cyber security professional looking at a tablet

Bachelor of Science inCybersecurity Analytics and Operations

Program summary

Prepare yourself to anticipate and identify threats, clearly articulate potential impacts to stakeholders, and ensure the safety of digital information. This program is supported by Penn State's College of IST.

Application deadline

Apply by June 30 to start August 26

Credits and costs

123 Credits$626/$671 per credit

Nationally Recognized

US News and World Report Bachelor's badge
Our bachelor's degrees are highly ranked by U.S. News & World Report.

Prepare to Meet the Growing Demand for Skilled Cybersecurity Analysts 

Cybersecurity is a broad and growing discipline that intersects with almost every industry. As digital information exchange increasingly becomes the norm, it is critically important to protect systems, networks, programs, and data from attacks and unauthorized access. As a graduate of Penn State’s interdisciplinary online Bachelor of Science in Cybersecurity Analytics and Operations program, you can enter the workforce prepared to join the rapidly growing cybersecurity industry, which spans organizations of almost every size and mission.

This online program, offered by the College of Information Sciences and Technology (IST) in partnership with Penn State World Campus, equips students with the tools needed to become skilled cybersecurity professionals who can recognize, analyze, manage, and eliminate risks related to a wide range of threats. As a student in the program, you can learn to anticipate and identify threats, clearly articulate potential impacts to stakeholders, and ensure the safety of digital information.

Why Study Cybersecurity Analytics and Operations at Penn State?

This online cybersecurity program has a strong foundation in programming and mathematics. It teaches the essential concepts of cyber defense and analytics to create a holistic understanding of adversarial strategies and effective countermeasures. The program focuses on helping students develop the knowledge and skills needed to critically assess and respond to security threats including system hacking, data breaches, theft of personal information, and cyberattacks by terrorist groups or other aggressors. 

Who Should Apply?

Penn State’s online cybersecurity and analytics program is ideal for people who:

  • enjoy working with computers and their operating systems and applications
  • have an interest in business and organizational security
  • are motivated to protect digital information, data stores, and computer networks from threats
  • are driven to learn the best strategies to anticipate, recognize, and defend against cyberattacks
  • are passionate about how to keep sensitive information out of the hands of hackers, cybercriminals, and terrorist organizations
  • enjoy working on a team to resolve technical problems 
  • are interested in computer programming and mathematics

Information for Military and Veterans

Are you a member of the military, a veteran, or a military spouse? Please visit our military website for additional information regarding financial aid, transfer credits, or application instructions.

Courses

The Bachelor of Science in Cybersecurity Analytics and Operations program teaches students to analyze security issues from the perspective of human and information systems. Courses in the major will explore how to anticipate and identify threats using technology, articulate potential impacts to stakeholders, and ensure the safety of online information.

To earn the B.S. in Cybersecurity Analytics and Operations, you are required to successfully complete a minimum of 123 credits.

Build Your Credentials along the Way

Because the IT profession is constantly changing, continued learning remains key to advancing your career. As you consider your education options, you might also be interested in the Associate in Science in IST, Undergraduate Certificate in IST, or the Undergraduate Certificate in SRA, as you work toward your bachelor’s degree. Many of the credits in these programs may be applied to the requirements for your bachelor’s degree, so that means you can benefit from Penn State's highly regarded name on your résumé even sooner. Your adviser can help you plan the best path for you to achieve your goals.

Prescribed Courses

  • 3
    credits

    This studio course teaches four basic hands-on cyber-defense skills: configuring a firewall, implementing a host-based intrusion detection software tool, using the Metasploit tool to do penetration testing, and implementing a network intrusion detection tool.

    • Prerequisite

      (CYBER 100 or CYBER 100S) and IST 140

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    This course provides the student with the background, experience and perspective that is required to document organizational preparation for cyber incidents, document cyber incident impact and resolution, document response strategies, as well as integrate business continuity planning into the organization.

    • Prerequisite

      CYBER 262, SRA 221 and SRA 231

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    This studio course teaches fundamental data-driven cybersecurity analytics skills using programming skills acquired in earlier courses.

    • Prerequisite

      STAT 200 and IST 261 and CYBER 262

    • Concurrent

      SRA 365

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    Malware Analytics is an intermediate course required for students who are majoring in Cybersecurity Analytics and Operations. It is a three-credit hands-on course that teaches principles and practice of malware detection, analysis, and defense.

