The cybersecurity sector is exploding, which means that professionals with the right skills, knowledge, and experience will have plenty of opportunities. This guide addresses all of the important factors to consider when deciding on a cybersecurity major or evaluating a cybersecurity degree programme. We’ll look at the various paths that can lead to a cybersecurity degree in this guide. We’ll also look at some of the most common qualifications for a bachelor’s degree in cybersecurity, as well as some commonly asked questions about cybersecurity majors. Finally, we go through some of the career options available to graduates with a cybersecurity bachelor’s degree.
Top five biggest reasons to get a cybersecurity bachelor’s degree
It’s a huge decision to invest years of your life and tens of thousands of dollars in a college or university degree. It’s a good idea to be sure that pursuing a cybersecurity degree is a good match for you before diving in.
Here are some of the most compelling reasons to pursue a cybersecurity degree:
- Professionals in the field of cybersecurity are in high demand. This ensures that getting a successful job in cybersecurity is easier than in most other fields, and cybersecurity professionals are well compensated (see our complete profile of cybersecurity careers for more information).
- Professionals in the field of cybersecurity make a difference. It’s not as if cybersecurity experts work in a factory producing the same widget over and over again. Cybersecurity experts, on the other hand, use their education and experience to safeguard sensitive digital infrastructure and services.
- Cybersecurity is a high-paying career in the software industry. Information security analyst was recently named one of the top five positions to have in tech by US News and World Report. The rating is based on work demand and earning potential. Other positions in cybersecurity follow a similar pattern.
- The demand for cybersecurity jobs will continue to rise in the future. According to a variety of work pages, the average annual growth in cybersecurity job demand is around 7% per year. As the world becomes more digitally linked, the growth is expected to continue in the future.
- Cybersecurity is a complex field with few dull moments. Cybersecurity is always evolving, thanks to new threats and technical advancements, so there are no dull days at the office.
To help students interested in pursuing a cybersecurity degree learn more about their choices, we compiled a list of the most frequently asked questions.
Frequently asked questions about the process of getting a cybersecurity degree
Q. What kind of degree do you need for a career in cybersecurity?
A. Computer science, information technology, criminal justice, business management, and law are only a few of the paths and degrees that can help you start a good cybersecurity career. Students with non-cybersecurity degrees can take classes in computer coding, networking, cryptography, and cyber vulnerability testing (also known as penetration testing or ethical hacking). Many colleges and universities are increasingly providing cybersecurity-specific degrees at all levels, from associate’s to Ph.D., in part to meet workforce demand. These degree programmes are available both on and off campus.
Q. Is a degree in cybersecurity worth it?
A. Indeed, a cybersecurity degree is worthwhile. Let’s go into more detail. There are usually two requirements for deciding something’s worth or value. There are two types of values: intrinsic and extrinsic. Intrinsic values mean that something has meaning in and of itself, or for the sake of it. This is valid in many respects when it comes to cybersecurity. The profession’s aim is summed up in its name: to keep safe. When you take out cybersecurity experts who work for the good guys, you’re left with only cybersecurity experts who work for the bad guys. As a result, indeed. Cybersecurity is valuable in and of itself. When it comes to extrinsic meaning, it generally refers to how people perceive and value the profession. Salary is a very simple metric for extrinsic valuation. Extrinsically, cybersecurity practitioners are highly valued since many individuals with a cybersecurity degree and work experience earn six figures.
Q. What is a cybersecurity major?
A. While there are many different forms of cybersecurity majors, they all concentrate on a core technical curriculum that includes elements of computer science, networking, cryptography, and hacking. As previously mentioned, there are a variety of ways to earn a bachelor’s degree in cybersecurity. Some students are interested in the networking or computer technology dimensions of cybersecurity, as well as information assurance. Others are more concerned with cyber security and ethical hacking. Some students are more interested in criminal justice and digital forensics. Prospective cybersecurity students will be able to follow a career path that attracts them with the right cybersecurity degree programmes.
Q. How long does it take to get a degree in cybersecurity?
A. A typical campus-based cybersecurity bachelor’s degree programme takes 120 credits to complete, or around four years of full-time study. Competitive cybersecurity master’s degree programmes typically require 60 credit hours or two years of full-time study to complete. However, today’s educational opportunities and options are more versatile, particularly for students pursuing online cybersecurity degrees. It’s also worth noting that some master of cybersecurity programmes are tailored for students who already have cybersecurity-related job experience and want to improve management, communications, and strategy skills. Some of these online master’s programmes can be completed in a year, depending on the student’s history.
Q. Is cybersecurity hard?
A. Of course. Getting a cybersecurity degree is difficult. Engineering, computer science, mathematics, and other scientific fields are often used in cybersecurity degrees. It’s not easy to demonstrate mastery in these areas, which are known for their complexity and rigour. That isn’t to suggest that obtaining a cybersecurity degree is difficult. Hands-on learning exercises, such as cyber-ranges and project-based capstone projects, are increasingly being used by universities to ensure that the cyber curriculum is a good mix between the academic, theoretical, and practical.
