What can I do with a business degree focused in information systems and cyber security?

Technology is the backbone of modern business—and so is protecting it. In Longwood’s ISCS concentration, you’ll learn how to design secure systems, defend against cyber threats, and leverage emerging technologies like blockchain and AI to gain a competitive edge.

Whether you're passionate about coding, digital forensics, or cloud architecture, this concentration will prepare you for one of today’s most high-demand, high-impact fields.


What jobs can I get with an information systems and cyber security concentration?

Longwood’s ISCS graduates leave with the skills to build, manage, and protect information systems—and the credentials to enter tech and business sectors alike. You’ll be ready to step into roles such as:

  • Cybersecurity Analyst
  • Network Administrator
  • Systems Security Engineer
  • Cloud Computing Services Architect
  • Penetration Tester
  • Database Analyst
  • Digital Forensics Investigator

You’ll also be well prepared for graduate studies in tech or business fields, and to pursue industry certifications in security, systems design, or analysis.


Information Systems and Cyber Security

You’ll study how to build strong technology systems—and how to defend them. This concentration blends core business skills with technical knowledge in security, programming, and data protection.

Topics you'll explore include:

  • Computer Networking
  • Programming
  • Secure System Design
  • Network & Systems Security
  • Cryptography
  • Social Engineering
  • Digital Forensics
  • Wireless Network Security
  • Identifying & Fixing System Vulnerabilities
  • Database Administration

You’ll also gain a strong foundation in business fundamentals—making you a tech expert who understands how cybersecurity fits into broader organizational goals.

See all Information Systems and Cyber Security (ISCS) courses in the Loading... major.

Can I minor in cyber security, forensics, and policy?

Absolutely. The Cyber Security, Forensics, and Policy minor gives students from any major the tools to understand and navigate the digital risks we all face today. You’ll learn how to spot suspicious activity on computer systems, collect and analyze digital evidence, and understand the laws and policies that shape how we protect data.

Whether you want to safeguard your own information, pursue a career in digital forensics, or advise organizations on security policies, this minor offers a strong foundation.

You’ll gain skills in:

  • Identifying malicious activity on networks and devices
  • Tracing digital evidence back to its source
  • Creating effective technology use and security policies
  • Understanding the legal framework for digital investigations

This minor is a great choice for students interested in law enforcement, cybersecurity, tech policy, or digital risk management—and for anyone who wants to become a more informed and capable digital citizen.

See all courses in the Loading....