Cybersecurity Degrees

Cybersecurity is vital to nearly every part of our daily lives.

It has become crucial for businesses and individuals to understand their risks and vulnerabilities when it comes to securely storing and accessing digital data. Just as important, if not more important, is the need for companies to find ways to protect their information systems and our data. As a result, trained information security professionals are in high demand and available positions far exceed the number of qualified candidates. 

In fact, in some areas, such as healthcare, finance, government and utilities, experts project more than 30% in cybersecurity job growth over the next 10 years. Don't take our word for it, the need for cybersecurity experts is making headlines, like these, across the world;

Find out how to take advantage of this expanding job market at Kent State University,  where we prepare our students to take on the security threats of today – and tomorrow – as skilled cybersecurity professionals with powerful earning potential.


 

We offer Bachelor's Degrees, Master's Degrees, Associate Degrees, Minors and Certificates

Cybercriminology

The value of cybercriminology graduates is evident across a range of industries, from law enforcement and national security to corporate cybersecurity departments and private consultancy. As businesses and governments invest heavily in protecting their digital infrastructure, the demand for professionals trained to combat cybercrime continues to rise. Kent State graduates are uniquely positioned to meet this demand with their comprehensive understanding of both criminal justice and technology, enabling them to bridge the gap between law enforcement and cybersecurity. In a world where cybercrime poses one of the greatest threats to privacy, safety and economic stability, cybercriminology graduates are indispensable to safeguarding the digital landscape.

Common Courses

  • Criminology
  • Intelligence and National Security
  • Cyber Security
  • Computer Forensics
  • Network Routing, Switching, Setup and Configuration
  • Security Essentials

Careers

  • Computer and information system managers
  • Computer network support specialists
  • Database administrators and architects
  • Detectives and criminal investigators
  • Information security analysts

Pay Scale

Visit our cybercriminology academic program page to see the pay ranges for various careers aligned with this degree.

Find Program Information

Access the academic program page to find out about this cybercriminology degree.

Visit Apply Now Request Info

Cybersecurity Engineering

This is a high-growth career in the digital economy. As a cybersecurity engineer, you’ll analyze computer networks, ensure that they're running securely, and foresee security issues before they occur. A cybersecurity engineer focuses on designing computer systems equipped to deal with disruptions like natural disasters and/or malicious cyber-attacks.

The Bachelor of Science degree in Cybersecurity Engineering prepares students who want to become professional engineers in the broad field of cybersecurity. Program objectives include providing students with a working knowledge of analysis and evaluation of components and systems with respect to security and maintaining operations in the presence of risks and threats with an emphasis on engineered systems.

Students will gain the knowledge and skills necessary to address security issues pertaining to stakeholder needs and requirements considering the lifecycle of the system from the outset. Design and development of systems, their components and associated networks to increase trustworthiness.

Common Courses

Courses in cybersecurity engineering will focus on data structures and abstraction, discrete structures for computer science, embedded systems, signals and circuits, networking, cybersecurity operations, systems engineering, cryptology and law and ethics for engineers. 

Careers

  • Cybersecurity engineer
  • Information security specialist
  • Cybersecurity analyst
  • Security operations center engineer
  • Network security engineer
  • Information security analyst
  • Systems engineer
  • Cyber threat analyst
  • Cloud security engineer
  • Cyber threat detection engineer

Pay Scale

The pay scale for most of these jobs for entry-level engineers would range from $70,000-$90,000. Students may attain higher salaries if they earn certain certifications before they graduate.

Find Program Information

Access the academic program page to find out about this cybersecurity engineering degree.

Visit Apply Now Request Info

The Cybersecurity Concentration in the Bachelor of Science degree in Computer Science

This degree seeks to prepare students to have successful careers as computing professionals, with a solid understanding of software development and computer systems and the foundation for life-long learning in the field. Cybersecurity Concentration prepares students to meet the security needs of industry and government through coursework that provides a thorough understanding of security, privacy and cryptographic techniques and protocols used in computing and communication.

