Earn your degree online

From private enterprises to government organizations, cybersecurity experts play a vital part in the improvement of system security frameworks and procedures that guarantee the protection of our most vital information. Bluefield College’s cybersecurity program offers students the opportunity to obtain the knowledge and skills needed for a career in this field. The curriculum is based on an expansive foundation of industry-relevant concepts related to computer forensics, vulnerability assessment, security compliance, and software assurance.

Bluefield College’s Cybersecurity program is designed to map to industry standards certifications such as Network+, Linux+, Security+ CEH and others (Cisco/Microsoft), thus equipping students to obtain these globally recognized credentials. With these certifications, internships, academic coursework, and hands-on labs, our students will be well-equipped and prepared to meet the criteria and demands of a competent cybersecurity professional.

Admissions Requirements

  • Students seeking admission to the Bluefield College Online Cybersecurity Program must have a high school diploma or a GED with a GPA of 2.0.
  • Students who have completed college work must have a cumulative GPA of 2.0.
  • Students who have not earned any college credit hours in the required Math or English general education requirements for Bluefield College must take these courses at Bluefield College, unless an SAT/ACT score excludes them.
  • Students applying to the Bluefield College Online Cybersecurity program must submit an online application and official copies of transcripts from every institution attended.

Program Outcomes

Upon graduation from the Bluefield College Cybersecurity program, students will demonstrate the following competencies:

  • Problem-solving and critical learning skills expected as standard within the IT/Cybersecurity industries.
  • Up-to-date technical competency.
  • Skill set to select appropriate technologies and effective countermeasure tools supported by a sound defensive methodology to defend a network.

Core Courses

  • Information Systems Fundamentals
  • Networking Fundamentals
  • Linux Fundamentals
  • Information Security Fundamentals
  • Networking Switching and Routing
  • Scripting Fundamentals
  • Windows Server Installing and Configuring
  • Digital Forensics Fundamentals
  • Introduction to Secure Programming Logic
  • Database Fundamentals
  • Information Technology Internship
  • Windows Server System Administration
  • Linux Server Administration
  • Intrusion Detection/Prevention Systems
  • Network Security
  • Ethical Hacking and System Defense
  • Network Forensics and Incident Response

Career Opportunities

Students who earn a bachelor’s degree in cybersecurity will be prepared for a variety of essential careers including:

  • Cybersecurity response specialist. Cybersecurity specialists work with organizations to keep their computer information systems secure. They determine who requires access to which information, and then plan, coordinate and implement information security programs.
  • Cybersecurity engineer. As a cybersecurity engineer, you will develop, implement, and upgrade security measures geared towards keeping hackers away. Any company or business that manages digital data needs cybersecurity experts to keep the wrong people from accessing delicate information or crashing their web based infrastructure.
  • Cyber threat analyst. Cyber threat analysts are information security professionals who use their skills and background knowledge in areas like network administration or network engineering to help counter the activities of cybercriminals such as hackers and developers of malicious software.
  • Security operations specialist. Security operations specialists conduct incident handling, response plans, and recommend appropriate mitigation activities to minimize down time and restore service.
  • Information analyst. Information analysts help thwart attacks through their expertise and knowledge of databases, networks, hardware, firewalls and encryption. They keep computer systems running smoothly, prevent the theft of financial and personal information, and block hackers from accessing and disclosing proprietary data.
Contact Information

Jeff Teo
Professor, Cybersecurity