Graduates of the cybersecurity bachelor’s program are employed as information security analysts whose responsibility it is to evaluate the vulnerability of an organization’s networks and systems, then develop solutions to address security risks. Security analyst positions are found in virtually every major organization whether it be business, industry or government. This position is becoming increasingly important because of the increase in cyberattacks.
Indiana Tech’s cybersecurity program is distinguished by providing a blend of the technical aspects of information security with a fundamental understanding of criminal investigation. This combination provides graduates with effective tools to not only protect an organization’s data, but to work with or be employed by law enforcement and intelligence agencies.
As the methods that criminals use become more and more sophisticated, Indiana Tech’s cybersecurity program ensures that our graduates will have the technical depth to keep ahead of them.
While earning your degree in cybersecurity, you’ll learn how to:
- Use sophisticated software applications and advanced electronic circuitry in a forensics laboratory.
- Evaluate vulnerability risk and determine the appropriate controls needed to protect an organization’s information and business continuity.
- Perform a comprehensive technical analysis and interpret computer-related evidence such as e-mail, accounting software, various databases, and information stored on electronic devices.
- Apply reverse engineering and trace and trap procedures to discover the identity of an individual involved in an electronic crime or malicious activity.
- Conduct a field investigation and search a crime scene with proper legal techniques.
- Profile and predict the behavior of suspects based on an analysis of the offense and the manner in which it was committed.
- Communicate effectively with law enforcement, legal, and technical personnel, both verbally and in writing.
- Assist prosecutors or defense attorneys with the preparation of a criminal case.
- Design and write security policies for an environment presented in a case study.