{"id":14957,"date":"2025-01-22T14:03:15","date_gmt":"2025-01-22T19:03:15","guid":{"rendered":"https:\/\/www.virginiawestern.edu\/academics-new\/?page_id=14957&#038;preview_id=14957"},"modified":"2026-02-26T14:20:28","modified_gmt":"2026-02-26T19:20:28","slug":"ist-security-network","status":"publish","type":"page","link":"https:\/\/www.virginiawestern.edu\/academics\/it\/ist-security-network\/","title":{"rendered":"IST: Cyber Security &amp; Network Administration Specialization"},"content":{"rendered":"<style>.kb-row-layout-id14957_90e237-0f > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id14957_90e237-0f > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id14957_90e237-0f > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, calc(74% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)))minmax(0, calc(26% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)));}.kb-row-layout-id14957_90e237-0f > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id14957_90e237-0f > .kt-row-column-wrap{grid-template-columns:minmax(0, 2fr) minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id14957_90e237-0f > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id14957_90e237-0f alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-left-golden kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column14957_20bfb8-59 > .kt-inside-inner-col,.kadence-column14957_20bfb8-59 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column14957_20bfb8-59 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column14957_20bfb8-59 > .kt-inside-inner-col{flex-direction:column;}.kadence-column14957_20bfb8-59 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column14957_20bfb8-59 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column14957_20bfb8-59{position:relative;}@media all and (max-width: 1024px){.kadence-column14957_20bfb8-59 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column14957_20bfb8-59 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column14957_20bfb8-59\"><div class=\"kt-inside-inner-col\">\n<p>The IST: Cyber Security &amp; Network Administration Program at Virginia Western will equip you with&nbsp;expertise&nbsp;required&nbsp;for a career in cyber security and computer networking, offering diverse roles such as systems administration, infrastructure administration, network security administration, network technician, desktop support&nbsp;technician&nbsp;and security analyst. Throughout the&nbsp;program&nbsp;coursework, you will have the opportunity to earn valuable industry certifications, bolstering your professional credentials. Experienced faculty take a hands-on approach to teaching, offering practical exercises that allow you to learn through real-world experiences.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>What do cyber security professionals do?<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Threat monitoring and detection:<\/strong>&nbsp;Continuously&nbsp;monitor&nbsp;for security threats and breaches&nbsp;<\/li>\n\n\n\n<li><strong>Incident response:<\/strong>&nbsp;Investigate and respond to security incidents&nbsp;<\/li>\n\n\n\n<li><strong>Vulnerability assessment:<\/strong>&nbsp;Identify&nbsp;and address system vulnerabilities&nbsp;<\/li>\n\n\n\n<li><strong>Security policy enforcement:<\/strong>&nbsp;Develop and enforce security policies and best practices&nbsp;<\/li>\n\n\n\n<li><strong>Log analysis and investigation:<\/strong>&nbsp;Analyze logs and security events for potential threats&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>What do network\/system administrators do?<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>System configuration and maintenance:<\/strong>&nbsp;Set up and&nbsp;maintain&nbsp;server hardware and software&nbsp;<\/li>\n\n\n\n<li><strong>Network configuration and maintenance:<\/strong>&nbsp;Set up,&nbsp;configure&nbsp;and&nbsp;maintain&nbsp;network infrastructure&nbsp;<\/li>\n\n\n\n<li><strong>User and device management:<\/strong>&nbsp;Manage user accounts, access&nbsp;permission&nbsp;and support networked devices&nbsp;<\/li>\n\n\n\n<li><strong>Network security and compliance:<\/strong>&nbsp;Implement security measures,&nbsp;monitor&nbsp;for threats,&nbsp;monitor&nbsp;security measures and compliance&nbsp;<\/li>\n\n\n\n<li><strong>Network\/system troubleshooting and support:<\/strong>&nbsp;Resolve network-related issues and provide user support; provide technical support; and troubleshoot system issues&nbsp;<\/li>\n\n\n\n<li><strong>Backup and disaster recovery:<\/strong>&nbsp;Plan and execute backup and recovery strategies for the network&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>Why choose Virginia Western&#8217;s IST: Cyber Security &amp; Network Administration Program?