Information Systems B.S. and Cybersecurity M.S.
Bachelor of Science, Master of Science (B.S., M.S.)
Combined
Allendale • Face to face
• 144 CreditsCombined
Allendale • Face to face
• 144 CreditsGrand Valley State University combined degree programs offer current qualified undergraduate students the opportunity to complete both an undergraduate and graduate degree, meeting their unique personal, academic, and career goals. Pursuing a combined degree can reduce the cost and total time required to complete both.
Grand Valley's combined degree program in Information Systems B.S. and Cybersecurity M.S. allows students to complete both degrees in an accelerated timeframe. This program equips students with a solid foundation in computing and advanced cybersecurity knowledge, preparing them to manage secure IT infrastructures effectively.
The course topics include computing principles, network security, data protection, and threat analysis. Students gain hands-on experience in state-of-the-art labs, building skills to recognize, defend against, and investigate cybersecurity threats. Graduate coursework counts towards both degrees, ensuring a comprehensive education.
Studying this program at Grand Valley offers excellent job market preparation through a blend of theoretical and practical experiences. Students benefit from collaboration with faculty engaged in ongoing research, dedicated computer labs, and the accelerated nature of the program, which helps them advance their careers quickly and stand out in the cybersecurity field.
Students apply directly to the School of Computing for the combined B.S./M.S. program during their second academic year. Visit the online catalog for more information about admission requirements for the combined bachelor of science in information systems and master of science in cybersecurity.
College of Computing
(616) 331-3051
[email protected]
gvsu.edu/computing
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
Annual Earnings | Percentile |
---|---|
$ 48,136.15 | 10% |
$ 70,097.49 | 25% |
$ 98,871.70 | 50% |
$129,226.74 | 75% |
$155,047.99 | 90% |
Plan, direct, or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming.
Top skillsAnnual Earnings | Percentile |
---|---|
$ 96,443.61 | 10% |
$124,226.68 | 25% |
$158,451.43 | 50% |
$183,588.66 | 75% |
$231,156.96 | 90% |
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
Top skillsAnnual Earnings | Percentile |
---|---|
$ 61,018.22 | 10% |
$ 79,589.03 | 25% |
$104,135.25 | 50% |
$129,116.37 | 75% |
$164,460.06 | 90% |