Cybersecurity is vital to nearly every part of our daily lives.
It has become crucial for businesses and individuals to understand their risks and vulnerabilities when it comes to securely storing and accessing digital data. Just as important, if not more important, is the need for companies to find ways to protect their information systems and our data. As a result, trained information security professionals are in high demand and available positions far exceed the number of qualified candidates.
In fact, in some areas, such as healthcare, finance, government and utilities, experts project more than 30% in cybersecurity job growth over the next 10 years. Don't take our word for it, the need for cybersecurity experts is making headlines, like these, across the world;
- Cybersecurity Jobs in High Demand
- Annual Cybersecurity Survey Shows an Increase in Unfilled Cybersecurity Positions
Find out how to take advantage of this expanding job market at Kent State University, where we prepare our students to take on the security threats of today – and tomorrow – as skilled cybersecurity professionals with powerful earning potential.
- Bachelor of Science in Cybersecurity Engineering
This is a high-growth career in the digital economy. As a cybersecurity engineer, you’ll analyze computer networks, ensure that they're running securely, and foresee security issues before they occur. A cybersecurity engineer focuses on designing computer systems equipped to deal with disruptions like natural disasters and/or malicious cyber-attacks.
The Bachelor of Science degree in Cybersecurity Engineering prepares students who want to become professional engineers in the broad field of cybersecurity. Program objectives include providing students with a working knowledge of analysis and evaluation of components and systems with respect to security and maintaining operations in the presence of risks and threats with an emphasis on engineered systems.
Students will gain the knowledge and skills necessary to address security issues pertaining to stakeholder needs and requirements considering the lifecycle of the system from the outset. Design and development of systems, their components and associated networks to increase trustworthiness.
Courses in cybersecurity engineering will focus on data structures and abstraction, discrete structures for computer science, embedded systems, signals and circuits, networking, cybersecurity operations, systems engineering, cryptology and law and ethics for engineers.
- Cybersecurity engineer
- Information security specialist
- Cybersecurity analyst
- Security operations center engineer
- Network security engineer
- Information security analyst
- Systems engineer
- Cyber threat analyst
- Cloud security engineer
- Cyber threat detection engineer
The pay scale for most of these jobs for entry-level engineers would range from $70,000-$90,000. Students may attain higher salaries if they earn certain certifications before they graduate.
Find Program Information
Access the University Catalog to find out about this cybersecurity engineering degree.
- Bachelor of Science in Computer Science Information Security
The Cybersecurity Concentration in the Bachelor of Science degree in Computer Science
This degree seeks to prepare students to have successful careers as computing professionals, with a solid understanding of software development and computer systems and the foundation for life-long learning in the field. Cybersecurity Concentration prepares students to meet the security needs of industry and government through coursework that provides a thorough understanding of security, privacy and cryptographic techniques and protocols used in computing and communication.
Required courses include systems programming, cryptology, network security and information security, as well as an elective ranging from data security and privacy to digital forensics. Students learn
- the modern science of Cryptology and skills highly employable from the NSA to banks, to anybody who needs to encrypt information
- concepts and methodology useful for information security, as specified by the standard from the NSA
- how to detect and handle code vulnerabilities, vulnerabilities in web and database programming
- secure network design and network security including attacks and vulnerabilities and defense measures, intrusion detection techniques, defense against denial-of-service attacks
- hardware, software, and applications attacks and their defense
- security policies, legal and ethical issues in cyber and computer crimes
- the security and privacy issues in legacy systems and security and privacy policies and legislations
- legal aspects of forensics, tools and techniques to perform a full computer forensic investigation.
According to the department, graduates are typically hired by tech or IT companies, with a starting salary of about $90,000.
Find Program Information
- The Computer Science Department website includes a chart that maps out the information security concentration.
- The University Catalog contains program information about these four concentrations: data engineering, game programming, cybersecurity, robotics and embedded systems.
- Bachelor of Science IT Cybersecurity and Forensics Concentration
The Bachelor of Science in Information Technology
This degree in Information Technology provides students with an applied approach that focuses on supporting end-users in a variety of workplace settings by utilizing a range of computing technologies.
The Cybersecurity and Forensics concentration places an emphasis on security of computer and network systems, including forensic work to prevent and/or determine and correct security issues utilizing cybersecurity devices, procedures, tools, and solutions. Graduates are qualified to work in a wide range of computer and network infrastructures in small to large-sized enterprises.
Students in this program will be taking courses in networking and operating systems, server/network setup and configuration, hardware assembly and configuration, Cyber Ethics, emerging technologies, Internet fraud, computer, network. mobile device and social media security and forensics, ethical hacking and multiple computer and network security courses. They will also take a course in programming and web development as well as intermediate and advanced Office Suite tools. They have elective opportunities in virtualization, cloud, and wireless and mobile device security. They will finish off their degree with a Capstone course that will focus on portfolio development, preparation for a career focused resume and interview skills.