    • Prerequisite

      IST 242 and IST 261 and CYBER 262

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    Cybersecurity Capstone is an advanced, culminating course for students who are majoring in Cybersecurity. This course provides the student with a practical exercise, designed by the instructor.

    • Prerequisite

      CYBER 342W and (ENGL 202A or ENGL 202B or ENGL 202C or ENGL 202D) and 7th semester standing

  • 3
    credits

    Introduction to the concept of databases, including the storage, manipulation, evaluation, and display of data, and related issues.

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    Introduction to digital network topologies, transmission media, signal modulation, digital packet switching and routing, systems integration, communications management, and security.

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    Introduction to formal languages, mathematical logic, and discrete mathematics, with applications to information sciences and technology.

    • Prerequisite

      MATH 110 or MATH 140

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    Legal environment of information technology, constitutional/political issues, intellectual property, management, e-commerce, privacy, access, computer contracting, cyberspace regulation.

    • Prerequisite

      IST 301 or SRA 231

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    Fundamental issues and concepts of network security, network security technologies and protocols, and emerging technologies in network security.

    • Prerequisite

      C or better in IST 220 and SRA 221

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    Fundamental issues and concepts of computer forensics; aspects of computer and cybercrime; methods to uncover, protect, exploit, and document digital evidence; tools, techniques, and procedures to perform computer and cybercrime investigation.

    • Prerequisite

      C or better in IST 220 and SRA 221

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    Contemporary security issues; security management processes, architecture, and models; risk analysis and management; security planning, analysis, and safeguards; security policies development and administration; contingency planning, incidence handling, and response; and security standards and certification processes.

    • Prerequisite

      C or better in IST 220 and SRA 221

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 1
    credit

    Supervised off-campus, nongroup instruction including field experiences, practica, or internships. Written and oral critique of activity required.

    • Prerequisite

      prior approval of proposed assignment by instructor

    • Note

      Internships provide valuable experience for students; however, we recognize that situations vary and some students, due to work or other commitments, are unable to adjust their schedules. You are encouraged to contact your adviser to make arrangements for suitable activities in lieu of an internship.

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    This introductory course spans areas of security, risk, and analysis covering contexts in government agencies and business organizations.

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    Provides overview of nature, scope, and seriousness of threats to security as a result of terrorism and crime.

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    Provides an understanding of the overview of information security including security architecture, access control, and internet secure applications.

    • Prerequisite

      SRA 111 and (CMPSC 101 or IST 140 or CMPSC 121)

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    Provides an overview of decision theoretical and analytical concepts and tools in the security risk analysis field.

    • Prerequisite

      SRA 111 and STAT 200

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    Assessment and mitigation of security vulnerabilities for people, organizations, industry sectors, and the nation.

    • Prerequisite

      SRA 231

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    This course emphasizes how to summarize data using descriptive statistics, how to make data-driven decisions using inferential statistics, and how to critically evaluate data presented in the media, all within the context of security, risk, and analysis. This is both a theory and application course. Students will learn about statistical theories, such as regression, and chi-square analyses, and apply their knowledge of these theories by analyzing and interpreting data using a statistical software package.

    • Prerequisite

      STAT 200

    • C or better

      A student enrolled in this course must receive a grade of C or better.

Additional Courses

  • 3
    credits

    This is an introductory university-level course in computer systems literacy. The history, architecture and operation of computing systems and underlying computing theory are covered.

    • 3
      credits

      Writing for students in scientific and technical disciplines.

      • Prerequisite

        ENGL 15, ESL 15, ENGL 30, and 4th Semester standing OR ENGL 137H, ENGL 138T, and 4th Semester standing

    • or:
      3
      credits

      Writing reports and other common forms of business communication.

      • Prerequisite

        (ENGL 15 or ESL 15 or ENGL 30) and 4th-semester standing OR (ENGL 137H and ENGL 138T) and 4th-semester standing

    • 4
      credits

      Introduces and develops the mathematical skills required for analyzing change, and the underlying mathematical behaviors that model real-life economics and financial applications. Develops student knowledge of calculus techniques, and how to use a calculus framework to develop critical thinking and problem-solving skills.

