61´«Ã½tv

Skip to main content
Home / 61´«Ã½tv / Programs

Cybersecurity, BS

Our Cybersecurity major will teach you to recognize issues in cybersecurity and develop your knowledge in data, software, system, human, organizational and societal security. You'll learn ethical aspects and cyber laws related to each of these cybersecurity areas.

Required courses in computer science and computer engineering provide a foundation of fundamental knowledge. You’ll study secure software development and host-based cyber defense, and attacks and countermeasures. Interdisciplinary courses in cryptography, information ethics and cybercrime add a well-rounded perspective on the field.

When you graduate, you’ll be able to:

  • Identify current problems and threats in cybersecurity
  • Detect and analyze cybersecurity attacks and practice defense strategies against them
  • Write secure software
  • Analyze networks and network security
  • Plan, implement and assess security protection mechanisms in computer systems and networks

61´«Ã½tv is recognized as a by the U.S. National Security Agency and Department of Homeland Security.

Your Degree Plan

Intro

Finger touching touchscreen

Cybersecurity is an area of vital importance to industry, government institutions and national security. You'll graduate workforce-ready, with skills to succeed in this high-demand field that’s expected to grow even more in the future.

Take advantage of special options related to this major:

  • Honors

    Expand your curiosity — and enhance your curriculum — through the 61´«Ã½tv Honors College. Two programs are offered: for first- and second-year students and for third- and fourth-year students.

The 61´«Ã½tv Difference

What sets this program apart from its competitors?

  • Digital forensics and cybersecurity laboratory co-located with the West Virginia State Police crime lab.
  • Department maintains its own customized version of Ubuntu Linux and a teaching laboratory with 60 high performance computers that boot to both Linux and Windows.
  • Capstone design experience encourages entrepreneurial activities and partners with the and the ZinnStarter business plan competition.
Scholarships

Over 92% of 61´«Ã½tv freshmen receive grants or scholarships (2022-2023).

Learn more

Learn by Doing

Learning happens outside the classroom. Get involved.

61´«Ã½tv is recognized as a by the U.S. National Security Agency and Department of Homeland Security.

In recent years the Department has offered undergraduate opportunities in the areas of:

  • System administration
  • Department of Defense-funded cybersecurity scholarships
  • Faculty mentored research on the topics of cybersecurity, digital forensics, human/computer interface, social media, biometrics data acquisition and machine learning

Student work has been sponsored in the summer by undergraduate scholarships.

Before graduating, all undergraduates in this major complete an academic project (or "capstone") to demonstrate their research, communication and critical thinking skills. Projects in 61´«Ã½tv's Cybersecurity major have included:

  • Avoiding Buffer-overflow security Vulnerabilities with Rust.
  • Development of Secure Mobile Apps for iPhone and Android.
  • Development of a Virtual Environment for Simulation of Network-based cyber attacks.

Connect with other students who share your academic interests as a member of:

View all of the you can join.

Network with professionals in your field as a student member of:

Live, study and pursue outside-the-classroom learning in a that shares your interests:

Outside of the Evansdale Crossing building.

What you learn outside of the classroom is just as important as what you learn during class. We’ll help you follow your curiosity.

Careers and Outcomes

How does this degree prepare students for a career?

Computer and Information Systems Managers

Plan, direct, or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming.

Has a Bright Outlook

Median Salary: $169,510

Possible job titles include: Information Systems Director (IS Director), Information Systems Manager (IS Manager), Information Technology Director (IT Director), Information Technology Manager (IT Manager).

Explore Career

Security Management Specialists

Conduct security assessments for organizations, and design security systems and processes. May specialize in areas such as physical security, personnel security, and information security. May work in fields such as health care, banking, gaming, security engineering, or manufacturing.

Has a Bright Outlook

Median Salary: $79,590

Possible job titles include: Consultant, Director, Security Risk Management, Operations Staff Specialist, Security, Physical Security Engineer, Physical Security Specialist, Principal Engineer, Security Engineering and Applied Science, Section Chief, Physical Security Specialist, Security Analyst, Security Consultant, Security Specialist.

