The field of cybersecurity exists to keep private digital information private and to help bring justice to those who would compromise that privacy, misappropriate information, and in some cases, misuse it. The proliferation of information networks—especially the internet—ushered in the need for digital information security, and it seems only fitting that one be able to study it online. The question is: which students tend to thrive in an online learning environment (versus a face-to-face, classroom experience)?
Ultimately, an online degree program is often an excellent choice for students with additional obligations, such as those with current full-time work who wish to pursue a degree during their free time. An online cybersecurity program may also be right for an individual who lives too far from a physical campus, or who otherwise cannot fit classroom attendance into an already busy schedule.
Online degree programs generally allow students some amount of flexibility to complete work on their own time throughout the semester, although most often, they must still adhere to the semester calendar of the institution and, in some cases, attend particular online classes at scheduled times.
That said, those students who require more hands-on experience or who need routine supervision from an instructor may wish to look to a campus-based program for their education. Indeed, an online program demands a certain degree of independence from instructors and peers, which should be an important consideration for anyone interested in this type of degree.
School | City | State | Website | Undergrad | Graduate | Grads |
---|---|---|---|---|---|---|
Adelphi |
MD | www.umgc.edu | 1620 | |||
New Castle |
DE | www.wilmu.edu | 1045 | |||
Salt Lake City |
UT | www.wgu.edu | 980 | |||
Tempe |
AZ | www.phoenix.edu | 536 | |||
Williamsburg |
KY | www.ucumberlands.edu | 511 | |||
Charles Town |
WV | www.apus.edu | 397 | |||
Virginia Beach |
VA | www.ecpi.edu | 386 | |||
Burlington |
VT | www.champlain.edu | 206 | |||
Arnold |
MD | www.aacc.edu | 197 | |||
Monterey |
CA | www.nps.edu | 181 | |||
Minneapolis |
MN | www.capella.edu | 180 | |||
Bellevue |
NE | www.bellevue.edu | 149 | |||
Clearwater |
FL | www.spcollege.edu | 116 | |||
Colorado Springs |
CO | www.coloradotech.edu | 98 | |||
La Plata |
MD | www.csmd.edu | 95 | |||
San Antonio |
TX | www.utsa.edu | 93 | |||
Baltimore |
MD | www.jhu.edu | 88 | |||
Laurel |
MD | www.captechu.edu | 86 | |||
Flint |
MI | www.baker.edu | 85 | |||
La Jolla |
CA | www.nu.edu | 77 | |||
Raymond |
MS | www.hindscc.edu | 75 | |||
Chicago |
IL | www.depaul.edu | 71 | |||
Baltimore |
MD | www.ccbcmd.edu | 67 | |||
Washington |
DC | www.gwu.edu | 66 | |||
University Park |
PA | worldcampus.psu.edu | 65 | |||
Syracuse |
NY | www.syracuse.edu | 63 | |||
Henniker |
NH | www.nec.edu | 63 | |||
Bel Air |
MD | www.harford.edu | 59 | |||
Romeoville |
IL | www.lewisu.edu | 59 | |||
Rochester |
NY | www.rit.edu | 58 | |||
Madison |
SD | dsu.edu | 57 | |||
Ellensburg |
WA | www.cwu.edu | 53 | |||
Kennesaw |
GA | www.kennesaw.edu | 51 | |||
Grand Rapids |
MI | www.davenport.edu | 48 | |||
Pittsburgh |
PA | www.ccac.edu | 47 | |||
Westerville |
OH | www.mycomputercareer.edu | 46 | |||
Saint Leo |
FL | www.saintleo.edu | 43 | |||
Dobbs Ferry |
NY | www.mercy.edu | 40 | |||
Okmulgee |
OK | www.osuit.edu | 37 | |||
Lenexa |
KS | www.grantham.edu | 36 | |||
Utica |
NY | www.sunypoly.edu | 33 | |||
Davenport |
IA | www.purdueglobal.edu | 33 | |||
San Antonio |
TX | www.alamo.edu/spc | 32 | |||
Denver |
CO | www.regis.edu | 31 | |||
Kingston |
RI | web.uri.edu | 30 | |||
Fairfax |
VA | www.stratford.edu | 29 | |||
New York |
NY | www.nyu.edu | 28 | |||
