Cybersecurity is a computing-based discipline involving technology, people, information, and processes to ensure an organization鈥檚 computer systems and data are protected from attacks. The interdisciplinary nature of the cybersecurity program means graduates can excel in careers such as information technology, law, policy, human factors, ethics, and risk management.

What is your area interest?
Career Career Summary Suggested Electives
Security Architect

A security architect develops and maintains the security of an organization鈥檚 network.

The job may include the following responsibilities:

  • Provide guidance and leadership on cybersecurity policy
  • Collaborate with business leaders, developers, engineers and more to identify the organization鈥檚 business needs and make a plan for implementation
  • Research and design all security features for IT projects
  • Use cryptography to protect an organization鈥檚 data
  • Stay up-to-date on cybersecurity threats, tools and best practices

Systems Security Track

  • CYBR 3153: Database Systems
  • CYBR 4843: Ethical Hacking for Effective Defense
    or CYBR 4883: Infrastructure Defense
  • CYBR 4350: Management of Digital Forensics and eDiscovery
    or CYBR 4853: Computer Forensics
Cybersecurity Manager

A cybersecurity manager is in charge of the overall cyber safety of an organization. This is an advanced-level job role that includes managing a staff of cybersecurity professionals.

Here are a few ways a cybersecurity manager supports an organization:

  • Leads all facets of day-to-day cybersecurity operations
  • Provides subject matter expertise in designing and implementing security safeguards to cloud, on-premises, endpoint, edge and mobile infrastructure
  • Manages cybersecurity budget and creates metrics to track performance
  • Maintains security protocols and policies
  • Manages teams and projects

Systems Security Track

  • CYBR 3153: Database Systems
  • CYBR 4843: Ethical Hacking for Effective Defense
    or CYBR 4883: Infrastructure Defense
  • CYBR 4350: Management of Digital Forensics and eDiscovery
    or CYBR 4853: Computer Forensics
Cybersecurity Engineer

Cybersecurity engineers work to build and maintain a system that鈥檚 safe against cyber attacks They focus on fixing and protecting these systems and stay up to date on new technology so they can keep their system secure. Cybersecurity engineers work closely with a company鈥檚 IT team to build an emergency plan to get things up and running quickly following a disaster.  

Some responsibilities of a cybersecurity engineer include:

  • Creating new solutions to solve existing security issues
  • Enhancing security capabilities by evaluating new technologies and processes
  • Defining, implementing and maintaining corporate security policies
  • Configuring and installing firewalls and intrusion detection systems
  • Responding to information security issues
  • Supervising changes in software, hardware, facilities, telecommunications and user needs
  • Recommending modifications in legal, technical and regulatory areas that affect IT security

Systems Security Track

  • CYBR 3153: Database Systems
  • CYBR 4843: Ethical Hacking for Effective Defense
    or CYBR 4883: Infrastructure Defense
  • CYBR 4350: Management of Digital Forensics and eDiscovery or CYBR 4853: Computer Forensics
Penetration Tester

A penetration tester, or pen tester, is considered a white hat or good hacker. Although they must think like a bad guy, the end goal is to help organizations improve their security practices to prevent theft and damage. Pen testers target traditional operating systems and devices as well as emerging technology, including Internet of Things (IoT devices, mobile devices, embedded systems and more.

Some responsibilities include:

  • 成人直播ing appropriate tools for penetration testing
  • Performing social engineering tests and reviewing physical security where appropriate
  • Keeping up to date with latest testing and hacking methods
  • Collecting data and deploying testing methodology
  • Locating, assessing and managing vulnerabilities
  • Making suggestions for security improvements and preparing technical responses to security questions

Systems Security Track

  • CYBR 3153: Database Systems
  • CYBR 4843: Ethical Hacking for Effective Defense
    or CYBR 4883: Infrastructure Defense
  • CYBR 4350: Management of Digital Forensics and eDiscovery or CYBR 4853: Computer Forensics
Cybersecurity Analyst

A cybersecurity analyst detects cyber threats and then implements changes to protect an organization in the following ways:

  • Manages and configures tools to monitor activity on the network
  • Analyzes the reports from those tools to identify unusual behavior on the network
  • Proactively identifies network vulnerabilities through penetration testing, vulnerability scans and vulnerability assessment reports
  • Plans and recommends changes to increase the security of the network
  • Applies security patches to protect the network

Network Security Track

  • CYBR 4333: Network Configuration & Administration
  • CYBR 4833: Wireless Security
  • CYBR 4893: Internet of Things: Applications and Security
Cybersecurity Specialist

Cybersecurity specialists continually analyze risks and develop strategies to prevent breaches. They rely on teamwork because of the broad scope of security measures that need to be applied to protect the integrity of the network.

Other duties include:

  • Keeping a close watch for the organization鈥檚 networks and making sure there are no security breaches
  • Investigating any violations and running defensive protocols
  • Protecting sensitive information by installing and using software, such as firewalls and data encryption programs
  • Documenting security breaches and the extent of the damage caused by the breaches through extensive reports
  • Simulating attacks to look for vulnerabilities in their systems before they can be exploited and write reports based on simulation results

Network Security Track

  • CYBR 4333: Network Configuration & Administration
  • CYBR 4833: Wireless Security
  • CYBR 4893: Internet of Things: Applications and Security
Computer Forensic Analyst A computer forensic analyst helps investigate instances of crime and attacks on cybersecurity. Their job can involve using software to recover deleted or encrypted files, preparing digital evidence for use in court for trials and sometimes interviewing the people involved in an instance of cyber crime to gain more insight. Computer forensic analysts can also discuss cases with law enforcement professionals to give them access to their specific technical expertise and offer advice about how to evaluate different pieces of digital evidence.

Cyber Crime Track

  • CCRJU1101: Foundations of Criminal Justice
  • CYBR 3305: Technology and Criminal Justice
  • CYBR 4305: Technology and Cyber Crime

Back to top