Explore Career

Computer Systems Analysts

Analyze science, engineering, business, and other data processing problems to implement and improve computer systems. Analyze user requirements, procedures, and problems to automate or improve existing systems and review computer system capabilities, workflow, and scheduling limitations. May analyze or recommend commercially available software.

Has a Bright Outlook

Median Salary: $103,800

Possible job titles include: Business Systems Analyst, Computer Systems Analyst, Programmer Analyst, Systems Analyst.

Explore Career

Information Security Analysts

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Has a Bright Outlook

Median Salary: $120,360

Possible job titles include: Data Security Administrator, Information Security Analyst, Information Security Officer, Information Technology Specialist.

Explore Career

Computer Network Support Specialists

Analyze, test, troubleshoot, and evaluate existing network systems, such as local area network (LAN), wide area network (WAN), and Internet systems or a segment of a network system. Perform network maintenance to ensure networks operate correctly with minimal interruption.

Has a Bright Outlook

Median Salary: $71,530

Possible job titles include: Computer Network Specialist, IT Consultant (Information Technology Consultant), Network Engineer, Network Specialist, Network Support Specialist, Network Technical Analyst, Network Technician, Personal Computer Network Analyst, Senior IT Assistant (Senior Information Technology Assistant), Systems Specialist.

Explore Career

Database Administrators

Administer, test, and implement computer databases, applying knowledge of database management systems. Coordinate changes to computer databases. May plan, coordinate, and implement security measures to safeguard computer databases.

Has a Bright Outlook

Median Salary: $101,510

Possible job titles include: Database Administrator (DBA), Database Analyst, Database Coordinator, Information Systems Manager.

Explore Career

Network and Computer Systems Administrators

Install, configure, and support an organization's local area network (LAN), wide area network (WAN), and Internet systems or a segment of a network system. Monitor network to ensure network availability to all system users and may perform necessary maintenance to support network availability. May monitor and test Web site performance to ensure Web sites operate correctly and without interruption. May assist in network modeling, analysis, planning, and coordination between network and data communications hardware and software. May supervise computer user support specialists and computer network support specialists. May administer network security measures.

Median Salary: $95,360

Possible job titles include: Information Technology Specialist (IT Specialist), Network Administrator, Network Engineer, Systems Administrator.

Explore Career

Potential Careers

This program provides skills in areas such as:

  • Programming
  • Networking
  • Software development business
  • Cybersecurity
  • Criminal justice
  • Cryptography

Where Graduates are Working

  • Leidos
  • KeyLogic
  • Northrop Grumman
  • Federal Bureau of Investigation
  • U.S. Department of Defense
  • NASA's Katherine Johnson Independent Verification and Validation Facility

Admission Requirements

To be admitted to 61´«Ã½tv's Cybersecurity major, first-time freshmen must meet 61´«Ã½tv's . They also must meet one of the following admission requirements. Interested in transferring? Review the .

Tuition and Aid

How much does Cybersecurity at 61´«Ã½tv cost? And how can you save?

Tuition and Fees

Estimated rates are available on our tuition website. Anyone who is not a current West Virginia resident, including international students, will be charged non-resident rates.

Scholarships

Estimate your eligibility for merit scholarships at 61´«Ã½tv Morgantown.

Find Scholarships

Net Price Calculator

Estimate your cost of attendance and eligibility for financial aid and scholarships at any 61´«Ã½tv System campus.

Ways to Save

Here are a few ways for you to save on the cost of attending 61´«Ã½tv in addition to university scholarships.

Financial Aid

The most important step toward funding your future with financial aid for the Cybersecurity major is submitting the Free Application for Federal Student Aid, or FAFSA.

Transfer Articulation Agreements

To simplify the transfer process, we have formal agreements with certain institutions. These agreements outline the courses you should take to prepare for transferring to 61´«Ã½tv.

Review the to see if your institution is listed.

Ready to take the next step?

Learn how to join the 61´«Ã½tv family.

Want to know more about Cybersecurity at 61´«Ã½tv? Fill out our request form to receive more information.

Visit

​​Experiencing campus is the best way to see if 61´«Ã½tv is the right fit. Choose from in-person and virtual options.

Visit 61´«Ã½tv

Your first step to becoming a Mountaineer is applying for admission using our convenient online application.