Program Details
Cybersecurity (BS)
Bachelor of ScienceRandolph-Macon College
Cybersecurity is a computing-based discipline that involves the creation, operation, analysis, and testing of secure systems, networks, and applications to protect against a variety of digital threats. The cybersecurity curriculum is based on national standards and builds on a computer science foundation. The curriculum emphasizes four main areas of cybersecurity: information security, software security, network security, and system security. Mindful of the rapid changes in technology, the curriculum seeks to prepare students for lifelong learning to enable them to meet future challenges. A student expecting to major in cybersecurity should complete CSCI 111 and CSCI 112 in the first year.
Capstone experiences offered by the Department of Computer Science include CSCI 401, CSCI 403, and CSCI 485, all of which are available to majors in cybersecurity.
Program Overview & Guidance

Program Guidance Element | What You Need to Know |
---|---|
Considerations for Selecting Degree | Cybersecurity is a computing-based discipline that involves the creation, operation, analysis, and testing of secure systems, networks, and applications to protect against a variety of digital threats. The cybersecurity curriculum at R-MC provides an in-depth study of four main areas within the discipline: data security, network security, computer security, and security policy. This structure will provide students with a solid foundation that will enable them to immediately begin a career in a Cybersecurity related field or to further their studies in discipline specializations through graduate level programs. Student chapter of The Associating of Computing Machinery (The ACM), which is the professional and educational society of the computer science discipline. E-Sports We also have a large number of athletes, especially on the football, baseball, basketball (both men’s and women’s teams), and swimming (both men’s and women’s teams). Please note: Students enrolled at Randolph-Macon College attend classes primarily Monday-Friday between 8 am - 5 pm with very few evening courses. The large majority of RMC coursework is offered in-person and on campus. A very limited selection of online courses is offered in summer sessions. No more than one half of the courses on a major or minor can be transferred; at least one-half of the semester hours of the major or minor must be taken at Randolph-Macon. |
Considerations When Selecting Courses |
Common double majors: Computer Science Business Accounting Cybersecurity Suggested double majors (in addition to those above): Criminology Communication Studies Common minors: Computer Science Accounting Ethics History Communication Studies Suggested minors (in addition to those above): Asian Studies Writing English Criminology Political Science Economics Psychology
|
Program Requirements Beyond Specific Courses | A major component of the cybersecurity major at R-MC is a focus on effective communication. Effective communication is a cornerstone of the discipline and a necessity for most job opportunities related to cybersecurity. Throughout the program, students are required to complete multiple writing assignments and make multiple classroom presentations on various topics related to the discipline. These assignments provide students multiple opportunities to improve and build their experience in communicating effectively and opportunities to work with individually faculty members to improve in this area as they progress through the program. Students at R-MC are required to complete a capstone experience in their senior year. For the cybersecurity major, students must complete a project that applies knowledge obtained from the required content of the major to a real-world problem of their choosing. Our students have the opportuntiy to expand on their work with a problem from an earlier course that is of interest to them or they can explore new areas beyond the courses and topics covered by the major itself. The latter provides a wide range of possibilities and an opportunity not found at most other institutions. |
Doing More With Your Degree | While in the program, students have opportunities to conduct research in collaboration with a faculty member. Some examples of previous studies are: Evaluating the Security of Smart Home Internet of Things Ethan Olmsted (primary investigator) and Dr. Rance Necaise (research advisor) SURF Project – Summer 2022 The goal of this research was to determine whether security related smart home devices could withstand a cyber attack such as a denial-of-service (DOS) attack. If not, it could be possible for criminals to gain access to the premises in the event the security system is interrupted or taken offline. To test the devices, we designed and configured a simple replica of a home security system using a variety of smart home devices connected to a private network like those found in residential areas. Multiple simulated network attacks were performed on the devices, both individually and as a group. We found that all of the items were susceptible to network attacks to varying degrees. Some devices were not responsive during the actual attack, while others lost their network connection completely and shutdown. Graduates from our program are employed with companies such as: Booz Allen Hamilton Sentera Hospital Systems National Reconnaissance Office |
Program Successes & Highlights | The computer science department has state of the art laboratory facilities available for a wide variety of courses and for student and faculty research. The department uses both Windows and Linux systems and has a wide variety of software available for both. Most of the computer science and cybersecurity courses, beyond the introductory sequence, rely on the use of Linux systems, which is a resource typically found only at larger research universities. All of our computer labs are accessible to students 24/7 when the college is in session. The department has a state of the art security laboratory that houses a collection of network hardware and computer systems for use in the network and computer security courses. This lab is used by students to test, evaluate, and observe a wide variety of network and system attacks on physical hardware and computer systems. This is a unique feature to the R-MC program that is typically only found at larger research universities. Most cybersecurity programs rely on virtual computers and networks for teaching the security courses, but that setup can not convey the same real-world experience as using actual computers and networks. |
Program Credit Requirements

