program overview
the field of cybersecurity has grown and evolved significantly in recent years. currently, only 3% of us bachelor degree grads have cyber-related skills, meaning students with this training are in high demand. cybersecurity professionals are also among the highest paid technology professionals measured at the 3-5 year post-graduation mark.
as a cybersecurity professional, you are concerned with the confidentiality, integrity, and availability of information regardless of the form the data may take: electronic, print or other forms. governments, military, corporations, financial institutions, hospitals and private businesses amass a great deal of confidential information about their employees, customers, products, research and financial status. most of this information is collected, processed, and stored on computers, and then transmitted across networks for additional processing, use and storage. protecting confidential information is a business requirement and, in many cases, is also an ethical and legal requirement.
lipscomb's cybersecurity degree program covers the breadth of cybersecurity from theoretical frameworks through models to policies and ethical practices. it focuses on security challenges, threats and requirements for operating systems, computer architectures, networking protocols and organization data and information. it ensures you will develop the necessary skills to become an indespensable asset in the technology field. at 世界杯2022预选赛录像回放 , we incorporate real-world training and experiences into the classroom by having you study under recognized leaders and practitioners. our expert faculty, specialized facilities, cyber defense team, internships and other resources will allow you to expand and utilize your growing expertise through a variety of opportunities.
courses
view the list of courses for the cybersecurity, b.s. required below.
our faculty
career paths
cybersecurity engineer
cybersecurity engineers combine a variety of skillsets to protect systems, network and data, including the creation and maintenance of software, hardware and implementation of security policies.
penetration tester
penetration testers use their experience with technology to perform cyberattacks on their employer's systems/networks to analyze the effectiveness of current cybersecurity.
information systems security engineer
an information systems security engineer is responsible for implementing security measures for an organization's network and system to prevent cyber attacks.