Information Security in Focus

Whether using an information security degree to advance a current career or to start a new one, students face many choices when it comes to degree options, funding, internships and the like. The following guide discusses degree levels, coursework, career pathways, and salaries and job growth for current and future information security professionals. With so many things to consider, a little research can push you in the right direction.

Careers in Information Security

Information security specialists work to bridge the gap between a company and the safe use of technology. Most specialists work with consulting firms or technology companies to protect computer networks and systems from external and internal attacks, though they can also be found in companies across other industries. Below area few examples of specialties that fit into the larger picture of information security, but require more specific skills:

  • Web Security: Safeguards customer information during use of web-based applications. The issue of customer usability is also addressed by Web Security professionals.
  • Data Privacy: Complies with laws and ethical issues as it protects a network or server from cyber threats. Specialists in this field also have expertise in various technologies.
  • Business Continuity: Protects the inner workings of a business or company as threatened by outside attacks. Critical business functions are researched and protected.

The above specializations are only the tip of the iceberg. The specifics of careers in information security change often in order to keep up with the creativity and complexity of cyber attackers. Improvement in the areas of web technologies and hardware specifics offer growth opportunities for information security analysts. Jobs and salaries in the field are dependent upon location. Find out how your location stands up against other areas:

Career Salary Tool

  • Computer Science Type:
  • Select a state:
  • Select City 1:
  • Select City 2:
Birmingham 2012 MEAN PAY $75,170 per year
Huntsville 2012 MEAN PAY $76,430 per year

Internships

Every summer a tidal wave of new college graduates descends on to the job market. With that kind of competition, it may be difficult to keep ahead of the tide. Getting a foothold before the flood begins can be a lifeline.

Internships provide opportunity. Not only can information security students join a new professional network, they can also gain invaluable practice and experience. Internships give students the opportunity to learn about data protection and assurance at an organization, making them invaluable to employers. Because training new employees on office protocols and specific security measures can cost a company time and money, interns are usually more appealing to employers than untrained job seekers.

Information security students or those preparing for graduate study in the field may find the following list of internships helpful:

Security Intern
Location: San Luis Obispo, CA
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Intern will be responsible for maintaining and monitoring network security, working with software engineers to learn the coding of security, and working with compliance management structures.
Company Affiliation: Shopatron, Inc.

Security Internship
Location: Littleton, CO
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: The job will support on-going security projects, whether testing in a technology lab or participating in the roll out of a product. Intern will write test plans, document results and more.
Company Affiliation:TW Telecom

Security Intern
Location: San Francisco, CA
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Intern will work with web security researchers to find vulnerabilities and propose the proper implementation.
Company Affiliation:Adobe

Information Security Intern
Location: San Francisco, California
Specs: Paid, Corporate, Summer, Open to Students
Description: Intern will work with experienced information security leadership to identify risks, vulnerabilities, and security exposures to both business and residential systems.
Company Affiliation: Dolby

Intern Mobile & Product Security
Location: Bellevue, Washington
Specs: Paid, Corporate, Immediate, Open to Students
Description: Intern will play a role in creating a secure experience for T-Mobile customers by assessing threats and applying expertise in the area of information security.
Company Affiliation: T-Mobile

Security Analyst Intern Job
Location: Columbia, MD
Specs: Paid Unpaid, Corporate NonProfit, Immediate Summer, Open to Students
Description: Intern will apply theories from mathematics or statistics to analyze security data, providing support to a seasoned cyber analytics team.
Company Affiliation: Leidos

Hardware Security Engineering Intern
Location: Philadelphia, PA
Specs: Paid Unpaid, Corporate NonProfit, Immediate Summer, Open to Students
Description: Responsibilities mainly include development and categorization of a tracking system of hardware properties that the company is leveraging.
Company Affiliation:Comcast

Security Research Internship
Location: Baltimore, Maryland
Specs: Paid Unpaid, Corporate NonProfit, Immediate Summer, Open to Students
Description: Intern will assist a seasoned team with data modeling and documentation, creating and maintaining security experiments and logic trees.
Company Affiliation: ZeroFOX, Inc.