Ocala |
FL | www.cf.edu | 26 | |||
Davie |
FL | www.mcfattertechnicalcollege.edu | 26 | |||
Saint Paul |
MN | www.metrostate.edu | 24 | |||
Omaha |
NE | www.unomaha.edu | 24 | |||
Norfolk |
VA | www.nsu.edu | 22 | |||
Philadelphia |
PA | www.drexel.edu | 22 | |||
Huntsville |
TX | www.shsu.edu | 21 | |||
Lowell |
MA | www.uml.edu | 21 | |||
Orange Beach |
AL | www.columbiasouthern.edu | 21 | |||
Arlington |
VA | www.strayer.edu | 20 | |||
Los Angeles |
CA | www.usc.edu | 20 | |||
Albany |
NY | www.excelsior.edu | 20 | |||
Saint Paul |
MN | www.csp.edu | 19 | |||
Melbourne |
FL | www.fit.edu | 19 | |||
Towson |
MD | www.towson.edu | 19 | |||
Missoula |
MT | www.umt.edu | 19 | |||
Irving |
TX | www.udallas.edu | 18 | |||
Fort Lauderdale |
FL | www.nova.edu | 15 | |||
Daytona Beach |
FL | worldwide.erau.edu | 15 | |||
Knoxville |
TN | www.fountainheadcollege.edu | 15 | |||
Raleigh |
NC | www.mycomputercareer.edu | 15 | |||
Martinsburg |
WV | www.valley.edu | 15 | |||
Louisville |
KY | www.sullivan.edu | 15 | |||
San Juan |
PR | www.metro.inter.edu | 14 | |||
San Antonio |
TX | www.ollusa.edu | 13 | |||
Washington |
DC | www.potomac.edu | 13 | |||
Youngwood |
PA | westmoreland.edu | 13 | |||
Springfield |
MO | www.missouristate.edu | 12 | |||
New Britain |
CT | www.charteroak.edu | 12 | |||
Newark |
DE | www.udel.edu | 11 | |||
Columbus |
OH | www.franklin.edu | 11 | |||
St. Cloud |
MN | rasmussen.edu | 11 | |||
Killeen |
TX | www.ctcd.edu | 11 | |||
Bristol |
RI | www.rwu.edu | 10 | |||
Hoboken |
NJ | www.stevens.edu | 10 | |||
Fort Lauderdale |
FL | www.broward.edu | 10 | |||
Waltham |
MA | www.brandeis.edu | 9 | |||
Naples |
FL | www.hodges.edu | 9 | |||
Gaffney |
SC | www.limestone.edu | 9 | |||
Moon Township |
PA | www.rmu.edu | 9 | |||
Springfield |
IL | www.uis.edu | 9 | |||
San Juan |
PR | www.edpuniversity.edu | 8 | |||
Charlottesville |
VA | www.virginia.edu | 8 | |||
Indianapolis |
IN | www.ivytech.edu | 8 | |||
Niagara University |
NY | www.niagara.edu | 7 | |||
Wichita |
KS | www.friends.edu | 6 | |||
Louisville |
KY | www.louisville.edu | 6 | |||
Cumberland |
MD | www.allegany.edu | 6 | |||
Ocala |
FL | rasmussen.edu | 6 | |||
Augusta |
ME | www.uma.edu | 6 | |||
Norfolk |
VA | www.odu.edu | 5 | |||
Cedar City |
UT | www.suu.edu | 5 | |||
Washington |
DC | www.strayer.edu | 5 | |||
Tampa |
FL | www.strayer.edu | 5 | |||
Detroit |
MI | www.udmercy.edu | 5 | |||
Orchard Park |
NY | www.bryantstratton.edu | 5 | |||
McHenry |
MD | www.garrettcollege.edu | 5 | |||
Ruidoso |
NM | www.ruidoso.enmu.edu | 5 | |||
San Marcos |
CA | www.csusm.edu | 4 | |||
Atlanta |
GA | www.strayer.edu | 4 | |||
Washington |
DC | www.strayer.edu | 4 | |||
San Antonio |
TX | www.hallmarkuniversity.edu | 4 | |||
Conway |
SC | www.coastal.edu | 3 | |||
Melbourne |
FL | www.fit.edu | 3 | |||
Philadelphia |
PA | www.lasalle.edu | 3 | |||
Manchester |
NH | www.snhu.edu | 3 | |||
Tucson |
AZ | www.arizona.edu | 3 | |||
Princess Anne |
MD | www.umes.edu | 3 | |||
Seattle |
WA | www.cityu.edu | 3 | |||
Scooba |
MS | www.eastms.edu | 3 | |||
Lynchburg |
VA | www.liberty.edu | 3 | |||
Rockford |
IL | rasmussen.edu | 3 | |||
Beckley |
WV | www.valley.edu | 3 | |||
Granite Falls |
MN | www.mnwest.edu | 3 | |||
Rapid City |
SD | www.national.edu | 3 | |||
Zanesville |
OH | www.zanestate.edu | 3 | |||
Salem |
VA | www.an.edu | 2 | |||
Grand Rapids |
MI | www.grcc.edu | 2 | |||
Winona |
MN | www.southeastmn.edu | 2 | |||
Montreat |
NC | www.montreat.edu | 2 | |||
St. Louis |
MO | www.purdueglobal.edu | 2 | |||
Fargo |
ND | rasmussen.edu | 2 | |||
Vidalia |
GA | www.southeasterntech.edu | 2 | |||
Fort Kent |
ME | www.umfk.maine.edu | 2 | |||
Hampton |