Q. What skills do you need for cybersecurity?
A. Cybersecurity specialists have traditionally had a strong background in computer science, computer coding, information technology, and networking. University cybersecurity curriculum creators are increasingly incorporating courses on domestic and foreign policy, criminal justice, business management, and strategy in the mix to represent the challenges faced by the cybersecurity profession. The aim is to prepare tomorrow’s cybersecurity leaders so that they can learn about and solve large problems.
Q. What requirements are needed for a cybersecurity bachelor’s degree?
A. GPA, training, and test scores are the three key criteria for admission to a cybersecurity bachelor’s degree. Admission criteria vary by university and degree programme, but they typically include a combination of previous GPA, previous work experience or academic experience, and requisite test scores. A 3.0 GPA is commonly considered suitable for a bachelor’s degree in cybersecurity, but more competitive programmes will require higher GPAs, whereas less competitive programmes will require lower GPAs. Master’s degree programmes often have a GPA portion, but it can be higher or lower than a 3.0 depending on a number of factors, much like bachelor’s degree programmes. It is often a good idea to demonstrate an interest and proficiency in computer science or programming while applying for bachelor’s degree programmes. This can be illustrated with a project portfolio, previous coursework or certifications, tournaments, or club membership. Competitive master’s applicants may be able to demonstrate any cybersecurity-related job experience or another way of demonstrating the expertise and knowledge required to succeed in the academic programme and beyond.
Q.What can I do with a bachelor’s of cybersecurity?
A. Graduates of cybersecurity degree programmes have a plethora of future career choices. This website has an entire section devoted to in-depth profiles of cybersecurity careers, ranging from entry-level to C-suite roles. As previously mentioned, completing a bachelor’s degree programme will provide you with a well-rounded experience and preparation to take on a variety of roles. Furthermore, most cybersecurity programmes (both bachelor’s and master’s degrees) allow students to specialise. Since there is such a high demand for cybersecurity expertise, anyone with a bachelor’s degree will usually find a successful job early on in their careers.
Five key considerations when choosing the right bachelor’s degree programme
1. Research: The first step in determining if a bachelor’s degree in cybersecurity is right for you is to look at all of your choices (which is probably what lead you here in the first place). As the cybersecurity sector matures, so do the opportunities available to students interested in gaining the skills and experience needed to launch a career in a high-demand field. There are a range of cybersecurity bachelor degree programmes available online that are worth looking into in addition to conventional campus-based academic programmes.
2. Visit or contact colleges and universities for more information: Course offerings, degree requirements, student and career resources, available financial assistance, and other important factors vary by academic programme. Visiting or contacting individual schools and speaking with professors, students, and support staff is a perfect way to learn about a program’s true costs and benefits. Furthermore, speaking with real people can disclose important knowledge not included in the college or university’s publicity materials, which is a positive thing.
3. Admission prep: After developing a list of target schools and programmes, dive into admissions requirements and understand what kind of preparation can be done in advance. Examine the necessary test scores, prerequisites, required experience, and other considerations that can be planned ahead of time. Establish positive relationships with teachers and those who can serve as references. In the next section, we’ll go through the admission criteria in greater detail.
4. Apply: Applying to a college or university programme can be intimidating, but knowing precise timelines and deadlines ahead of time can help make the process feel more manageable. Keep a list of scholarship opportunities and deadlines, as well as schools and services that use standard applications (where one application can be used by several schools).
5. Budget: Making (and sticking to) a balanced budget is one of the most difficult aspects of earning a bachelor’s degree. One important move is to understand the total degree costs (credit costs per year + cost of living + other factors). It’s also important to know what kinds of student funding options are available when creating a budget.
Cybersecurity degree admission requirements
Many undergraduate cybersecurity colleges, like other undergraduate degree programmes, require a high school diploma or a GED.
Since cybersecurity is a computer-intensive field, understanding the fundamentals of computing infrastructure and programming can aid in demonstrating the skills and aptitude required to be a good cybersecurity student and professional.
Learning to write computer code or designing computer software and hardware are both excellent ways to prepare for a bachelor’s degree in cybersecurity.
Not all cybersecurity professionals begin their careers with a bachelor’s degree in cybersecurity or information protection. Some students major in math, computer science, or engineering, but focus on security through coursework, internships, or certification preparation.
Common courses for cybersecurity majors
The coursework and curriculum for undergraduate cybersecurity programmes are diverse and comprehensive, reflecting the variety of positions available in the workforce for qualified cybersecurity professionals.
“What we teach at undergraduate level is offensive security as well as defensive security. The first thing we teach the students is how to hack. But we also teach them ethics.”
— Hossein Sarrafzadeh, professor and chair of St. Bonaventure University’s cybersecurity department.