Intern, Security Operations Internship
Location:Morgantown, WV
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Responsibilities include supporting information security initiatives, supporting security teams with implementation of programs, and other special projects.
Company Affiliation: Mylan

System Security Intern
Location:Omaha, NE
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Intern will enhance SQL reports by using various management tools to enhance security, developing automated monitor systems, and configuring any changes between monitoring systems.
Company Affiliation:CSG Systems

IT Internship – Enterprise Security
Location: Orlando, FL
Specs: Paid, Corporate, Immediate, Open to Students
Description: Responsibilities include mainly support in building SAP Job roles, in solution ID training, and in building segregation of duties tools.
Company Affiliation: CHEP

Enterprise Security Analyst Intern
Location:Pekin, IL
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Intern will provide the company with vulnerability data, assist in building security reports for various client companies, assist in the creation and implementation of security awareness materials, and more.
Company Affiliation: Pekin Insurance

System Security Intern
Location: Hillsboro, OR
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Responsibilities will rest solely in Security & Privacy Research to assist researchers in the ongoing fight again malware and information theft.
Company Affiliation: Intel

Datacenter Security Intern
Location: Hillsboro, OR
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Intern will assist a veteran team of information security technicians as they evaluate processor and software abilities to ensure data safety.
Company Affiliation: Intel

Client Security Intern
Location:Hillsboro, OR
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Responsibilities will be research-based, looking into security platforms for client devices such as tablets and smartphones.
Company Affiliation: Intel

Security Architecture IT Internship
Location: Indianapolis, IN
Specs: Unpaid, Corporate, Summer, Open to Students
Description: Intern will work with infrastructure services, providing broad range of customer service and problem solving and will be provided with a broad range of experiential learning.
Company Affiliation: WellPoint, Inc.

Network Security Intern
Location: Mountain View, CA
Specs: Unpaid, Corporate, Summer, Open to Students
Description: Responsibilities include working alongside a veteran group of creative network engineers, supporting development of information security processes within new hardware and software.
Company Affiliation: Skybox Imaging

Information Security Intern
Location: Fairfax, VA
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Intern will assist with incident response and tracking and scanning for vulnerabilities for clients, as well as tracking and handling incidents related to internal informational systems.
Company Affiliation: Ellucian

Security Operations Internship
Location: Broomfield, CO
Specs: Paid, Corporate, Immediate, Open to Students
Description: Responsibilities will include problem solving, learning basic Unix/Linus command skills, working collaboratively, and more.
Company Affiliation: Return Path

Security Graduate Intern
Location: Cambridge, MA
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Intern will work with projects sponsored by the Department of Defense and the Federal Government, utilizing advanced software systems, TCP/IP networking, memory analysis, mobile platforms, and more.
Company Affiliation: Raytheon BBN Technologies

Security Analyst Intern
Location:San Diego, CA
Specs: Unpaid, Corporate, Immediate Summer, Open to Students
Description: Responsibilities will include maintenance of documentation repositories, web properties, internal ticketing, and security initiatives.
Company Affiliation: Sony Electronics

Security Engineer Intern
Location: San Jose, CA
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Intern will troubleshoot problems within automation builds, code signing, and server provisioning. Relay to engineering teams the best security practices as they work to integrate new hardware with old.
Company Affiliation: Adobe

Security Analyst Intern
Location: Lehi, UT
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Responsibilities will include vulnerability management, issue response, data analysis and recap. All this along with discovery, fixing and correcting of security vulnerabilities.
Company Affiliation: Adobe

Information Security Intern
Location: Fairlawn, OH
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Intern will work with security help desk, approval of customer password or account changes, alert monitoring, unauthorized monitoring reports, and more.
Company Affiliation: Sterling Jewelers Inc.

Associate Security Administrator Intern
Location: Frederick, MD
Specs: Unpaid, Corporate, Immediate, Open to Students
Description: Responsibilities lie within the range of support for the IT and engineering teams’ information security efforts.
Company Affiliation: Life Technologies

Information Securityin College

Information security degrees give students the opportunity to learn about securing information and dealing with threats. The shortest of the three degree types, the associate’s degree, is a two-year program that creates a foundational knowledge of web technologies and fundamentals of operating systems. The bachelor’s degree, traditionally a four-year degree, solidifies the introductory elements and moves toward advanced topics such as intrusion detection and creation of database securities. Both the master’s and PhD use research and experience to enhance a student’s grasp on network security and cryptology.