VA | www.hamptonu.edu | 1 | |||
Providence |
RI | online.jwu.edu | 1 | |||
Mankato |
MN | mankato.mnsu.edu | 1 | |||
Greenville |
SC | www.strayer.edu | 1 | |||
Memphis |
TN | www.strayer.edu | 1 | |||
Austin |
TX | www.strayer.edu | 1 | |||
Scott Depot |
WV | www.strayer.edu | 1 | |||
Tulsa |
OK | utulsa.edu | 1 | |||
Roswell |
NM | www.roswell.enmu.edu | 1 | |||
Poughkeepsie |
NY | www.marist.edu | 1 | |||
Fergus Falls |
MN | www.minnesota.edu | 1 | |||
Bronx |
NY | www.monroecollege.edu | 1 | |||
Lincoln |
NE | www.purdueglobal.edu | 1 | |||
Omaha |
NE | www.purdueglobal.edu | 1 | |||
Radford |
VA | www.radford.edu | 1 | |||
Sunset Hills |
MO | www.vatterott.edu | 1 | |||
Cheyenne |
WY | www.lccc.wy.edu | 1 |
If you are planning on pursuing an online degree in cybersecurity, it is important that you know what to expect throughout the application process, and how to prepare accordingly.
Of course, the specifics of the application will likely depend on the degree you are pursuing; to be sure, those applying for an undergraduate program will be presented with different criteria than those interested in obtaining a graduate degree. For example, while an individual applying to an undergraduate bachelor’s degree program in cybersecurity may be asked to submit proof of SAT scores, those applying to graduate master’s or doctoral degree programs may be asked for GRE or GMAT scores instead.
Furthermore, those applying to a master’s or doctoral program may ask for letters of recommendation from previous professors and even employers, while those looking to obtain a bachelor’s degree may only be asked for such letters from high school instructors. In addition, an undergraduate applicant will be asked to show proof of high school transcripts, while a graduate applicant will need to show transcripts from all undergraduate institutions attended. Outside of these variances, the applications may appear similar and ask for a personal statement, a resume or CV, and other related information.
In general, most programs require prospective students to apply before a certain date to be considered for acceptance. Many schools have a deadline of January for programs to start in the fall or an early fall deadline for winter-start programs.
The U.S. Department of Homeland Security and the National Security Agency jointly sponsor the National Centers of Academic Excellence program, which designates specific two- and four-year colleges and universities as centers of academic excellence (CAE) in cyber defense. Schools are presented with this form of accreditation based on several criteria, including the contents of their degree program, as well as their alignment to specific cybersecurity-related knowledge units. As of the time of this writing (November 2022), over 300 top colleges and universities have been awarded this designation.
It is certainly not necessary to attend an institution that has been recognized as a CAE in cyber defense. That being said, doing so will help ensure that the student has access to a top-notch education from some of the leading minds in the field.
Generally, while the specifics of a cybersecurity program will likely vary based on the program, students in this field of study may expect to take a fairly similar course load in pursuit of their degree. For example, undergraduate and graduate students will likely take classes on cyberspace and cybersecurity, ethics in cybersecurity, security policy analysis, cybersecurity management, emerging technologies, and a capstone course or project.
Of course, undergraduate students may also be required to take several electives to meet core requirements, which may not be the same for graduate students.