<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A 20-year Tech Talent grant provides equipment and online tutoring for all students.&nbsp;<\/li>\n\n\n\n<li>The Cyber Security program has been&nbsp;designated&nbsp;as a National Center&nbsp;of&nbsp;Academic Excellence in Cyber Defense Education by the National Security Agency and Homeland Security Administration.&nbsp;<\/li>\n\n\n\n<li>Industry certifications are strongly encouraged, and costs of certifications may be reimbursed for eligible students.&nbsp;<\/li>\n\n\n\n<li>The Virginia Western Education Foundation offers scholarships to aid in tuition, books, living expenses and&nbsp;costs of certification&nbsp;for eligible students.&nbsp;<\/li>\n\n\n\n<li>The program is offered online or in person.&nbsp;<\/li>\n\n\n\n<li>New cyber security and network labs are open on campus.&nbsp;&nbsp;<\/li>\n\n\n\n<li>A student computer club provides activities for learning and networking with other students in the field.&nbsp;<\/li>\n\n\n\n<li>Virginia residents may qualify for G3 tuition&nbsp;assistance.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><em>This course of study includes required completion of the&nbsp;<a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/it-cyber-security\/\">IST: Cyber Security Certificate<\/a>&nbsp;which is designated as a validated program of study by the&nbsp;<a href=\"https:\/\/www.caecommunity.org\/about-us\/what-cae-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">Center for Academic Excellence in Cybersecurity Education<\/a>.<\/em><\/p>\n\n\n\n<p><strong>This program is available completely online.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-black-color has-text-color has-background has-link-color has-text-align-center wp-element-button\" href=\"https:\/\/catalog.virginiawestern.edu\/preview_program.php?catoid=25&amp;poid=3505&amp;returnto=2597\" style=\"border-top-left-radius:5px;border-top-right-radius:5px;border-bottom-left-radius:5px;border-bottom-right-radius:5px;background-color:#53c6d6;text-transform:uppercase\">What Classes Do I Take?<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--2\"><a class=\"wp-block-button__link has-black-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/youtu.be\/goKiX8gLNj4\" style=\"border-top-left-radius:5px;border-top-right-radius:5px;border-bottom-left-radius:5px;border-bottom-right-radius:5px;background-color:#cfd1d7;text-transform:uppercase\">Choose Your Stem<\/a><\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Related Programs<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/information-systems-technology\/\">Information Systems Technology (IST)<\/a>&nbsp;(Associate of Applied Science)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/ist-data-analytics\/\">IST: Data Analytics and Programming Solutions Specialization<\/a>&nbsp;(Associate of Applied Science)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/science-engineering\/computer-science\/\">Computer Science<\/a>&nbsp;(Associate of Science)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/science-engineering\/eng-computer-science\/\">Engineering: Computer Science<\/a>&nbsp;(Associate of Science)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/it-cisco-ccna\/\">IST: Cisco&trade; CCNA&trade; Networking<\/a>&nbsp;(Career Studies Certificate)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/it-cyber-security\/\">IST: Cyber Security<\/a>&nbsp;(Career Studies Certificate)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/data-analytics-csc\/\">IST: Data Analytics and Programming Solutions<\/a>&nbsp;(Career Studies Certificate)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/it-support-analyst\/\">IST: Information Technology Support Analyst<\/a>&nbsp;(Career Studies Certificate)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/it-network-security\/\">IST: Network &amp; Security Administration<\/a>&nbsp;(Career Studies Certificate)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Transferring<\/h2>\n\n\n\n<p>If you&#8217;re considering an AAS program and interested in transferring to a four-year college or university, contact a program advisor upon entry to the program to discuss your plans.