This program covers a broad expanse of technological concepts and provides individuals with the skills required to implement effective and comprehensive information security controls to protect the confidentiality, integrity, and availability of information and information systems.

Coursework includes securing network technologies and operating systems, security management, and industry best practices.

Additionally, students will acquire the skills and hands-on experience with hardware and software that allow them to pursue various industry certifications.

Each student should contact the Information Technology Department for assistance in planning the program of study.


People who work in this field are focused and analytic in their thinking, enjoying problem-solving and trying out new ideas. They enjoy hands-on projects and tend to Coursework. Often they prefer to work by themselves or in small groups and can work well with little supervision. They enjoy a challenge and work that allows them to use their abilities to their best.


There is a demand for qualified security professionals in all businesses that use computers as part of the normal course of business, as employers continue to invest in cybersecurity to protect their information and infrastructure. Many new and emerging careers in the Information Technology (IT) field are in the area of data and information security.


Primary Employers

Graduates from the Information Technology (IT) Security program will work in business, finance, insurance, and industrial firms; federal, state, and local governments; and education and healthcare sectors.


Computer Security Specialists
Plan, coordinate, and implement the employer’s information security in order to protect the organization’s data and infrastructure. They educate users about computer security, install security software, monitor networks for security breaches, respond to cyber attacks, and in some cases, gather data and evidence used in prosecuting cyber crime.

Security Analysts
Review and analyze computer data and documents for performance indicators to locate code problems, and correct errors by correcting codes. They consult with management to ensure agreement on system principles. They may also develop, document and revise system design procedures, test procedures, and quality standards.

Other Occupations

  • Data Recovery Planner
  • Network Designer
  • Security Administrator
  • Software Quality Assurance Tester
  • Web Administrator

You May Also Be Interested In...