Cybersecurity

Apply
  • calendar
    Program Duration: 2 Year Program
  • graduation cap
    Degree Type: Associate in Arts (A.A.)
  • clock
    Total Credit Hours: 60
Closeup of a computer keyboard.

About This Program

As the number of computers being used to store sensitive information for personal, business, and government purposes increases, the need for securing computers and other systems that store this information becomes more obvious. Information security professionals are needed to provide security for these infrastructures. The Associate of Applied Science (A.A.S) program in Cybersecurity is designed for students who are interested in pursuing careers in cybersecurity, network/systems administration, and system programmers. This program will also consist of courses that help to prepare students for these industry certification exams.

Quick Information

Apply Now

Featured Transfer Opportunities

Bloomsburg logo

Public university in Pennsylvania offering diverse programs.

Jefferson University logo

Healthcare and science-focused institution in Philadelphia.

Person working at computer

Launch Your Career in Cybersecurity

  • Database Administrator – est. salary $107,562
  • Information Security Analyst – est. salary  $119,390*
  • Network and Computer Systems Administrator – est. salary $97,557
  • Security Management Specialist – est. salary $87,360
**EMSI Data, 2022; The greater Philadelphia region, PA; a percentage of people in these jobs may have a bachelor's degree or higher.

Career Outlook

$113,936

Median Salary of an Information Security Analyst

395

Number of Jobs in the Region

+23.5%

10-year Job Outlook in the Region for Information Security Analyst

Featured Career

Information Security Analysts

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure.

Starting Pay: $113,936

Person working at laptop

Typical Tasks

  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Monitor use of data files and regulate access to safeguard information in computer files.