Mathematics and IT


Bachelor of Science in Cybersecurity


Bachelor of Arts in Information Technology
Concentration in Cybersecurity

Download Information Sheet

Cybersecurity is a global crisis. Professor teaching a classThere is an increasing demand for skilled cybersecurity professionals in the workforce. According to the U.S. Bureau of Labor Statistics, more than 200,000 cybersecurity-related jobs remained unfilled in 2016; the number is projected to grow by 18 percent by the year 2024. The median annual wage for an information security analyst was above $90,000 in 2016.

Cybersecurity at the Mount

The Cybersecurity major provides a comprehensive coverage of technical, ethical, legal, and contemporary topics in the field. The Cybsersecurity major offers theoretical and hands-on skills to:

  • Identify and mitigate security vulnerabilities in software applications, operating systems, computer networks, the internet, and mobile networks
  • Understand mathematical algorithms behind encryption and decryption techniques used in computing

The major enables students to build solid groundwork with courses in programming, databases, and computer networks before taking specialized courses in cybersecurity. Graduates of the concentration will have both technical skills and managerial qualities to work in IT departments or security consulting companies.

Cybersecurity Concentration
Students may choose to declare an Information Technology major and a concentration in Cybersecurity.

Career Options

A major in Cybersecurity can lead to careers in several industry sectors including technology and internet, security software, defense, government, teaching, e-commerce, banking, finance, business, and more.

What you will study

Sampling of courses for the IT major

  • Fundamentals of Computing
  • Spreadsheets & Databases
  • Internet Programming I
  • Networking
  • Intro to Programming
  • Computer Operation and Management
  • Database Management Systems
  • Discrete Topics in Computer Mathematics
  • Network Operating Systems and Administration

Cybersecurity specialization

  • Introduction to Cryptology
  • Application Software Security
  • Operating Systems Security
  • Network Security

Internships and Independent Study

Many students complete paid, credit-bearing, or unpaid internships related to their field of study, and often find their first job through an internship or co-op. Through independent study, students can pursue subjects of special interest and delve into high-level research with faculty mentors.

Where our students go

Our students have interned with IBM, Google, Travelers Insurance, UPS, Marvel, RAL, and many area businesses and schools.