&nbsp;&nbsp;<\/p>\n\n\n<h2>User Groups &amp; Professional Societies<\/h2>\r\n<p><strong>Roanoke-Blacksburg Technology Council<\/strong> (RBTC) is a non-profit, member-driven association of businesses and organizations working together to promote the growth of the region's technology sector. With over 200 member companies and 24,000 employee members, RBTC hosts a very active list of events including TechNite, Tech and Toast, Security Forums, and Peer Roundtables.\u00a0<a href=\"https:\/\/rbtc.tech\/\" rel=\"noopener\">https:\/\/rbtc.tech\/<\/a><\/p>\r\n\r\n<p><strong>Roanoke Infosec Exchange<\/strong> (RISE) brings together IT professionals in the Roanoke area to discuss cutting edge topics and applications in the Cyber Security world.\u00a0 Meetings are held the second Thursday of every month at various companies around town.\u00a0 <a href=\"https:\/\/roanokeinfosec.com\">https:\/\/roanokeinfosec.com<\/a><\/p>\r\n\r\n<p><strong>The Oracle Academy<\/strong> mission is to advance computer science education globally to drive knowledge, innovation, skills development, and diversity in technology fields. As a member, Virginia Western receives expertly developed learning resources and world-class industry technologies for both the Java and Oracle database world.\u00a0 Students receive discounts on industry tests.\u00a0<a href=\"https:\/\/academy.oracle.com\/\" rel=\"noopener\">https:\/\/academy.oracle.com<\/a><\/p>\r\n\r\n<p><strong>Association for Computing Machinery<\/strong> (ACM), the world's largest educational and scientific computing society, delivers resources that advance computing as a science and a profession. ACM provides the computing field's premier Digital Library and serves its members and the computing profession with leading-edge publications, conferences, and career resources.\u00a0<a href=\"http:\/\/www.acm.org\/\" rel=\"noopener\">http:\/\/www.acm.org<\/a>.<\/p>\r\n\r\n<p><strong>The Cisco Networking Academy<\/strong> is an IT skills and career building program for learning institutions and individuals worldwide. More than 5.5 million people have joined the Networking Academy and become a force for change in the global economy since 1997. Virginia Western is a part of the Cisco academy and teaches the Cisco curriculum in both the Networking and the Security programs.\u00a0<a href=\"https:\/\/www.netacad.com\/\" rel=\"noopener\">https:\/\/www.netacad.com<\/a><\/p>\n<\/div><\/div>\n\n\n<style>.kadence-column14957_81158d-fb > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-xs, 1rem);padding-right:var(--global-kb-spacing-xs, 1rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);}.kadence-column14957_81158d-fb > .kt-inside-inner-col,.kadence-column14957_81158d-fb > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column14957_81158d-fb > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column14957_81158d-fb > .kt-inside-inner-col{flex-direction:column;}.kadence-column14957_81158d-fb > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column14957_81158d-fb > .kt-inside-inner-col{background-color:#18284a;}.kadence-column14957_81158d-fb > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column14957_81158d-fb, .kadence-column14957_81158d-fb h1, .kadence-column14957_81158d-fb h2, .kadence-column14957_81158d-fb h3, .kadence-column14957_81158d-fb h4, .kadence-column14957_81158d-fb h5, .kadence-column14957_81158d-fb h6{color:#ffffff;}.kadence-column14957_81158d-fb a{color:#ffffff;}.kadence-column14957_81158d-fb a:hover{color:#fec00f;}.kadence-column14957_81158d-fb{position:relative;}@media all and (max-width: 1024px){.kadence-column14957_81158d-fb > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column14957_81158d-fb > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column14957_81158d-fb feature-box-academic\"><div class=\"kt-inside-inner-col\">\n<h3 class=\"wp-block-heading\">Program Cost &amp; Length<\/h3>\n\n\n\n<p><strong>Est. Tuition*:<\/strong> $<span id=\"tuition\"><\/span><br><strong>Program Length:<\/strong> 2 Years<br><strong>Credits: <\/strong><span id=\"hours\">64<\/span><\/p>\n\n\n\n<div class=\"disclaimer\"><p>*Estimated cost reflects in-state rate and is subject to change. <a href=\"https:\/\/www.virginiawestern.edu\/pay\/cost-of-attendance\/\">Click here for the cost of attendance for financial aid<\/a>.