Furthermore, in some cases, a student in a cybersecurity program may be able to pursue an additional specialty, although this is not a guarantee for each institution. Specialty areas for a cybersecurity student, particularly at the master’s level, may include cybersecurity engineering, operations, management, policy, investigation/forensics, and intelligence.
Very often, schools may present cybersecurity as a specialty itself, housed within a broader degree in information systems or computer science.
At Iowa State University, students may pursue an online master’s degree in cybersecurity offered through the Department of Electrical and Computer Engineering. This is a 100 percent online program that students can complete without ever visiting the campus. Courses in this program will be delivered through pre-recorded videos, offering maximum flexibility.
For admission to the program, students must have graduated with a bachelor’s or post-baccalaureate degree from a regionally accredited U.S. institution or from a recognized foreign institution. Other admission requirements include a minimum grade point average of 3.0, academic records, statement of purpose, letters of recommendation, GRE scores (optional), a current resume, and applicants whose native language is not English must demonstrate proficiency in English.
Made up of 30 credits, the program includes courses such as advanced computer networking; computer security; information warfare; cryptography; and steganography; among others.
Students will be able to enhance and impart knowledge about information infrastructure security, engineer complex systems, develop social awareness, understand policy and strategic issues, and build a sense of ethics.
Johns Hopkins Engineering for Professionals is part of Johns Hopkins University, offering a master of science degree and a post-master’s certificate in cybersecurity. These programs provide students with the knowledge and skills they need for protecting and defending information systems. Offered entirely online, students in this cybersecurity program become adept at safeguarding data availability, integrity, and confidentiality. They learn to preserve and restore systems and manage risks.
The program's faculty includes knowledgeable instructors who are active in the cybersecurity space and help students find meaningful career paths.
Admission requirements for the master’s program include a bachelor’s degree from a regionally accredited college or university, a grade point average of at least 3.0, transcripts from all college studies, a completed online application, a detailed resume, and all international applicants must submit proof of their proficiency in English via the TOEFL or the IELTS.
Students for the post-master's certificate require a master’s degree in a relevant engineering or science discipline along with college transcripts and a completed application. GRE scores are not required for admission but will be considered if submitted.
The master of science program consists of ten courses, while the post-master’s certificate consists of five courses. The curriculum includes courses such as cryptology; cyber-physical systems security; digital forensics technologies and techniques; foundations of information assurance; information assurance analysis; introduction to ethical hacking; intrusion detection; and network security, among others.
At the end of the program, graduates will be able to analyze enterprise security risks and make software and hardware recommendations, as well as develop a high level of proficiency in hash functions, encryption, authentication, and signature schemes.
At the University of Dallas, students have the opportunity to pursue a master’s of science in cybersecurity. Notably, the institution has been designated a center of academic excellence. Additionally, students also have the option of pursuing a 42-credit MBA with a cybersecurity concentration. The MS in cybersecurity program provides students with a real-world perspective on cybersecurity and is taught by experienced professionals.
To apply for admission, students need to have a U.S. bachelor's degree with a minimum cumulative GPA of 2.0 from a regionally accredited college or university, a completed online application, a current resume or CV, unofficial transcripts, and English language proficiency for international applicants.
Comprising 30 credits, the MS in cybersecurity program includes courses such as programming & scripting languages; the effective leader; business & society; data protection; compliance & legal; operational cybersecurity management; network security; and digital forensics.
The MBA with a cybersecurity concentration consists of 42 credits. It includes courses such as managerial finance; data protection; compliance and legal issues; operational cybersecurity management; and foundations of cybersecurity, among others.
Upon successful completion, graduates can pursue careers in areas such as cyber defense, threat analysis, network security, digital forensics, and penetration testing. They can take up roles such as security architects, engineers, consultants, software developers, cryptographers, and cryptanalysts.
Students can pursue a fully online master of science degree in cybersecurity at the University of Delaware. The University of Delaware has been designated a National Center of Academic Excellence in Cyber Defense Education by the NSA (National Security Agency) and DHS (Department of Homeland Security). The program provides students with hands-on training and the foundational theory required for defending infrastructure. The program's faculty includes active researchers and practitioners with experience in military and corporate systems.
The major admission requirements include a baccalaureate degree from an accredited four-year university, a minimum grade point average of 3.0, three letters of recommendation, GRE scores (GRE waivers available), and TOEFL scores for international students.
