Information Assurance & Cyber Security

Bachelor of Science Degree (B.S.)
group of students with laptops

About this program

As technology advances to new levels, online security is more important than ever before. With a degree in Information Assurance & Cyber Security, you’ll learn how to safeguard sensitive data and prevent critical attacks. From IT essentials like programming, databases, and networking to threat prevention, assessment, and testing, this industry-driven curriculum pulls it all together to create the diverse skillset that future employers want most.

array(19) { [0]=> string(2) "id" [1]=> string(4) "uuid" [2]=> string(11) "revision_id" [3]=> string(8) "langcode" [4]=> string(4) "type" [5]=> string(6) "status" [6]=> string(7) "created" [7]=> string(9) "parent_id" [8]=> string(11) "parent_type" [9]=> string(17) "parent_field_name" [10]=> string(17) "behavior_settings" [11]=> string(16) "default_langcode" [12]=> string(16) "revision_default" [13]=> string(29) "revision_translation_affected" [14]=> string(15) "field_body_copy" [15]=> string(11) "field_cards" [16]=> string(22) "field_content_category" [17]=> string(14) "field_headline" [18]=> string(12) "field_link_1" }


Hired BEFORE Graduation

array(19) { [0]=> string(2) "id" [1]=> string(4) "uuid" [2]=> string(11) "revision_id" [3]=> string(8) "langcode" [4]=> string(4) "type" [5]=> string(6) "status" [6]=> string(7) "created" [7]=> string(9) "parent_id" [8]=> string(11) "parent_type" [9]=> string(17) "parent_field_name" [10]=> string(17) "behavior_settings" [11]=> string(16) "default_langcode" [12]=> string(16) "revision_default" [13]=> string(29) "revision_translation_affected" [14]=> string(15) "field_body_copy" [15]=> string(11) "field_cards" [16]=> string(22) "field_content_category" [17]=> string(14) "field_headline" [18]=> string(12) "field_link_1" }


Specialized Computer Labs

array(19) { [0]=> string(2) "id" [1]=> string(4) "uuid" [2]=> string(11) "revision_id" [3]=> string(8) "langcode" [4]=> string(4) "type" [5]=> string(6) "status" [6]=> string(7) "created" [7]=> string(9) "parent_id" [8]=> string(11) "parent_type" [9]=> string(17) "parent_field_name" [10]=> string(17) "behavior_settings" [11]=> string(16) "default_langcode" [12]=> string(16) "revision_default" [13]=> string(29) "revision_translation_affected" [14]=> string(15) "field_body_copy" [15]=> string(11) "field_cards" [16]=> string(22) "field_content_category" [17]=> string(14) "field_headline" [18]=> string(12) "field_link_1" }


Average Class Size


  • Information security analyst
  • Information security manager/administrator
  • System security engineer/architect
  • IT security consultant
  • Security incident responder/investigator
  • IT auditor
  • Penetration tester
  • Cybersecurity analyst

At Penn College, we believe your educational experience should go beyond specialized skills. Real-world ready means taking a broader approach that builds communication skills, inspires collaboration, and encourages exploration of arts, history, and science.

​​Specialization requires in-depth knowledge and high-level proficiency. Students learn and apply major-specific concepts, skills, and methods.

  • Introduction to Programming (CIT160)
  • Networking I (EET145)
  • Programming II (CIT260)
  • Networking II (EET247)
  • Introduction to UNIX/Linux (CIT240)
  • Introduction to Database (CIT180)
  • Fundamentals of Information Security (CIT230)
  • System Analysis I (CIT246)
  • Secure Database Development (CIT281)
  • Information Security Tools for Code and Data Analysis (IAS211)
  • Ethical Hacking and Penetration Testing (IAS311)
  • Directed Information Assurance and Cyber Security Elective (BCS)
  • Fundamentals of Cryptography (CIT335)
  • Network Defense (IAS312)
  • Information Security Policy (IAS411)
  • Legal Issues in Information Security Management (LAS350)
  • IAS Awareness, Training, and Education (IAS412)
  • Contingency Planning (IAS413)
  • Secure System Accreditation and Certification (IAS461)
  • IAS Seminar I (IAS492A)
  • Risk Analyst Capstone (IAS466)
  • Information Security Forensics and Incident Response (CIT430)
  • Advanced Topics in Information Assurance and Security (IAS490)
  • IAS Seminar II (IAS492B)

​Perspectives are points of view, offering a variety of ways of understanding, interacting, and influencing the world. Students identify, explain, and utilize the approaches used by academics and professionals to study, analyze, or understand problems, and offer solutions.

  • First Year Experience (FYE101)
  • Principles of Management (MGT115)
  • Science Elective (SCI)
  • Open Elective (OEA)
  • Fitness and Lifetime Sports Elective (FIT)
  • Exploration Electives (OEE)
  • Science Elective with lab (SCL)
  • Core Historical Perspective (HIP)
  • Management of Organizational Behavior (MGT410)
  • Core Social Science Perspective (SSP)
  • Core Arts Perspective (ARP)

​​Foundations are the practical, intellectual, and social skills: communication, collaboration, critical and ethical thinking, quantitative thinking, and technological literacy that are crucial to every student at every stage of education and at every stage of life.