Individual learning can differ depending on the requirements of each cybersecurity bachelor’s degree programme, but there are some common curriculum patterns. Students pursuing a bachelor’s degree in cybersecurity should expect to take courses in:
- Computer science: The foundation of cybersecurity work is computer science theory and practise.
- Network security architecture and hardening: Knowing how different data networks work (and how different networks can be hacked) is also important in this field.
- These courses may outline the rights and responsibilities expected of a cybersecurity professional, especially when dealing with or accessing sensitive data or intelligence. Ethical hacking and when it’s okay to go from a defensive to an offensive security stance are examples of topics that could be discussed.
- Forensics: These courses focus on identifying the source of a security breach or intrusion and determining how to track down the individual or group responsible.
- Security issues surrounding mobile and wireless networks are becoming their own specialty within the cybersecurity world as the world becomes increasingly mobile and wireless.
Not only are there various technological aspects of cybersecurity (for example, learning about network protection versus preventing social engineering attacks), but there are also different ways to specialise.
For students interested in management and cybersecurity, Colorado Technical University, for example, offers a bachelor’s degree programme. This type of curriculum will be perfect for anyone who wants to learn the technological aspects of cybersecurity while also training to lead teams and operate within a company’s or organization’s leadership framework.
Online cybersecurity bachelor’s programmes
The good news is that there are more opportunities for students to complete their cybersecurity bachelor’s degree with each passing year.
More and more colleges and universities are offering cybersecurity students coursework and degree programmes, as well as certificates and other technical programmes.
They also offer online degree programmes that are ideal for working professionals or those who are unable to attend on-campus classes due to other obligations.
Students in campus-based classes will have more opportunities to participate in student associations and professional organisations, as well as internships and mentoring.
Universities are offering hybrid degrees, which allow students to attend some in-person, campus-based instruction while still taking online classes, as online education becomes more popular. These programmes seem to deliver the best of both worlds, giving students access to campus resources while also allowing them to complete coursework online.
How much is tuition for a cybersecurity bachelor’s degree?
The cost of a bachelor’s degree in cybersecurity can differ greatly depending on a number of factors.
A cybersecurity bachelor’s degree, like most undergraduate degrees, would include 120 to 126 hours of coursework, which will include academic courses and electives.
According to studies released by the U.S. Department of Education, tuition dependent on credit hour can vary between $300 and $500 per credit, implying that overall tuition for a cybersecurity bachelor’s degree can range between $23,000 and $61,000. News and World Report is a news organisation based in the United States.
Here are five things to consider when evaluating tuition costs.
- Cost per credit: This is probably the simplest metric to use when comparing cybersecurity degree programmes to one another. Lab fees and other charges are also included in overall tuition costs. However, compare credit costs for each curriculum to get a true understanding of the cost versus benefit of a cybersecurity degree.
- Location: The cost of a cybersecurity bachelor’s degree might vary depending on geographic location. One factor to consider is whether the school has established relationships with cybersecurity employers in the region. Internships and job preparation would be a little simpler as a result of this.
- Size: Overall school and programme size seem to correlate to cost. Since they are part of a larger university, larger programmes have a greater variety of course offerings. However, bigger isn’t necessarily better, so it’s always a good idea to do some research into how individual services can best fulfil specific student needs and goals.
- Online vs. campus-based: It’s important to look at the cost per credit when comparing online degrees versus campus-based degrees. It’s also crucial to compare the number of necessary course hours for each degree and determine which is a better match.
- Full-time vs. part-time: While the choice of full-time vs. part-time attendance in a cybersecurity bachelor’s degree programme may not have a significant impact on the cost-per-credit, it may make the degree more affordable, or at least financially attainable, because students can work while in school. Although not all programmes offer a part-time alternative, there are enough that it’s worth considering.
When weighing bachelor degree options, community college cybersecurity programmes should be considered. Community colleges are increasingly offering bachelor’s and associate’s degrees in cybersecurity, with both on-campus and online course options.
Since qualified professionals with a history and understanding in computer and network security are in such high demand, a variety of cybersecurity-specific undergraduate scholarships are accessible. Many cybersecurity scholarship opportunities are funded by businesses seeking to increase their cybersecurity workforce or by government agencies and organisations looking to fill important cybersecurity positions.
Here are a few examples of scholarships available to students pursuing a bachelor’s degree in cybersecurity:
Scholarship for Service in Science, Mathematics, and Research Transformation (SMART): This scholarship covers the entire cost of tuition, as well as a stipend and other benefits. It is intended for students who choose to work for the Department of Defense (DOD) during the summer while enrolled in an undergraduate programme and then work full-time for the DOD after graduation for a specified period of time.
The International Information Systems Security Certifications Consortium, Inc.’s Center for Cyber Safety and Education provides a variety of scholarships for undergraduate and graduate students. Any of the scholarships are tailored to help women pursue careers in cybersecurity. Students pursuing both conventional on-campus and online cybersecurity degrees are eligible for the scholarships.
