ÎçÒ¹¸£ÀûÊÓÆµ

Skip to main content
Home / ÎçÒ¹¸£ÀûÊÓÆµ / Programs

Cybersecurity, BS

Our Cybersecurity major will teach you to recognize issues in cybersecurity and develop your knowledge in data, software, system, human, organizational and societal security. You'll learn ethical aspects and cyber laws related to each of these cybersecurity areas.

Required courses in computer science and computer engineering provide a foundation of fundamental knowledge. You’ll study secure software development and host-based cyber defense, and attacks and countermeasures. Interdisciplinary courses in cryptography, information ethics and cybercrime add a well-rounded perspective on the field.

When you graduate, you’ll be able to:

  • Identify current problems and threats in cybersecurity
  • Detect and analyze cybersecurity attacks and practice defense strategies against them
  • Write secure software
  • Analyze networks and network security
  • Plan, implement and assess security protection mechanisms in computer systems and networks

ÎçÒ¹¸£ÀûÊÓÆµ is recognized as a by the U.S. National Security Agency and Department of Homeland Security.

Your Degree Plan

Intro

Finger touching touchscreen

Cybersecurity is an area of vital importance to industry, government institutions and national security. You'll graduate workforce-ready, with skills to succeed in this high-demand field that’s expected to grow even more in the future.

Take advantage of special options related to this major:

  • Honors

    Expand your curiosity — and enhance your curriculum — through the ÎçÒ¹¸£ÀûÊÓÆµ Honors College. Two programs are offered: and .

The ÎçÒ¹¸£ÀûÊÓÆµ Difference

What sets this program apart from its competitors?

  • Digital forensics and cybersecurity laboratory co-located with the West Virginia State Police crime lab.
  • Department maintains its own customized version of Ubuntu Linux and a teaching laboratory with 60 high performance computers that boot to both Linux and Windows.
  • Capstone design experience encourages entrepreneurial activities and partners with the and the ZinnStarter business plan competition.
Scholarships

93% of ÎçÒ¹¸£ÀûÊÓÆµ freshmen receive grants or scholarships (2023-24).

Learn more

Learn by Doing

Learning happens outside the classroom. Get involved.

ÎçÒ¹¸£ÀûÊÓÆµ is recognized as a by the U.S. National Security Agency and Department of Homeland Security.

In recent years the Department has offered undergraduate opportunities in the areas of:

  • System administration
  • Department of Defense-funded cybersecurity scholarships
  • Faculty mentored research on the topics of cybersecurity, digital forensics, human/computer interface, social media, biometrics data acquisition and machine learning

Student work has been sponsored in the summer by undergraduate scholarships.

Before graduating, all undergraduates in this major complete an academic project (or "capstone") to demonstrate their research, communication and critical thinking skills. Projects in ÎçÒ¹¸£ÀûÊÓÆµ's Cybersecurity major have included:

  • Avoiding Buffer-overflow security Vulnerabilities with Rust.
  • Development of Secure Mobile Apps for iPhone and Android.
  • Development of a Virtual Environment for Simulation of Network-based cyber attacks.

Connect with other students who share your academic interests as a member of:

View all of the you can join.

Network with professionals in your field as a student member of:

Live, study and pursue outside-the-classroom learning in a that shares your interests:

Outside of the Evansdale Crossing building.

What you learn outside of the classroom is just as important as what you learn during class. We’ll help you follow your curiosity.

Careers and Outcomes

How does this degree prepare students for a career?

Computer and Information Systems Managers

Plan, direct, or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming.

Has a Bright Outlook

Median Salary: $171,200

Possible job titles include: Information Systems Director (IS Director), Information Systems Manager (IS Manager), Information Technology Director (IT Director), Information Technology Manager (IT Manager).

Explore Career

Security Management Specialists

Conduct security assessments for organizations, and design security systems and processes. May specialize in areas such as physical security or the safety of employees and facilities.

Has a Bright Outlook

Median Salary: $81,270

Possible job titles include: Physical Security Engineer, Physical Security Specialist, Security Analyst, Security Consultant.

Explore Career

Computer Systems Analysts

Analyze science, engineering, business, and other data processing problems to develop and implement solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions, improve existing computer systems, and review computer system capabilities, workflow, and schedule limitations. May analyze or recommend commercially available software.

