Mar 04, 2025  
[DRAFT] 2025-2026 Undergraduate Catalog 
    
[DRAFT] 2025-2026 Undergraduate Catalog

Cybersecurity Minor

Location(s): Online


[linked graphic] Program Description [linked graphic] Program Student Learning Outcomes [linked graphic] Admissions, Enrollment, and Graduation Criteria [linked graphic] Program Course Requirements

[linked graphic] Have Questions? Contact Us!

Program Description

The minor in Cybersecurity is designed for students with an interest in applying information security controls on information systems. The Minor emphasizes the skills necessary to defend networks and systems and to detect and react to system threats. The expertise you receive in this program will give you an edge over other individuals upon graduation and the program will give you the skills to make an immediate and meaningful impact.

Program Student Learning Outcomes

Students who successfully complete this program will be able to:

  1. Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
  2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  3. Communicate effectively in a variety of professional contexts.
  4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  5. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  6. Develop and implement effective InfoSec Policies and Plans to guide organizational InfoSec operations based on industry standards.
  7. Perform risk management using an established methodology based on modern InfoSec standards for structuring risk problems and controls.
  8. Analysis, evaluation, assessment and recommendations as to current state and the improvement of all aspects of an organizational information asset protection program including governance, managerial, operational, and management of technical control approaches.
  9. Describe, implement, and maintain information security technologies associated with the protection of information assets with the appropriate formal tools and methods.

[icon]This program is a part of the Michael J. Coles College of Business .

return to top 


Admissions, Enrollment, and Graduation Criteria

Admissions Criteria

Admission to this program is open to all students who meet Kennesaw State University’s general admission standards. Visit the Admissions  section of the Catalog for more details.

Enrollment Criteria

This program does not have specific enrollment requirements. 

Graduation Criteria

Each student is expected to meet the requirements outlined in Academic Policy 5.0 PROGRAM REQUIREMENTS & GRADUATION .

return to top 


Program Course Requirements