The Stokes Educational Scholarship Program is open to high school students who are planning to participate in a cybersecurity bachelor’s degree programme. The scholarship, which is run by the National Security Agency (NSA), offers up to $30,000 per year in addition to other benefits and stipend opportunities. Students participating in this programme must work for the NSA for 1.5 times the amount of years the scholarship covers after graduation.
Cybersecurity career outlook
Cybersecurity bachelor degree holders will find rewarding and high-paying positions in a variety of industries and sectors, whether in top-secret government, military, or intelligence work, a buttoned-down office job with a Fortune 500 business, or as early start-ups developing the latest technology.
Obtaining a cybersecurity degree can provide a decent return on investment in terms of both money and job. The median pay for an entry-level information security worker with a bachelor’s degree in cybersecurity is $95,510, according to the Bureau of Labor Statistics (BLS).
Many cybersecurity bachelor’s degree programmes combine computer science, information technology, and network security. An undergraduate cybersecurity degree provides excellent training for the cybersecurity certification process, which is a critical component of the sector.
Listings of schools
Now it’s time to take the next step to look into cybersecurity bachelor’s degrees that would be a good match academically and personally. The following is a detailed list of the most recent cybersecurity degree options, which is revised on a regular basis.
|School||Location||Link to Program Website|
|Alderson Broaddus University||Philippi, West Virginia|| Bachelor of Science – Cyber Security|
|Anderson University||Anderson, Indiana||Cybersecurity Major|
|Arizona State University||Tempe, Arizona||B.S.E. in Computer Systems Engineering – Cybersecurity|
|Assumption College||Worcester, Massachusetts||Bachelor of Science in Cybersecurity|
|Augusta State University||Augusta, Georgia||Bachelor of Science in Information Technology – Cybersecurity|
|Baker College||Allen Park, Michigan||Bachelor of Science in Information Technology and Security – Concentration in Information Assurance and Cyber Security|
|Baker College||Allen Park, Michigan||Bachelor of Science in Information Technology and Security – Concentration in Network Professional|
|Baker College||Allen Park, Michigan||Bachelor of Science in Information Technology and Security – Concentration in Server Administration|
|Bay Path University||Longmeadow, Massachusetts||Bachelor of Science in Cybersecurity – Digital Forensics|
|Bloomsburg University of Pennsylvania||Bloomsburg, Pennsylvania||Bachelor’s in Digital Forensics|
|Boise State University||Boise, Idaho||Bachelor’s of Science in Computer Science – Cyber Security Minor|
|Brigham Young University-Provo||Provo, Utah||BS in Information Technology emphasis in Cyber Security|
|California State Polytechnic University-Pomona||Pomona, California||Bachelor of Science in Computer Science – Cyber Security Career Focus|
|California State Polytechnic University-Pomona||Pomona, California||Computer Information Systems Undergraduate Program: Information Assurance Track|
|California State University – San Bernardino||San Bernardino, California||B.A. Criminal Justice – Crime Analysis, Technical Proficiency Cyber Security|
|California State University – San Bernardino||San Bernardino, California||B.S. Information Systems & Technology – Cyber Security Intelligence|
|Cameron University||Lawton, Oklahoma||Bachelor of Science in IT – Information Assurance/Security|
|Capitol Technology University||Laurel, Maryland||Bachelor of Science in Cyber Analytics|
|Capitol Technology University||Laurel, Maryland||Bachelor of Science in Cybersecurity|
|Champlain College||Burlington, Vermont||Bachelor of Science in Criminal Justice – Cyber Investigation Specialization|
|Clemson University||Clemson, South Carolina||Cybersecurity Minor|
|Columbia Basin College||Pasco, Washington||Bachelor of Applied Science in Cyber Security|
|Columbus State University||Columbus, Georgia||Computer Science (BS) – CyberSecurity Track|
|Columbus State University||Columbus, Georgia||Cybersecurity(BS)|
|Dakota State University||Madison, South Dakota||Cyber Operations (BS)|
|Davenport University||Grand Rapids, Michigan||Digital Forensics, BS|
|Davenport University||Grand Rapids, Michigan||Network Security, BS|
|East Stroudsburg University of Pennsylvania||East Stroudsburg, Pennsylvania||Bachelor of Science Degree in Computer Security|
|Eastern Kentucky University||Richmond, Kentucky||B.S. in Network Security and Electronics|
|Eastern Michigan University||Ypsilanti, Michigan||Bachelor of Science in Information Assurance & Cyber Defense|
|Embry-Riddle Aeronautical University||Prescott, Arizona||Bachelor of Science in Cyber Intelligence and Security|