Paying for a degree of any level, however, can be challenging, and many prospective students rely on savings or student loans. While those options are helpful, scholarships are a way to earn money without having to pay anything back after graduating. Below are examples of scholarships for information security students to give you an idea of what’s available.

Scholarships

Scholarships are merit-based funding options, meaning they are awarded to a student based on characteristics such as GPA, leadership skills or community service. The multitude of scholarships awaits, and this list is a good place to start:

Honeywell International, Society of Women Engineers

Amount Eligibility More Info
$5,000 Open to female U.S. citizens planning to major in an engineering or technology discipline. http://www.swe.org/scholarships

Eugene Garfield Doctoral Dissertation Fellowship

Amount Eligibility More Info
$1,000-5,000 Open to doctoral candidates seeking a PhD degree in information security. http://beta-phi-mu.org/scholarships/

Boeing Company Scholarship

Amount Eligibility More Info
$1,500 Open to full-time students in engineering technology, information security, or business management. http://www.bcc.ctc.edu/scholarships/

Dr. Robert W. Sims Memorial Scholarship

Amount Eligibility More Info
$3,000 Open to information security students enrolled in a public college or university in the state of Florida. http://www.faeds.org/scholarships_dr_robert_sims.cfm

ACT Foundation Second-Year Scholarship Program

Amount Eligibility More Info
$1,000 Available for full-time information security students enrolling in their second year (sophomore). http://www.accountcontrolfoundation.org

Carolinas Cyber Defender Scholarship

Amount Eligibility More Info
Full Tuition Awardees will be full-time students enrolled in either an Information Security or Information Technology degree program. Requires a letter of recommendation from two professors. http://www.sis.uncc.edu/NSFSFS.html

Ernest F. Hollings Scholarship for Continuing Students

Amount Eligibility More Info
$1,500 Open to students with a 3.5 GPA or higher who show promise in the fields of business systems, information security, or information technology. http://www.midlandstech.edu/scholarships

Ernst & Young BETF Continuing Education Scholarship

Amount Eligibility More Info
$10,000 Open to students who are enrolled full-time and are actively pursuing a degree in computer science or information technology and security. http://www.betf.org/

CHS Cooperatives Scholarship

Amount Eligibility More Info
$500 Award is based on the academic and extra-curricular achievements of students within information security degree programs. http://www.mnsu.edu/

OutputLinks Communications Group Woman of Distinction

Amount Eligibility More Info
$5,000 Open to full-time students who seek careers in the Document Management and Graphic Communication field (including computer science, network administration, and network and information security). http://www.edsf.org/what_we_do/scholarships/wod.html

Doris Keller Hosler Scholarship-Information Systems

Amount Eligibility More Info
$325 Open to business education or information security majors. http://www.bloomu.edu/

Grandchildren of Margaret Jones and Eugene Lear Scholarship

Amount Eligibility More Info
$1,745 Available for students enrolled full-time in an information security degree program. Students must show promise within the field and economic need. http://www.psu.edu/

Life Technologies Scholarship

Amount Eligibility More Info
$2,500-7,500 Open to all students with 3.0 GPA or higher who major in information security, engineering, or technical field. https://www.nsbe.org/Programs/Scholarships/Scholarship-Vault/At-Life-Technologies.aspx

MTC Foundation Education Scholarship

Amount Eligibility More Info
$500 Available to rising full-time seniors enrolled with an information technology or computer science degree program. http://www.midlandstech.edu/scholarships

National Science Foundation Graduate Research Fellowship Center

Amount Eligibility More Info
$30,000-32,000 Directed toward those potential students who want to become crucial tools in the advancement of the nation’s technological infrastructure and national security. http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=6201

Kimberly-Clark Scholarship for Excellence

Amount Eligibility More Info
$2,500 Awarded to students who are enrolled in various technology degrees. http://www.psu.edu/

G. Richard and Jacqueline R. Johnson Scholarship

Amount Eligibility More Info
$500 Available to students within a technology degree program who maintain a 2.0 GPA or higher. http://www.kirkwood.edu/foundation/scholarship.html

George Brotherton Memorial Scholarship-Information Security

Amount Eligibility More Info
$1,500 Applicant’s must major in computer science, information technology, or information security. https://www.apsu.edu/

