Information Assurance & Cyber Security

Bachelor of Science Degree (B.S.)
group of students with laptops

About this program

As technology advances to new levels, online security is more important than ever before. With a degree in Information Assurance & Cyber Security, you’ll learn how to safeguard sensitive data and prevent critical attacks. From IT essentials like programming, databases, and networking to threat prevention, assessment, and testing, this industry-driven curriculum pulls it all together to create the diverse skillset that future employers want most.

Spring Friendly Start

This program allows you to start in January 2022 and finish as early as December 2025.
Spring start details & benefits

Next steps...

You're on your way to becoming a tomorrow maker.


Hired BEFORE Graduation


Specialized Computer Labs


Average Class Size


  • Information security analyst
  • Information security manager/administrator
  • System security engineer/architect
  • IT security consultant
  • Security incident responder/investigator
  • IT auditor
  • Penetration tester
  • Cybersecurity analyst

At Penn College, we believe your educational experience should go beyond specialized skills. Real-world ready means taking a broader approach that builds communication skills, inspires collaboration, and encourages exploration of arts, history, and science.

​​Specialization requires in-depth knowledge and high-level proficiency. Students learn and apply major-specific concepts, skills, and methods.

  • Introduction to Programming (CIT160)
  • Networking I (EET145)
  • Principles of Management (MGT115)
  • Programming II (CIT260)
  • Networking II (EET247)
  • Introduction to UNIX/Linux (CIT240)
  • Introduction to Database (CIT180)
  • Directed Information Assurance and Cyber Security Elective (BCS)
  • Fundamentals of Information Security (CIT230)
  • Secure Database Development (CIT281)
  • System Analysis I (CIT246)
  • Fundamentals of Cryptography (CIT335)
  • Network Defense (IAS312)
  • Information Security Tools for Code and Data Analysis (IAS211)
  • Ethical Hacking and Penetration Testing (IAS311)
  • Information Security Policy (IAS411)
  • Legal Issues in Information Security Management (LAS350)
  • Management of Organizational Behavior (MGT410)
  • IAS Awareness, Training, and Education (IAS412)
  • Contingency Planning (IAS413)
  • Secure System Accreditation and Certification (IAS461)
  • IAS Seminar I (IAS492A)
  • Risk Analyst Capstone (IAS466)
  • Information Security Forensics and Incident Response (CIT430)
  • Advanced Topics in Information Assurance and Security (IAS490)
  • IAS Seminar II (IAS492B)

​Perspectives are points of view, offering a variety of ways of understanding, interacting, and influencing the world. Students identify, explain, and utilize the approaches used by academics and professionals to study, analyze, or understand problems, and offer solutions.

  • Science Elective (SCI)
  • Science Elective with lab (SCL)
  • Core Social Science Perspective (SSP)
  • Core Historical Perspective (HIP)
  • Core Arts Perspective (ARP)

​​Foundations are the practical, intellectual, and social skills: communication, collaboration, critical and ethical thinking, quantitative thinking, and technological literacy that are crucial to every student at every stage of education and at every stage of life.

  • Information, Technology, and Society (CSC124)
  • English Composition I (ENL111)
  • Calculus I (MTH240)
  • English Composition II (ENL121) or
  • Technical and Professional Communication (ENL201)
  • Fundamentals of Speech (SPC101)
  • Statistics for STEM Fields with Computer Applications (MTH161)

What's the difference between Information Technology and Computer Science?

Computer science is more theoretical, with increased math requirements. Many tend to focus on programming or cutting-edge computing, like artificial intelligence and augmented reality.

IT is focused on supporting the user. It is more people-focused, making the tools of computing accessible to fit the needs of people and organizations, as well as creating computing tools and systems to meet the user's needs.

Virtual Tour

Information Technology

Get a glimpse inside the labs where future IT professionals learn how to install, configure, and maintain computing systems. Meet Dr. Sandra Gorka, Associate Professor of Computer Science. And check out everything from gaming and simulation spaces to the hands-on labs decided to cyber security, networking, database management, and Linux systems.

IT Labs

IT Labs

Apply theory to the real thing in our specialized IT labs. Here, you’ll have access to both physical and virtual labs designed for networking, IT security, operating systems, and gaming. Apply the principles of ethical hacking, intrusion detection, and digital forensics in both physical and virtual environments. Labs also allow students to create 3D models, investigate hypervisors, build networks from bare metal to full production, and simulate a host of applications and network configurations.

Student Experience

When it comes to IT, security is a top concern. Adam put his technical skills to work for Lycoming County Society for the Prevention of Cruelty to Animals.

Adam Reinard

Information Assurance & Cyber Security

Read his story

Featured Video

Women In STEM

What does it take to succeed in a STEM career? Curiosity. Critical thinking. A can-do spirit. And an educational experience that meets your passion head-on. Here, you’ll meet a community of innovators. Future pioneers who are learning by doing. Breathing new life into old concepts. Testing theories. And breaking barriers. Because the more you explore, the more you grow. And the bigger difference you can make.

Tour Schedule

Seeing is believing.

