Step 1: Research the Field

Computer technology moves fast, so the IT workforce must be dynamic enough to keep up. The field is notably varied, including many different professions, such as computer research scientists, systems managers, software developers, and support specialists.

Cybersecurity engineers—labeled as information security analysts by the United States Bureau of Labor Statistics (BLS)—tend to have many of the same networking and computer systems skills as other IT professionals, but are highly specialized in using them with a mind for security. Anyone considering a career in cybersecurity is encouraged to research the job carefully before committing to the field.

Typical Duties of Cybersecurity Engineers

The breadth and scope of a cybersecurity engineer’s duties vary by industry and organization, but the following are among the most common:

  • Selecting and installing cybersecurity software
  • Evaluating an organization’s security needs and establishing best practices accordingly
  • Cybersecurity engineers design, implement, maintain, oversee, and upgrade all security measures that are needed for protecting an organizations’ systems, networks, and data
  • Monitoring networks for security breaches
  • Conducting penetration tests to identify potential vulnerabilities
  • Reporting the incidence, nature, and extent of security breaches
  • Developing and implementing a plan of action for responding to such breaches
  • Developing security standards and best practices to be followed on an organizational level
  • Keeping up to date on the latest security threats and tools
  • Assisting in security breach investigations

Skills & Knowledge of Cybersecurity Engineers

Cybersecurity engineers plan, execute, monitor, and upgrade computer security systems—tasks that rely on a range of skills and knowledge. According to O*NET Online (2022), information security analysts must be familiar with:

  • The development environment, web platform development, networking, and operating system software
  • Transaction security and virus protection software
  • Computer hardware and electronics
  • Telecommunications systems
  • Data gathering and analysis
  • Security practices and standards

Personal Qualities of Cybersecurity Engineers

As with most careers, there are a handful of personal qualities and aptitudes that could make one well suited for a career in cybersecurity engineering. The following are among the most important:

  • Analytical thinking
  • Attention to detail
  • Grace under pressure
  • Deductive and inductive reasoning
  • Creative problem-solving
  • Excellent written and oral communication

Typical Qualifications Required

Cybersecurity engineers must generally have the following qualifications:

  • They should possess a degree in IT, systems engineering, computer science, or any other similar field
  • A minimum of two years of cybersecurity work experience doing activities such as incident detection and forensics
  • They must have experience with the operation, maintenance, and functionality of firewalls and other forms of endpoint security
  • They should have proficiency in languages or tools such as Java, C++, Node, Ruby, Python, Go, or PowerShell
  • They should have the ability to work in a fast-paced environment
  • They must have up to date knowledge about the latest hacker tactics, and cybersecurity trends

It must be noted that different organizations have different qualification requirements. Given above is a general list of requirements that an organization may ask for.

Step 2: Earn a Bachelor’s Degree in Cybersecurity or a Related Discipline (Four Years)

The BLS (2020) notes that information security analysts typically need at least a bachelor’s degree in information security, computer engineering, computer programming, or another relevant discipline to enter the field, though some employers prefer candidates with related master’s degrees or MBAs. Prospective students should look for accredited programs with updated curricula so that they can stay informed about significant changes in the field.

Cybersecurity Engineering Degree Specializations

Some cybersecurity bachelor’s degrees offer specializations for more targeted training. Examples of real cybersecurity concentrations from U.S. colleges and universities include cybercrime and fraud investigation, cyber operations, intrusion investigation, information assurance, and network forensics.

Undergraduate Cybersecurity Engineering Coursework

Cybersecurity engineering programs usually require a foundation of necessary education coursework in areas like math, science, English, and history, as well as core courses relevant to the field. Additional electives allow students to customize their training to best suit their interests and goals. Examples of actual undergraduate cybersecurity engineering courses include:

  • Computer security
  • Cryptology
  • Communications networks
  • Security data science
  • Reverse engineering
  • Networking
  • Programming languages
  • Data structures
  • Algorithm design and analysis
  • Hardware design

Graduates who have earned their bachelor’s degrees in cybersecurity engineering are prepared for most entry-level jobs, though some opt to enroll in a graduate program to advance their expertise, prepare for management positions, gain a competitive advantage in the field, obtain research positions, or teach.