Diamond Wipes Scholarship Program

Amount Eligibility More Info
$1,000 Awarded to economically-challenged youth who desire to enroll in higher education. http://www.apcf.org/what-we-do/216

Cisco Scholarship

Amount Eligibility More Info
$1,200-10,800 Open to DeVry University students who enter a full-time information security degree. http://www.cs.devry.edu/

Nebraska Public Power District Scholarship

Amount Eligibility More Info
$1,000 Awarded to students enrolled full-time in one of the following programs: accounting, engineering, journalism, political science, business administration, environmental science, information technology, pre-engineering, office technology, utility line, drafting, electrician, or electronics. Applicants must have a GPA of 2.5 or higher. Both financial need and overall merit will be considered. http://www.northeastcollege.com/PS/PS_finaid_scholarships.html

Information Security Degree Programs

No matter the lifestyle or learning mode of information security students, all degree levels are offered in three modes. Campus-based programs offer the opportunity of a traditional college experience, where students meet in-person for classes and spend time listening to lectures and working with peers. All assignments are turned in and accepted in person. Online programs offer a choice based on remote or distance learning, where students spend time with professors and fellow students, chatting or conferencing via the web. Along those same lines, projects and papers are also submitted electronically. Hybrid programs blend the best of both options. While some coursework and collaboration take place off-campus, students also spend time taking notes from expert professors and working hands-on in a lab.

Online Degrees in Depth

Doctors have patients; teachers have students; and salespeople have customers. These “people-centric” professions are at home in the traditional collegiate classroom. Information security students are often called upon to work in groups, but the technological emphasis of the degree easily lends itself to an online program.

Interactive tools such as Blackboard or Adobe Connect allow for remote collaboration and instruction. They also offer an easy way for students to complete and submit assignments, research, and other course-related materials.

Self-Paced vs. Real-Time

Online information security degree programs are usually taught in one of two ways: self-paced and real-time. Self-paced degrees offer freedom to the student, allowing the student to progress through courses at his/her own pace. Within a real-time program, distance learning still takes place, but the schedule is created by the professor, and the students must submit research and essays or collaborate with peers at predetermined times.

Equipment Standards

Online degree programs often supply a list of required technology: a reliable computer or laptop, a consistent broadband connection, the ability to watch videos, a standard web browser, and a word processor. However, a degree in information security will require much more. Consider contacting a department administrator to see if a provided list might include a more formidable computer, tools for working with hardware, software creating programs, or more.

Student Profile #1 - Matt

Matt got into information security because he heard that the job market was hot. After earning his associate’s degree, he decided to stick with it and complete his bachelor’s degree, making him much more appealing to potential employers.

Associate’s Degree in Information Security (2 years)

An associate’s degree in information security provides an anchor for work in the real world. Year one focuses on general education in English and basic math, while hitting on IT fundamentals and reasoning. Year two completes the training with web technologies and operating systems. The following table outlines the four semesters of an associate’s degree in information security.

First Semester (Freshman) Credits Overview
IT Fundamentals I 3 Using the internet/web as a base, this course explores hardware and software of networking and customization.
Foundations of College Mathematics 3 Course focuses on basic geometry, algebra, calculation, probability, and numeracy skills.
Reasoning and Problem Solving 3 Course focuses on researching problems, identifying assumptions, interpretation and analysis, reaching logical conclusions.
English Composition I 3 This course introduces learners to the types of writing and thinking that is valued in college and beyond.
Second Semester (Freshman) Credits Overview
IT Fundamentals II 4 This course focuses on the components of personal computers and their functions.
IT Fundamentals III 4 *See IT Fundamentals II
Finite Mathematics 2 This course focuses on the application of graph, number, set, and logic theories.
English Composition II 3 The course evaluates the quality, credibility, and relevance of evidence in order to integrate evidence into a final research paper.
Third Semester (Sophomore) Credits Overview
Project in Web Development Fundamentals 1 This is the final performance project in Web Development Fundamentals.
Web Development Fundamentals 2 This course focuses on programming, troubleshooting, debugging, scripting and configuring web applications.
Web Technologies 4 Through dynamic web fundamentals and programming languages, this course explores using and updating client web software and web page creation.
Natural Science Elective 3 Students may take any advisor-approved science elective.
Natural Science Elective Lab 1 All science electives have required lab space and schedule.
College Algebra 3 The course offers an education in basic algebra: concepts, functions, and use in the real world.
Fourth Semester (Sophomore) Credits Overview
Software Development Fundamentals 4 This course focuses on the fundamentals of core programming, object-oriented programming, software development, web applications, desktop applications and user interfaces, and databases.
Windows OS Fundamentals 3 Course provides an introduction to the basics of Windows-based operating systems.
Elements of Effective Communication 2 This course is an exploration into the base traits of an effective communicator.
Application of Effective Communication 1 This is the performance final project of Elements of Effective Communication.
Natural Science Elective 3 Students may take any advisor-approved science elective.
Natural Science Elective Lab 1 All science electives have required lab space and schedule.

