{"id":14974,"date":"2025-01-23T12:18:22","date_gmt":"2025-01-23T17:18:22","guid":{"rendered":"https:\/\/www.virginiawestern.edu\/academics-new\/?page_id=14974&#038;preview_id=14974"},"modified":"2026-02-26T14:36:17","modified_gmt":"2026-02-26T19:36:17","slug":"it-cyber-security","status":"publish","type":"page","link":"https:\/\/www.virginiawestern.edu\/academics\/it\/it-cyber-security\/","title":{"rendered":"IST: Cyber Security"},"content":{"rendered":"<style>.kb-row-layout-id14974_25665c-2d > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id14974_25665c-2d > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id14974_25665c-2d > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, calc(74% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)))minmax(0, calc(26% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)));}.kb-row-layout-id14974_25665c-2d > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id14974_25665c-2d > .kt-row-column-wrap{grid-template-columns:minmax(0, 2fr) minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id14974_25665c-2d > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id14974_25665c-2d alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-left-golden kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column14974_ebf48b-5f > .kt-inside-inner-col,.kadence-column14974_ebf48b-5f > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column14974_ebf48b-5f > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column14974_ebf48b-5f > .kt-inside-inner-col{flex-direction:column;}.kadence-column14974_ebf48b-5f > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column14974_ebf48b-5f > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column14974_ebf48b-5f{position:relative;}@media all and (max-width: 1024px){.kadence-column14974_ebf48b-5f > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column14974_ebf48b-5f > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column14974_ebf48b-5f\"><div class=\"kt-inside-inner-col\">\n<p>The Cyber Security CSC will provide you with the knowledge and skills needed to secure servers and network infrastructures. Learn how to develop security infrastructure and recognize threats and vulnerabilities&nbsp;to&nbsp;networks and servers. These skills are essential for&nbsp;maintaining&nbsp;the security of online networks used by private industries and government organizations.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The Cyber Security CSC equips you with the skills needed for entry-level network security positions while strengthening your existing information technology skillset.&nbsp;You&#8217;ll&nbsp;develop an understanding of the importance of online networks in modern commerce and communication and learn how to keep the data and client information of companies and organizations secure.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Receive training for these entry-level careers:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Network analyst &nbsp;<\/li>\n\n\n\n<li>Security analyst&nbsp;<\/li>\n\n\n\n<li>Security architect&nbsp;<\/li>\n\n\n\n<li>Vulnerability analyst&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This program will prepare you to sit for the <strong>CompTIA Security+ Certification<\/strong> and the <strong>CompTIA Linux+ certification<\/strong>.&nbsp;CompTIA is an industry-leading organization that provides certifications across a variety of information technology concentrations.&nbsp;<\/p>\n\n\n\n<p>This Career Studies Certificate can be earned on its own, or as part of the <a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/ist-security-network\/\">IST: Cyber Security &amp; Network Administration<\/a> degree. It can also be stacked with other <a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/\">Computer Science and Information Systems Technology programs<\/a> to expand your career potential.&nbsp;<\/p>\n\n\n\n<p><strong>This program is available completely online.<\/strong><\/p>\n\n\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-black-color has-text-color has-background has-link-color has-text-align-center wp-element-button\" href=\"https:\/\/catalog.virginiawestern.edu\/preview_program.php?catoid=25&amp;poid=3511&amp;returnto=2597\" style=\"border-top-left-radius:5px;border-top-right-radius:5px;border-bottom-left-radius:5px;border-bottom-right-radius:5px;background-color:#53c6d6;text-transform:uppercase\">What Classes Do I Take?