A 2024 study by the International Information System Security Certification Consortium (ISC2) found that the number of cybersecurity jobs worldwide - 5.8 million - stayed the same, while the shortage of workers - 4.8 million - grew by 19%, dwarfing other job markets. The field is projected to keep growing because malicious actors are always evolving their tactics and procedures. 


Taught by industry professionals, ¶¶ÒõÃâ·Ñ’s cybersecurity major focuses on current and future threats affecting individuals, networks and infrastructures. Coursework is specifically designed to prepare students for employment in the private and government sectors. Students interested in cybersecurity might also consider the data science and computer science majors.


A degree is needed but certifications are essential. At ¶¶ÒõÃâ·Ñ, students in the cybersecurity program learn skills that are sought after in the field and ready to sit for industry certification exams that showcase mastery and proficiency in cybersecurity and related fields. By the time students graduate, they will be prepared for up to six industry certifications:

 

Berks Cyber Alliance

¶¶ÒõÃâ·Ñ created the Berks Cyber Alliance, a consortium of industry professionals meeting quarterly to discuss current threats and trends. Students in ¶¶ÒõÃâ·Ñ's cybersecurity program are able to participate in meetings, which gives them the ability to network with professionals within the cybersecurity field. Speakers include professionals from FBI, CIA, Secret Service and private industry. Attendees include CIOs, CISOs and other technology experts from Berks County.

 

Research

¶¶ÒõÃâ·Ñ strives to provide the highest level of research opportunities. Examples include AI crimes research and creating a mobile hacking station from a robot dog. We work with multiple governmental and private entities to come up with the most interesting and relevant research.

In This Section
Cybersecurity
Online Learners
Program Overview

 

Career Outlook


Cybersecurity majors develop the expertise necessary for careers in various sectors, including Fortune 500 companies, government agencies, banks, non-profits, and local, regional, and national organizations. Graduates may pursue roles such as:

   â€¢ Information Security Analyst
   â€¢ Cybersecurity Analyst
   â€¢ Digital Forensics Specialist
   â€¢ Network and Computer Systems Administrator
   â€¢ IT Specialist
   â€¢ Security Consultant
   â€¢ Incident Responder
   â€¢ Security Software Developer
   â€¢ Security Policy Analyst
   â€¢ Penetration Tester
   â€¢ Security Operations Center (SOC) Analyst
   â€¢ Cryptographer


According to the U.S. Bureau of Labor Statistics, employment as an information security analyst is projected to grow 32 percent and the median salary is $112,000. 
 

Experiential Learning Opportunities


Berks Cyber Alliance

¶¶ÒõÃâ·Ñ created the Berks Cyber Alliance, a consortium of industry professionals meeting quarterly to discuss current threats and trends. Students in ¶¶ÒõÃâ·Ñ's cybersecurity program are able to participate in meetings, which gives them the ability to network with professionals within the cybersecurity field. Speakers include professionals from FBI, CIA, Secret Service and private industry. Attendees include CIOs, CISOs and other technology experts from Berks County.

 

Research

¶¶ÒõÃâ·Ñ strives to provide the highest level of research opportunities. Examples include AI crimes research and creating a mobile hacking station from a robot dog. We work with multiple governmental and private entities to come up with the most interesting and relevant research.
 

General Notes


A minimum of 123 credits are required for graduation.

  • Credits earned for COM 100 and MAT 100 do not count toward the 123 credits required for graduation; however, COM 100 students may petition for elective credit.
  • Where appropriate, courses required for the major can be used to satisfy General Education requirements. However, the credits earned for these courses are applied to either Gen Ed requirements or the major, not both.
  • Paths of Knowledge coursework may count towards major or minor requirements, but may not fulfill a second Mid-Level Liberal Arts Exploration requirement.
  • Students are expected to follow the catalog requirements for General Education, the major, and additional requirements.
  • A minor or second major within the areas listed under Paths of Knowledge automatically fulfills that area of the Gen Ed requirements.
     
Application Instructions


Through a rolling admission process, prospective undergraduate students — including first-year, transfer, and international students — may apply via the  or . To learn more about how to complete your application, please visit our application page.
 

Financing Your Education


There are options to assist in financing your education and making the tuition affordable. Visit our Student Financial Services page for a detailed overview of the process, including a link to complete the FAFSA application, as well as more information about tuition, the tuition payment plan and the tuition deferment program we offer. ¶¶ÒõÃâ·Ñ’s Title IV code for the FAFSA is 003233. The Office of Student Financial Services is available to help with any questions you may have. Call 610-796-8201 or email sfs@alvernia.edu.
 

Request More Information

 

Loading...

 

Accreditation Statements
  • ¶¶ÒõÃâ·Ñ is an accredited institution and a member of the . MSCHE is an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education Accreditation.
Students in a biology lab at ¶¶ÒõÃâ·Ñ.
College of STEAM
STEAM encompasses the disciplines that drive innovative problem-solving, entrepreneurship, critical thinking and technological growth.