Defend against cyber attacks and protect data with a cybersecurity degree from Eastern Michigan University. Our nationally ranked hands-on programs, including our ground-breaking curriculum for cybersecurity for autonomous vehicles, prepare students with the knowledge and skills to build, maintain and protect networks and computer systems.

Information Assurance & Cyber Defense [BS]

Information Assurance & Cyber Defense [BS]

Prepare for the future of technology with a STEM degree focused on design, integration, administration, and protection of all types of computer information systems. Available online or on-campus to fit your schedule.

Information Technology [BS]

Information Technology [BS]

Direct the flow of innovation with a degree focused on IT infrastructure, project management and integration, systems and network administration, security, and IT architecture. Available online or on-campus to fit your schedule.

Cybersecurity [M.S.]

Cybersecurity [M.S.]

Prepare to be a leader in cybersecurity with a graduate degree focused on research and innovation. Designed to meet the needs of research-oriented students, this program offers thesis and project-based tracks. Available online or on-campus to fit your schedule.

Request More Information

Why Study Cybersecurity at EMU?

  • Enhanced job market potential at some of the biggest companies in cybersecurity. With nearly 100% job placement, our graduates have received jobs at Snapchat, Google, Amazon, the Department of Homeland Security, and the National Security Agency.
  • The U.S. Bureau of Labor Statistics projects employment in this field to grow 32% through 2028, which is much faster than the average for all occupations.
  • Intensive, hands-on curriculum.
  • Flexible online and on-campus courses to meet the needs of research-oriented students and professionals.
  • A deeper, better understanding of cyber laws, legislation, and policy work.
  • Allows students to make informed judgments based on legal and ethical principles.
  • Focus on IT infrastructure, project management and integration, systems and network administration, security, and IT architecture.
  • Development and implementation of cryptography.