The table below provides the requirements to complete this program if you are not following a Transfer Guide. If you have an account and have created a Portfolio, the table includes the "Applied Credits" column. This column shows how the credits you earned based on the experiences you entered may be applied to satisfy these requirements. You can find schools where you can take courses that will transfer and apply to this degree using the Where Can I Find An Equivalent Course feature in the Transfer Tools menu.
A formal determination of credits awarded for your prior learning and their applicability to the degree requirements can only be made by the institution. The formal determination and resulting map may reflect higher or lower number of credits to be completed to achieve this program.
Applicable Admissions Agreements

The table below lists admissions agreements between Randolph-Macon College and partner institutions that may guarantee admission to this program if you meet the required criteria. Click on the title name of the agreement to view a summary of those criteria.
You can view the full text of these Agreements in the Resource Center
What If I Have An Associate Degree Or Credit For Prior Learning?

Transfer Guidance Element | What You Need to Know |
---|---|
Associate Transfer Degree Completion | Students admitted under our guaranteed admissions agreement are guaranteed completion of most general education requirements. Students may need to complete additional foreign language coursework to complete the Effective Communication requirements and must complete the college's Cross-Area Requirements, most of which can be fulfilled through major programs and should not significantly increase the time to completion of degree.
|
Completion of Associate Degree Concurrent with High School |
Credit for Prior Learning | We accept AP (4 or 5 on the exam) and IB (5, 6, or 7 on higher level exams). |
Did You Know That... |
|
College Level Information

College Fit Guidance | What You Need to Know |
---|---|
Is This College Right For Me? | At Randolph-Macon, we recognize the breadth of knowledge and experience you bring as a transfer student. Our personalized, hands-on approach to learning lets you build on that foundation, honing the skills you'll need to excel. No matter what your future goals, we'll set you on a path to success that’s uniquely yours. |
Transfer Student Catalog Year | Catalog year determined by first semester of attendance at RMC. |
First Year Student Catalog Year | Catalog year determined by first semester of attendance |
Applying for Guaranteed Admissions | GAA students must complete the RMC transfer application and submit all required materials by June 1 (for fall term) or December 1 (for spring term). GAA students will submit an Intent to Transfer form through their current community college contact to RMC. |
Where Can This Degree Transfer

Institution | Title | Degree | Award Name | Award Level | Delivery Mode |
---|---|---|---|---|---|
Laurel Ridge Community College | Associate of Applied Science Degree in Information Systems Technology | Associate | Associate of Applied Science | 2-Year | Hybrid |
Wytheville Community College | Associate of Applied Science Degree in Information Systems Technology | Associate | Associate of Applied Science | 2-Year | In-Person, Online, Hybrid |
Southside Virginia Community College | Associate of Applied Science with a major in Information Systems Technology-Networking | Associate | Associate of Applied Science | 2-Year | In-Person, Hybrid, Online |
Tidewater Community College | Associate of Applied Science - Information Systems Technology (Network Administration) | Associate | Associate of Applied Science | 2-Year | In-Person |
Tidewater Community College | Associate of Applied Science - Information Systems Technology (Network Infrastructure Specialist) | Associate | Associate of Applied Science | 2-Year | In-Person |
Germanna Community College | Associate of Applied Science Degree in Information SystemsTech | Associate | Associate of Applied Science | 2-Year | In-Person, Hybrid, Online |
The University of Virginia's College at Wise | Bachelor of Science in Computer Science, Major in Computer Science | Bachelor | Bachelor of Science | 4-Year | In-Person |
Tidewater Community College | Associate of Applied Science - Information Systems Technology (Programming and Mobile Applications Development) | Associate | Associate of Applied Science | 2-Year | In-Person |
Tidewater Community College | Associate of Applied Science - Information Systems Technology (Web Development Specialist) | Associate | Associate of Applied Science | 2-Year | In-Person |
Richard Bland College | Associate of Science-Math/Computer Science | Associate | Associate of Science | 2-Year | In-Person, Hybrid |
Virginia Peninsula Community College | Associate of Applied Science in Information Systems Technology | Associate | Associate of Applied Science | 2-Year | In-Person, Online |
Germanna Community College | Associate of Applied Science Degree in Information Systems Tech | Associate | Associate of Applied Science | 2-Year | In-Person, Hybrid, Online |
Germanna Community College | Associate of Applied Science Degree in Cybersecurity | Associate | Associate of Applied Science | 2-Year | In-Person, Hybrid, Online |
Laurel Ridge Community College | Associate of Applied Science Degree in Cybersecurity | Associate | Associate of Applied Science | 2-Year | Hybrid |
Northern Virginia Community College | Cybersecurity, A.A.S. | Associate | Associate of Applied Science | 2-Year | In-Person, Online |
Tidewater Community College | Associate of Applied Science - Cyber Security | Associate | Associate of Applied Science | 2-Year | In-Person |
Radford University | BS in Cybersecurity | Bachelor | Bachelor of Science | 4-Year | In-Person |
Old Dominion University | Cybersecurity-BS | Bachelor | Bachelor of Science | 4-Year | In-Person, Online |
Old Dominion University | Cyber Operations-BS | Bachelor | Bachelor of Science | 4-Year | In-Person |
Marymount University | Cybersecurity (BS) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Bridgewater College | Computer Science Major - BS (Cybersecurity Track) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Bridgewater College | Computer Science Major - BS (Full-Stack Software Development Track) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Shenandoah University | Bachelor of Science in Cybersecurity | Bachelor | Bachelor of Science | 4-Year | In-Person |
Bluefield University | BS in Cybersecurity | Bachelor | Bachelor of Science | 4-Year | Online, Hybrid |
Careers Where This Degree Applies