Student Profile #2 - Kevin

Kevin entered into the information security world during his first year in college, and he was fascinated by the in-depth study of operating systems. The internship between his junior and senior year was a success and poised him to accept a position with the same firm after graduation.

Bachelor’s Degree in Information Security (4 years)

Two years beyond an associate’s degree in information security is the bachelor’s degree. Exploring web programming, database administration and network devices, the program culminates in a capstone project completed during a student’s senior year. Junior and senior year of a information security degree may resemble the following:

Fifth Semester (Junior) Credits Overview
Security 4 This course focuses on authentication and using it to increase security and reduce cyber threat.
Operating Systems I 2 Students in this course will learn to install, troubleshoot and configure the LINUX OS.
Operating Systems II 2 This course focuses on shells, scripting and data managements, user interfaces and desktops, administrative tasks, essential system services, networking fundamentals and security.
Leadership Concepts and Applications 3 This course focuses on the human side of technology, exploring different styles and techniques of leadership in the business world.
Geography 3 This course focuses on fundamentals of geography, places and regions, physical and human systems, and the environment.
Sixth Semester (Junior) Credits Overview
Fundamentals of Interconnecting Network Devices 3 This course investigates features or networking hardware and software to create, configure, or troubleshoot.
Introduction to Probability and Statistics 3 The class evaluates categorical and quantitative data using appropriate numerical measures and graphical displays.
Project Management 6 Focuses on skills and concepts students need to know to plan and implement projects.
Literature, Arts and the Humanities 3 Students may enroll in any one of various advisor-approved electives.
Seventh Semester (Senior) Credits Overview
Interconnecting Network Devices 3 *See Fundamentals of Interconnecting Network Devices
Literature, Arts and the Humanities:Analysis and Interpretation 2 Students may enroll in any one of various advisor-approved electives.
Web Programming 4 Provides the knowledge and skills to create and manage websites using tools such as Dreamweaver and Dynamic HTML
Organizational Behavior and Leadership 3 This course focuses on management and leadership concepts and applications.
Designing Customized Security 4 The course identifies technical and security issues, and creates conceptual designs for network infrastructure security.
Eighth Semester (Senior) Credits Overview
Project in Introduction to Programming 2 This is the performance final project in Introduction to Programming.
Introduction to Programming 2 Using program code as its base, this course develops working programs, control structures, and execution paths.
Principles of Management 4 This course offers a crucial understanding of how to manage and lead in the business market.
Database I 4 This course distinguishes between simple database terms and concepts, usage, and database languages.
IT - Security Capstone Written Project 4 The Capstone Project is the culmination of the degree program, requiring students to create a synthesis of research and coursework over the past four years.

Student Profile #3 - Nick

Nick landed a solid job, working with information security, after finishing his bachelor’s degree. It opened the door to quite a few workplace options, but Nick began to see an achievement ceiling. He decided to go back to school and acquire his master’s degree, allowing him to be more alluring to the higher-ups in the field.

Master’s Degrees in Information Security

For students seeking even more in-depth knowledge of information security, a master’s degree is the next level of education, adding on two more years of study. Most universities offer two graduate study tracks: a thesis option and a non-thesis option. The thesis option, often chosen by potential doctoral candidates, ends with a final paper or project to be reviewed by a board of professors and defended by the student. Those students who do not see a PhD in their futures tend to choose the non-thesis option, which culminates in comprehensive exams or projects.

