At which campus can I study this program?
Any Penn State Campus
Degree Information At Additional Campuses
The Bachelor of Science in Cybersecurity Analytics and Operations in the College of Information Sciences and Technology (IST) is an interdisciplinary program that prepares students for careers as cybersecurity professionals. It educates students on the essential concepts of cyber-defense and the analytical fundamentals of cybersecurity, with a focus on the analytical and risk management underpinnings and associated cyber-defense techniques and strategies for ensuring the safety of online information stored in large and heterogeneous networks that are embedded within and across the complex socio-technical infrastructures that are pervasive in today's business, government and military organizations. Students will acquire the knowledge and skills needed to critically assess and respond to modern information security threats, using approaches that are grounded in a holistic understanding of adversarial strategies and effective responses. More specifically, it will offer an in-depth and domain-independent approach to the development of skills in cyber defense technologies, tools and processes; cybersecurity analytics and visualization; and cybersecurity risk analysis and management. The major draws from concepts and skills associated with a number of disciplines, including information science, management science, statistics and data science, human behavior, and law/policy. Graduates will be prepared to join the rapidly growing cybersecurity workforce deployed across organizations of diverse sizes and missions.
What is Cybersecurity Analytics and Operations?
Cybersecurity is a field that deals with the protection of computer systems, networks, programs, and data from attacks and unauthorized access. This includes the development of cyber defense tools to protect critical infrastructure as well as the analysis and mitigation of cyber threats.
Cybersecurity is a very broad field. This program focuses students beyond the information technology field and instead focuses on the analysis of cybersecurity data, identification of cyber incidents, understanding the actions of malware, communication of concerns to business stakeholders and the general public. High performing cyber analysts have a strong mathematical and computational background. They often employ computer programming and scripting to solve problems and integrate existing tools. They analyze the data they are presented with from intrusion detection sensors, firewalls, and anti-malware tools.
Cybersecurity professionals apply their skills for organizations to prevent cyber criminals, hacktivists, and persistent nation-state actors. They protect organizations, companies, healthcare institutions, and government agencies from the loss of confidential data. They keep abreast of new developments technically, as well as those in the work domain of the organization and events that occur in the world at large.
You Might Like This Program If...
- You enjoy working with and on computers as well as their operating systems and applications.
- You have an interest in business and organizations and securing
- You want to protect digital information, data stores, and computer networks from threats.
- You want to learn the cyber defense strategies used to anticipate, recognize, and defend against computer attacks.
- You're passionate about how we can keep sensitive information out of the hands of hackers, cybercriminals, and terrorist organizations.
- You enjoy working on a team to solve technical problems for organizations.
- You are interested in computer programming and mathematics.
Entrance to Major
To be eligible for the Cybersecurity Analytics and Operations major, students must:
- Have completed the following entrance-to-major requirements with a grade of C or better in each: CYBER 100S, IST 140, IST 210, IST 220, IST 242, STAT 200
- Have achieved a minimum cumulative grade point average of 2.00 prior to and through the end of the semester during which the entrance to major is requested.
For the B.S. degree in Cybersecurity Analytics and Operations, a minimum of 126 credits is required:
|Requirements for the Major||99|
21 of the 45 credits for General Education are included in the Requirements for the Major. This includes: 6 credits of GQ courses, 6 credits of GS courses, 9 credits of GWS courses.
Connecting career and curiosity, the General Education curriculum provides the opportunity for students to acquire transferable skills necessary to be successful in the future and to thrive while living in interconnected contexts. General Education aids students in developing intellectual curiosity, a strengthened ability to think, and a deeper sense of aesthetic appreciation. These are requirements for all baccalaureate students and are often partially incorporated into the requirements of a program. For additional information, see the General Education Requirements section of the Bulletin and consult your academic adviser.
The keystone symbol appears next to the title of any course that is designated as a General Education course. Program requirements may also satisfy General Education requirements and vary for each program.
Foundations (grade of C or better is required.)