<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--2\"><a class=\"wp-block-button__link has-black-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/youtu.be\/goKiX8gLNj4\" style=\"border-top-left-radius:5px;border-top-right-radius:5px;border-bottom-left-radius:5px;border-bottom-right-radius:5px;background-color:#cfd1d7;text-transform:uppercase\">Choose Your STEM<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Related Programs<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/information-systems-technology\/\">Information Systems Technology<\/a> (Associate of Applied Science)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/ist-security-network\/\">IST: Cyber Security &amp; Network Administration Specialization<\/a> (Associate of Applied Science)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/ist-data-analytics\/\" type=\"page\" id=\"14963\">IST: Data Analytics &amp; Programming Solutions Specialization<\/a>&nbsp;(Associate of Applied Science)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/it-cisco-ccna\/\">IST: Cisco&trade; CCNA&trade; Networking<\/a>&nbsp;(Career Studies Certificate)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/data-analytics-csc\/\">IST: Data Analytics &amp; Programming Solutions<\/a>&nbsp;(Career Studies Certificate)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/it-support-analyst\/\">IST: Information Technology Support Analyst<\/a>&nbsp;(Career Studies Certificate)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/it-network-security\/\">IST: Network &amp; Security Administration<\/a>&nbsp;(Career Studies Certificate)<\/li>\n<\/ul>\n\n\n\n<h2>User Groups &amp; Professional Societies<\/h2>\r\n<p><strong>Roanoke-Blacksburg Technology Council<\/strong> (RBTC) is a non-profit, member-driven association of businesses and organizations working together to promote the growth of the region's technology sector. With over 200 member companies and 24,000 employee members, RBTC hosts a very active list of events including TechNite, Tech and Toast, Security Forums, and Peer Roundtables.\u00a0<a href=\"https:\/\/rbtc.tech\/\" rel=\"noopener\">https:\/\/rbtc.tech\/<\/a><\/p>\r\n\r\n<p><strong>Roanoke Infosec Exchange<\/strong> (RISE) brings together IT professionals in the Roanoke area to discuss cutting edge topics and applications in the Cyber Security world.\u00a0 Meetings are held the second Thursday of every month at various companies around town.\u00a0 <a href=\"https:\/\/roanokeinfosec.com\">https:\/\/roanokeinfosec.com<\/a><\/p>\r\n\r\n<p><strong>The Oracle Academy<\/strong> mission is to advance computer science education globally to drive knowledge, innovation, skills development, and diversity in technology fields. As a member, Virginia Western receives expertly developed learning resources and world-class industry technologies for both the Java and Oracle database world.\u00a0 Students receive discounts on industry tests.\u00a0<a href=\"https:\/\/academy.oracle.com\/\" rel=\"noopener\">https:\/\/academy.oracle.com<\/a><\/p>\r\n\r\n<p><strong>Association for Computing Machinery<\/strong> (ACM), the world's largest educational and scientific computing society, delivers resources that advance computing as a science and a profession. ACM provides the computing field's premier Digital Library and serves its members and the computing profession with leading-edge publications, conferences, and career resources.\u00a0<a href=\"http:\/\/www.acm.org\/\" rel=\"noopener\">http:\/\/www.acm.org<\/a>.<\/p>\r\n\r\n<p><strong>The Cisco Networking Academy<\/strong> is an IT skills and career building program for learning institutions and individuals worldwide. More than 5.5 million people have joined the Networking Academy and become a force for change in the global economy since 1997. Virginia Western is a part of the Cisco academy and teaches the Cisco curriculum in both the Networking and the Security programs.