Labor statistics and information
- Ohio and surrounding area salaries in cyber
- U.S. BUREAU OF LABOR STATISTICS
- Specifically IT cybersecurity
- Associate IT Security Engineer – Cyber Risk Management
- Cyber Security – Privilege Access Manager
- IT Security Analyst
- Security Accessor
- IT Auditor
- Security vulnerabilities
- Threats and attacks
- Mitigation solutions for modern cyber networks
- Network infrastructure and how to protect it
Graduates are qualified to work in a wide range of computer and network infrastructures in small to large-sized enterprises in such positions as:
- IT support specialist/analyst or consultant
- Help desk, network or IT project manager
- Security or forensic analyst
- Cybersecurity specialist or analyst
- Incident specialist/analyst
- Systems, network or database administrators (for all sectors of business, education, manufacturing, healthcare, nonprofit and government)
Job Spotlight from the Bureau of Labor Statistics
Network and Computer Systems Administrators
- 2020 median pay: $84,810
- Entry level education: Bachelor’s degree in computer engineering
- Jobs in 2019: 373,900
- Projcted jobs in 2029: 289,900
- 2020 median pay: $103,590 per year
- Entry level education: Bachelor’s degree
- Jobs in 2019: 131,000
- Projected jobs in 2029: 171,900
Find Program Information
- Access the University Catalog to find out about this Bachelor of Science in Information Technology in Cybersecurity.
- The University Catalog contains program information about the six concentrations in the Bachelor of Science in Information Technology information including Application Development, Cybersecurity and Forensics, Database Design and Administration, Health Information Technology, Internet/Multimedia and Networking.
- Associate of Applied Business in Cybersecurity
The Associate of Applied Business degree in Cybersecurity
This degree provides students with an applied approach to information security concepts. With an ever-growing threat to sensitive and critical data in the field of information technology, understanding the impact of security issues on businesses and individuals is critical. The degree program gives students the tools they need to address current security issues including risk identification, security testing and monitoring, and enterprise risk management.
Courses in this degree focus on building a solid knowledgebase in cyber defense methods, security policies, incident management, business continuity and network hardening. Additional topics include networking, hardware and operating systems, cyber ethics, and current and emerging threat mitigation.
Graduates of this program will be able to:
- Demonstrate core competency in cybersecurity-related topics
- Describe the scope of the information security field and its impact on information technology
- Identify and analyze security risks to determine potential impacts
- Demonstrate ability to develop plans to mitigate security risks
- Identify professional, legal and ethical behavior
Access the University Catalog to find out about this Associate Degree in Cybersecurity.
- Minors and Certificates in Computer Forensics and Information Security
Cybersecurity and Forensics Minor
The Computer Forensics and Security minor is designed to complement a wide range of majors. Curriculum focuses on vulnerabilities, forensics and network security. Electives provide flexibility to tailor the minor to each student's interests and career goals. For example, a student might choose a more in-depth course in hardware, mobile applications, command-line tools, networking, or firewalls.
Students in this minor will take courses in ethical hacking, computer and network forensics, and security. They have options for electives in Internet fraud, networking forensics, command line and programming mobile applications.
Cybersecurity and Forensics Certificate
The Computer Forensics and Information Security undergraduate certificate provides an introduction to information security and incident response, forensic preparation and data recovery and analysis.
This certificate is a great add-on to another degree or specialization. It can also be a great place to start for upskilling, reskilling or entering the IT Security and Forensics field.
Students will participate in courses that focus on law and society, operating systems and networking, hardware and server setup and configuration, forensics and in-depth security courses.
Quick employment facts
The job outlook is more than promising for cybersecurity professionals. Review the information in the article links below that speak to job market forecasts.
- The Bureau of Labor Statistics offers a robust job overview.
- Cybersecurity’s unemployment rate is 0% and is projected to remain there through 2021. (CSO Online)
- By the end of 2021, 100% of large companies across the globe will have a chief information security officer position. (Cybersecurity Ventures)
- In 2021, there will be 4 million unfilled cybersecurity jobs globally. (Netsparker)
- Information security analyst jobs in the U.S. are expected to increase 31% from 2020-30. (Bureau of Labor Statistics)
- Computer network architect jobs in the U.S. are expected to increase 5% from 2020-30. (Bureau of Labor Statistics)
- Computer programmer jobs in the U.S. are expected to decline 9% from 2020-30. (Bureau of Labor Statistics)
- An industry blog offers 134 facts and statistics about cybersecurity.
Visit the "Cybercrime Statistics" tab on this website for recent happenings that relied on cybersecurity experts for resolution.