<\/p><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Program Head<\/h3>\n\n\n\n<p><strong>Dr. Diane D. Wolff<\/strong><br \/>\n<em>Professor, Computer Science &amp; Information Technology<\/em><br \/>\n<i class=\"fa fa-envelope\" title=\"email\"><\/i> <a href=\"mailto:dwolff@virginiawestern.edu\">dwolff@virginiawestern.edu<\/a><br \/>\n<i class=\"fa fa-phone-alt\" title=\"phone number\"><\/i>\u00a0540-857-6214<br \/>\n<i class=\"fa fa-map-marker\" title=\"location\"><\/i>\u00a0Business Science M310<\/p>\n<p>B.S. &#8211; University of Northern Iowa<br \/>\nM.A.L.S. &#8211; Hollins University<br \/>\nPh.D. &#8211; Arizona State University<\/p>\n\n\n\n<h3>Have Questions? Contact Us<\/h3>\n<p><i class=\"fa fa-envelope\" title=\"email\"><\/i>\u00a0<a href=\"mailto:enroll@virginiawestern.edu\">enroll@virginiawestern.edu<\/a><br \/>\n<i class=\"fa fa-map-marker\" title=\"location\"><\/i> Chapman Hall<br \/>\n<i class=\"fa fa-phone-alt\" title=\"phone number\"><\/i> <a href=\"tel:855-874-6690\">855-874-6690<\/a><\/p>\n\n\n\n<p class=\"school\">School of STEM &#038; <br \/>Workforce Solutions<\/p>\n\n\n\n<style>.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box14957_19d9e3-22 .kt-blocks-info-box-link-wrap{max-width:unset;}.kt-info-box14957_19d9e3-22 .kt-blocks-info-box-link-wrap{border-top:3px solid #ffffff;border-right:3px solid #ffffff;border-bottom:3px solid #ffffff;border-left:3px solid #ffffff;border-top-left-radius:10px;border-top-right-radius:10px;border-bottom-right-radius:10px;border-bottom-left-radius:10px;background:#53c6d6;padding-top:var(--global-kb-spacing-xxs, 0.5rem);padding-right:var(--global-kb-spacing-xxs, 0.5rem);padding-bottom:var(--global-kb-spacing-xxs, 0.5rem);padding-left:var(--global-kb-spacing-xxs, 0.5rem);margin-top:var(--global-kb-spacing-sm, 1.5rem);margin-bottom:var(--global-kb-spacing-sm, 1.5rem);}.kt-info-box14957_19d9e3-22 .kadence-info-box-icon-container .kt-info-svg-icon, .kt-info-box14957_19d9e3-22 .kt-info-svg-icon-flip, .kt-info-box14957_19d9e3-22 .kt-blocks-info-box-number{font-size:35px;}.kt-info-box14957_19d9e3-22 .kt-blocks-info-box-media{color:#000000;border-radius:200px;overflow:hidden;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:10px;margin-right:10px;margin-bottom:0px;margin-left:0px;}.kt-info-box14957_19d9e3-22 .kt-infobox-textcontent p.kt-blocks-info-box-title{color:#000000;font-family:-apple-system,BlinkMacSystemFont,\"Segoe UI\",Roboto,Oxygen-Sans,Ubuntu,Cantarell,\"Helvetica Neue\",sans-serif, \"Apple Color Emoji\", \"Segoe UI Emoji\", \"Segoe UI Symbol\";font-style:normal;font-weight:700;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:5px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box14957_19d9e3-22 .kt-infobox-textcontent .kt-blocks-info-box-text{color:#000000;}.wp-block-kadence-infobox.kt-info-box14957_19d9e3-22 .kt-blocks-info-box-text{font-weight:400;}.kt-info-box14957_19d9e3-22 .kt-blocks-info-box-learnmore{background:transparent;border-width:0px 0px 0px 0px;padding-top:4px;padding-right:8px;padding-bottom:4px;padding-left:8px;margin-top:10px;margin-right:0px;margin-bottom:10px;margin-left:0px;}@media all and (max-width: 1024px){.kt-info-box14957_19d9e3-22 .kt-blocks-info-box-link-wrap{border-top:3px solid #ffffff;border-right:3px solid #ffffff;border-bottom:3px solid #ffffff;border-left:3px solid #ffffff;}}@media all and (max-width: 767px){.kt-info-box14957_19d9e3-22 .kt-blocks-info-box-link-wrap{border-top:3px solid #ffffff;border-right:3px solid #ffffff;border-bottom:3px solid #ffffff;border-left:3px solid #ffffff;}}<\/style>\n<div class=\"wp-block-kadence-infobox kt-info-box14957_19d9e3-22 feature-box-light\"><span