      • Prerequisite

        MATH 022 or MATH 40 or MATH 41 or satisfactory performance on the mathematics placement examination

      • C or better

        A student enrolled in this course must receive a grade of C or better.

    • or:
      4
      credits

      Introduces and develops the mathematical skills required for analyzing change and creating mathematical models that replicate real-life phenomena. Develops student knowledge of calculus techniques and how to use the calculus environment to develop critical thinking and problem-solving skills.

      • Prerequisite

        MATH 22 and MATH 26 or MATH 26 and satisfactory performance on the mathematics placement examination or MATH 40 or MATH 41 or satisfactory performance on the mathematics placement examination.

      • C or better

        A student enrolled in this course must receive a grade of C or better.

  • 4
    credits

    Descriptive Statistics, frequency distributions, probability and normal distributions, statistical inference, linear regression, and correlation.

    • Prerequisite

      Placement into MATH 21 or higher.

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    A first course in concepts and skills for application development.

    • Prerequisite

      C or better in MATH 21 or placement above the level of Math 21 in the mathematics placement test.

    • C or better

      A student enrolled in this course must receive a grade of C or better.

  • 3
    credits

    Intermediate application development including algorithms, data structures, and object-oriented concepts.

    • Prerequisite

      A grade of C or better in IST 140 or CMPSC 121 or IST 240

    • C or better

      A student enrolled in this course must receive a grade of C or better.

    • 3
      credits

      This course will provide students with the knowledge and skills to create both basic and more dynamic web-based content pages and applications.

      • Prerequisite

         IST 250 or IST 242 or CMPSC 122 or CMPSC 132

    • or:
      3
      credits

      Introductory design and development studio course for IST and SRA students.

      • Prerequisite

        A grade of C or better in IST 242 or permission of program

      • C or better

        A student enrolled in this course must receive a grade of C or better.

    • or:
      3
      credits

      Second of two design and development studio courses for IST and SRA students.

      • Prerequisite

        Grade of C or better in IST 311

      • C or better

        A student enrolled in this course must receive a grade of C or better.

Supporting Courses and Related Areas (select 9 credits)

Students in the Bachelor of Science in Cybersecurity Analytics and Operations must take 9 credits within one of these application areas, with all of the courses being at the 400-level. Students will be encouraged to take introductory courses that fill enforced prerequisites in the specialization while also meeting General Education knowledge domain requirements. The student must take all nine credits in a single application focus area. Students may not mix and match. 

Application Focus Areas:

  • Application Development
  • Law & Policy
  • Economics
  • Geopolitics
  • Healthcare
  • Custom Application Focus

Please consult with your academic adviser on a list of courses offered. 

Electives (select 3 credits)

Students can choose electives in consultation with their adviser.

General Education Requirements

Some General Education requirements may be satisfied by courses required for the major. Students should work with an adviser to select courses.

  • Foundations: 15 credits  
    All courses require a grade of C or better. Inter-Domain courses may not be used for foundations requirements. 
    • Writing/Speaking: 9 credits 
    • Quantification: 6 credits 
      3-6 credits are selected from mathematics, applied mathematics, and statistics; 3 credits may be selected from computer science or symbolic logic. 
  • Knowledge Domains: 15 credits  
    Inter-Domain courses may not be used for knowledge domain requirements.
    • Health and Wellness (GHW): 3 credits 
    • Natural Sciences (GN): 3 credits 
    • Arts (GA): 3 credits 
    • Humanities (GH): 3 credits 
    • Social and Behavioral Sciences (GS): 3 credits  
  • Integrative Studies: 6 credits
    • Inter-Domain course work: 6 credits  
  • Exploration: 9 credits 
    • Natural Sciences (GN) (may be Inter-Domain): 3 credits
    • GA, GH, GN, GS, and Inter-Domain courses: 6 credits  
      May include 3 credits of World Language course work beyond the requirements of the student’s degree program or at the 12th credit level, whichever is higher.

These General Education Requirements are for students who started in summer 2023 or later. Students who started earlier can review the prior version of the general education requirements. 

Course Availability

If you're ready to see when your courses will be offered, visit our public LionPATH course search (opens in new window) to start planning ahead.

Costs and Financial Aid

Undergraduate Tuition

Undergraduate tuition is calculated based on the number of credits for which you register and the number of total credits you have accrued at or transferred to Penn State.