Common Courses

Required courses include systems programming, cryptology, network security and information security, as well as an elective ranging from data security and privacy to digital forensics. Students learn

  • the modern science of Cryptology and skills highly employable from the NSA to banks, to anybody who needs to encrypt information
  • concepts and methodology useful for information security, as specified by the standard from the NSA
  • how to detect and handle code vulnerabilities, vulnerabilities in web and database programming
  • secure network design and network security including attacks and vulnerabilities and defense measures, intrusion detection techniques, defense against denial-of-service attacks
  • hardware, software, and applications attacks and their defense
  • security policies, legal and ethical issues in cyber and computer crimes
  • the security and privacy issues in legacy systems and security and privacy policies and legislations
  • legal aspects of forensics, tools and techniques to perform a full computer forensic investigation.

Pay Scale

According to the department, graduates are typically hired by tech or IT companies, with a starting salary of about $90,000.

Find Program Information

  • The academic program page contains program information about these four concentrations: data engineering, game programming, cybersecurity, robotics and embedded systems.

Visit Apply Now Request Info

The Bachelor of Science in Information Technology

This degree in Information Technology provides students with an applied approach that focuses on supporting end-users in a variety of workplace settings by utilizing a range of computing technologies.

The Cybersecurity and Forensics concentration places an emphasis on security of computer and network systems, including forensic work to prevent and/or determine and correct security issues utilizing cybersecurity devices, procedures, tools, and solutions.  Graduates are qualified to work in a wide range of computer and network infrastructures in small to large-sized enterprises.

Students in this program will be taking courses in networking and operating systems, server/network setup and configuration, hardware assembly and configuration, Cyber Ethics, emerging technologies, Internet fraud, computer, network. mobile device and social media security and forensics, ethical hacking and multiple computer and network security courses. They will also take a course in programming and web development as well as intermediate and advanced Office Suite tools. They have elective opportunities in virtualization, cloud, and wireless and mobile device security. They will finish off their degree with a Capstone course that will focus on portfolio development, preparation for a career focused resume and interview skills.

Labor statistics and information

2023

Skills

  • Security vulnerabilities
  • Threats and attacks
  • Mitigation solutions for modern cyber networks
  • Network infrastructure and how to protect it

Careers

Graduates are qualified to work in a wide range of computer and network infrastructures in small to large-sized enterprises in such positions as:

  • IT support specialist/analyst or consultant
  • Help desk, network or IT project manager
  • Security or forensic analyst
  • Cybersecurity specialist or analyst
  • Incident specialist/analyst
  • Systems, network or database administrators (for all sectors of business, education, manufacturing, healthcare, nonprofit and government)

Job Spotlight from the Bureau of Labor Statistics

Network and Computer Systems Administrators

  • 2023 median pay: $95,360
  • Entry level education: Bachelor’s degree in computer engineering
  • Jobs in 2022: 339,900
  • Projcted job growth in 2022-32: 2% growth

Information Security Analysts

  • 2023 median pay: $120,360 per year
  • Entry level education: Bachelor’s degree
  • Jobs in 2019: 168,900
  • Projected job growth in 2022-32: 32% growth (much faster than average)

Find Program Information

Visit Apply Now Request Info

Student taking notes in front of a laptop

The Master of Arts in Criminology and Criminal Justice

This degree is designed to equip students with the skills necessary for impactful careers in criminal justice, providing a deep understanding of crime and security challenges from a worldwide perspective. The Global Security concentration prepares students to address the evolving security needs of government and private organizations through coursework that covers terrorism, homeland security, and information and cyber security, fostering expertise in navigating the complexities of international security threats.

Common Courses

  • Homeland Security
  • Terrorism and Counterterrorism
  • Information and Cyber Security

Careers

  • Criminal justice and law enforcement teachers
  • First-line supervisors of correctional officers
  • First-line supervisors of police and detectives

Pay Scale

Visit our criminology and criminal justice academic program page to see the pay ranges for various careers aligned with this degree.

Find Program Information

Access the academic program page to find out about this criminology and criminal justice degree.

