Program Details
Cybersecurity (Minor)
MinorRandolph-Macon College
Cybersecurity is a computing-based discipline that involves the creation, operation, analysis, and testing of secure systems, networks, and applications to protect against a variety of digital threats. The cybersecurity curriculum is based on national standards and builds on a computer science foundation. The curriculum emphasizes four main areas of cybersecurity: information security, software security, network security, and system security. Mindful of the rapid changes in technology, the curriculum seeks to prepare students for lifelong learning to enable them to meet future challenges. A student expecting to major in cybersecurity should complete CSCI 111 and CSCI 112 in the first year.
Capstone experiences offered by the Department of Computer Science include CSCI 401, CSCI 403, and CSCI 485, all of which are available to majors in cybersecurity.
Program Overview & Guidance

Program Guidance Element | What You Need to Know |
---|---|
Considerations for Selecting Degree | Please note: Students enrolled at Randolph-Macon College attend classes primarily Monday-Friday between 8 am - 5 pm with very few evening courses. The large majority of RMC coursework is offered in-person and on campus. A very limited selection of online courses is offered in summer sessions. No more than one half of the courses on a major or minor can be transferred; at least one-half of the semester hours of the major or minor must be taken at Randolph-Macon. |
Considerations When Selecting Courses |
|
Program Requirements Beyond Specific Courses | |
Doing More With Your Degree | |
Program Successes & Highlights |
Program Credit Requirements

If you wish to see how your credits may apply, you can:
- Contact the institution where a staff member can help you map your credits to the requirements for this program.
- View the program requirements listed in the institution's catalog.
Applicable Admissions Agreements

The table below lists admissions agreements between Randolph-Macon College and partner institutions that may guarantee admission to this program if you meet the required criteria. Click on the title name of the agreement to view a summary of those criteria.
You can view the full text of these Agreements in the Resource Center
What If I Have An Associate Degree Or Credit For Prior Learning?

Transfer Guidance Element | What You Need to Know |
---|---|
Associate Transfer Degree Completion | Students admitted under our guaranteed admissions agreement are guaranteed completion of most general education requirements. Students may need to complete additional foreign language coursework to complete the Effective Communication requirements and must complete the college's Cross-Area Requirements, most of which can be fulfilled through major programs and should not significantly increase the time to completion of degree.
|
Completion of Associate Degree Concurrent with High School |
Credit for Prior Learning | We accept AP (4 or 5 on the exam) and IB (5, 6, or 7 on higher level exams). |
Did You Know That... |
|
College Level Information

College Fit Guidance | What You Need to Know |
---|---|
Is This College Right For Me? | At Randolph-Macon, we recognize the breadth of knowledge and experience you bring as a transfer student. Our personalized, hands-on approach to learning lets you build on that foundation, honing the skills you'll need to excel. No matter what your future goals, we'll set you on a path to success that’s uniquely yours. |
Transfer Student Catalog Year | Catalog year determined by first semester of attendance at RMC. |
First Year Student Catalog Year | Catalog year determined by first semester of attendance |
Applying for Guaranteed Admissions | GAA students must complete the RMC transfer application and submit all required materials by June 1 (for fall term) or December 1 (for spring term). GAA students will submit an Intent to Transfer form through their current community college contact to RMC. |
Where Can This Degree Transfer

