decorative image of rox-edit-2-PEN_Baars06 , Cybersecurity 2023-06-06 08:12:05

Contact the Pensacola State College Information Technology Department for assistance in planning your program of study.

View Course Requirements

 PROGRAM CONTACT
  Dr. Nelson Stewart
  Phone: (850) 484-1121
  Email: nstewart@pensacolastate.edu

 DEPARTMENT HEAD
  Dr. Kirk Bradley
  Phone: (850) 484-1121
  Email: kbradley@pensacolastate.edu

SEARCH PROGRAMS

INTRODUCTION

The Associate in Science degree in Cybersecurity provides students with a broad foundation in all areas of technology and prepares students to seek employment in various business and industry fields. Course work includes securing network technologies and operating systems, security management, and industry best practices.

IS THIS FOR YOU

People who work in this field are focused and analytic in their thinking, enjoying problem-solving and trying out new ideas. They enjoy hands-on projects and tend to Coursework. Often they prefer to work by themselves or in small groups and can work well with little supervision. They enjoy a challenge and work that allows them to use their abilities to their best.

BEYOND GRADUATION

There is a demand for qualified security professionals in all businesses that use computers as part of the normal course of business, as employers continue to invest in cybersecurity to protect their information and infrastructure. Many new and emerging careers in the Information Technology (IT) field are in the area of data and information security.

RELATED CAREER OPPORTUNITIES

Primary Employers

Graduates from the Information Technology (IT) Security program will work in business, finance, insurance, and industrial firms; federal, state, and local governments; and education and healthcare sectors.

Occupations

Computer Security Specialists
Plan, coordinate, and implement the employer’s information security in order to protect the organization’s data and infrastructure. They educate users about computer security, install security software, monitor networks for security breaches, respond to cyber attacks, and in some cases, gather data and evidence used in prosecuting cyber crime.

Security Analysts
Review and analyze computer data and documents for performance indicators to locate code problems, and correct errors by correcting codes. They consult with management to ensure agreement on system principles. They may also develop, document and revise system design procedures, test procedures, and quality standards.

Other Occupations

  • Data Recovery Planner
  • Network Designer
  • Security Administrator
  • Software Quality Assurance Tester
  • Web Administrator




You May Also Be Interested In...