Program Details
BS in Cybersecurity
Bachelor of ScienceBluefield University
Chart your own path as a cybersecurity professional with a Bluefield University B.S. in Cybersecurity degree. You can seize your dream of helping to protect private information for individuals and companies. From learning the basics of information security to advanced skills like tracking down hackers, you will gain the skills necessary to enter the wideopen field of cybersecurity. In Bluefield’s cybersecurity program, students learn how to integrate a Christian perspective into their work in protecting personal data. Your coursework builds skills in programming logic, network switching and routing, server administration, and network forensics. Along with fundamental technical skills, you will learn how to think critically about data and how to protect information from hackers who are trying to take advantage of individuals and businesses. Throughout your coursework, there is a focus on ethical decision making, and the program culminates in an internship where you practice the cybersecurity skills you have learned in your courses.
Program Overview & Guidance

Program Guidance Element | What You Need to Know |
---|---|
Considerations for Selecting Degree | This program builds skills in programming logic, network switching and routing, server admin, and network forensics. |
Considerations When Selecting Courses |
|
Program Requirements Beyond Specific Courses | |
Doing More With Your Degree | In addition to the program, you can double major, or earn a minor along with this program. |
Program Successes & Highlights | Led by excellent faculty, this program graduates successful individuals every year. |
Program Credit Requirements

The table below provides the requirements to complete this program if you are not following a Transfer Guide. If you have an account and have created a Portfolio, the table includes the "Applied Credits" column. This column shows how the credits you earned based on the experiences you entered may be applied to satisfy these requirements. You can find schools where you can take courses that will transfer and apply to this degree using the Where Can I Find An Equivalent Course feature in the Transfer Tools menu.
A formal determination of credits awarded for your prior learning and their applicability to the degree requirements can only be made by the institution. The formal determination and resulting map may reflect higher or lower number of credits to be completed to achieve this program.
Applicable Admissions Agreements

The table below lists admissions agreements between Bluefield University and partner institutions that may guarantee admission to this program if you meet the required criteria. Click on the title name of the agreement to view a summary of those criteria.
You can view the full text of these Agreements in the Resource Center
What If I Have An Associate Degree Or Credit For Prior Learning?

Transfer Guidance Element | What You Need to Know |
---|---|
Associate Transfer Degree Completion | Completion of Associate Degree Concurrent with High School |
Credit for Prior Learning | We accept AP, IB, CLEP, and DSST results for college credit if the score earned meets college expectations. If you have industry or military experience, please reach out to us to discuss these prior learning experiences. |
Did You Know That... |
|
College Level Information

College Fit Guidance | What You Need to Know |
---|---|
Is This College Right For Me? | We are a small Christ-centered university in a small town setting. Our students attend classes on Monday-Friday between 8-5. We offer atheletic and culutural events on campus for students that help roundout the student experience. |
Transfer Student Catalog Year | Catalog year determined by first semester of attendance |
First Year Student Catalog Year | Catalog year determined by first semester of attendance |
Applying for Guaranteed Admissions |
Where Can This Degree Transfer