This online master of science in cybersecurity requires 30 credit hours. It is targeted at professionals with knowledge in information systems, computer science, engineering, or related fields. Courses include an introduction to cybersecurity; advanced cybersecurity; system hardening and protection; digital forensics; secure software design; computer networks; and applied cryptography.
Students are prepared to execute solutions protecting global systems and infrastructure. They will gain knowledge and skills for designing secure networks, systems, and software using a holistic approach.
Utica College offers an online master of science (MS) in cybersecurity to equip students with the knowledge and skills to lead cybersecurity units in government agencies, investigative units, or businesses. Students in this program will also participate in a two-day online virtual residency during which they'll interact with their classmates and professors.
Admission requirements include a bachelor's degree or equivalent with a minimum grade point average of 3.0, a completed online application, a personal statement, two letters of recommendation, transcripts, and a current resume. Applicants whose first language is not English must submit their test scores for either the TOEFL or IELTS.
Comprising 30 credits, the program includes six core courses: principles of cybersecurity; cyber intelligence; critical national infrastructures and national security; principles of cybercrime investigations; and two capstone projects. Students will then go on to complete the remaining four courses within each advising specialization. The specializations include computer forensics, cyber-operations, and electronic crime.
Upon successful completion, graduates can take up roles such as information security analysts, chief security offices, security architects, IT risk managers, cyber operations analysts, principal consultants of cybersecurity, and supplier security compliance managers.
Apart from the MS in cybersecurity, Utica College also offers an online bachelor of science in cybersecurity (120 credits), an online BBA in cybersecurity operations management (120 credits), and an online master of science in cybersecurity operations management (30 credits).
Drexel University offers an online master of science in cybersecurity program providing graduates with detailed technical training for understanding, adapting, and developing new techniques to confront emerging threats in cybersecurity.
The program is ideal for students who have a background in computer science, computer engineering, telecommunications engineering, electrical engineering, and any other closely-related technical fields. Courses in the program are taught by acclaimed Drexel faculty.
To apply for admission, students must have a bachelor's degree from an accredited college or university and submit a completed application, transcripts from all universities attended, letters of recommendation, a current resume, and TOEFL scores for international students. GRE scores are not a requirement but are preferred.
Made up of 45 credits, the program includes core courses such as principles of cybersecurity; information policy and ethics; and security engineering. Additional cybersecurity track technical electives are selected in consultation with an academic advisor.
After completing the program, graduates can take up roles such as cryptanalyst, cryptographer, security administrator, security analyst, security architect, security consultant, and security engineer.
The Syracuse University College of Engineering and Computer Science offers an online master of science program in cybersecurity. It prepares students to spot, prevent, and fight cybercrime using curricular innovations, multidisciplinary collaboration, and cutting-edge research. The program faculty has won top awards from numerous security organizations. They have also received funding from the NSA (National Security Agency) for developing their cybersecurity program.
The major admission requirements include a bachelor’s degree in computer engineering, computer science, cybersecurity, or any other related field from an accredited institution, and an average grade point average of 3.0 or better. Core competencies in data structures, basic systems knowledge, high-level programming, and discrete mathematics are recommended.
The curriculum of this online cybersecurity program includes 15 credits of core courses and 15 credits of electives. Some of the courses in the curriculum include computer security; design and analysis of algorithms; internet security; principles of operating systems; and assurance foundations.
Students learn how to design new information and computer systems, protect web, mobile, and other information platform systems, and analyze and detect data breaches, malware, and other cyberattacks. Upon completion of the program, graduates can find opportunities in industries such as finance, education, oil and gas, entertainment, national defense, and health care.
The University of Southern California offers an online master of science in cyber security engineering to professional engineers through its [email protected] online platform. Students will learn how to navigate challenges with operating systems, secure applications, use of cryptography, key management, and secure networking.
Admission requirements for the program include a bachelor’s degree from an accredited institution in any engineering or engineering-related discipline, transcripts from all colleges and universities attended, a current resume, a personal statement, and English language proficiency for international students.
The program comprises 28 credits and includes courses such as security systems; the foundations and policy for information security; computer systems assurance; security and privacy; applied cryptography; and computer forensics.
Graduates of the program will be well-equipped to pursue opportunities in areas such as homeland security, computer software engineering, computer engineering, computer systems, information security, computer architecture, intelligence analysis, software development, and network administration.