When comparing your options in the cybersecurity arena, consider your academic strengths and weaknesses, particularly around math and physics requirements.
|Program Name||Admission Requirements||Math Requirements||Physics Requirement||Additional Requirements|
|Associate in Applied Business, Cybersecurity||Open enrollment admission for students who hold a high school diploma, GED or equivalent.||Kent Core Math Requirement||None||None|
|Bachelor of Science, Computer Science, Optional Concentration in Information Security||Freshman students on the Kent Campus: The freshman admission policy on the Kent Campus is selective. Admission decisions are based upon the following: cumulative grade point average, ACT and/or SAT scores, strength of high school college preparatory curriculum and grade trends. The Admissions Office at the Kent Campus may defer the admission of students who do not meet admissions criteria but who demonstrate areas of promise for successful college study. Deferred applicants may begin their college coursework at one of seven regional campuses of Kent State University. For more information on admissions, including additional requirements for some academic programs, visit the admissions website for first-year students.||MATH 12002 Analytic Geometry and Calculus I; MATH 12013 Brief Calculus II; MATH 20011 Decision-Making Under Uncertainty; MATH 21002 Applied Linear Algebra||None||Students pursuing the Bachelor of Science degree in the College of Arts and Sciences must complete 8 credit hours of foreign language. Minimum Elementary I and II of the same language|
|Bachelor of Science, Cybersecurity Engineering||Freshman students: Admission into the Cybersecurity Engineering major requires a minimum 3.0 high school GPA and a minimum 24 ACT composite score (minimum 24 ACT sub-scores in both English and mathematics) or a minimum 1160 SAT composite score (mathematics, critical reasoning and writing); and placement directly into MATH 12002 (or its equivalent). Students who do not meet these requirements may apply for admission to the Computer Engineering Technology major and request to change their program to the Cybersecurity Engineering major after their freshman year if they meet the following criteria: minimum 3.200 overall Kent State GPA and minimum B grade in both MATH 12002 and PHY 23101.||MATH 12002 Analytic Geometry and Calculus I; MATH 12003 Analytic Geometry and Calculus II; MATH 30011 Basic Probability and Statistics; and MATH 32051 Mathematical Methods in the Physical Sciences I||Phy 23101 General University Physics I and General University Physics II||None|
|Bachelor of Science in Information Technology, Cybersecurity and Forensics Concentration||Open enrollment admission for students who hold a high school diploma, GED or equivalent.||Kent Core Math Requirement||None||None|
|Computer Forensics and Information Security - Certificate||Open enrollment admission for students who hold a high school diploma, GED or equivalent.||None||None||None|
|Computer Forensics and Security - Minor||Admission to a minor is open to students declared in a bachelor’s degree, the A.A.B. or A.A.S. degree, or the A.T.S. degree (not Individualized Program major). Students declared only in the A.A. or A.S. degree, or the A.T.S. degree in Individualized Program may not declare a minor. Students may not pursue a minor and a major in the same discipline.||None||None||None|
Cybersecurity professionals play an essential role in many fields and in every kind of industry. These articles can help you learn about different career possibilities. Then Kent State can help you find the degree path that can connect you to your career goals.
Cybercrime is on the rise.
Ransomware and other cyberattacks have increased awareness of vulnerabilities in critical infrastructure. They’ve also shown just how important skilled cybersecurity professionals are to our safety and information security, and to the economy.
- Since the COVID-19 pandemic began, the FBI has reported a 300% increase in reported cybercrimes. (IMC Grupo)
- More than a quarter of COVID-19 cyberattacks target banks or healthcare organizations and COVID-19 is credited for a 238% rise in attacks on banks in 2020. (Fintech News)
- Forbes elaborates on “A Fresh Look at Some Very Alarming Stats, in 2022”
- Stefanini Group explains "Cyber Security Statistics for 2022: List of Data, Trends"
- Confirmed data breaches in the healthcare industry increased by 58% in 2020. (Verizon)
- One state notified 33,000 unemployment applicants they were exposed to a data security breach from the Pandemic Unemployment Assistance program in May. (NBC)
- Cybersecurity Statistics & Projections for 2022.
- More than half of legal and compliance leaders are concerned about third-party cybersecurity risks due to remote work since COVID-19. (Gartner)
- Remote work has increased the average cost of a data breach by $137,000. (IBM)
- Nearly half of affected employees cited distraction as the reason for falling for a phishing scam while working from home. (Tessian)
- More than 80% of cybersecurity professionals have reported that their job function changed during the pandemic. (ISC)
- Half a million Zoom user accounts were compromised and offered for sale on a dark web forum in April 2020. (CPO Magazine)
- Cloud-based cyberattacks rose 630% between January and April 2020. (Fintech News)
- Remote workers have caused a security breach in 20% of organizations. (Security magazine)
- Cybercrime trends and statistics show the issues in 2021.
- Cybersecurity Jobs Report: 3.5 Million Openings In 2025.
Ready to Get Started?
Our advisors, faculty and staff meet students where they are and help get them to where they want to be. Kent State’s quality cybersecurity degree programs, minors and certificates fully prepare graduates to be valued members of the workforce who make a difference every day. And, our award-winning student support, including career planning and placement, provides assistance every step of the way to graduation – and beyond.