
B.S., Cybersecurity Analytics and Operations
Identify. Analyze. Defend. Respond.
There are hundreds of millions of attempted cyberattacks each year, costing people and organizations trillions of dollars. The B.S., Cybersecurity Analytics and Operations program positions you to leverage the cyber technical and risk management skills needed to evaluate risk and defend against these attacks. By understanding how adversaries think and deploying cutting-edge cyber defense techniques, you'll protect information systems, discover vulnerabilities, manage network security devices, analyze data, and communicate the risks and impacts of cyberattacks to stakeholders.
Is Cybersecurity Analytics and Operations Right for Me?
Cybersecurity Analytics and Operations combines technology with math, law and policy, programming, psychology, criminology and business to protect critical systems. This program could be a great fit if you want to
- protect digital information, data stores, and computer networks from threats
- learn how we can keep sensitive information out of the hands of hackers, cybercriminals, and terrorist organizations
- work on a team to solve technical problems for organizations

What You'll Study
Gain foundational knowledge and state-of-the-art skills needed to anticipate and defend against computer attacks by exploring topics like these.
- Incident Handling and Response
- Cyber Forensics
- Cyber Technologies Studio
- Malware Analytics
- Network Security
- Risk Management
- Information Security Management
- Decision Theory and Analysis
Application Focus Areas
Pick an application focus area or work with an adviser to create your own so you can develop and apply more specialized knowledge in a specific field.
- Application development
- Economics
- Enterprise technology
- Entrepreneurship and Business of Technology
- Geopolitics
- Health care
- Law and policy
- Custom Application Focus
Earn a B.S. and M.S. at the Same Time
You can pursue a B.S. in Cybersecurity Analytics and Operations and a master's degree at the same time through the Integrated Undergraduate-Graduate (IUG) degree program. IUGs make it possible to complete both an undergraduate and graduate degree in five years!

The Power of Internships
Every Cybersecurity Analytics and Operations student must complete at least one internship before graduating—most complete more than one, and 84% receive a job offer from an internship provider. With hundreds of organizations recruiting and a dedicated Career Solutions team to support you, you'll have the tools and opportunities to launch your career.
View Past Internships
“The most important thing I’ve learned at Penn State is the value of the people you surround yourself with. The Competitive Cyber Security Orgnization allowed me to learn from so many talented individuals — both older and younger — and I credit those relationships to the success I’ve found outside the classroom and as I start my career. They also sparked a passion to continue sharing what I’ve learned to give others an avenue to find themselves in such a large field.”
Jenna Fox '25 , Advisory Red Consultant, Security Risk Advisors
Discover Your Career
Technology is ever-changing, and so are the careers that create, use, and study it. As you work toward your degree, you’ll identify and refine your career interests through courses, student organizations, and experiential opportunities. With guidance and resources from our dedicated Career Solutions team—from your first job to the executive suite—you'll gain the technical expertise, business savvy, and communication skills to lead in business, health care, defense, technology, and countless other industries.
Computer Forensics Specialist
Assists law enforcement in cyber crimes by evaluating attacks, collecting evidence, and extracting data to identify the attack type, perpetrator, and stolen information.
Security Solutions Analyst
Secures, develops, implements, and manages information security, governance, and risk programs, analyzing business processes, identifying security risks, and designing solutions to protect data and systems.
Technical Risk Advisor
Scopes and monitors technology risks, performs assessments, oversees control testing, supports remediation, and provides technical guidance to improve and implement effective technology controls.
Cyber Intelligence Analyst
Collects and analyzes information on internet-based malware crimes, predicts cyber criminal activities, and creates threat intelligence reports for decision-makers and security officials.
Business Systems Analyst/Consultant
Analyzes business problems and designs technology solutions, bridging gaps through architecture, tools, or software applications to resolve issues and improve processes.
Cyberthreat Advisor
Analyzes the threat landscape and recommends security measures to help companies understand and prepare for cyber risks.
Network and Systems Security Analyst
Protects the usability and integrity of networks and data, using hardware and software technologies to manage access and prevent threats from entering or spreading.
Network Infrastructure Engineer
Designs and implements computer networks, focusing on high-level planning and selection of data communication components to meet user and corporate needs, including LAN, WAN, Internet, and intranet integration.
Network Security Engineer
Implements, maintains, and integrates corporate WAN, LAN, and server architecture. Administers network security hardware/software, enforces security policies, and supports external audits, troubleshooting, and perimeter security.

Competitive Cyber Security Organization
Through undergraduate research, experiential learning opportunities, and student organizations like the Competitive Cyber Security Organization, Cybersecurity Analytics and Operations students can extend learning far beyond the classroom. CCSO help helps students build their cyberdefense skills by participating in a variety of cybersecurity events throughout the year, where they compete against university teams from around the world in real-world challenges.
Learn about CCSO