The University of Arizona offers a fully online master of science (MS) program in cybersecurity. It provides working professionals with mastery in the rapidly growing field of cybersecurity. This challenging online program allows students to assess, manage, and prevent information security-related risks. The interactive and hands-on courses are taught by the University of Arizona’s excellent faculty members.
The program allows students the option of two different tracks: information systems and physical systems. The program comprises 33 credits, out of which 12 credits comprise common core courses, while the remaining 21 credits are of the selected track. The curriculum includes instruction in information security in public and private sectors; business data communications and networking; systems cybersecurity engineering; and engineering of trustworthy secure systems.
The information systems track includes courses in Information security risk management; systems security management; data mining for business intelligence; cyber threat intelligence; and penetration testing: ethical hacking and social engineering. Courses in the physical systems track include cyber security: concepts, theory, practice; machine learning and data analytics; fundamentals of cloud security; engineering statistics; digital communications systems; and systems engineering process.
To get accepted into the program, applicants must have a bachelor's degree from a regionally accredited college or university, an undergraduate degree grade point average of 3.0 or higher, three years of technical work experience, and TOEFL scores for international students.
The program teaches students to prevent, assess, and manage security-related risks, successfully perform vulnerability testing, forensic investigation, and system hardening, and develop threat intelligence.
Regent University offers an online master of science in cybersecurity, preparing students to develop holistic cybersecurity measures for their organization.
Students will develop expertise in identity management, network security, disaster recovery, strategic planning, and more. The program is ideal for those with strong ethical and analytical aptitudes and for military members transitioning into a new career.
For admission, applicants must have a bachelor's degree from a regionally accredited institution or an equivalent degree from a foreign institution, a minimum grade point average of 2.5, a completed online application, official college transcripts, a personal goal statement, and English language proficiency for international students.
The program consists of 30 credits and has three concentration options to choose from: cybersecurity practitioner, cybersecurity management, and cybersecurity policy. As part of the program, students will delve into topics such as cybersecurity ethics; information systems security and assurance; internet and network security; digital systems design and forensics; information security management; business continuity & disaster recovery; and cybersecurity compliance.
The program teaches students how to assess computer systems and networks, build technological and organizational structures for protecting digital assets, and develop recovery plans for information (IT DRP). Graduates of the program have career opportunities in areas such as digital forensics engineering, computer programming, cyber intelligence, digital security project management, network or systems administration, and more.
Regent University also offers a 120-credit bachelor of science program in cybersecurity.
In some cases, students pursuing an online degree in cybersecurity may be required to visit the campus once or twice throughout the calendar year. That being said, this is not the norm; instead, many programs, such as the one offered by Iowa State University, may be completed without ever stepping foot on the campus. This should certainly be considered by those whose schedule prevents them from physically attending courses, or who do not live near a quality institution.
Since campus visitation requirements are not published in a standard manner across universities, please be sure to research specific requirements for your programs of interest. It is not uncommon, even for primarily online programs, to require a campus visit for orientation, for instance, or for the presentation of a capstone project.
Finally, there are a few other considerations to remember during the program selection process. For starters, you may wish to inquire about each institution’s career placement assistance or the career success statistics of its graduates.
While neither is synonymous with a job guarantee or long-term career advancement or success, it can help you better understand a program’s post-degree support system. In addition, you may wish to get in contact with the school’s academic advising programs to learn about the advising services offered to online students. Ultimately, remaining diligent by taking these actions can help ensure success during the program and beyond.
Some individuals are concerned that the quality of the education offered in an online program may not be as high as that found in a traditional, campus-based, face-to-face program. In reality, however, many experienced and skilled professors successfully teach cybersecurity classes online, including the five listed below.
Sandra Blanke University of Dallas
Dr. Sandra Blanke is an associate professor in cybersecurity at the University of Dallas. She holds a PhD in computer and information systems from Nova Southeastern University. Professor Blanke also holds the information systems security professional (CISSP) credential. Her research explores rapidly changing and developing areas of cybersecurity and emerging technologies. She teaches classes on technology, business, and cybersecurity.
Before joining academia, Dr. Blanke acquired over 20 years of work experience in enterprise technology and network operations, including a stint at Verizon. She completed her BBA from The University of Texas at Arlington and her MBA from the University of Dallas.