Tuition is due shortly after each semester begins and rates are assessed every semester of enrollment.

2023–24 Academic Year Rates

Tuition rates for the fall 2023, spring 2024, and summer 2024 semesters.

How many credits do you plan to take per semester?If you have 59 or fewer creditsIf you have 60 or more credits
11 or fewer$626 per credit$671 per credit
12–19$7,602 per semester$8,206 per semester

Undergraduate students taking more than 19 credits will be charged the flat tuition rate plus the regular per credit hour rate for each credit above 19. 

2024–25 Academic Year Rates

Tuition rates for the fall 2024, spring 2025, and summer 2025 semesters.

How many credits do you plan to take per semester?If you have 59 or fewer creditsIf you have 60 or more credits
11 or fewer$632 per credit$678 per credit
12–19$7,678 per semester$8,288 per semester

Undergraduate students taking more than 19 credits will be charged the flat tuition rate plus the regular per credit hour rate for each credit above 19. 

Financial Aid and Military Benefits

Some students may qualify for financial aid. Take the time to research financial aid, scholarships, and payment options as you prepare to apply. Military service members, veterans, and their spouses or dependents should explore these potential military education benefits and financial aid opportunities, as well.

How to Apply

Deadlines and Important Dates

Your degree application, including receipt of all transcripts, must be received by the following deadlines to be considered complete.

  • Fall Deadline:  Apply by June 30 to start August 26
  • Spring Deadline:  Apply by October 31 to start January 13
  • Summer Deadline:  Apply by March 15, 2025, to start May 19, 2025

New students are encouraged to complete the FAFSA by March 1. Please visit the Office of Student Aid website for more information about applying for financial aid and recommended deadlines.

Admissions Help

Thank you for your interest in applying to this program. Contact an admissions counselor to discuss your educational goals, financial aid options, and application deadlines.

Admission Requirements

You must be a high school graduate or have completed a GED and have earned three and a half units of mathematics (selected from any combination of algebra, geometry, and trigonometry or higher math course) to satisfy the initial admission requirements to be admitted to the College of Information Sciences and Technology. Transfer applicants are expected to meet the minimum high school math requirements or equivalent college coursework prior to enrolling at Penn State:

  • completing MATH 022 (College Algebra II and Analytic Geometry) or MATH 026 (Plane Trigonometry) OR a higher-level math course offered by Penn State, determined in consultation with your academic adviser
  • completing a trigonometry or higher-level course at another accredited institution with a grade of C or better
  • receiving sufficient scores on Advanced Placement calculus exams

Important: Penn State's math placement exam results are used to determine the appropriate starting point for math. The results are NOT sufficient for satisfying the entrance into the College of IST requirement. The requirement must be demonstrated by letter grade or transfer credit. For more information about the entrance into the College of IST requirement for this program, contact an adviser.

Once you are admitted to the pre-major in the College of Information Sciences and Technology, you will work closely with your academic adviser to gain entrance to the cybersecurity analytics and operations major.

Entrance-to-Major Requirements

In order to be eligible for entrance to this major, students must satisfy the following requirements:

  • Have completed the following entrance-to-major requirements with a grade of C or better in each: CYBER 100S, IST 210, IST 220, IST 242, and STAT 200.
  • Have achieved a minimum cumulative grade point average of 2.00 prior to and through the end of the semester during which the entrance to major is requested. 

What You Need

Applications are submitted electronically and include a nonrefundable application fee. You will need the following items to complete your application:

High school transcripts or GED transcript - First-year applicants are required to submit Self-Reported Academic Records (SRAR). Official high school transcripts will only be required at the time a student accepts an offer of admission to Penn State.

Official college or university transcripts, if you attended another institution, and/or official military transcripts (if applicable). (All college or university transcripts are required regardless of the length of time that has passed, the grades earned, or the accreditation of the institutions attended. Acceptance of transfer credit toward your degree is subject to final approval by the academic department. For detailed information, see the Transfer Students page.)

Transcripts not in English must be accompanied by a certified translation. Please send your transcripts by mail or electronically through Parchment, eScrip-Safe, or the National Student Clearinghouse directly to Penn State from the college/university where coursework was attempted.