Step 3: Earn a Master’s Degree or Graduate Certificate in Cybersecurity (One to Two Years, Optional)

Earnings, career outlook, and advancement potential tend to improve with education. This makes earning a master’s degree in cybersecurity, information security, computer programming, IT management, and other related fields a valuable if voluntary, endeavor.

While some employers prefer candidates with graduate degrees in IT and cybersecurity, others prefer candidates with a master of business administration (MBA) with a specialization in information systems.

Generally speaking, master’s degrees require two additional years of full-time study, but some schools offer special evening and weekend programs for students who want to continue working in the workforce. These part-time programs generally take three to five years to complete, depending on the program and each student’s course load.

Common Admissions Requirements

Every graduate-level cybersecurity program sets its own admissions criteria, so it is important to carefully research requirements before applying. However, there are many commonalities between each university’s admission requirements. The following criteria for the master’s program in cybersecurity operations and leadership at the University of San Diego are representative of the conditions applicants will find at most schools.

  • A bachelor’s degree from a regionally accredited institution
  • An undergraduate GPA of at least 2.75 (candidates with GPAs lower than 2.75 are encouraged to submit GRE, GMAT, LSAT, or other relevant test scores)
  • A statement of purpose
  • A resume or CV showing relevant IT experience
  • A letter of support from an employer or two letters of reference

Some graduate schools have additional or slightly different course prerequisites, so it is essential that applicants properly research the programs they are interested in before applying.

Cybersecurity Graduate Degree Specializations

Some colleges and universities offer concentrations that allow students to specialize in their master’s degrees. Examples of specialty tracks within graduate-level cybersecurity include analysis, cyber terrorism, SCADA cybersecurity, networks, systems, IT auditing, and cyber forensics.

Graduate Cybersecurity Engineering Coursework

The curriculum for a master’s degree in cybersecurity can vary from one program to the next, but, as with bachelor’s degrees, they tend to have similar core coursework. Graduate schools do not typically need to complete basic education classes as long as they have met the program’s prerequisites. Below is a sampling of courses from Johns Hopkins University’s cybersecurity program:

  • Foundations of informational assurance
  • Cryptology
  • Foundations of algorithms
  • Intrusion detection
  • Reverse engineering and vulnerability analysis
  • Principles of data communications networks
  • Computer network architectures and protocols
  • Web security
  • Foundations of engineering
  • Cryptography and coding
  • Java security
  • Authentication technologies

Graduate Certificates in Cybersecurity

An alternative to a master’s degree is a graduate certificate. Graduate certificates are ideal for students who want to advance their cybersecurity savvy without committing to a two-year program or those who wish to specialize in a particular discipline, such as computer engineering and programming.

Certificate requirements range in scope and duration. Students enrolled in Harvard University’s cybersecurity graduate certificate, for example, must complete four courses—two core courses and two electives. As always, prospective students should review admissions and graduation requirements carefully.

Step 4: Earn Professional Certifications (Timeline Varies, Optional)

Professional certifications are another way cybersecurity professionals can enhance their knowledge and expertise. Industry vendors or professional organizations typically offer certifications. Most require professionals to pass a test, though candidates should be mindful of pre-exam requirements, such as junior certifications, specific degrees, or a minimum number of years of professional experience.

Here are a few in-demand professional certifications and the organizations that sponsor them, as reported by O*NET:

Global Information Assurance Certification (GIAC) Credentials

Certified Enterprise Defender – This certification ensures that holders have validated abilities and knowledge in packet analysis, defensive network infrastructure, incident handling, malware removal, and penetration testing. Candidates must pass a three-hour, 115-question exam with a minimum passing score of 70 percent. This certification exam will cost $949.

To remain competitive and current in the cybersecurity workforce, GIAC recommends renewing the credential by collecting 36 CPEs over four years to keep this certification active.

GIAC Certified Forensics Analyst – This certification focuses on core skills that are required for collecting and analyzing data computer systems. Areas covered in this certification include threat hunting, digital forensics, advanced incident response, memory forensics, anti-forensics detection, timeline analysis, APT intrusion incident response.