Shiu-Kai Chin Syracuse University
Dr. Shiu-Kai Chin is an electrical engineering and computer science professor at Syracuse University. His research explores computer or cybersecurity, formal verification, and systems assurance.
Dr. Shui-Kai Chin has taught courses in hardware design, secure computer architecture, access control, and certified security by design. He also has won several honors, such as the Crouse-Hinds Award for Excellence in Education, a Syracuse University Outstanding Teacher of the Year Award, and the Laura J. and L. Douglas Meredith Professor for Teaching Excellence. He completed his PhD at Syracuse University.
Chase Cotton University of Delaware
Dr. Chase Cotton is a professor of cybersecurity at the University of Delaware. His research centers around cybersecurity and software systems with high availability. At present, he directs the cybersecurity educational program at the University of Delaware. He develops courses and degree programs, including an MS, minor, and certificates in cybersecurity.
Dr. Cotton has published his research in prominent journals such as the Journal of Experimental and Theoretical Artificial Intelligence and the Journal of Information Systems Applied Research. He completed his PhD from the University of Delaware and a BS from the University of Texas at Austin.
Leonard Popyack Utica College
Dr. Leonard Popyack is a professor of practice in cybersecurity at Utica College. Being one of the first US government research scientists to study offensive information warfare, Popyack has valuable experience in the field of offensive and defensive information assurance (INFOSEC). He has taught courses on mobile code security, internet security principles, systems assurance, malicious code analysis, cryptography, and data hiding and steganography.
Dr. Popyyack has received many awards, such as Jamestown Community College Distinguished Alumnus Award and Air Force Research Laboratory Information Directorate Basic Research Award. He completed his PhD and MS from Binghamton University, BS from SUNY Polytechnic Institute, and an AAS from Jamestown Community College.
Lanier Watkins Johns Hopkins University
Dr. Lanier Watkins is the JHU chairman of the Engineering for Professional (EP) cybersecurity and computer science master’s program. Currently, his research focuses on network security, IoT security, vulnerability monitoring and analysis, data analytics, malware monitoring and analysis, and assured AI.
Dr. Watkins has published in journals such as the Journal of Information Warfare and the International Journal of Security and Networks. He has won prominent awards such as the Special Achievement Award, Lump Sum Merit Award, and Modern-Day Technology Leader Award. He completed his PhD from Georgia State University and an MS in biotechnology from Johns Hopkins University, as well as an MS in computer science, MS in physics, and a BS in physics, all from Clark Atlanta University.
Traditional forms of education are still important, but they can’t keep up with the rapid pace of cybersecurity. As soon as one form of threat is neutralized, innumerable others are developed. That’s why employers and employees are both increasingly turning to the more nimble world of professional certifications.
Data science, as described by University of California, Berkeley, involves the analysis and management of large quantities of data. The discipline requires professionals who can ask the right questions, chart out what information is needed, collect the data, and analyze it effectively.
Meet several leading professors of computer science, and learn more about what makes them standout educators and innovators.
Software powers a large part of today’s world. From hailing taxi cabs to ordering food, there is an app for everything. As a result, there is a growing demand for software engineers to develop new applications and websites.
In a world largely powered by software, there is a high demand for those trained in web development. A bachelor's degree in web development can allow students to gain a fundamental understanding of software as a whole and confidently launch their career in this exciting field.
An online bachelor's degree in business data analytics provides students with a strong foundation in data analytics and prepares them for a promising career in this burgeoning field. Students become well-equipped in data mining, data storage, and data analytics.
Financial engineers are expected to be in the know about the latest financial models, systems, and software. Professionals with a background in mathematics, statistics, and computer science can opt for a master’s program in financial engineering.
Because of this ongoing and ever-growing need for cybersecurity solutions, this industry is growing rapidly. Most bigger companies now employ in-house cybersecurity professionals to properly secure networks, data, and processes. While this work was once often done by self-taught experts who often had a history of hacking, it is now often performed by people who attended universities and programs with the express intent of becoming industry professionals.
A master’s degree in data science trains students to expertly analyze data, as well as in other important disciplines such as machine learning, programming, database management, and data visualization. This degree is ideal for aspiring data scientists, data analysts, and pricing analysts.
Businesses today have large amounts of data at their disposal, thanks to the increasing dependence on technology. The job of a data analyst is to dissect the information available, derive meaningful conclusions, and finally, help make sound business decisions. A master's degree in business data analytics helps students get on the fast track to a successful career as an analyst.