There is a wide range of options within schools, departments and specializations. Universities and colleges offer academic support in the form of advisors (often experienced professors) to help students choose the right options. This variety makes it difficult to pin down the specifics of a master’s program in information security, but the following resembles a typical core course schedule:

Master’s Program Core Courses Overview
Orientation to Graduate Studies An introduction to the planning skills and work habits which create an atmosphere of graduate study success.
Information Technology Foundations A fundamental study of technology and its applications, as well as the economic and social issues they have raised.
Information Technology Infrastructure A study of systems analysis and design, using selected engineering and management science techniques and practices.
Information Systems Analysis, Modeling, and Design A study of systems analysis and design, using selected engineering and management science techniques and practices.
Information Technology Project Management An examination of the fundamental principles and practice of managing programs and projects in an information processing and high-tech environment.
Economics and Financial Analysis for Technology Managers A study of the financial tools managers use to assess the financial conditions of the firm.
Foundations of Information Security and Assurance Topics include administrative and technical security controls to prevent, detect, respond to, and recover from cyber-attacks.
Network and Internet Security An introduction to the security concepts needed for the design, use, and implementation of secure voice and data communications networks, including the Internet.
Intrusion Detection and Intrusion Prevention An exploration of the theory and implementation of intrusion detection and intrusion prevention.
Cryptology and Data Protection An overview of the theory of encryption using symmetric and asymmetric keys, current protocols for exchanging secure data (including the Data Encryption Standard and the Advanced Encryption Standard), and secure communication techniques.
Computer Forensics An introduction to the fundamental concepts behind the collection and analysis of the digital evidence left behind in a digital crime scene.
Security Policy, Ethics, and the Legal Environment An overview of laws and ethics related to information assurance.

PhD in Computer Engineering

Another four years separates master’s graduates from their PhDs, and those years are full of research and experience in the field, bringing the theoretical and the practical together. This combination offers the basis for a candidate’s dissertation, a long paper to be review by a board of professors and to be defended by the candidate.

Schools with Information Security Programs

Search A School
State
DEGREES OFFERED
TUITION COST
STUDENT POPULATION
City
SCHOOL TYPE
PROGRAM TYPE
Total Results:
SCHOOL NAME CITY, STATE STUDENT POPULATION SCHOOL TYPE TUITION PROGRAM TYPE PROGRAMS
University of Phoenix-Online CampusPhoenix, AZ307,871Private, 4-year$9,216Campus
Bachelor’s
  • Computer and Information Systems Security/Information Assurance
American Public University SystemCharles Town, WV50,838Private, 4-year$6,000Campus
Bachelor’s
  • Computer and Information Systems Security/Information Assurance
Master’s
  • Computer and Information Systems Security/Information Assurance
Indiana University-BloomingtonBloomington, IN42,731Public, 4-year$8,750Campus
Master’s
  • Computer and Information Systems Security/Information Assurance
University of Maryland-University CollegeAdelphi, MD42,713Public, 4-year$6,024Campus
Bachelor’s
  • Computer and Information Systems Security/Information Assurance
Master’s
  • Computer and Information Systems Security/Information Assurance
Florida State UniversityTallahassee, FL41,087Public, 4-year$4,587Campus
Bachelor’s
  • Cyber/Computer Forensics and Counterterrorism
University of HoustonHouston, TX39,820Public, 4-year$7,176Campus
Master’s
  • Computer and Information Systems Security/Information Assurance
University of Southern CaliforniaLos Angeles, CA38,010Private, 4-year$43,722Campus
Master’s
  • Computer and Information Systems Security/Information Assurance
College of Southern NevadaLas Vegas, NV37,717Public, 4-year$2,265Campus
Associate
  • Cyber/Computer Forensics and Counterterrorism
Capella UniversityMinneapolis, MN36,375Private, 4-year$11,952Campus
Bachelor’s
  • Computer and Information Systems Security/Information Assurance
Master’s
  • Computer and Information Systems Security/Information Assurance
Doctorate
  • Computer and Information Systems Security/Information Assurance
City College of San FranciscoSan Francisco, CA34,558Public, 2-yearNRCampus
Associate
  • Computer and Information Systems Security/Information Assurance