Submit official documents by mail to:

Undergraduate Admissions Office
The Pennsylvania State University
201 Shields Building
University Park PA 16802

English Proficiency — The language of instruction at Penn State is English. With some exceptions, international applicants must take and submit scores for the Test of English as a Foreign Language (TOEFL) or International English Language Testing System (IELTS). Minimum test scores and exceptions are found in the English Language Proficiency section on the Undergraduate Admissions International Requirements page. Visit the TOEFL website for testing information. Penn State's institutional code is 2660.

Start Your Application

Former Penn State students may not need to complete the admissions application. Please visit our Returning Students page for instructions. 

If this is your first time applying to Penn State, you'll need to complete the following steps:

  1. Review the application instructions before beginning.
  2. Complete the online application and submit all official documents.
  3. Pay the application fee.

Checking Your Status

You can check the status of your application by using the same login information established for the online application form and choosing "MyPennState — Check Application Status." Your decision letter (confirming your acceptance or denial) will be mailed four to six weeks after receipt of all application materials. An admissions counselor will contact you if additional information is required.

Technical Requirements 

Review the technical requirements for this degree program.

Ready to Learn More?

Get the resources you need to make informed decisions about your education. Request information on this program and other programs of interest by completing this form.

* required1/3

I agree to be contacted via phone, email, and text by Penn State World Campus and affiliates. I understand my information may also be shared with select providers to offer ads that may be of interest to me.Privacy Policy. reCAPTCHA protected. Google Privacy Policy and Terms of Service.

Learn more about this program

Download Program Brochure All my programs

Ready to take the next step toward your Penn State bachelor's degree?

Apply by June 30 to start August 26. How to Apply 

Start or Advance Your Career

A homeland security professional working at a computer

As the demand for educated cybersecurity professionals continues to grow, so does the gap in knowledge and skills required to fill these positions in business and industry, government and intelligence, and military and defense. You can use the knowledge gained from this program and the support of Penn State career resources to pursue careers in a variety of fields, depending on your goals.


Job Titles Related to This Degree

Cybersecurity professionals protect the data of organizations, companies, health care institutions, and government agencies. The following roles are often held by people with this type of degree:

  • Cyber Analyst
  • Information Security Officer
  • Information Security Specialist
  • Information Systems Security Analyst
  • Information Systems Security Officer (ISSO)
  • Information Technology Security Analyst (IT Security Analyst)
  • Network Security Analyst

Employment Outlook for Occupational Fields Related to This Degree

Estimates of employment growth and total employment are provided by the U.S. Bureau of Labor Statistics and are subject to change. While these occupations are often pursued by graduates with this degree, individual outcomes may vary depending on a variety of factors. Penn State World Campus cannot guarantee employment in a given occupation.

Information Security Analysts

31.5%
employment growth (10 years)
163,690
total employment

Computer Occupations, All Other

9.7%
employment growth (10 years)
416,320
total employment

Career Services to Set You Up for Success

Student having a virtual meeting on a laptop with a career counselor

From the day you're accepted as a student, you can access resources and tools provided by Penn State World Campus Career Services to further your career. These resources are beneficial whether you're searching for a job or advancing in an established career.

  • Opportunities to connect with employers
  • Career counselor/coach support
  • Occupation and salary information
  • Internships
  • Graduate school resources 

Integrated B.S. / MPS

Earn both the Bachelor of Science in Cybersecurity Analytics and Operations and the Master of Professional Studies in Cybersecurity Analytics and Operations in this accelerated program.

The integrated undergraduate/graduate (IUG) program is designed for academically talented World Campus students to obtain both the Bachelor of Science in Cybersecurity Analytics and Operations and the Master of Professional Studies in Cybersecurity Analytics and Operations in less time than it would traditionally take to earn both degrees independently.

The IUG program is intended to provide accelerated graduate study in cybersecurity analytics and operations for promising undergraduate students, while emphasizing the development of advanced core information science knowledge and research skills.

The IUG program can help prepare individuals for research-oriented careers in fields such as health, education, and government. Some graduates of the master’s degree program in cybersecurity analytics and operations may opt to pursue doctoral studies.

Students must fulfill all degree requirements for each degree to be awarded that degree. Up to 12 credits can double count and apply to both the undergraduate and graduate degrees.

