M.S. in Accountancy
The Master of Science (M.S.) in Accountancy program at Marshall University is designed ...
Huntington, West Virginia
INTAKE: Jan & Aug
The Bachelor of Science in Computer and Information Security at Marshall University is designed to prepare students for careers in the rapidly growing field of cybersecurity. This program equips students with the technical skills and knowledge needed to protect information systems from cyber threats. Students learn to secure networks, safeguard data, and address security vulnerabilities through a combination of theoretical knowledge and practical experience.
STEM-Designated: The B.S. in Computer and Information Security is designated as a STEM (Science, Technology, Engineering, and Mathematics) program. This designation highlights the program's focus on technical and analytical skills essential for solving complex problems related to cybersecurity and information technology. As a STEM program, it provides students with a rigorous education that aligns with industry standards and demands.
Curriculum: The curriculum for the B.S. in Computer and Information Security includes a blend of core computer science courses and specialized security-focused classes. Key courses typically cover topics such as network security, cryptography, ethical hacking, digital forensics, and secure software development. The program also emphasizes hands-on learning through labs and practical projects, enabling students to apply their knowledge in real-world scenarios.
Research Focus: Research in the B.S. in Computer and Information Security program at Marshall University focuses on emerging cybersecurity threats and solutions. Faculty and students engage in research that addresses contemporary issues such as malware detection, threat modeling, security protocols, and data privacy. Research projects often aim to advance the field of cybersecurity and contribute to the development of new technologies and methodologies for protecting information systems.
Industry Engagement: The program emphasizes strong industry engagement to ensure that students are well-prepared for the job market. Marshall University collaborates with industry partners to provide students with internship opportunities, industry projects, and networking events. These connections help students gain practical experience, understand industry trends, and build relationships with potential employers.
Global Perspective: The B.S. in Computer and Information Security incorporates a global perspective by addressing international cybersecurity issues and practices. Students learn about global cybersecurity policies, regulations, and the challenges faced by organizations worldwide. This global outlook prepares graduates to work in diverse environments and manage security concerns on an international scale.
Huntington, West Virginia
IELTS 6
USD 20342
Undergraduate Entry Requirements
Academic Qualifications: Applicants for undergraduate programs typically require a minimum academic achievement of 65% or above in their previous academic qualifications.
English Language Proficiency:
Course by Course WES required
SPANTRAN Recommended
Marshall University offers several scholarship opportunities to international students to help them with the cost of their education. These scholarships are awarded based on academic achievement, leadership potential, and other criteria.
Marshall University Merit-Based Scholarships: These scholarships are awarded to international students based on their academic performance. The specific criteria and the value of the scholarships may vary. Students are automatically considered for these scholarships during the admission process.
Intensive English Program (IEP) Scholarship: Marshall University offers scholarships to students who enroll in the Intensive English Program (IEP) to improve their English language skills before beginning their degree program. These scholarships can help reduce the cost of language preparation.
International Student Scholarships: These scholarships are available to both undergraduate and graduate international students. The eligibility criteria and award amounts may vary based on academic achievement and program of study.
Undergraduate Competitive Scholarships: Marshall University provides a range of competitive scholarships for undergraduate international students. These may be based on factors like leadership, community involvement, or specific academic achievements.
External Scholarships: International students are encouraged to explore external scholarships, such as those offered by government agencies, foundations, and organizations in their home countries. Marshall University's International Student Office can provide guidance on external scholarship opportunities.
Honors College Scholarships: Exceptional undergraduate students may be eligible for Honors College scholarships. These scholarships are designed to support high-achieving students in their pursuit of advanced academic and research opportunities.
Departmental Scholarships: Some academic departments at Marshall University offer scholarships or assistantships specific to students in certain fields of study. Prospective graduate students should inquire within their respective departments.
Athletic Scholarships: International students with exceptional athletic abilities may be eligible for athletic scholarships if they are recruited to participate in Marshall University's sports programs.
It's important to note that scholarship availability and eligibility criteria can change over time.
Graduates of the B.S. in Computer and Information Security from Marshall University are well-prepared for a variety of roles in the cybersecurity and information technology fields. The program's comprehensive curriculum and hands-on experience provide students with the skills needed to tackle diverse challenges in the realm of computer security.
Information Security Analyst: These professionals are responsible for protecting an organization's computer systems and networks from cyber threats. They monitor security systems, analyze potential vulnerabilities, and implement strategies to safeguard sensitive information.
Network Security Engineer: Network security engineers design and implement security measures to protect network infrastructure. They work on securing network architectures, configuring firewalls, and developing protocols to prevent unauthorized access.
Cybersecurity Consultant: Consultants advise organizations on best practices for securing their IT systems. They conduct security assessments, recommend improvements, and help organizations develop comprehensive cybersecurity strategies.
Ethical Hacker (Penetration Tester): Ethical hackers, or penetration testers, simulate cyberattacks to identify vulnerabilities in systems before malicious hackers can exploit them. They perform security tests and provide recommendations for strengthening security measures.
Security Architect: Security architects design and build secure IT systems and networks. They develop security frameworks and oversee the implementation of security solutions to ensure that systems are resilient against cyber threats.
Digital Forensics Specialist: Digital forensics specialists investigate cybercrimes and analyze digital evidence. They recover and examine data from computers, mobile devices, and networks to support legal proceedings and understand the nature of cyber incidents.
Malware Analyst: Malware analysts focus on studying malicious software, such as viruses and ransomware. They analyze how malware operates, develop detection methods, and work on creating tools to mitigate malware threats.
Chief Information Security Officer (CISO): A CISO is responsible for overseeing an organization's entire information security program. They develop and implement security policies, manage security teams, and ensure compliance with regulations and standards.
Compliance Analyst: Compliance analysts ensure that organizations adhere to cybersecurity regulations and standards. They assess compliance with industry requirements, conduct audits, and help organizations navigate regulatory challenges.
Security Operations Center (SOC) Analyst: SOC analysts monitor and manage security incidents in real-time. They use various tools and techniques to detect, respond to, and mitigate security threats within an organization’s network.