Institution | Title | Degree | Award Name | Award Level | Delivery Mode |
---|---|---|---|---|---|
Germanna Community College | Associate of Applied Science Degree in Information Systems Tech | Associate | Associate of Applied Science | 2-Year | In-Person, Hybrid, Online |
Germanna Community College | Associate of Applied Science Degree in Cybersecurity | Associate | Associate of Applied Science | 2-Year | In-Person, Hybrid, Online |
Laurel Ridge Community College | Associate of Applied Science Degree in Information Systems Technology | Associate | Associate of Applied Science | 2-Year | Hybrid |
Laurel Ridge Community College | Associate of Applied Science Degree in Cybersecurity | Associate | Associate of Applied Science | 2-Year | Hybrid |
Northern Virginia Community College | Cybersecurity, A.A.S. | Associate | Associate of Applied Science | 2-Year | In-Person, Online |
Tidewater Community College | Associate of Applied Science - Cyber Security | Associate | Associate of Applied Science | 2-Year | In-Person |
Wytheville Community College | Associate of Applied Science Degree in Information Systems Technology | Associate | Associate of Applied Science | 2-Year | In-Person, Online, Hybrid |
Radford University | BS in Cybersecurity | Bachelor | Bachelor of Science | 4-Year | In-Person |
The University of Virginia's College at Wise | Bachelor of Science in Computer Science, Major in Computer Science | Bachelor | Bachelor of Science | 4-Year | In-Person |
Old Dominion University | Cybersecurity-BS | Bachelor | Bachelor of Science | 4-Year | In-Person, Online |
Old Dominion University | Cyber Operations-BS | Bachelor | Bachelor of Science | 4-Year | In-Person |
Marymount University | Cybersecurity (BS) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Bridgewater College | Computer Science Major - BS (Cybersecurity Track) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Bridgewater College | Computer Science Major - BS (Full-Stack Software Development Track) | Bachelor | Bachelor of Science | 4-Year | In-Person |
Shenandoah University | Bachelor of Science in Cybersecurity | Bachelor | Bachelor of Science | 4-Year | In-Person |
Bluefield University | BS in Cybersecurity | Bachelor | Bachelor of Science | 4-Year | Online, Hybrid |
Careers Where This Degree Applies

O*Net Code | Name | Description | Parent |
---|---|---|---|
15-1241.00 | Computer Network Architects | Design and implement computer and information networks, such as local area networks (LAN), wide area networks (WAN), intranets, extranets, and other data communications networks. Perform network modeling, analysis, and planning, including analysis of capacity needs for network infrastructures. May also design network and computer security measures. May research and recommend network and data communications hardware and software. | Computer and Mathematical Occupations |
15-1231.00 | Computer Network Support Specialists | Analyze, test, troubleshoot, and evaluate existing network systems, such as local area networks (LAN), wide area networks (WAN), cloud networks, servers, and other data communications networks. Perform network maintenance to ensure networks operate correctly with minimal interruption. | Computer and Mathematical Occupations |
11-3021.00 | Computer and Information Systems Managers | Plan, direct, or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming. | Management Occupations |
15-1243.01 | Data Warehousing Specialists | Design, model, or implement corporate data warehousing activities. Program and configure warehouses of database information and provide support to warehouse users. | Computer and Mathematical Occupations |
15-1242.00 | Database Administrators | Administer, test, and implement computer databases, applying knowledge of database management systems. Coordinate changes to computer databases. Identify, investigate, and resolve database performance issues, database capacity, and database scalability. May plan, coordinate, and implement security measures to safeguard computer databases. | Computer and Mathematical Occupations |
15-1243.00 | Database Architects | Design strategies for enterprise databases, data warehouse systems, and multidimensional networks. Set standards for database operations, programming, query processes, and security. Model, design, and construct large relational databases or data warehouses. Create and optimize data models for warehouse infrastructure and workflow. Integrate new systems with existing warehouse structure and refine system performance and functionality. | Computer and Mathematical Occupations |
15-1212.00 | Information Security Analysts | Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. | Computer and Mathematical Occupations |
15-1244.00 | Network and Computer Systems Administrators | Install, configure, and maintain an organization's local area network (LAN), wide area network (WAN), data communications network, operating systems, and physical and virtual servers. Perform system monitoring and verify the integrity and availability of hardware, network, and server resources and systems. Review system and application logs and verify completion of scheduled jobs, including system backups. Analyze network and server resource consumption and control user access. Install and upgrade software and maintain software licenses. May assist in network modeling, analysis, planning, and coordination between network and data communications hardware and software. | Computer and Mathematical Occupations |
15-1241.01 | Telecommunications Engineering Specialists | Design or configure wired, wireless, and satellite communications systems for voice, video, and data services. Supervise installation, service, and maintenance. | Computer and Mathematical Occupations |
Cost To Complete
