Cybersecurity Bachelor's Degree

The world has become a complex synergy of the physical world and the cyber world. Every day, hackers and cyber criminals launch new, more sophisticated computer viruses, malware, and scams that threaten the data our society relies on. In fact, it is estimated that by 2025, cybercrime will cost $10.5 trillion globally, increasing by 15 percent annually. And a recent study found that cybercriminals can potentially penetrate 93 percent of worldwide company networks.

Whatever your occupation, wherever you live, everyone is exposed to cyber-attacks, such as email phishing and cyber fraud. Your career in cybersecurity will make a meaningful impact on the security of individuals, companies and organizations, and our nation.

Choose Your Concentration

Software Security

If you enjoy coding and want to develop secure and trusted software systems, this is the concentration for you. You'll learn to systematically design, develop, deploy, and test trusted software and applications; and you'll find and fix common software and application vulnerabilities, preventing attackers from exploiting them.

System and Network Security

If you prefer hands-on learning and want to secure IT systems and infrastructure, this is the concentration for you. By implementing security processes, technologies, and best practice, you'll learn to manage and secure computer systems, networks, and IT infrastructure, and protect them from unauthorized access, attacks, misuse, or damage. 

Co-Ops and Internships

Cybersecurity students have direct access to highly competitive cooperative education (co-op) and internship opportunities. These work experiences will give you foundational industry experience in many technical and non-technical areas in the field. When you graduate, you'll have the portfolio of skills that today's employers are seeking. Recent Applied Computing students have completed internships and co-ops at the following companies:

  • Alliance Laundry Systems
  • Boise Cascade
  • C Jackson Electric and Automat
  • Caterpillar, Inc.
  • CCI Systems, Inc
  • Consistacom, Inc.
  • Cooper Power Systems
  • CSX Transportation
  • Doosan
  • DTE Energy
  • Enterforce
  • Expera
  • Extreme Engineering Solutions
  • GE Aviation
  • General Motors
  • Georgia-Pacific Corporation
  • Harley-Davidson Motor Co
  • Hitachi Global Storage Tech
  • Johnsonville Sausage, LLC
  • Los Alamos Nat'l Lab
  • Mass Electric Construction Co.
  • Material Handling Services, LLC
  • Mercury Marine
  • Michigan Consolidated Gas Co
  • Michigan Tech
  • MTU Systems Admin Svcs
  • Nemak
  • NewPage Corporation
  • Northern Star Industries
  • Nucor Steel
  • Packaging Corp. of America
  • Parr Instrument Co.
  • REMC#1
  • Sentry Insurance A Mutual Comp
  • Systems Control
  • Toyota
  • USG Interiors, Inc.
  • Wausau Paper
  • #1
    safest college campus in the nation
  • #2
    best return on investment (ROI) of public colleges in Michigan
  • #3
    top colleges in Michigan

Great job. Great wages.

The median annual wage for information security analysts was $102,600 in May 2021, according to the U.S. Bureau of Labor Statistics. And employment of information security analysts is projected to grow 35% from 2021 to 2031, much faster than the average for all occupations.

Cybersecurity BS Grads Work in These Positions

  • Cybersecurity Response Specialist
  • Cybersecurity Engineer
  • Cyber Threat Analyst
  • Security Operations Specialist
  • Information Analyst
  • Security Policy Analyst/Manager
  • Security Architect, Programmer, or Engineer
  • Forensics Analyst Investigator
  • Ethical Hacker/Penetration Analyst
  • IT Auditor
  • Application Security Specialist
  • Network Security Analyst
  • Information Assurance Engineer

The best part of Computing[MTU] is the community. Everyone I've met is helpful and welcoming and I don't feel out of place at all, even though I switched majors mid semester.

Cooper Rellis, Cybersecurity Student
Cooper Rellis
Cybersecurity Student

Ready to take the next step?

Learn more about studying cybersecurity at Michigan's flagship technological university.

Only at Michigan Tech: RedTeam

Third place among 100 teams, 96% accuracy, 5th of 119 teams, 6th of 576 teams. Facing competitors from colleges across the nation, the MTU RedTeam student organization consistently ranks among the top college and high school teams in bi-annual National Cyber League competitions and many other industry-sponsored events. And facing industry professionals and college students, in September 2021 the RedTeam captured 1st place in an Open Source Intelligence Capture the Flag contest hosted at the GrrCON Cyber Security Summit and Hacker Conference. 

The MTU RedTeam, a registered Michigan Tech student organization, works to promote a security-driven mindset among students, and provide a community and resource for those wishing to learn more about information security. The student organization also co-hosts capture the flag and hackathon competitions on campus, including the annual Winter Wonderhack.

"I feel like I've made a ton of friends here that I otherwise might not have at a larger state school. And the location, I mean, it's beautiful up here."Stu Kernstock '22BS in Cybersecurity

Why Accreditation Matters

Michigan Tech's Cybersecurity bachelor of science degree program follows the ACM Cybersecurity Curricular Guidelines (CSEC 2017) and National Institute of Standards and Technology (NIST) National Initiative for Cybersecurity Education (NICE) Workforce Framework. The program's goal is to be compliant with the Accreditation Board for Engineering and Technology (ABET) Cybersecurity accreditation criteria and the NSA Center of Academic Excellence in Cyber Defense (CAE-CD).

The Cybersecurity Program-Level Learning Outcomes (for CAE-CD) capture the desired attributes that the Cybersecurity program at Michigan Tech aspires to impart to its students through the curriculum and academic experience. Graduates of the program will have the ability to:

  • Analyze a complex computing problems and apply principles of computing and other relevant disciplines to identify solutions.

  • Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.

  • Communicate effectively in a variety of professional contexts.

  • Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.

  • Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.

  • Apply security principles and practices to maintain operations in the presence of risks and threats.

ACM Logo

Computing[MTU] — The future needs you.

Try to imagine a world without computers everywhere. For better or worse, the genie is out of the bottle and computing, connectivity, and artificial intelligence have become critically ingrained in nearly every aspect of modern life. This is the world that needs the College of Computing.

Founded in 2019, the College of Computing is one of the first colleges in the nation—and the only college in Michigan—to focus solely on computing.  Digital transformation has morphed every discipline into a computing discipline, and industries like manufacturing, criminal justice, marketing, and health care are all being reinvented by digital technologies. The College of Computing is making sure that today's and tomorrow's employers have the computing talent they need to thrive in this brave new world.

Supercharge your future and meet the demands of a technology-driven society at a flagship public research university powered by science, technology, engineering, and math. Graduate with the theoretical knowledge and practical experience needed to succeed in tomorrow's high-tech world.

I really enjoy the instructors in the College of Computing. They are really passionate in what they do, always willing to help you outside of the classroom, and they regularly forward internship and work opportunities to students.

Thad Sander, Cybersecurity Student
Thad Sander
Student, Bachelor of Science in Cybersecurity