|Fairleigh Dickinson University||Madison, New Jersey||B.S. in Computer Science – Cybersecurity & Information Assurance Concentration|
|Fairleigh Dickinson University||Madison, New Jersey||B.S. in Computer Science – Cybersecurity Concentration|
|Fairleigh Dickinson University||Madison, New Jersey||B.S. in Computer Science – Information Security Administration Concentration|
|Fairleigh Dickinson University||Madison, New Jersey||B.S. in Information Technology – Security & Forensics Concentration|
|Ferris State University||Big Rapids, Michigan||Bachelor of Science in Information Security and Intelligence|
|Ferris State University||Big Rapids, Michigan||Minor in Digital Forensic/Cybersecurity|
|Ferris State University||Big Rapids, Michigan||Minor in Information Security and Intelligence|
|Florida Atlantic University||Boca Raton, Florida||Bachelor of Management Information Systems (MIS) – specialization in Information Security and Business Analytics|
|Florida Polytechnic University||Lakeland, Florida||Bachelor of Science in Computer Science: Information Assurance & Cyber Security|
|Fontbonne University||Saint Louis, Missouri||Bachelor of Science in Cyber Security|
|Fort Hays State University||Hays, Kansas||BA or BS in Information Networking and Telecommunications, Concentration: Computer Networking and Telecommunications with Information Assurance Emphasis|
|Friends University||Wichita, Kansas||Bachelor of Science in Cyber Security – Adult Undergraduate Program|
|Friends University||Wichita, Kansas||Bachelor of Science in Cyber Security – Traditional Undergraduate Program|
|Frostburg State University||Frostburg, Maryland||Bachelor of Science in Secure Computing and Information Assurance|
|George Fox University||Newberg, Oregon||Bachelor of Science in Computer Science – Cyber Security Concentration|
|George Mason University||Fairfax, Virginia||Bachelor of Science in Cyber Security Engineering|
|George Washington University||Washington, District Of Columbia||BA/BS in Computer Science / MS in Cybersecurity in Computer Science|
|George Washington University||Washington, District Of Columbia||Cybersecurity Bachelor’s Degree Completion Program|
|Georgia Southern University||Statesboro, Georgia||Bachelor of Information Technology – Cyber Security Track|
|Georgia Southern University||Statesboro, Georgia||Bachelor of Science in Criminal Justice and Criminology – Cybercrime|
|Georgia Southern University||Statesboro, Georgia||BBA in Information Systems – Enterprise Security|
|Georgia Southern University||Statesboro, Georgia||Cyber Security Minor|
|Georgia Southern University||Statesboro, Georgia||Minor in Cyber Security|
|Green River Community College||Auburn, Washington||Bachelor’s in Network Administration & Security|
|Harrisburg University of Science and Technology||Harrisburg, Pennsylvania||Bachelor of Science in Computer and Information Sciences – Cyber Security|
|Houston Baptist University||Houston, Texas||Bachelor of Science in Cyber Engineering|
|Illinois Tech||Chicago, Illinois||Applied Cybersecurity and Information Technology (B.S.)|
|Indiana University Bloomington||Bloomington, Indiana||Bachelor of Science in Computer Science – Security Specialization|
|Indiana University Bloomington||Bloomington, Indiana||B.S. in Cybersecurity and Global Policy|
|Indiana University Bloomington||Bloomington, Indiana||Bachelor of Science in Informatics – Security Informatics Specialization|
|Indiana University Bloomington||Bloomington, Indiana||Minor in Security Informatics|
|Indiana University of Pennsylvania-Main Campus||Indiana, Pennsylvania||Bachelor of Science in Computer Science – Cyber Security Track|
|Iona College||New Rochelle, New York||Bachelor of Science in Computer Science with Concentration in Cyber Security|
|Iowa State University||Ames, Iowa||Cyber Security Engineering|
|Jacksonville State University||Jacksonville, Alabama||Bachelor of Science in Computer Science – Information Assurance|
|Johnson & Wales University||Providence, Rhode Island||Bachelor of Science in Cyber Threat Intelligence & Defense|
|Kansas State University||Manhattan, Kansas||BS in Computer Science – Cyber Security Track|
|Kean University||Union, New Jersey||Bachelor of Arts in Criminal Justice with a concentration/minor in Cybersecurity|
|Kean University||Union, New Jersey||Bachelor of Science in Computer Science with a Cybersecurity option|
|Kean University||Union, New Jersey||Bachelor of Science in Information Technology with a Cybersecurity option|
|Kennesaw State University||Kennesaw, Georgia||Bachelor Of Science In Cybersecurity Engineering|
|Kent State University||Kent, Ohio||Bachelor Of Science In Cybersecurity Engineering|
|Kentucky State University||Frankfort, Kentucky||Bachelor of Science in Computer Science – Computer Information Security Option|