Visit Apply Now Request Info

Computer Science M.S.

The Master of Science Degree in Computer Science

This degree in Computer Science with a concentration in Computer Security prepares students with advanced knowledge and skills to protect and defend computer systems and networks. The program focuses on a blend of theoretical knowledge and practical application to secure digital assets and ensure data privacy in a wide range of organizations.

The Computer Security concentration covers various topics related to securing computer systems. Students learn to identify vulnerabilities in software and networks and create algorithms and programs to safeguard data, employing techniques such as digital encryption, secure databases, and protected networking methods.

Students in this program will take courses in cryptography, network security, systems administration, information security, and digital forensics. They will complete the program with a Capstone project or thesis that involves researching and developing solutions for real-world cybersecurity challenges, preparing them for careers in a dynamic and rapidly evolving field.

Common Courses

  • Systems Administration
  • Systems Programming
  • Computer Network Security
  • Information Security
  • Data Security and Privacy
  • Digital Forensics
  • Introduction to Cryptology

Pay Scale

According to the department, graduates are typically hired by tech or IT companies, with a starting salary of about $90,000.

Find Program Information

Access the academic program page to learn more about this computer science degree.

Visit Apply Now Request Info

a photograph of a student working at a computer

The Associate of Applied Business degree in Cybersecurity

This degree provides students with an applied approach to information security concepts. With an ever-growing threat to sensitive and critical data in the field of information technology, understanding the impact of security issues on businesses and individuals is critical. The degree program gives students the tools they need to address current security issues including risk identification, security testing and monitoring, and enterprise risk management.

Courses in this degree focus on building a solid knowledgebase in cyber defense methods, security policies, incident management, business continuity and network hardening. Additional topics include networking, hardware and operating systems, cyber ethics, and current and emerging threat mitigation.

Graduates of this program will be able to:

  1. Demonstrate core competency in cybersecurity-related topics
  2. Describe the scope of the information security field and its impact on information technology
  3. Identify and analyze security risks to determine potential impacts
  4. Demonstrate ability to develop plans to mitigate security risks
  5. Identify professional, legal and ethical behavior

Access the academic program page to find out about this Associate Degree in Cybersecurity.

Visit Apply Now Request Info

Two students sitting together at a desk with a laptop

Computer Information Systems Minor

The Computer Information Systems minor is designed to enhance a variety of majors by providing students with foundational knowledge in managing and supporting information systems within an organization. The curriculum covers key areas such as database management, systems analysis, and IT project management, giving students practical skills to handle information technology challenges in any field. Electives allow students to customize their learning experience based on their interests and career goals.

Students in this minor will take courses in business modeling, information systems and artificial intelligence. They also have the option to choose electives in designing innovative information systems and digital transformation management.

Find Program Information

Access the academic program page to learn more about the computer information systems minor.

A photograph of a student working at a computer

Cybersecurity and Forensics Minor

The Computer Forensics and Security minor is designed to complement a wide range of majors. Curriculum focuses on vulnerabilities, forensics and network security. Electives provide flexibility to tailor the minor to each student's interests and career goals. For example, a student might choose a more in-depth course in hardware, mobile applications, command-line tools, networking, or firewalls.

Students in this minor will take courses in ethical hacking, computer and network forensics, and security. They have options for electives in Internet fraud, networking forensics, command line and programming mobile applications.

Cybersecurity and Forensics Certificate

The Computer Forensics and Information Security undergraduate certificate provides an introduction to information security and incident response, forensic preparation and data recovery and analysis.

This certificate is a great add-on to another degree or specialization. It can also be a great place to start for upskilling, reskilling or entering the IT Security and Forensics field.

Students will participate in courses that focus on law and society, operating systems and networking, hardware and server setup and configuration, forensics and in-depth security courses.

Visit Apply Now Request Info

Quick employment facts

The job outlook is more than promising for cybersecurity professionals. Review the information in the article links below that speak to job market forecasts.

Visit the "Cybercrime Statistics" tab on this website for recent happenings that relied on cybersecurity experts for resolution.