Candidates must pass a three-hour, 82- to 115-question exam with a minimum passing score of 72 percent. This certification exam will cost $949. Renewal requires collecting 36 CPEs over four years.

GIAC Web Application Penetration Tester – Holders of this certification have a thorough understanding of web application security issues and can better secure organizations through penetration testing. Candidates must pass a two- to three-hour, 82- to 115-question exam with a minimum passing score of 71 percent. This certification exam will cost $949. Renewal requires collecting 36 CPEs over four years.

GIAC Certified Intrusion Analyst – This certification validates that holders understand traffic analysis, intrusion detection, and network and host monitoring. They have the skills required for configuring and monitoring intrusion detection systems and for reading, interpreting, and analyzing network traffic and related log files.

Candidates must pass a four-hour, 106-question exam with a minimum passing score of 68 percent. This certification exam will cost $949. Renewal requires collecting 36 CPEs over four years.

American Health Information Management Association (AHIMA) Certification

Certified in Healthcare Privacy and Security – Professionals who have earned this designation will have the expertise to design, implement, and administer privacy and security protection programs in healthcare organizations. To be eligible for this certification, candidates must have one of the following:

  • High school diploma or GED with six years of experience in healthcare privacy or security management
  • Associate degree with four years of experience
  • A credential in either CCA or CCS or CCS-P or RHIT with four years of experience
  • Baccalaureate degree with two years of experience
  • Credential in RHIA with two years of experience
  • Master’s degree or higher with one

Candidates must pass this 3.5-hour, 104- to 160-question exam with a minimum passing score of 300. Members pay $259 and non-members pay $329 for this examination. Recertification requires professionals to earn 30 CEUs during a two-year certification cycle.

International Information Systems Security Certification Consortium (ISC)² Certification

Certified Secure Software Lifecycle Professional – This certification shows peers and employers that holders have the advanced technical knowledge and skills necessary for the authorization, auditing, and authentication, throughout the software development lifecycle (SDLC) using policies, procedures, and best practices established by the cybersecurity experts at (ISC)².

Candidates must pass a three-hour, 125-question exam with a minimum passing score of 700. This certification exam will cost $564.90. Certification holders will be required to recertify every three years by earning 90 continuing professional education (CPE) credits and paying an Annual Maintenance Fee (AMF) of $125.

Cisco Systems Certifications

Cisco Certified Internetwork Expert Security – The CCIE Security certification proves that holders have skills with complex security solutions. To earn this certification, candidates must pass two exams: a 120-minute qualifying exam covering core security technologies and an eight-hour hands-on lab exam covering security technologies and solutions through the entire network lifecycle, from designing to optimizing.

The implementing and operating cisco security core technologies exam covers topics such as security concepts, network security, securing the cloud, content security, and endpoint protection. Topics in the lab exam include perimeter security and intrusion prevention, infrastructure security, secure connectivity, and advanced threat protection. This certification exam will cost $400. Holders will be required to recertify every three years by earning a minimum of 30 CE credits.

Cisco Certified Network Professional Security – Just like the CCIE certification, this CCNP Security Certification also requires candidates to pass two exams; the only difference being that after completing the core qualifying exam, candidates will complete a security concentration exam of their choice.

Concentration exam options include Implementing and Configuring Cisco Identity Services Engine (SISE); Securing the Web with Cisco Web Security Appliance (SWSA); Securing Email with Cisco Email Security Appliance (SESA); and Implementing Secure Solutions with Virtual Private Networks (SVPN), among others. Details about cost and recertification remain the same.

Information Systems Audit and Control Association (ISACA) Certifications

Certified Information Systems Auditor – This certification proves that holders have expertise in information systems auditing process, information systems operations and business resilience, governance and management of it, protection of information assets, and information systems acquisition, development, and implementation. The exam comprises 150 questions that cover five job practice domains and tests.

The five domains include information systems auditing process; governance and management of it; information systems acquisition, development, and implementation; information systems operations and business resilience; and protection of information assets. ISACA members pay $575, while ISACA non-members $760 for this certification.

To maintain certification, candidates must earn and report a minimum of 120 CPE hours for a three-year reporting cycle period and pay the CISA annual maintenance fee; which is $45 for members and $85 for non-members.

