We’re excited to announce the launch of our new website, designed to enhance your experience with improved navigation and fresh content. If you encounter any broken or relocated pages, please use the search tool to find what you’re looking for. Thank you for your patience as we continue to refine and improve the site!
Cyber Security
Cybersecurity track is designed for students interested in pursuing a career in cybersecurity. This track combines the fundamentals of computer science, electronics engineering technology with cybersecurity concepts.

The Computer Science Technology Program adopts the following educational objectives, designed to educate and improve the ability of students to become competent and creative professionals contributing effectively for fulfilling the employment needs of today and of the future. Within two to five years of graduation, Computer Science Technology graduates will be able to:
- Demonstrate competency in identifying and analyzing technical problems, problem-solving, design of systems and application of modern tools.
- Advance through their professional career by demonstrating their ability to function in multidisciplinary teams and participate in ongoing professional development.
- Express themselves effectively in both oral and written communication, understand social responsibilities, appreciate diversity, commit to continuous improvement and maintain professional competency through lifelong learning.
CST Expected Student Outcomes:
Graduates of the CST program will have the ability to:
- Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify.
- Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program.
- Communicate effectively in a variety of professional contexts.
- Recognize professional responsibilities and make informed judgments in computing practices based on legal and ethical principles.
- Function effectively as a member or leader of a team engaged in activities appropriate to the program.
The Computer Science Technology curriculum
The Computer Science Technology curriculum – Cybersecurity track is designed for students interested in pursuing a career in cybersecurity. This track combines the fundamentals of computer science, electronics engineering technology with cybersecurity concepts. Students in this track will assess the trends and impact of current and past actions within the cyber world. Students will become adept at making rationalized digital decisions, evaluating threats, and managing risks in today’s cyber infrastructure. Students in this track will also learn how to apply the tools required to solve problems and mitigate new risks. Students with this track will be marketable and prepared for future-proof employment.
Computer Science Technology (Cyber Security Concentration), BS
Future Career Opportunities
Students with this track will be marketable and prepared for future-proof employment in areas such as these:
responsible to design and implement security systems to protect an organization’s computer infrastructure from cyber-threats.
Data security analyst
responsible to safeguard an organization’s computer systems and networks by developing strategies and maintaining security to ensure that an organization’s networks has no security breach.
Penetration tester
is an ethical hacker responsible for testing Information Technology / Operations Technology (IT/OT) systems to identify vulnerabilities using a wide variety of penetration software tools methods and tactics to simulate cyber-attacks
responsible to investigate computer-related crimes by using forensic tools to recover electronic data/information that serves as legal evidence.
Cyber security analyst
responsible to assess, plan and enact security measures to safeguard the privacy, integrity and availability of an organization’s cyber and information assets by preventing compromise (e.g., outside/inside security breaches)
Security Software Developer
responsible to implement and develop security software and systems to ensure an organization’s network continuity of operations (i.e., maintains confidentiality, integrity and availability).