Prerequisites

Undergraduate students may apply for admission to the IUG program as early as the end of their sophomore year, if they meet the following admission requirements:

  • must be enrolled in a College of IST undergraduate degree program
  • must have completed entrance to their undergraduate major and must have completed 60 credits of an IST undergraduate degree program (Transfer students must have completed at least 15 credits at Penn State to enroll in an IUG.)
  • must have an overall GPA of 3.5 (on a 4.0 scale) in undergraduate course work and a minimum GPA of 3.5 in all course work completed for the major
  • must meet with both the Director of Undergraduate Academic Affairs and the Graduate Program Manager to declare interest and receive information about the IUG program. To request a meeting, please submit the College of IST - IUG Intention Form.

Application Materials

Admissions decisions for this program will be based on the quality of credentials and will be made after review of the complete application portfolio. A completed application portfolio must include:

  • the Penn State Graduate School application and application fee
  • References (2) — You will need to initiate the process through the online application by entering names, email addresses, and mailing addresses of two IST faculty contacts. Upon submission of your application, an email will be sent to each contact requesting they complete a brief online recommendation regarding your commitment for success in an online program. Please inform all recommenders that they must submit the form in order for your application to be complete
  • an approved plan of study — the plan should cover the entire time spent in the integrated program

Upon acceptance into the program, students will be assigned a graduate adviser who is a graduate faculty member. In addition, students will plan the remainder of their undergraduate program of study to complement their proposed plan of study.

Contact Us

To learn more about the Bachelor of Science in Cybersecurity Analytics and Operations, offered in partnership with the Penn State College of Information Sciences and Technology, please contact:

World Campus Admissions Counselors
Phone: 814-863-5386
Email: [email protected]

Faculty

  • Michael R. Bartolacci

    • Degree
      Ph.D., Industrial Engineering, Lehigh University
    • Degree
      MBA, Lehigh University
    • Degree
      B.A., Engineering, Lafayette College

    Dr. Michael R. Bartolacci is an associate professor of information sciences and technology at Penn State Berks. He conducts research in telecommunications modeling, electronic commerce modeling, customer relationship management, manufacturing modeling, and international aspects of telecommunications.

  • Megan Costello

    • Degree
      J.D., University of New Hampshire
    • Degree
      B.S., Information Sciences and Technology, Penn State

    Megan Costello is an assistant teaching professor of information sciences and technology. Her areas of interest are copyright and trademark registration, business law matters, contract disputes, and privacy law. Prior to her appointment in the College of IST, she was the founder and solo practitioner for a boutique law practice that focused on cyberlaw issues and intellectual property.

  • Marc Friedenberg

    • Degree
      J.D., Columbia Law School
    • Degree
      M.S., Information Sciences and Technology, Penn State
    • Degree
      B.S., Information Sciences and Technology, Penn State

    Marc Friedenberg joined the College of Information Sciences and Technology as an assistant teaching professor of information sciences and technology after practicing intellectual property and securities litigation for large law firms in New York. His legal practice experience also involved clerkships with federal judges in New York and Los Angeles.

  • David M. Hozza

    • Degree
      MPS, Information Sciences (Cybersecurity), Penn State
    • Degree
      B.S., Computer Science and Management, East Stroudsburg University

    David M. Hozza is a lecturer in information sciences and technology. Prior to his appointment, he had a 30-year career in the IT industry, with responsibilities in storage architecture, systems administration, data analysis, and leadership management. His areas of interest include cloud computing, cybersecurity, data protection and storage, and enterprise integration.

  • Johnson Kinyua

    • Degree
      Ph.D., Computer Science, University of Cambridge, United Kingdom
    • Degree
      M.S., Digital Communications, University of Kent at Canterbury, United Kingdom
    • Degree
      B.S., Electronics Engineering, University College London, United Kingdom

    Dr. Johnson Kinyua has been an associate teaching professor with the College of IST since 2018. His career spans more than 35 years of teaching, research, and industry experience. He served as a director of a school for six years and as a dean for five years at different universities. His teaching interests are in cybersecurity, enterprise information systems, networks, computer architecture, operating systems, software engineering, database management systems, object-oriented programming, distributed database systems, and enterprise integration.