|LeMoyne-Owen College||Memphis, Tennessee||Major Criminal Justice ( Cyber Defense/Cyber Security Concentration)|
|Lindenwood University||Saint Charles, Missouri||BS in Cyber Security|
|Lipscomb University||Nashville, Tennessee||Bachelor of Science in Information Security|
|Louisiana Tech University||Ruston, Louisiana||B.S. in Computer Science – Cyber Security Concentration|
|Loyola University Chicago||Chicago, Illinois||B.S. in Cyber Security|
|Marshall University||Huntington, West Virginia||Bachelor of Science in Digital Forensics and Information Assurance|
|Marshall University||Huntington, West Virginia||Regents Bachelor of Arts – Digital Forensics and Information Assurance Emphasis|
|Marymount University||Arlington, Virginia||Bachelor of Science in Information Technology – Specialty in Networking and Cybersecurity|
|Marywood University||Scranton, Pennsylvania||B.S. in Information Security|
|Mercyhurst University||Erie, Pennsylvania||Bachelor of Science in Cyber Security|
|Messiah College||Mechanicsburg, Pennsylvania||Cybersecurity B.S|
|Metropolitan State University||Saint Paul, Minnesota||Bachelor of Science in Cybersecurity|
|Metropolitan State University||Saint Paul, Minnesota||Computer Forensics (BAS)|
|Metropolitan State University||Saint Paul, Minnesota||Computer Forensics Minor|
|Metropolitan State University||Saint Paul, Minnesota||Cybersecurity Minor|
|Metropolitan State University of Denver||Denver, Colorado||Bachelor of Science in Computer Information Systems – Information Systems Security Concentration|
|Michigan Technological University||Houghton, Michigan||Bachelor of Science in Computer Network and System Administration – Cybersecurity|
|Mount Aloysius College||Cresson, Pennsylvania||Bachelor of Science in Information Technology – Cybersecurity and Digital Forensics Concentration|
|Mount St. Mary’s University||Emmitsburg, Maryland||Cyber Security Minor|
|New England Institute of Technology||East Greenwich, Rhode Island||Bachelor of Science in Cyber Security and Network Engineering|
|New Mexico Institute of Mining and Technology||Socorro, New Mexico||Bachelor of Science Degree in Information Technology – Security and Assurance Track|
|Norfolk State University||Norfolk, Virginia||BS in Computer Science – Information Assurance Emphasis|
|Northeastern Illinois University||Chicago, Illinois||Bachelor of Science in Computer Science – Computer Networks and Security concentration|
|Northeastern State University||Tahlequah, Oklahoma||Bachelor of Science in Cyber Security|
|Northeastern University||Boston, Massachusetts||Bachelor of Science in Cybersecurity|
|Northern Michigan University||Marquette, Michigan||Bachelor of Science in Information Assurance/Cyber Defense|
|Ohio State University-Main Campus||Columbus, Ohio||Bachelors of Science in Computer Science and Engineering (BS CSE) – Information and Computation Assurance|
|Ohio State University-Main Campus||Columbus, Ohio||Bachelors of Science with a major in Computer and Information Science (BS CIS) – Information and Computation Assurance|
|Oklahoma State University-Main Campus||Stillwater, Oklahoma||Management Information Systems bachelor’s degree – Information Assurance Emphasis|
|Our Lady of the Lake University||San Antonio, Texas||BA in Computer Information Systems and Security – Security Track|
|Pace University-New York||New York, New York||Bachelor of Science in Information Technology – Security and Information Assurance Concentration|
|Palm Beach State College||Lake Worth, Florida||Bachelor of Applied Science in Information Management – Security and Network Assurance|
|Pennsylvania State University-Main Campus||University Park, Pennsylvania||Bachelor of Science in Cybersecurity Analytics and Operations|
|Purdue University||West Lafayette, Indiana||Bachelor of Science in Computer and Information Technology – Cybersecurity|
|Purdue University-Northwest||Hammond, Indiana||Bachelor of Science in Computer Information Technology|
|Rochester Institute of Technology||Rochester, New York||BS Computing Security|
|Rochester Institute of Technology||Rochester, New York||BS/MS in Computing Security|
|Roosevelt University||Chicago, Illinois||Bachelor of Science in Cyber and Information Security|
|Rutgers University||New Brunswick, New Jersey||Bachelor of Science in Computer Science – Computer Security|
|Saginaw Valley State University||University Center, Michigan||Minor in Cybersecurity|
|Saint Vincent College||Latrobe, Pennsylvania||Bachelor of Science in Computing and Information Science – Cybersecurity Concentration|
|Sam Houston State University||Huntsville, Texas||Bachelor of Science in Digital and Cyber Forensic Engineering Technology|
|Southeast Missouri State University||Cape Girardeau, Missouri||Bachelor of Science in Cybersecurity|
|Southern Arkansas University Main Campus||Magnolia, Arkansas||Bachelor of Science in Computer Science – Privacy and Cyber Security Option|