O*Net Code | Name | Description | Parent |
---|---|---|---|
15-1231.00 | Computer Network Support Specialists | Analyze, test, troubleshoot, and evaluate existing network systems, such as local area networks (LAN), wide area networks (WAN), cloud networks, servers, and other data communications networks. Perform network maintenance to ensure networks operate correctly with minimal interruption. | Computer and Mathematical Occupations |
11-3021.00 | Computer and Information Systems Managers | Plan, direct, or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming. | Management Occupations |
15-1212.00 | Information Security Analysts | Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. | Computer and Mathematical Occupations |
15-1241.00 | Computer Network Architects | Design and implement computer and information networks, such as local area networks (LAN), wide area networks (WAN), intranets, extranets, and other data communications networks. Perform network modeling, analysis, and planning, including analysis of capacity needs for network infrastructures. May also design network and computer security measures. May research and recommend network and data communications hardware and software. | Computer and Mathematical Occupations |
15-1244.00 | Network and Computer Systems Administrators | Install, configure, and maintain an organization's local area network (LAN), wide area network (WAN), data communications network, operating systems, and physical and virtual servers. Perform system monitoring and verify the integrity and availability of hardware, network, and server resources and systems. Review system and application logs and verify completion of scheduled jobs, including system backups. Analyze network and server resource consumption and control user access. Install and upgrade software and maintain software licenses. May assist in network modeling, analysis, planning, and coordination between network and data communications hardware and software. | Computer and Mathematical Occupations |
15-1241.01 | Telecommunications Engineering Specialists | Design or configure wired, wireless, and satellite communications systems for voice, video, and data services. Supervise installation, service, and maintenance. | Computer and Mathematical Occupations |
15-1232.00 | Computer User Support Specialists | Provide technical assistance to computer users. Answer questions or resolve computer problems for clients in person, via telephone, or electronically. May provide assistance concerning the use of computer hardware and software, including printing, installation, word processing, electronic mail, and operating systems. | Computer and Mathematical Occupations |
15-1255.01 | Video Game Designers | Design core features of video games. Specify innovative game and role-play mechanics, story lines, and character biographies. Create and maintain design documentation. Guide and collaborate with production staff to produce games as designed. | Computer and Mathematical Occupations |
15-1254.00 | Web Developers | Develop and implement websites, web applications, application databases, and interactive web interfaces. Evaluate code to ensure that it is properly structured, meets industry standards, and is compatible with browsers and devices. Optimize website performance, scalability, and server-side code and processes. May develop website infrastructure and integrate websites with other computer applications. | Computer and Mathematical Occupations |
15-1255.00 | Web and Digital Interface Designers | Design digital user interfaces or websites. Develop and test layouts, interfaces, functionality, and navigation menus to ensure compatibility and usability across browsers or devices. May use web framework applications as well as client-side code and processes. May evaluate web design following web and accessibility standards, and may analyze web use metrics and optimize websites for marketability and search engine ranking. May design and test interfaces that facilitate the human-computer interaction and maximize the usability of digital devices, websites, and software with a focus on aesthetics and design. May create graphics used in websites and manage website content and links. | Computer and Mathematical Occupations |
15-1243.01 | Data Warehousing Specialists | Design, model, or implement corporate data warehousing activities. Program and configure warehouses of database information and provide support to warehouse users. | Computer and Mathematical Occupations |
15-1242.00 | Database Administrators | Administer, test, and implement computer databases, applying knowledge of database management systems. Coordinate changes to computer databases. Identify, investigate, and resolve database performance issues, database capacity, and database scalability. May plan, coordinate, and implement security measures to safeguard computer databases. | Computer and Mathematical Occupations |