class=\"kt-blocks-info-box-link-wrap info-box-link kt-blocks-info-box-media-align-left kt-info-halign-left kb-info-box-vertical-media-align-top\"><div class=\"kt-blocks-info-box-media-container\"><div class=\"kt-blocks-info-box-media kt-info-media-animate-none\"><div class=\"kadence-info-box-icon-container kt-info-icon-animate-none\"><div class=\"kadence-info-box-icon-inner-container\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_info-circle kt-info-svg-icon\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.043 8 8 119.083 8 256c0 136.997 111.043 248 248 248s248-111.003 248-248C504 119.083 392.957 8 256 8zm0 110c23.196 0 42 18.804 42 42s-18.804 42-42 42-42-18.804-42-42 18.804-42 42-42zm56 254c0 6.627-5.373 12-12 12h-88c-6.627 0-12-5.373-12-12v-24c0-6.627 5.373-12 12-12h12v-64h-12c-6.627 0-12-5.373-12-12v-24c0-6.627 5.373-12 12-12h64c6.627 0 12 5.373 12 12v100h12c6.627 0 12 5.373 12 12v24z\"\/><\/svg><\/span><\/div><\/div><\/div><\/div><div class=\"kt-infobox-textcontent\"><p class=\"kt-blocks-info-box-title\">DID YOU KNOW?<\/p><p class=\"kt-blocks-info-box-text\"><p>This program is eligible for G3 funding assistance!\u00a0<a href=\"https:\/\/www.virginiawestern.edu\/freecollege\/\">Click here for more information and to contact an advisor<\/a>.<\/p>\n<\/p><\/div><\/span><\/div>\n\n\n<!-- Information Systems Technology: Network and Security Administration -->\r\n  <div id=\"program-widget-7fd934-wrapper\" style=\"height:100%\" >\r\n  <script type=\"text\/javascript\" src=\"https:\/\/widget.emsicc.com\/scripts.js\"><\/script>\r\n  <script> generateWidget({clientId:'virginiawestern',hasAllLocations:'false',hasCareerList:'true',hasEmployment:'true',hasImages:'true',hasJobOpenings:'true',hasNationalData:'true',hasOutlook:'true',hasSkills:'false',hasVisitButton:'true',hasWages:'true',id:'program-widget-7fd934',isHourlyWage:'false',labelSet:'default',locationName:'Roanoke%2C%20VA',orderCareersBy:'None',primaryColor:'%2318284a',programs:'vw0049', \r\n  title:'virginiawestern widget',visitButtonColor:'%230053a5',headingText:'Potential%20Careers%20%26%20Labor%20Market%20Information'})\r\n  <\/script>\r\n  <\/div>\n<\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The IST: Cyber Security &amp; Network Administration Program at Virginia Western will equip you with&nbsp;expertise&nbsp;required&nbsp;for a career in cyber security and computer networking, offering diverse roles such as systems administration, infrastructure administration, network security administration, network technician, desktop support&nbsp;technician&nbsp;and security analyst. Throughout the&nbsp;program&nbsp;coursework, you will have the opportunity to earn valuable industry certifications, bolstering your&hellip; <a class=\"continue\" href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/ist-security-network\/\">Continue Reading<span> IST: Cyber Security &amp; Network Administration Specialization<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":14372,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-14957","page","type-page","status-publish","hentry"],"featured_image_src":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IST: Cyber Security &amp; Network Administration Specialization - Programs &amp; Training at Virginia Western<\/title>\n<meta name=\"description\" content=\"The IST: Cyber Security &amp; Network Administration AAS program at Virginia Western prepares you to work in the information systems career field in a broad range of roles.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IST: Cyber Security &amp; Network Administration Specialization - Programs &amp; Training at Virginia Western\" \/>\n<meta property=\"og:description\" content=\"The IST: Cyber Security &amp; Network Administration AAS program at Virginia Western prepares you to work in the information systems career field in a broad range of roles.