- Quantification (GQ): 6 credits
- Writing and Speaking (GWS): 9 credits
- Arts (GA): 6 credits
- Health and Wellness (GHW): 3 credits
- Humanities (GH): 6 credits
- Social and Behavioral Sciences (GS): 6 credits
- Natural Sciences (GN): 9 credits
Integrative Studies (may also complete a Knowledge Domain requirement)
- Inter-Domain or Approved Linked Courses: 6 credits
University Degree Requirements
First Year Engagement
All students enrolled in a college or the Division of Undergraduate Studies at University Park, and the World Campus are required to take 1 to 3 credits of the First-Year Seminar, as specified by their college First-Year Engagement Plan.
Other Penn State colleges and campuses may require the First-Year Seminar; colleges and campuses that do not require a First-Year Seminar provide students with a first-year engagement experience.
First-year baccalaureate students entering Penn State should consult their academic adviser for these requirements.
6 credits are required and may satisfy other requirements
- United States Cultures: 3 credits
- International Cultures: 3 credits
Writing Across the Curriculum
3 credits required from the college of graduation and likely prescribed as part of major requirements.
Total Minimum Credits
A minimum of 120 degree credits must be earned for a baccalaureate degree. The requirements for some programs may exceed 120 credits. Students should consult with their college or department adviser for information on specific credit requirements.
Quality of Work
Candidates must complete the degree requirements for their major and earn at least a 2.00 grade-point average for all courses completed within their degree program.
Limitations on Source and Time for Credit Acquisition
The college dean or campus chancellor and program faculty may require up to 24 credits of course work in the major to be taken at the location or in the college or program where the degree is earned. Credit used toward degree programs may need to be earned from a particular source or within time constraints (see Senate Policy 83-80). For more information, check the Suggested Academic Plan for your intended program.
Requirements for the Major
To graduate, a student enrolled in the major must earn a grade of C or better in each course designated by the major as a C-required course, as specified by Senate Policy 82-44.
|CAS 100||Effective Speech||3|
|Prescribed Courses: Require a grade of C or better|
|CYBER 100S||Computer Systems Literacy||3|
|CYBER 262||Cyber-Defense Studio||3|
|CYBER 342W||Cyber Incident Handling and Response||3|
|CYBER 362||Cybersecurity Analytics Studio||3|
|CYBER 366||Malware Analytics||3|
|CYBER 440||Cybersecurity Capstone||3|
|IST 140||Introduction to Application Development||3|
|IST 210||Organization of Data||3|
|IST 220||Networking and Telecommunications||3|
|IST 230||Language, Logic, and Discrete Mathematics||3|
|IST 242||Intermediate & Object-Oriented Application Development||3|
|IST 261||Application Development Design Studio I||3|
|IST 432||Legal and Regulatory Environment of Information Science and Technology||3|
|IST 451||Network Security||3|
|IST 454||Computer and Cyber Forensics||3|
|IST 456||Information Security Management||3|
|MATH 110||Techniques of Calculus I||4|
|SRA 111||Introduction to Security and Risk Analysis||3|
|SRA 211||Threat of Terrorism and Crime||3|
|SRA 221||Overview of Information Security||3|
|SRA 231||Decision Theory and Analysis||3|
|SRA 311||Risk Analysis in a Security Context||3|
|SRA 365||Statistics for Security and Risk Analysis||3|
|SRA 472||Integration of Privacy and Security||3|
|STAT 200||Elementary Statistics||4|
|ENGL 15||Rhetoric and Composition||3|
|or ENGL 30||Honors Freshman Composition|
|ENGL 202C||Effective Writing: Technical Writing||3|
|or ENGL 202D||Effective Writing: Business Writing|
|Supporting Courses and Related Areas|
|Select 12 credits from one of the Application Focus course lists in Appendix B; at least 6 credits must be at the 400-level. Students may also complete a custom Application Focus sequence with approval from an academic adviser and a CYBER teaching faculty member.||12|
Cybersecurity blends the technical expertise needed to analyze security issues and create cyberdefense strategies with the interpersonal skills needed to communicate threats to a variety of audiences. The program prepares students to meet the growing need for professionals who can defend against threats to digital information and assets. IST's Office of Career Solutions helps students navigate their internship and career development in the field through coaching, workshops, interview preparation, resume reviews, career fairs, job postings, and networking opportunities.
Because our courses blend technical knowledge with skills in communication and business, a Cybersecurity Analytics and Operations degree allows students to pursue opportunities as cybersecurity analysts, cyberthreat advisers, penetration testers, and a number of other unique careers in fields such as defense, government, and business.