- "4+1" (ADDP)
- Cybersecurity Programs
- Program Guides
- BA Computing & Informatics
- BA Computer Systems Technology
- BS Computer Science
- Minor in Computer Science
- Concentrations
- CUGS Guides
- Advanced Network Technology
- Azure Fundamentals
- Blockchain Technologies & Cryptocurrencies
- Computer Programming
- Cybersecurity
- Cybersecurity in Information Technology
- Database Development
- Database Fundamentals
- Digital Forensics
- Ethical Hacking
- Fundamental Computing
- Internet of Things
- Intrusion Detection/Prevention
- Linux Systems Administration
- Mobile Application Development
- Network Fundamentals
- Operating Systems Funamentals
- 4+1 Programs
- MS Computer Science
- MS Cybersecurity
- MS Data Science
- COGS Guides
- PhD in Data Science
- Minor in Data Science
- Minor in Cybersecurity
- BS Data Science
- Standard Course Syllabi
- Forms & Policies
- Undergraduate
- Faculty and Staff
- Students
- Research
- News
- Events
- Contacts
- Faculty Portal - secured
- Site Index
- Can't find it?