Think Penn College might be a good fit for you? Make plans to visit and discover what hands-on learning is all about. Academic Tours allow you to explore labs and get to the core of your future program. If you’re looking for a deeper dive into your academic area of interest, opt for a Self-Scheduled Personal Tour. Comprehensive COVID-19 safety protocols are in place.

Jan 28

Open House

Friday, January 288:30 AM - 2:30 PM Eastern Time (U.S.)

Feb 5

Open House

Saturday, February 58:30 AM - 2:30 PM Eastern Time (U.S.)

Feb 25

Open House

Friday, February 258:30 AM - 2:30 PM Eastern Time (U.S.)

Mar 19

Open House

Saturday, March 198:30 AM - 2:30 PM Eastern Time (U.S.)

Apr 3

Open House

Sunday, April 38:30 AM - 2:30 PM Eastern Time (U.S.)

Apr 22

Open House

Friday, April 228:30 AM - 2:30 PM Eastern Time (U.S.)

More tour dates are on the way.

But let's customize a tour for you now. Call, chat, or email for options.

Need a different date?

Let's customize a tour for you now. Call, chat, or email for options.


Admissions Office

If you can't attend any of these dates Contact Admissions at 570.320.2400

Upcoming Events

Explore Penn College


Your knowledge in practice

Internships are key for career preparation. Apply your knowledge to the workplace and learn about the industry first-hand.

Learn More
Related Programs

Follow your passion

Information Technology: Network & User Support

Information Technology: Network & User Support

Associate of Applied Science Degree (A.A.S.)

Network Administration & Engineering Technology

Network Administration & Engineering Technology

Bachelor of Science Degree (B.S.) 

Software Development & Information Management

Software Development & Information Management

Bachelor of Science Degree (B.S.) 

Student Life

Lead and put your skills to the test

Information Security Association (ISA)

Information Security Association (ISA)

ISA is a security club that encompasses all IT majors. It stresses the importance of security through networking, programming, security, and even average computer users.

Student Organizations at Penn College

Student Organizations at Penn College

Your college experience is about more than the classroom. Join one of 65+ clubs and organizations, or create your own.


Penn College grad ‘launches’ photography career

Christopher J. Herzog doesn’t remember his first photo subjects as a Pennsylvania College of Technology student. But memories of ...


IT expert treats students to tales of foiling hackers’ trickery

Appropriately invited by Penn College’s Information Security Association, an authority on network intrusion (and ...


Cybersecurity expert to speak at Penn College

A learning opportunity for Pennsylvania College of Technology students is being extended to the community when an expert on ...

Gain global experience
Study Abroad

Gain global experience

See the world via Williamsport. Take your education abroad and get hands-on experience learning about your industry on a global scale.

Learn More

Our Leadership

Faculty Story

Jacob Miller and Sandra Gorka, both computer science professors, were featured in the Washington Post for their efforts in extending cybersecurity education to high school students.

Read Their Story

More Information
  • This program was developed to meet the curricular recommendations for the National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education, a joint effort of the NSA and DHS.
  • Operates on an A,B,C,F grading scale for all major courses.

Students must complete all required courses in the Information Assurance and Cyber Security major (those with the alpha-designators CIT, EET, IAS, LAS, and MTH) with a grade of "C" or higher.  Additionally, any course approved for use as the IAS elective must also be completed with a grade of "C" or higher.

Students seeking entrance through transfer should strive to take courses at their respective institutions that provide competency in the following areas; programming, two semesters minimum (same language); database; networking, two semesters minimum; UNIX and/or Linux; and calculus for engineering or math majors.  Students planning to transfer from another college and wanting specific course advice should consult with the IT faculty at Penn College.

View general transfer information

Alternative Credit refers to academic credits earned through means other than traditional college course completion, including: credit by exam, articulation, proof of competency gained in high school, work/life experience, and advanced placement.

Visit the Alternative Credit Options page for requirements and procedures and for information on credit through Advanced Placement.

Special Considerations: Many jobs in information security will require background checks and/or security clearances. Ethical behavior is necessary if a student expects to succeed in this field. Additionally, due to the rigorous math requirements of this program, prospective students should consider applying early and remediating needed classes (such as Algebra or Pre-Calculus) prior to entering your first semester at Penn College.

A laptop/notebook computer is required for enrollment in major courses. Laptop specifications

Uniforms and tools are available for purchase through The College Store and Penn State Computer Store .

  • Mr. James R Ankers, CISSP, CISA, IT Specialist (INFOSEC), United States Navy
  • Mr. Daniel J Clarke, '07, Senior Solutions Architect, Arraya Solutions
  • Mr. Peter Codispoti, '73, Senior Systems Analyst, Furniture Division, Brodart
  • Dr. Todd W Griffith, Chief Technology Officer, Discovery Machine Corporation
  • Mr. Brandon J Howe, '01, Sr. IT Analyst, Anadarko Petroleum Corp.
  • Dr. Karl M Kapp, Assistant Director, Institute for Interactive Technologies, Bloomsburg University
  • Dr. Krish Pillai, Ph.D., Assistant Professor, Lock Haven University
  • Mr. Mark J Watson, '85, Administrative Director, Corporate Information Technology, Susquehanna Health
  • Mr. Benjamin Wright, Attorney, Instructor, SANS Institute