Institution | Title | Degree | Award Name | Award Level | Delivery Mode |
---|---|---|---|---|---|
Germanna Community College | Associate of Applied Science Degree in Information Systems Tech | Associate | Associate of Applied Science | 2-Year | In-Person, Hybrid, Online |
Germanna Community College | Associate of Applied Science Degree in Cybersecurity | Associate | Associate of Applied Science | 2-Year | In-Person, Hybrid, Online |
Laurel Ridge Community College | Associate of Applied Science Degree in Information Systems Technology | Associate | Associate of Applied Science | 2-Year | Hybrid |
Laurel Ridge Community College | Associate of Applied Science Degree in Cybersecurity | Associate | Associate of Applied Science | 2-Year | Hybrid |
Northern Virginia Community College | Cybersecurity, A.A.S. | Associate | Associate of Applied Science | 2-Year | In-Person, Online |
Tidewater Community College | Associate of Applied Science - Cyber Security | Associate | Associate of Applied Science | 2-Year | In-Person |
Wytheville Community College | Associate of Applied Science Degree in Information Systems Technology | Associate | Associate of Applied Science | 2-Year | In-Person, Online, Hybrid |
Radford University | BS in Cybersecurity | Bachelor | Bachelor of Science | 4-Year | In-Person |
The University of Virginia's College at Wise | Bachelor of Science in Computer Science, Major in Computer Science | Bachelor | Bachelor of Science | 4-Year | In-Person |
Old Dominion University | Cybersecurity-BS | Bachelor | Bachelor of Science | 4-Year | In-Person, Online |
Old Dominion University | Cyber Operations-BS | Bachelor | Bachelor of Science | 4-Year | In-Person |
Marymount University | Cybersecurity (BS) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Bridgewater College | Computer Science Major - BS (Cybersecurity Track) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Bridgewater College | Computer Science Major - BS (Full-Stack Software Development Track) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Shenandoah University | Bachelor of Science in Cybersecurity | Bachelor | Bachelor of Science | 4-Year | In-Person |
Randolph-Macon College | Computer Science (BS) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Randolph-Macon College | Cybersecurity (BS) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Careers Where This Degree Applies

O*Net Code | Name | Description | Parent |
---|---|---|---|
15-1241.00 | Computer Network Architects | Design and implement computer and information networks, such as local area networks (LAN), wide area networks (WAN), intranets, extranets, and other data communications networks. Perform network modeling, analysis, and planning, including analysis of capacity needs for network infrastructures. May also design network and computer security measures. May research and recommend network and data communications hardware and software. | Computer and Mathematical Occupations |
15-1231.00 | Computer Network Support Specialists | Analyze, test, troubleshoot, and evaluate existing network systems, such as local area networks (LAN), wide area networks (WAN), cloud networks, servers, and other data communications networks. Perform network maintenance to ensure networks operate correctly with minimal interruption. | Computer and Mathematical Occupations |
11-3021.00 | Computer and Information Systems Managers | Plan, direct, or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming. | Management Occupations |
15-1243.01 | Data Warehousing Specialists | Design, model, or implement corporate data warehousing activities. Program and configure warehouses of database information and provide support to warehouse users. | Computer and Mathematical Occupations |
15-1242.00 | Database Administrators | Administer, test, and implement computer databases, applying knowledge of database management systems. Coordinate changes to computer databases. Identify, investigate, and resolve database performance issues, database capacity, and database scalability. May plan, coordinate, and implement security measures to safeguard computer databases. | Computer and Mathematical Occupations |
15-1243.00 | Database Architects | Design strategies for enterprise databases, data warehouse systems, and multidimensional networks. Set standards for database operations, programming, query processes, and security. Model, design, and construct large relational databases or data warehouses. Create and optimize data models for warehouse infrastructure and workflow. Integrate new systems with existing warehouse structure and refine system performance and functionality. | Computer and Mathematical Occupations |
15-1212.00 | Information Security Analysts | Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. | Computer and Mathematical Occupations |
15-1244.00 | Network and Computer Systems Administrators | Install, configure, and maintain an organization's local area network (LAN), wide area network (WAN), data communications network, operating systems, and physical and virtual servers. Perform system monitoring and verify the integrity and availability of hardware, network, and server resources and systems. Review system and application logs and verify completion of scheduled jobs, including system backups. Analyze network and server resource consumption and control user access. Install and upgrade software and maintain software licenses. May assist in network modeling, analysis, planning, and coordination between network and data communications hardware and software. | Computer and Mathematical Occupations |
15-1241.01 | Telecommunications Engineering Specialists | Design or configure wired, wireless, and satellite communications systems for voice, video, and data services. Supervise installation, service, and maintenance. | Computer and Mathematical Occupations |
Cost To Complete
