M.A. Applied History and Public Humanities
The M.A. in Applied History and Public Humanities at The University of Akron combines h...
Akron, Ohio
INTAKE: Jan & Aug
The B.S. in Cybersecurity at The University of Akron prepares students to protect digital assets and information systems from cyber threats. This program focuses on developing skills in cybersecurity management, digital forensics, network security, and ethical hacking to address the growing demand for cybersecurity professionals in various industries.
STEM-designated: The B.S. Cybersecurity program at The University of Akron is classified as STEM (Science, Technology, Engineering, and Mathematics), emphasizing rigorous coursework in computer science, mathematics, and cybersecurity principles. This designation supports international students seeking STEM-related careers and benefits employers looking to hire skilled technical professionals.
Curriculum: The curriculum covers foundational topics such as cybersecurity fundamentals, cryptography, network defense, ethical hacking, and security risk management. Students also engage in hands-on lab exercises and projects to apply theoretical knowledge to real-world scenarios.
Research Focus: Students participate in research projects that explore cybersecurity threats, vulnerabilities, and mitigation strategies. Faculty mentorship and collaborative research initiatives prepare students to analyze and address complex cybersecurity challenges, contributing to advancements in the field.
Industry Engagement: The program maintains strong connections with industry leaders through internships, co-op programs, and industry-sponsored projects. Students gain practical experience and networking opportunities with cybersecurity professionals in sectors such as finance, healthcare, government, and technology.
Global Perspective: With a focus on global cybersecurity issues and practices, the program prepares students to navigate international cybersecurity regulations, standards, and best practices. Courses cover global cyber threats, international cybersecurity policies, and strategies for protecting global digital infrastructures.
Akron, Ohio
IELTS 6
USD 20961
Undergraduate Entry Requirements
Academic Qualifications: Applicants for undergraduate programs typically require a minimum academic achievement of 65% or above in their previous academic qualifications.
English Language Proficiency:
The University of Akron (UA) offers a variety of scholarships to support international students financially. These scholarships are designed to help alleviate the cost of tuition and support academic excellence.
Merit Scholarships: Merit scholarships at UA are automatically considered for all incoming first-year students. These awards are based on a comprehensive review of the applicant’s academic transcripts, curriculum, and cumulative GPA.
Williams Honors College Scholarships: First-year, transfer, and continuing students who meet specific academic qualifications can apply for the Williams Honors College Scholarships. These scholarships range from $1,500 to $2,000 and require an application to the Williams Honors College, including an interview.
Provost’s Scholarships for Transfer Students: These scholarships, ranging from $1,000 to $5,000, are available to students transferring from another regionally accredited college or university. Transfer students are automatically considered for these awards upon applying for admission.
International Student Scholarship Opportunities: International students can also benefit from various specific scholarships offered by different departments and programs within the university. For instance, the Buchtel College of Arts and Sciences offers numerous scholarships for students pursuing majors within their disciplines. These range from awards for academic merit to those supporting specific fields of study.
Graduates with a B.S. in Cybersecurity from The University of Akron are equipped with specialized knowledge and skills to protect organizations' digital assets from cyber threats.
Cybersecurity Analyst: Monitor computer networks for security breaches, investigate incidents, and implement security measures to protect against cyber attacks. Analyze data to identify vulnerabilities and recommend solutions to enhance security posture.
Security Consultant: Advise organizations on cybersecurity strategies, risk assessments, and implementation of security measures to protect against threats. Conduct security audits, develop policies, and provide expertise on compliance with cybersecurity regulations.
Network Security Engineer: Design and implement secure network architectures, firewalls, and intrusion detection systems to protect organizational networks from unauthorized access and cyber threats. Monitor network traffic and respond to security incidents.
Penetration Tester (Ethical Hacker): Assess the security of computer systems and networks by simulating cyber attacks to identify vulnerabilities. Conduct penetration tests, analyze results, and recommend remediation measures to improve security defenses.
Incident Responder: Lead incident response efforts to contain and mitigate the impact of cybersecurity incidents. Coordinate with internal teams and stakeholders to investigate incidents, restore operations, and implement preventive measures.
Cybersecurity Architect: Design and implement cybersecurity solutions and architectures that meet organizational needs for data protection, threat detection, and regulatory compliance. Develop security frameworks and policies to safeguard information assets.
Information Security Auditor: Evaluate and assess organizational IT systems and controls to ensure compliance with cybersecurity standards, regulations, and best practices. Conduct audits, identify vulnerabilities, and recommend corrective actions to mitigate risks.
Cybersecurity Manager/Director: Oversee cybersecurity operations, including security policies, risk management strategies, and incident response protocols. Manage cybersecurity teams, budgets, and initiatives to protect organizational assets.
Forensic Computer Analyst: Collect and analyze digital evidence from computers and electronic devices to investigate cyber crimes and security breaches. Provide expert testimony and forensic reports for legal proceedings and law enforcement investigations.
Chief Information Security Officer (CISO): Lead the organization's cybersecurity strategy and initiatives as a senior executive. Develop and implement policies, manage cybersecurity teams, and communicate with stakeholders on cybersecurity risks and strategies.