15-1243.00 | Database Architects | Design strategies for enterprise databases, data warehouse systems, and multidimensional networks. Set standards for database operations, programming, query processes, and security. Model, design, and construct large relational databases or data warehouses. Create and optimize data models for warehouse infrastructure and workflow. Integrate new systems with existing warehouse structure and refine system performance and functionality. | Computer and Mathematical Occupations |
15-1299.07 | Blockchain Engineers | Maintain and support distributed and decentralized blockchain-based networks or block-chain applications such as cryptocurrency exchange, payment processing, document sharing, and digital voting. Design and deploy secure block-chain design patterns and solutions over geographically distributed networks using advanced technologies. May assist with infrastructure setup and testing for application transparency and security. | Computer and Mathematical Occupations |
11-9199.11 | Brownfield Redevelopment Specialists and Site Managers | Plan and direct cleanup and redevelopment of contaminated properties for reuse. Does not include properties sufficiently contaminated to qualify as Superfund sites. | Management Occupations |
11-9199.02 | Compliance Managers | Plan, direct, or coordinate activities of an organization to ensure compliance with ethical or regulatory standards. | Management Occupations |
15-1299.00 | Computer Occupations, All Other | All computer occupations not listed separately. | Computer and Mathematical Occupations |
15-1299.08 | Computer Systems Engineers/Architects | Design and develop solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions. | Computer and Mathematical Occupations |
15-1299.06 | Digital Forensics Analysts | Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations. | Computer and Mathematical Occupations |
15-1299.03 | Document Management Specialists | Implement and administer enterprise-wide document management systems and related procedures that allow organizations to capture, store, retrieve, share, and destroy electronic records and documents. | Computer and Mathematical Occupations |
15-1299.02 | Geographic Information Systems Technologists and Technicians | Assist scientists or related professionals in building, maintaining, modifying, or using geographic information systems (GIS) databases. May also perform some custom application development or provide user support. | Computer and Mathematical Occupations |
15-1299.05 | Information Security Engineers | Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems. | Computer and Mathematical Occupations |
15-1299.09 | Information Technology Project Managers | Plan, initiate, and manage information technology (IT) projects. Lead and guide the work of technical staff. Serve as liaison between business and technical aspects of projects. Plan project stages and assess business implications for each stage. Monitor progress to assure deadlines, standards, and cost targets are met. | Computer and Mathematical Occupations |
11-9199.08 | Loss Prevention Managers | Plan and direct policies, procedures, or systems to prevent the loss of assets. Determine risk exposure or potential liability, and develop risk control measures. | Management Occupations |
11-9199.00 | Managers, All Other | All managers not listed separately. | Management Occupations |
15-1299.04 | Penetration Testers | Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security. | Computer and Mathematical Occupations |
13-1082.00 | Project Management Specialists | Analyze and coordinate the schedule, timeline, procurement, staffing, and budget of a product or service on a per project basis. Lead and guide the work of technical staff. May serve as a point of contact for the client or customer. | Business and Financial Operations Occupations |
11-9199.01 | Regulatory Affairs Managers | Plan, direct, or coordinate production activities of an organization to ensure compliance with regulations and standard operating procedures. | Management Occupations |
15-1299.01 | Web Administrators | Manage web environment design, deployment, development and maintenance activities. Perform testing and quality assurance of web sites and web applications. | Computer and Mathematical Occupations |
11-9199.10 | Wind Energy Development Managers | Lead or manage the development and evaluation of potential wind energy business opportunities, including environmental studies, permitting, and proposals. May also manage construction of projects. | Management Occupations |
11-9199.09 | Wind Energy Operations Managers | Manage wind field operations, including personnel, maintenance activities, financial activities, and planning. | Management Occupations |
Cost To Complete