  • Information, Technology, and Society (CSC124)
  • English Composition I (ENL111)
  • Calculus I (MTH240)
  • English Composition II (ENL121) or
  • Technical and Professional Communication (ENL201)
  • Fundamentals of Speech (SPC101)
  • Statistics for STEM Fields with Computer Applications (MTH161)
Featured Video

Women In STEM

What does it take to succeed in a STEM career? Curiosity. Critical thinking. A can-do spirit. And an educational experience that meets your passion head-on. Here, you’ll meet a community of innovators. Future pioneers who are learning by doing. Breathing new life into old concepts. Testing theories. And breaking barriers. Because the more you explore, the more you grow. And the bigger difference you can make.

Student Experience

When it comes to IT, security is a top concern. Adam put his technical skills to work for Lycoming County Society for the Prevention of Cruelty to Animals.

Adam Reinard

Information Assurance & Cyber Security

Read his story


IT Labs

Apply theory to the real thing in our specialized IT labs. Here, you’ll have access to both physical and virtual labs designed for networking, IT security, operating systems, and gaming. Apply the principles of ethical hacking, intrusion detection, and digital forensics in both physical and virtual environments. Labs also allow students to create 3D models, investigate hypervisors, build networks from bare metal to full production, and simulate a host of applications and network configurations.


Your knowledge in practice

Internships are key for career preparation. Apply your knowledge to the workplace and learn about the industry first-hand.

Learn More
Related Programs

Follow your passion

Information Technology: Network & User Support

Associate of Applied Science Degree (A.A.S.)

Network Administration & Engineering Technology

Bachelor of Science Degree (B.S.) 

Software Development & Information Management

Bachelor of Science Degree (B.S.) 

Student Life

Lead and put your skills to the test

Information Security Association (ISA)

ISA is a security club that encompasses all IT majors. It stresses the importance of security through networking, programming, security, and even average computer users.

Student Organizations at Penn College

Your college experience is about more than the classroom. Join one of 65+ clubs and organizations, or create your own.


Newswatch 16 spreads word of web-design class project

WNEP’s Chris Keating spoke remotely Tuesday with Spyke M. Krepshaw, assistant professor of web and interactive media, about the ...


Penn College alumna uses gaming for goodwill

Whether accessed on a smartphone, a personal computer or an elaborate home system, video games are the nation’s leading source ...


Penn College IT student presents at conference

A Pennsylvania College of Technology student offered his expertise at a recent conference for information security practitioners ...

Study Abroad

Gain global experience

See the world via Williamsport. Take your education abroad and get hands-on experience learning about your industry on a global scale.

Learn More

Our Leadership

Faculty Story

Jacob Miller and Sandra Gorka, both computer science professors, were featured in the Washington Post for their efforts in extending cybersecurity education to high school students.

Read Their Story

More Information
  • This program was developed to meet the curricular recommendations for the National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education, a joint effort of the NSA and DHS.
  • Operates on an A,B,C,F grading scale for all major courses.

Students must complete all required courses in the Information Assurance and Cyber Security major (those with the alpha-designators CIT, EET, IAS, LAS, and MTH) with a grade of "C" or higher.  Additionally, any course approved for use as the IAS elective must also be completed with a grade of "C" or higher.

Students seeking entrance through transfer should strive to take courses at their respective institutions that provide competency in the following areas; programming, two semesters minimum (same language); database; networking, two semesters minimum; UNIX and/or Linux; and calculus for engineering or math majors.  Students planning to transfer from another college and wanting specific course advice should consult with the IT faculty at Penn College.

View general transfer information

Alternative Credit refers to academic credits earned through means other than traditional college course completion, including: credit by exam, articulation, proof of competency gained in high school, work/life experience, and advanced placement.

Visit the Alternative Credit Options page for requirements and procedures and for information on credit through Advanced Placement.

Special Considerations: Many jobs in information security will require background checks and/or security clearances. Ethical behavior is necessary if a student expects to succeed in this field. Additionally, due to the rigorous math requirements of this program, prospective students should consider applying early and remediating needed classes (such as Algebra or Pre-Calculus) prior to entering your first semester at Penn College.

A laptop/notebook computer is required for enrollment in major courses. Laptop specifications

Uniforms and tools are available for purchase through The College Store and Penn State Computer Store .

  • Mr. James R Ankers, CISSP, CISA, IT Specialist (INFOSEC), United States Navy
  • Mr. Daniel J Clarke, '07, Senior Solutions Architect, Arraya Solutions
  • Mr. Peter Codispoti, '73, Senior Systems Analyst, Furniture Division, Brodart
  • Dr. Todd W Griffith, Chief Technology Officer, Discovery Machine Corporation
  • Mr. Brandon J Howe, '01, Sr. IT Analyst, Anadarko Petroleum Corp.
  • Dr. Karl M Kapp, Assistant Director, Institute for Interactive Technologies, Bloomsburg University
  • Dr. Krish Pillai, Ph.D, Assistant Professor, Lock Haven University
  • Mr. Mark J Watson, '85, Administrative Director, Corporate Information Technology, Susquehanna Health
  • Mr. Benjamin Wright, Attorney, Instructor at SANS Institute

matches /academics/et/information-technology/information-assurance-cyber-security ... percision: 3 of 3