|Southern Methodist University||Dallas, Texas||Bachelor of Science – Computer Science – Security Track|
|Southern University and A & M College||Baton Rouge, Louisiana||Bachelor Of Science in Computer Science – Cybersecurity|
|St. Bonaventure University||St. Bonaventure, New York||Bachelor of Science in Cybersecurity|
|St. John’s University||Queens, New York||Cyber Security Systems, Bachelor of Science|
|Stevens Institute of Technology||Hoboken, New Jersey||Bachelor of Science in Cybersecurity|
|SUNY at Albany||Albany, New York||B.S. in Digital Forensics|
|SUNY at Albany||Albany, New York||Major in Emergency Preparedness, Homeland Security and Cybersecurity|
|SUNY at Albany||Albany, New York||Minor in Emergency Preparedness, Homeland Security and Cybersecurity|
|SUNY Canton||Canton, New York||Cybersecurity B.S.|
|SUNY Polytechnic Institute||Utica, New York||Bachelor of Science (BS) degree in Network and Computer Security|
|Syracuse University||Syracuse, New York||B.S. in Information Management & Technology – Information security management concentration|
|Syracuse University||Syracuse, New York||B.S. in Systems and Information Science with Security Management Technical Sequence and Information Assurance & Security (IAS) Focus Area|
|Taylor University||Upland, Indiana||Bachelor of Science in Computer Science – Cybersecurity|
|Tennessee Technological University||Cookeville, Tennessee||Bachelor of Science in Computer Science – Cyber Security|
|Texas A&M University San Antonio||San Antonio, Texas||Bachelor of Applied Arts and Sciences Information Technology/Information Assurance and Security Concentration|
|Texas A&M University-College Station||College Station, Texas||Cybersecurity Undergraduate Minor|
|Texas A&M University-Corpus Christi||Corpus Christi, Texas||BS in CIS in Cyber Security and Infrastructure|
|The University of Tennessee||Knoxville, Tennessee||Cybersecurity Minor|
|The University of Tennessee at Chattanooga||Chattanooga, Tennessee||Bachelor of Science in Computer Science: Cyber Security|
|The University of Texas at Austin||Austin, Texas||Bachelor of Science in Computer Science – Cybersecurity|
|The University of Texas at Dallas||Richardson, Texas||Minor in Information Assurance|
|The University of Texas at San Antonio||San Antonio, Texas||Bachelor of Business Administration Degree in Cyber Security|
|The University of West Florida||Pensacola, Florida||Bachelor of Science in Cybersecurity|
|Thomas College||Waterville, Maine||Bachelor of Science in Security & Cyber Defense|
|Tulane University||New Orleans, Louisiana||Bachelor of Science in Information Technology with a concentration in Cybersecurity|
|Towson University||Towson, Maryland||Bachelor of Science in Computer Science with the option of the Security Track|
|Towson University||Towson, Maryland||Combined major in Computer Science and Mathematics with Security Track|
|Tuskegee University||Tuskegee, Alabama||BS in Information Technology – Network Administration/Security|
|United States Air Force Academy||USAFA, Colorado||Cyber Science Major|
|United States Military Academy||West Point, New York||Bachelor of Science in Electronic and Information Technology Systems (EITS) – Information Assurance|
|United States Naval Academy||Annapolis, Maryland||Cyber Operations Major|
|University of Advancing Technology||Tempe, Arizona||Bachelor of Science in Technology Forensics|
|University of Advancing Technology||Tempe, Arizona||Bachelors of Science in Network Security Degree|
|University of Advancing Technology||Tempe, Arizona||Bachelor of Science in Technology Forensics Degree|
|University of Alabama||Tuscaloosa, Alabama||Minor in Cyber Criminology|
|University of Alabama in Huntsville||Huntsville, Alabama||Bachelor of Science in Cybersecurity|
|University of Arizona||Sierra Vista, Arizona||Bachelor of Applied Science with an emphasis in Cyber Operations|
|University of Arkansas at Little Rock||Little Rock, Arkansas||Minor in Information Assurance|
|University of Central Missouri||Warrensburg, Missouri||Bachelor of Science in Cybersecurity|
|University of Central Missouri||Warrensburg, Missouri||Minor in Cybersecurity|
|University of Charleston||Charleston, West Virginia||Bachelor’s of Science in Cyber Security|
|University of Connecticut||Storrs, Connecticut||Bachelor of Science in Computer Science – Cyber Security Concentration|
|University of Connecticut||Storrs, Connecticut||Minor in Information Assurance|
|University of Detroit Mercy||Detroit, Michigan||Bachelor of Science in Computer & Information Systems – Cybersecurity Major|
|University of Dubuque||Dubuque, Iowa||Bachelor of Science in Computer Forensics & Security|
|University of Hawaii at Manoa||Honolulu, Hawaii||Bachelor of Arts in Information and Computer Sciences – Security Science Track|
