Two people review a map visualization on a large screen.

B.S., Security and Risk Analysis

Analyze. Mitigate. Communicate. Protect.

Having a highly trained analytic workforce is critical to protecting the critical assets and infrastructure that support our everyday lives. The B.S., Security and Risk Analysis program positions you to develop these analytical skills that can prepare you to address the security and risk challenges facing individuals, organizations, and the nation. By understanding how intelligence is collected and analyzed, you can communicate the information needed to help decision-makers reduce vulnerabilities, protect resources, and optimize investments.

Is Security and Risk Analysis Right for Me?

SRA combines technology with math, law and policy, and psychology, enabling you to create a safer and more secure world. This program could be a great fit if you want to

  • protect people, information, and assets from manmade and natural threats
  • leverage critical thinking and problem-solving to pursue mission-oriented work
  • make informed strategic decisions that help to defend critical infrastructures

Help Me Find My Major

What You'll Study

Gain foundational knowledge and state-of-the-art skills needed to protect critical assets and infrastructure by exploring topics like these.

  • Threats of Terrorism and Crime
  • Intelligence Environment
  • Deception and Counter Deception
  • Decision Theory and Analysis
  • Risk Analysis in a Security Context
  • International Relations
  • Visual Analytics

Suggested Academic Plan

Support of Option Courses

Support of option courses add value to your degree and educational experience by taking courses around a cohesive theme like these.

  • Business
  • Communications
  • Crime/Criminology
  • Cybersecurity
  • Geography
  • Global Security
  • Military Studies

Support of Option Courses

National Center of Academic Excellence

National Centers of Academic Excellence in Cybersecurity seal.

The College of IST is recognized as a National Center of Academic Excellence in Cyber Defense by the National Security Agency and the Department of Homeland Security. SRA graduates can earn a Letter of Recognition and Certificate of Achievement from these agencies, which certify that the student graduated from an institution and program whose security-related faculty, resources, curricula, and commitment were evaluated and found to be of high quality.

NSA Certificate

Earn a B.S. and M.S. at the Same Time

You can pursue a B.S. in Security and Risk Analysis and a master's degree at the same time through the Integrated Undergraduate-Graduate (IUG) degree program. IUGs make it possible to complete both an undergraduate and graduate degree in five years!

Students interact with a data visualization on a digital table.

The Power of Internships

Every Security and Risk Analysis student must complete at least one internship before graduating—most complete more than one, and 84% receive a job offer from an internship provider. With hundreds of organizations recruiting and a dedicated Career Solutions team to support you, you'll have the tools and opportunities to launch your career.

View Past Internships
Photo of Corey Lee

"SRA was perfect for me because it merged tech with problem solving. It let me explore all of these different aspects—analytics, economics, computer science, risk analysis—and how to put those ideas together. It gave me an understanding of how to break down complex problems. The diversity of what I learned gave me a holistic educational experience and has been practical to life in general."

Corey Lee '24 , Security CTO, Microsoft Corp.

Discover Your Career

Technology is ever-changing, and so are the careers that create, use, and study it. As you work toward your degree, you’ll identify and refine your career interests through courses, student organizations, and experiential opportunities. With guidance and resources from our dedicated Career Solutions team—from your first job to the executive suite—you'll gain the technical expertise, business savvy, and communication skills to lead in business, health care, defense, technology, and countless other industries.

Cybersecurity Engineer

Focuses on designing systems resilient to disruptions, from natural disasters to malicious acts, ensuring solutions meet functional requirements while preventing misuse through security policies.

IT Auditor

Evaluates IT infrastructure to ensure effectiveness, security, and compliance, identifying vulnerabilities, assessing risks, and recommending improvements to strengthen controls and mitigate threats.

Security Solutions Analyst

Secures, develops, implements, and manages information security, governance, and risk programs, analyzing business processes, identifying security risks, and designing solutions to protect data and systems.

Enterprise Risk and Security Solutions Analyst

Identifies, assesses, and manages risks, protecting the enterprise’s resources, products, services, and external impacts on society and markets.

Cloud and Infrastructure Services Consultant

Supports businesses by leveraging IT clouds, producing architectural artifacts like governance, security, and performance models, and facilitating cloud migrations for meaningful IT changes.

Risk Assurance Associate

Identifies, assesses, and mitigates risks by reviewing controls, generating reports, and providing recommendations to enhance risk management practices within an organization.

Technical Risk Advisor

Scopes and monitors technology risks, performs assessments, oversees control testing, supports remediation, and provides technical guidance to improve and implement effective technology controls.

IT Analyst

Analyzes and transmits specialized information, including acquiring, analyzing, indexing, and preparing abstracts. Manages technical information services, technology assessment, research support, and engineering services.

Client Security Inquiry Specialist

Provides solutions to guard against emerging threats, identifies malware, assesses security vulnerabilities, configures client security settings, and prioritizes issues through reports and alerts.

A student participates in a capture the flag cybersecurity exercise on a computer.

Red Cell Analytics Lab

Through undergraduate research, experiential learning opportunities, and student organizations like the Red Cell Analytics Lab, Security and Risk Analysis students can extend learning far beyond the classroom. The Red Cell Analytics Lab collaborates with Penn State and external partners to engage students in addressing real-world problems through structured analytics, critical thinking, and visual analytics.

Connect with Red Cell