It should be noted that while professional certifications tend to be voluntary, they indicate the level of expertise and an ongoing commitment that many employers value.

Step 5: Earn a Professional Engineer (PE) Licensure (Timeline Varies, Optional)

Finally, some cybersecurity professionals earn their Professional Engineer (PE) license from the National Council of Examiners for Engineering and Surveying.

The main benefit of having a PE license is how it qualifies recipients for some types of publicly-funded projects. These credentials require at least four years of post-bachelor degree work experience and the passing of a comprehensive examination.

The two types of PE licenses most relevant to cybersecurity:

Both are 9.5-hour, 85-question exams and cost $375 each.

Accredited Online Degree Programs in Cybersecurity

Arizona State University

Arizona State University offers an online master of computer science with a concentration in cybersecurity. The program provides students with the skills and knowledge that help them undertake computer security, data security, cryptography, and computer forensics. It is ideal for graduate-level students who wish to take up education in cybersecurity, focusing on algorithms and computer systems.

Admission requirements include a four-year undergraduate degree with a minimum cumulative grade point average of 3.0, two semesters of advanced math in calculus I and II, a background course in discrete math, official transcripts, and English proficiency for students who have their degree from a country outside the U.S.

This 30-credit program has nine credits in the cybersecurity concentration. The courses in the concentration include applied cryptography, information assurance and security, software security, and advanced computer network security.

Students learn how to defend and protect information systems and information by ensuring their integrity, availability, authentication, non-repudiation, and confidentiality. Graduates can take up roles as cybersecurity engineers, cybersecurity risk analysts, software development engineers, security engineers, and security analysts.

  • Location: Tempe, Arizona
  • Accreditation: Higher Learning Commission of the North Central Association of Colleges and Schools
  • Expected Time to Completion: 18 to 36 months
  • Estimated Tuition: $15,000 for the program

George Washington University

George Washington University offers an online master of engineering (MEng) in cybersecurity policy and compliance program. Designed for students who are working professionals, this fully online program teaches students security best practices. The program is taught by experienced faculty members who have received their doctoral degrees from the nation’s top engineering and computer science programs, providing students with a high-level understanding of cybersecurity.

Admission requirements for the program include a bachelor’s degree from an accredited institution, minimum grade point average of 2.7, work experience in an IT field for students who do not hold a degree in a technical discipline, completed application, official transcripts, statement of purpose, letters of recommendation, a current resume, while GRE or GMAT scores are recommended.

Requiring 30 credits of graduate-level coursework, this program includes courses such as cybersecurity and privacy, information policy, management of information and systems security, security in mobile computing, information security in government, secure cloud computing, and cybersecurity risk management and compliance.

Students become experts at analyzing cyber incidents, forecasting cyber attacks, formulating long-term strategies, designing solutions, and managing threats through this program.

On successfully completing the program, students can take up jobs at nonprofit, private, and government organizations. They can take roles as computer forensic investigators, computer security specialists, computer network defense engineers, cybersecurity managers, information security analysts, cybercrime technology directors, etc.

  • Location: Newport Beach, CA
  • Accreditation: Middle States Association of Colleges and Schools
  • Expected Time to Completion: 24 to 30 months
  • Estimated Tuition: $1,195 per credit

Related Articles

Cybersecurity Engineering Certifications (Cyber)

Traditional forms of education are still important, but they can’t keep up with the rapid pace of cybersecurity. As soon as one form of threat is neutralized, innumerable others are developed. That’s why employers and employees are both increasingly turning to the more nimble world of professional certifications.

Online IT Management Programs

Information technology management, or IT management refers to the way organizations organize their technology systems: software, networks, and hardware. An IT environment comprises several components such as computers, routers, servers, microservices, mobile technologies, and applications. An information technology infrastructure can be in the cloud, on-premises, or on a hybrid platform, integrating both.

Online Master's Degrees in Cybersecurity

Because of this ongoing and ever-growing need for cybersecurity solutions, this industry is growing rapidly. Most bigger companies now employ in-house cybersecurity professionals to properly secure networks, data, and processes. While this work was once often done by self-taught experts who often had a history of hacking, it is now often performed by people who attended universities and programs with the express intent of becoming industry professionals.