|University of Hawaii at Manoa||Honolulu, Hawaii||Bachelor of Science in Computer Science – Security Science Track|
|University of Hawaii-West Oahu||Kapolei, Hawaii||Bachelor of Applied Science in Information Security and Assurance|
|University of Houston – Clear Lake||Clear Lake, Texas||Minor in Cyber Security|
|University of Idaho||Moscow, Idaho||B.S. Cyber Security|
|University of Illinois at Urbana-Champaign||Champaign, Illinois||Bachelor of Science in Computer Engineering – Illinois Cyber Security Scholars Program|
|University of Illinois at Urbana-Champaign||Champaign, Illinois||Bachelor of Science in Computer Science (Engineering) – Illinois Cyber Security Scholars Program|
|University of Illinois, Springfield||Springfield, Illinois||Information Systems Security Bachelor’s Degree|
|University of Louisville||Louisville, Kentucky||BSBA in Computer Information Systems – Information Security Concentration|
|University of Maine at Fort Kent||Fort Kent, Maine||Computer Applications Major (Bachelor of Science)|
|University of Maryland-College Park||College Park, Maryland||BS in Computer Engineering with Specialization in Cybersecurity|
|University of Maryland-College Park||College Park, Maryland||BS in Computer Science with Specialization in Cybersecurity|
|University of Massachusetts Amherst||Amherst, Massachusetts||BS in Computer Science with Security & Privacy Track|
|University of Memphis||Memphis, Tennessee||Bachelor of Science in Computer Science – Cyber Security Concentration|
|University of Michigan-Dearborn||Dearborn, Michigan||Bachelor of Science in Cybersecurity and Information Assurance – Cybersecurity and Privacy Concentration|
|University of Michigan-Dearborn||Dearborn, Michigan||Bachelor of Science in Cybersecurity and Information Assurance – Digital Forensics Concentration|
|University of Michigan-Dearborn||Dearborn, Michigan||Bachelor of Science in Digital Forensics|
|University of Missouri-St Louis||Saint Louis, Missouri||Minor in Cybersecurity|
|University of Missouri-St Louis||Saint Louis, Missouri||Bachelor of Science in Cybersecurity|
|University of Nebraska at Omaha||Omaha, Nebraska||Bachelor of Science in Cybersecurity|
|University of Nevada-Reno||Reno, Nevada||Cyber Security Minor|
|University of New Orleans||New Orleans, Louisiana||B.S. in Computer Science with concentration in Information Assurance|
|University of North Carolina at Charlotte||Charlotte, North Carolina||Bachelor of Science|
|University of North Carolina Wilmington||Wilmington, North Carolina||Minor in Cyber Security|
|University of North Georgia||Dahlonega, Georgia||BA/BS from Cottrell College of Business with a Minor in Cyber Security or Information Assurance & Security|
|University of North Texas||Denton, Texas||Bachelors in Cybersecurity|
|University of Oregon||Eugene, Oregon||Bachelor of Science in Computer and Information Science – Security Track|
|University of Pittsburgh-Pittsburgh Campus||Pittsburgh, Pennsylvania||BS in Information Sciences : Networks and security Specialization|
|University of South Carolina-Upstate||Spartanburg, South Carolina||Bachelor of Arts in Computer Information Systems – Network/Information Security Track|
|University of Southern Maine||Portland, Maine||Bachelor of Science in Cyber Security|
|University of Southern Maine||Portland, Maine||Minor in Cyber Security Literacy|
|University of Southern Mississippi||Hattiesburg, Mississippi||Information Security Minor|
|University of Virginia||Charlottesville, Virginia||Cybersecurity Focal Path|
|University of Washington-Seattle Campus||Seattle, Washington||Bachelor of Science in Informatics – Information Assurance and Cybersecurity Option|
|University of Wisconsin-Stout||Menomonie, Wisconsin||Bachelor of Science in Applied Mathematics and Computer Science – Cyber Security Concentration|
|Utah Valley University||Orem, Utah||Bachelor of Science in Information Technology – Computer Forensics and Security Emphasis|
|Utica College||Utica, New York||BS Cybersecurity|
|Virginia Tech||Blacksburg, Virginia||Undergraduate Minor in Cybersecurity|
|Walsh College||Troy, Michigan||Bachelor of Science in Information Technology – Cyber Security|
|Webster University||Saint Louis, Missouri||Bachelor of Science in Computer Science – Cybersecurity Emphasis|
|Western Connecticut State University||Danbury, Connecticut||Bachelor of Business Administration in Management Information Systems – Information Security option|
|Western Washington University||Bellingham, Washington||Bachelor of Science in Cybersecurity|
|Wichita State University||Wichita, Kansas||Bachelor of Science in Engineering Technology – Cybersecurity|
|Worcester Polytechnic Institute||Worcester, Massachusetts||Computer Science (BS)- Cyber Security Concentration|
|York College Pennsylvania||York, Pennsylvania||Bachelor of Science in Cybersecurity Management|