Has a Bright Outlook

Median Salary: $103,790

Possible job titles include: Business Systems Analyst, Computer Systems Analyst, Programmer Analyst, Systems Analyst.

Explore Career

Information Security Analysts

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Has a Bright Outlook

Median Salary: $124,910

Possible job titles include: Information Security Officer, Information Systems Security Officer (ISSO), Information Technology Security Analyst (IT Security Analyst), Network Security Analyst.

Explore Career

Computer Network Support Specialists

Analyze, test, troubleshoot, and evaluate existing network systems, such as local area networks (LAN), wide area networks (WAN), cloud networks, servers, and other data communications networks. Perform network maintenance to ensure networks operate correctly with minimal interruption.

Has a Bright Outlook

Median Salary: $73,340

Possible job titles include: Network Specialist, Network Technical Analyst, Network Technician, Systems Specialist.

Explore Career

Database Administrators

Administer, test, and implement computer databases, applying knowledge of database management systems. Coordinate changes to computer databases. Identify, investigate, and resolve database performance issues, database capacity, and database scalability. May plan, coordinate, and implement security measures to safeguard computer databases.

Has a Bright Outlook

Median Salary: $104,620

Possible job titles include: Database Administration Manager, Database Administrator (DBA), Database Analyst, Systems Administrator (Systems Admin).

Explore Career

Network and Computer Systems Administrators

Install, configure, and maintain an organization's local area network (LAN), wide area network (WAN), data communications network, operating systems, and physical and virtual servers. Perform system monitoring and verify the integrity and availability of hardware, network, and server resources and systems. Review system and application logs and verify completion of scheduled jobs, including system backups. Analyze network and server resource consumption and control user access. Install and upgrade software and maintain software licenses. May assist in network modeling, analysis, planning, and coordination between network and data communications hardware and software.

Median Salary: $96,800

Possible job titles include: Information Technology Specialist (IT Specialist), Local Area Network Administrator (LAN Administrator), Network Administrator, Systems Administrator.

Explore Career

Potential Careers

This program provides skills in areas such as:

  • Programming
  • Networking
  • Software development business
  • Cybersecurity
  • Criminal justice
  • Cryptography

Where Graduates are Working

  • Leidos
  • KeyLogic
  • Northrop Grumman
  • Federal Bureau of Investigation
  • U.S. Department of Defense
  • NASA's Katherine Johnson Independent Verification and Validation Facility

Admission Requirements

To be admitted to ÎçÒ¹¸£ÀûÊÓÆµ's Cybersecurity major, first-time freshmen must meet ÎçÒ¹¸£ÀûÊÓÆµ's . They also must meet one of the following admission requirements. Interested in transferring? Review the .

Tuition and Aid

How much does Cybersecurity at ÎçÒ¹¸£ÀûÊÓÆµ cost? And how can you save?

Tuition and Fees

Estimated rates are available on our tuition website. Anyone who is not a current West Virginia resident, including international students, will be charged non-resident rates.

Scholarships

Estimate your eligibility for merit scholarships at ÎçÒ¹¸£ÀûÊÓÆµ Morgantown.

Find Scholarships

Net Price Calculator

Estimate your cost of attendance and eligibility for financial aid and scholarships at any ÎçÒ¹¸£ÀûÊÓÆµ System campus.

Ways to Save

Here are a few ways for you to save on the cost of attending ÎçÒ¹¸£ÀûÊÓÆµ in addition to university scholarships.

Financial Aid

The most important step toward funding your future with financial aid for the Cybersecurity major is submitting the Free Application for Federal Student Aid, or FAFSA.

Transfer Articulation Agreements

To simplify the transfer process, we have formal agreements with certain institutions. These agreements outline the courses you should take to prepare for transferring to ÎçÒ¹¸£ÀûÊÓÆµ.

Review the to see if your institution is listed.

Ready to take the next step?

Learn how to join the ÎçÒ¹¸£ÀûÊÓÆµ family.

Want to know more about Cybersecurity at ÎçÒ¹¸£ÀûÊÓÆµ? Fill out our request form to receive more information.

Visit

​​Experiencing campus is the best way to see if ÎçÒ¹¸£ÀûÊÓÆµ is the right fit. Choose from in-person and virtual options.

Visit ÎçÒ¹¸£ÀûÊÓÆµ

Your first step to becoming a Mountaineer is applying for admission using our convenient online application.