Skip to main content
Student at a computer.

Cybersecurity, B.S. and M.S.

Bachelor of Science, Master of Science (B.S., M.S.)

Combined

Grand Rapids • Face to face • 141 Credits

Grand Valley State University combined degree programs offer current qualified undergraduate students the opportunity to complete both an undergraduate and graduate degree, meeting their unique personal, academic, and career goals. Pursuing a combined degree can reduce the cost and total time required to complete both.

Overview

Grand Valley offers a combined degree program in Cybersecurity (BS and MS). This accelerated program allows students to earn both degrees efficiently, integrating undergraduate and graduate studies in cybersecurity.

The curriculum covers topics such as network security, cryptography, ethical hacking, digital forensics, and advanced threat analysis. This comprehensive education equips graduates to handle current and future cybersecurity challenges effectively.

Studying at Grand Valley provides a strong theoretical foundation and practical experience, with opportunities for research and hands-on learning in state-of-the-art labs. The program's accelerated nature gives students a competitive edge in the job market with both undergraduate and graduate qualifications.

Admission Information

Students apply directly to the School of Computing for the combined B.S./M.S. program during their second academic year. Visit the online catalog for more information about admission requirements for the combined bachelor of science in computer science and master of science in cybersecurity.

Career Opportunities

Direct an organization's security functions, including physical security and safety of employees and facilities.

Top skills
Earnings statistics
Annual Earnings Percentile
$ 57,442.69 10%
$ 72,634.22 25%
$ 92,162.74 50%
$113,085.91 75%
$138,783.53 90%

Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.

Top skills
Earnings statistics
Annual Earnings Percentile
$ 48,847.49 10%
$ 64,895.22 25%
$ 93,489.60 50%
$123,191.40 75%
$146,616.36 90%

Plan, direct, or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming.

Top skills
  • Critical Thinking
  • Reading Comprehension
  • Active Listening
  • Monitoring
  • Speaking
Earnings statistics
Annual Earnings Percentile
$ 92,068.87 10%
$119,620.77 25%
$149,750.58 50%
$175,039.44 75%
$215,403.70 90%

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Top skills
  • Reading Comprehension
  • Critical Thinking
  • Active Listening
  • Complex Problem Solving
  • Speaking
Earnings statistics
Annual Earnings Percentile
$ 61,630.68 10%
$ 79,562.28 25%
$103,281.46 50%
$130,213.76 75%
$163,844.79 90%

Direct an organization's security functions, including physical security and safety of employees and facilities.

Top skills
Earnings statistics
Annual Earnings Percentile
$ 60,664.00 10%
$ 77,930.22 25%
$102,131.22 50%
$133,851.89 75%
$168,904.33 90%

Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.

Top skills
Earnings statistics
Annual Earnings Percentile
$ 47,901.79 10%
$ 69,932.29 25%
$102,519.32 50%
$139,864.27 75%
$176,441.87 90%

Plan, direct, or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming.

Top skills
  • Critical Thinking
  • Reading Comprehension
  • Active Listening
  • Monitoring
  • Speaking
Earnings statistics
Annual Earnings Percentile
$100,456.65 10%
$130,545.48 25%
$168,293.38 50%
$213,340.26 75%
$304,106.79 90%

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Top skills
  • Reading Comprehension
  • Critical Thinking
  • Active Listening
  • Complex Problem Solving
  • Speaking
Earnings statistics
Annual Earnings Percentile
$ 68,977.14 10%
$ 89,760.32 25%
$120,087.54 50%
$153,468.98 75%
$182,679.35 90%
#1
University in Michigan by Employers
"One of the Top Public Universities in America"
- Niche.com
A "Best Bang for Your Buck"
By Washington Monthly

Request Information

Loading...


Page last modified May 14, 2025