Program Details

When comparing your options in the cybersecurity arena, consider your academic strengths and weaknesses, particularly around math and physics requirements.

Program NameAdmission RequirementsMath RequirementsPhysics RequirementAdditional Requirements
Associate in Applied Business, CybersecurityOpen enrollment admission for students who hold a high school diploma, GED or equivalent.Kent Core Math RequirementNoneNone
Bachelor of Science, Computer Science, Optional Concentration in Information SecurityFreshman students on the Kent Campus: The freshman admission policy on the Kent Campus is selective. Admission decisions are based upon the following: cumulative grade point average, ACT and/or SAT scores, strength of high school college preparatory curriculum and grade trends. The Admissions Office at the Kent Campus may defer the admission of students who do not meet admissions criteria but who demonstrate areas of promise for successful college study. Deferred applicants may begin their college coursework at one of seven regional campuses of Kent State University. For more information on admissions, including additional requirements for some academic programs, visit the admissions website for first-year students.MATH 12002 Analytic Geometry and Calculus I; MATH 12013 Brief Calculus II; MATH 20011 Decision-Making Under Uncertainty; MATH 21002 Applied Linear AlgebraNoneStudents pursuing the Bachelor of Science degree in the College of Arts and Sciences must complete 8 credit hours of foreign language. Minimum Elementary I and II of the same language
Bachelor of Science, Cybersecurity EngineeringFreshman students: Admission into the Cybersecurity Engineering major requires a minimum 3.0 high school GPA and a minimum 24 ACT composite score (minimum 24 ACT sub-scores in both English and mathematics) or a minimum 1160 SAT composite score (mathematics, critical reasoning and writing); and placement directly into MATH 12002 (or its equivalent). Students who do not meet these requirements may apply for admission to the Computer Engineering Technology major and request to change their program to the Cybersecurity Engineering major after their freshman year if they meet the following criteria: minimum 3.200 overall Kent State GPA and minimum B grade in both MATH 12002 and PHY 23101.MATH 12002 Analytic Geometry and Calculus I; MATH 12003 Analytic Geometry and Calculus II; MATH 30011 Basic Probability and Statistics; and MATH 32051 Mathematical Methods in the Physical Sciences IPhy 23101 General University Physics I and General University Physics IINone
Bachelor of Science in Information Technology, Cybersecurity and Forensics ConcentrationOpen enrollment admission for students who hold a high school diploma, GED or equivalent.Kent Core Math RequirementNoneNone
Computer Forensics and Information Security - CertificateOpen enrollment admission for students who hold a high school diploma, GED or equivalent.NoneNoneNone
Computer Forensics and Security - MinorAdmission to a minor is open to students declared in a bachelor’s degree, the A.A.B. or A.A.S. degree, or the A.T.S. degree (not Individualized Program major). Students declared only in the A.A. or A.S. degree, or the A.T.S. degree in Individualized Program may not declare a minor. Students may not pursue a minor and a major in the same discipline.NoneNoneNone

A woman on a computer reviewing security documentsCybersecurity professionals play an essential role in many fields and in every kind of industry. These articles can help you learn about different career possibilities. Then Kent State can help you find the degree path that can connect you to your career goals. 

Cybercrime is on the rise.

Ransomware and other cyberattacks have increased awareness of vulnerabilities in critical infrastructure. They’ve also shown just how important skilled cybersecurity professionals are to our safety and information security, and to the economy. 

Ready to Get Started on Your Path to a Cybersecurity Career?

Our advisors, faculty and staff meet students where they are and help get them to where they want to be. As the digital world continues to expand, Kent State’s quality cybersecurity and cybercriminology degree programs, minors and certificates fully prepare graduates to become valued members of the workforce.  Kent State’s programs equip students with the knowledge and hands-on experience necessary to investigate cybercrimes, analyze digital evidence, and develop strategies for cybersecurity, making them essential players in this evolving field. And, our award-winning student support, including career planning and placement, assists every step of the way to graduation – and beyond. 

Visit Apply Now Request Info