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.virginiawestern.edu\/academics\/it\/ist-security-network\/\" \/>\n<meta property=\"og:site_name\" content=\"Programs &amp; Training at Virginia Western\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-26T19:20:28+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/it\\\/ist-security-network\\\/\",\"url\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/it\\\/ist-security-network\\\/\",\"name\":\"IST: Cyber Security &amp; Network Administration Specialization - Programs &amp; Training at Virginia Western\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/#website\"},\"datePublished\":\"2025-01-22T19:03:15+00:00\",\"dateModified\":\"2026-02-26T19:20:28+00:00\",\"description\":\"The IST: Cyber Security & Network Administration AAS program at Virginia Western prepares you to work in the information systems career field in a broad range of roles.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/it\\\/ist-security-network\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/it\\\/ist-security-network\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/it\\\/ist-security-network\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer &amp; Information Technology\",\"item\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IST: Cyber Security &amp; Network Administration Specialization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/#website\",\"url\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/\",\"name\":\"Programs &amp; Training at Virginia Western\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IST: Cyber Security &amp; Network Administration Specialization - Programs &amp; Training at Virginia Western","description":"The IST: Cyber Security & Network Administration AAS program at Virginia Western prepares you to work in the information systems career field in a broad range of roles.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"IST: Cyber Security &amp; Network Administration Specialization - Programs &amp; Training at Virginia Western","og_description":"The IST: Cyber Security & Network Administration AAS program at Virginia Western prepares you to work in the information systems career field in a broad range of roles.","og_url":"https:\/\/www.virginiawestern.edu\/academics\/it\/ist-security-network\/","og_site_name":"Programs &amp; Training at Virginia Western","article_modified_time":"2026-02-26T19:20:28+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.virginiawestern.edu\/academics\/it\/ist-security-network\/","url":"https:\/\/www.virginiawestern.edu\/academics\/it\/ist-security-network\/","name":"IST: Cyber Security &amp; Network Administration Specialization - Programs &amp; Training at Virginia Western","isPartOf":{"@id":"https:\/\/www.virginiawestern.edu\/academics\/#website"},"datePublished":"2025-01-22T19:03:15+00:00","dateModified":"2026-02-26T19:20:28+00:00","description":"The IST: Cyber Security & Network Administration AAS program at Virginia Western prepares you to work in the information systems career field in a broad range of roles.","breadcrumb":{"@id":"https:\/\/www.virginiawestern.edu\/academics\/it\/ist-security-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.virginiawestern.edu\/academics\/it\/ist-security-network\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.virginiawestern.edu\/academics\/it\/ist-security-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.virginiawestern.edu\/academics\/"},{"@type":"ListItem","position":2,"name":"Computer &amp; Information Technology","item":"https:\/\/www.virginiawestern.edu\/academics\/it\/"},{"@type":"ListItem","position":3,"name":"IST: Cyber Security &amp; Network Administration Specialization"}]},{"@type":"WebSite","@id":"https:\/\/www.virginiawestern.edu\/academics\/#website","url":"https:\/\/www.virginiawestern.edu\/academics\/","name":"Programs &amp; Training at Virginia Western","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.virginiawestern.edu\/academics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/pages\/14957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/comments?post=14957"}],"version-history":[{"count":0,"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/pages\/14957\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/pages\/14372"}],"wp:attachment":[{"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/media?parent=14957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/categories?post=14957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/tags?post=14957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}