Program Details
Bachelor of Science in Cybersecurity
Bachelor of ScienceShenandoah University
This program provides students with a technical background in computer science and mathematics as well as applied skills in system, information and network security. Students will be prepared to enter technical fields as security analysts or technical specialists or continue on to do graduate programs in cybersecurity or other related fields. Cybersecurity is a fast-growing field and students in this program will learn to use advanced cyber tools to combat cyber attacks and protect computing infrastructure.
Program Overview & Guidance

Program Guidance Element | What You Need to Know |
---|---|
Considerations for Selecting Degree | |
Considerations When Selecting Courses |
|
Program Requirements Beyond Specific Courses | |
Doing More With Your Degree | |
Program Successes & Highlights |
Program Credit Requirements

If you wish to see how your credits may apply, you can:
- Contact the institution where a staff member can help you map your credits to the requirements for this program.
- View the program requirements listed in the institution's catalog.
Applicable Admissions Agreements

The table below lists admissions agreements between Shenandoah University and partner institutions that may guarantee admission to this program if you meet the required criteria. Click on the title name of the agreement to view a summary of those criteria.
You can view the full text of these Agreements in the Resource Center
What If I Have An Associate Degree Or Credit For Prior Learning?

Transfer Guidance Element | What You Need to Know |
---|---|
Associate Transfer Degree Completion | Completion of an Associate of Arts, Associate of Science, or Associate of Arts and Science will guarantee completion of general education requirements. |
Completion of Associate Degree Concurrent with High School | Completion of an Associate of Arts, Associate of Science, or Associate of Arts and Science prior to high school graduation will guarantee completion of general education requirements with the exception that the First Year Seminar (3 credits) must be completed upon enrollment to SU. |
Credit for Prior Learning | |
Did You Know That... |
|
College Level Information

College Fit Guidance | What You Need to Know |
---|---|
Is This College Right For Me? | Shenandoah offers an 11:1 student to faculty ratio, experiential learning opportunities, and integrative technology to prepare graduates for a successful career. |
Transfer Student Catalog Year | Catalog year determined by first semester of attendance |
First Year Student Catalog Year | Catalog year determined by first semester of attendance |
Applying for Guaranteed Admissions | Complete an Associate of Science, Associate of Arts, or Associate or Arts and Science with a cumulative GPA of 2.5 or higher |
Where Can This Degree Transfer

Institution | Title | Degree | Award Name | Award Level | Delivery Mode |
---|---|---|---|---|---|
Germanna Community College | Associate of Applied Science Degree in Information Systems Tech | Associate | Associate of Applied Science | 2-Year | In-Person, Hybrid, Online |
Germanna Community College | Associate of Applied Science Degree in Cybersecurity | Associate | Associate of Applied Science | 2-Year | In-Person, Hybrid, Online |
Laurel Ridge Community College | Associate of Applied Science Degree in Information Systems Technology | Associate | Associate of Applied Science | 2-Year | Hybrid |
Laurel Ridge Community College | Associate of Applied Science Degree in Cybersecurity | Associate | Associate of Applied Science | 2-Year | Hybrid |
Northern Virginia Community College | Cybersecurity, A.A.S. | Associate | Associate of Applied Science | 2-Year | In-Person, Online |
Tidewater Community College | Associate of Applied Science - Cyber Security | Associate | Associate of Applied Science | 2-Year | In-Person |
Wytheville Community College | Associate of Applied Science Degree in Information Systems Technology | Associate | Associate of Applied Science | 2-Year | In-Person, Online, Hybrid |
Radford University | BS in Cybersecurity | Bachelor | Bachelor of Science | 4-Year | In-Person |
The University of Virginia's College at Wise | Bachelor of Science in Computer Science, Major in Computer Science | Bachelor | Bachelor of Science | 4-Year | In-Person |
Old Dominion University | Cybersecurity-BS | Bachelor | Bachelor of Science | 4-Year | In-Person, Online |
Old Dominion University | Cyber Operations-BS | Bachelor | Bachelor of Science | 4-Year | In-Person |
Marymount University | Cybersecurity (BS) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Bridgewater College | Computer Science Major - BS (Cybersecurity Track) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Bridgewater College | Computer Science Major - BS (Full-Stack Software Development Track) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Bluefield University | BS in Cybersecurity | Bachelor | Bachelor of Science | 4-Year | Online, Hybrid |
Randolph-Macon College | Computer Science (BS) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Randolph-Macon College | Cybersecurity (BS) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Careers Where This Degree Applies

O*Net Code | Name | Description | Parent |
---|---|---|---|
15-1241.00 | Computer Network Architects | Design and implement computer and information networks, such as local area networks (LAN), wide area networks (WAN), intranets, extranets, and other data communications networks. Perform network modeling, analysis, and planning, including analysis of capacity needs for network infrastructures. May also design network and computer security measures. May research and recommend network and data communications hardware and software. | Computer and Mathematical Occupations |
15-1231.00 | Computer Network Support Specialists | Analyze, test, troubleshoot, and evaluate existing network systems, such as local area networks (LAN), wide area networks (WAN), cloud networks, servers, and other data communications networks. Perform network maintenance to ensure networks operate correctly with minimal interruption. | Computer and Mathematical Occupations |
11-3021.00 | Computer and Information Systems Managers | Plan, direct, or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming. | Management Occupations |
15-1243.01 | Data Warehousing Specialists | Design, model, or implement corporate data warehousing activities. Program and configure warehouses of database information and provide support to warehouse users. | Computer and Mathematical Occupations |
15-1242.00 | Database Administrators | Administer, test, and implement computer databases, applying knowledge of database management systems. Coordinate changes to computer databases. Identify, investigate, and resolve database performance issues, database capacity, and database scalability. May plan, coordinate, and implement security measures to safeguard computer databases. | Computer and Mathematical Occupations |
15-1243.00 | Database Architects | Design strategies for enterprise databases, data warehouse systems, and multidimensional networks. Set standards for database operations, programming, query processes, and security. Model, design, and construct large relational databases or data warehouses. Create and optimize data models for warehouse infrastructure and workflow. Integrate new systems with existing warehouse structure and refine system performance and functionality. | Computer and Mathematical Occupations |
15-1212.00 | Information Security Analysts | Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. | Computer and Mathematical Occupations |
15-1244.00 | Network and Computer Systems Administrators | Install, configure, and maintain an organization's local area network (LAN), wide area network (WAN), data communications network, operating systems, and physical and virtual servers. Perform system monitoring and verify the integrity and availability of hardware, network, and server resources and systems. Review system and application logs and verify completion of scheduled jobs, including system backups. Analyze network and server resource consumption and control user access. Install and upgrade software and maintain software licenses. May assist in network modeling, analysis, planning, and coordination between network and data communications hardware and software. | Computer and Mathematical Occupations |
15-1241.01 | Telecommunications Engineering Specialists | Design or configure wired, wireless, and satellite communications systems for voice, video, and data services. Supervise installation, service, and maintenance. | Computer and Mathematical Occupations |
Cost To Complete