  • Mohamed Meky

    • Degree
      Ph.D., Electrical Engineering, City University of New York Graduate Center
    • Degree
      M.Sc., Electrical Engineering, Faculty of Engineering, Alexandria University, Egypt
    • Degree
      B.Sc., Electrical Engineering, Egypt

    Dr. Mohamed Meky has been teaching for more than 25 years in the U.S. and abroad. He also has more than 22 years of industrial experience in IT fields with AT&T. He is currently conducting research in the IT security field, and his areas of teaching interest are networking, cybersecurity, system administration, computer language programming, wireless communication, electronics, and other technology courses.

  • Alison R. Murphy

    • Degree
      Ph.D., Information Sciences and Technology, Penn State
    • Degree
      B.S., Information Sciences and Technology, Penn State

    Dr. Alison R. Murphy is an assistant teaching professor of information sciences and technology. She enjoys teaching students to think critically about the socio-technical impacts of technology on individuals, organizations, and society. She is also dedicated to researching how to improve the usability of health information technology for both individuals and organizations through the use of qualitative methods and UX design principles.

  • Mahdi Nasereddin

    • Degree
      Ph.D., Industrial Engineering, University of Central Florida
    • Degree
      M.S., Industrial Engineering, University of Central Florida
    • Degree
      B.S., Industrial Engineering, University of Central Florida

    Dr. Mahdi Nasereddin is an associate professor of information sciences and technology at Penn State Berks. His current research interest is in the application of artificial intelligence, simulation metamodeling, simulation optimization, and experimental design.

  • Kaamran Raahemifar

    • Degree
      Ph.D., University of Windsor
    • Degree
      MASc, University of Waterloo

    Dr. Kaamran Raahemifar is a professor in the artificial intelligence and data science programs in the Penn State College of Information Sciences and Technology. He has several decades of combined experience in teaching, research, and administrative/executive services. He has research and teaching interests in applied optimization, data modeling and prediction, small and large system simulation and design, signal anomaly detection and testing, blockchain, data science, artificial intelligence, user experience, and smart-connected devices.

  • Syed Rizvi

    • Degree
      Ph.D., Computer Science and Engineering, University of Bridgeport
    • Degree
      M.S., Computer Engineering, Old Dominion University
    • Degree
      B.S., Computer Engineering, Sir Syed University of Engineering and Technology

    Dr. Syed Rizvi is an associate professor in information sciences and technology at the Penn State Altoona campus. His research interests lie at the intersection of computer networking, network security, and machine learning. Dr. Rizvi teaches cybersecurity, risk analysis, and IST courses such as fundamentals of information security, networking and telecommunications, secure software engineering, security risk assessment, network security, incident response handling, and capstone projects. He is a member of the IEEE Communications Society and ACM.

  • Don Shemanski

    • Degree
      J.D., Georgetown University
    • Degree
      B.A., With High Distinction, German, Penn State

    Don Shemanski joined Penn State as a professor of practice of information sciences and technology after a 23-year career as a diplomat with the U.S. Foreign Service. Immediately prior to his appointment at Penn State, he served as counselor for global affairs at the U.S. Embassy in Berlin, responsible for high-priority policy issues such as counterterrorism and nuclear nonproliferation.

  • Greg Thomas

    • Degree
      Ph.D., Administration and Leadership Studies, Indiana University of Pennsylvania
    • Degree
      MPA, Penn State
    • Degree
      B.S., Criminal Justice, Shippensburg University of Pennsylvania

    Dr. Greg Thomas has more than 25 years of hands-on law enforcement and educational experience in intelligence. He has developed operational intelligence concerning criminal activities and selected, trained, and supervised analysts in a criminal intelligence center. He has extensive experience teaching intelligence and analytical techniques to college students as well as intelligence analysts and law enforcement personnel.

  • Steve Tomasko

    • Degree
      M.S., IT, Capella University
    • Degree
      B.S., Professional Studies, Mount Aloysius College
    • Degree
      A.A.S., Electronics Technology, Penn Highlands Community College

    Steve Tomasko has spent more than 29 years working in networking, communications, program management, and cybersecurity. He has dozens of professional certifications in these fields. His experience includes many years of cybersecurity research in support of the DoD and IC. His current professional work and research focus on cybersecurity for 5G and satellite systems.

News


Ready to take the next step toward your Penn State bachelor's degree?

Apply by June 30 to start August 26. How to Apply 

Chat with an Admissions Counselor

Chat with an Admissions Counselor

Recaptcha

or Chat