\u00a0<a href=\"https:\/\/www.netacad.com\/\" rel=\"noopener\">https:\/\/www.netacad.com<\/a><\/p>\n<\/div><\/div>\n\n\n<style>.kadence-column14974_021f03-35 > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-xs, 1rem);padding-right:var(--global-kb-spacing-xs, 1rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);}.kadence-column14974_021f03-35 > .kt-inside-inner-col,.kadence-column14974_021f03-35 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column14974_021f03-35 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column14974_021f03-35 > .kt-inside-inner-col{flex-direction:column;}.kadence-column14974_021f03-35 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column14974_021f03-35 > .kt-inside-inner-col{background-color:#18284a;}.kadence-column14974_021f03-35 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column14974_021f03-35, .kadence-column14974_021f03-35 h1, .kadence-column14974_021f03-35 h2, .kadence-column14974_021f03-35 h3, .kadence-column14974_021f03-35 h4, .kadence-column14974_021f03-35 h5, .kadence-column14974_021f03-35 h6{color:#ffffff;}.kadence-column14974_021f03-35 a{color:#ffffff;}.kadence-column14974_021f03-35 a:hover{color:#fec00f;}.kadence-column14974_021f03-35{position:relative;}@media all and (max-width: 1024px){.kadence-column14974_021f03-35 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column14974_021f03-35 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column14974_021f03-35 feature-box-academic\"><div class=\"kt-inside-inner-col\">\n<h3 class=\"wp-block-heading\">Program Cost &amp; Length<\/h3>\n\n\n\n<p><strong>Est. Tuition*:<\/strong> $<span id=\"tuition\"><\/span><br><strong>Program Length:<\/strong> 1 Year<br><strong>Credits: <\/strong><span id=\"hours\">26<\/span><\/p>\n\n\n\n<div class=\"disclaimer\"><p>*Estimated cost reflects in-state rate and is subject to change. <a href=\"https:\/\/www.virginiawestern.edu\/pay\/cost-of-attendance\/\">Click here for the cost of attendance for financial aid<\/a>.<\/p><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Program Head<\/h3>\n\n\n\n<p><strong>Dr. Diane D. Wolff<\/strong><br \/>\n<em>Professor, Computer Science &amp; Information Technology<\/em><br \/>\n<i class=\"fa fa-envelope\" title=\"email\"><\/i> <a href=\"mailto:dwolff@virginiawestern.edu\">dwolff@virginiawestern.edu<\/a><br \/>\n<i class=\"fa fa-phone-alt\" title=\"phone number\"><\/i>\u00a0540-857-6214<br \/>\n<i class=\"fa fa-map-marker\" title=\"location\"><\/i>\u00a0Business Science M310<\/p>\n<p>B.S. &#8211; University of Northern Iowa<br \/>\nM.A.L.S. &#8211; Hollins University<br \/>\nPh.D. &#8211; Arizona State University<\/p>\n\n\n\n<h3>Have Questions? Contact Us<\/h3>\n<p><i class=\"fa fa-envelope\" title=\"email\"><\/i>\u00a0<a href=\"mailto:enroll@virginiawestern.edu\">enroll@virginiawestern.edu<\/a><br \/>\n<i class=\"fa fa-map-marker\" title=\"location\"><\/i> Chapman Hall<br \/>\n<i class=\"fa fa-phone-alt\" title=\"phone number\"><\/i> <a href=\"tel:855-874-6690\">855-874-6690<\/a><\/p>\n\n\n\n<p class=\"school\">School of STEM &#038; <br \/>Workforce Solutions<\/p>\n\n\n\n<style>.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box14974_67d478-70 .kt-blocks-info-box-link-wrap{max-width:unset;}.kt-info-box14974_67d478-70 .kt-blocks-info-box-link-wrap{border-top:3px solid #ffffff;border-right:3px solid #ffffff;border-bottom:3px solid #ffffff;border-left:3px solid #ffffff;border-top-left-radius:10px;border-top-right-radius:10px;border-bottom-right-radius:10px;border-bottom-left-radius:10px;background:#53c6d6;padding-top:var(--global-kb-spacing-xxs, 0.5rem);padding-right:var(--global-kb-spacing-xxs, 0.5rem);padding-bottom:var(--global-kb-spacing-xxs, 0.5rem);padding-left:var(--global-kb-spacing-xxs, 0.5rem);margin-top:var(--global-kb-spacing-sm, 1.5rem);margin-bottom:var(--global-kb-spacing-sm, 1.5rem);}.kt-info-box14974_67d478-70 .kadence-info-box-icon-container .kt-info-svg-icon, .kt-info-box14974_67d478-70 .kt-info-svg-icon-flip, .kt-info-box14974_67d478-70 .kt-blocks-info-box-number{font-size:35px;}.kt-info-box14974_67d478-70 .kt-blocks-info-box-media{color:#000000;border-radius:200px;overflow:hidden;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:10px;margin-right:10px;margin-bottom:0px;margin-left:0px;}.kt-info-box14974_67d478-70 .kt-infobox-textcontent p.kt-blocks-info-box-title{color:#000000;font-family:-apple-system,BlinkMacSystemFont,\"Segoe UI\",Roboto,Oxygen-Sans,Ubuntu,Cantarell,\"Helvetica Neue\",sans-serif, \"Apple Color Emoji\", \"Segoe UI Emoji\", \"Segoe UI Symbol\";font-style:normal;font-weight:700;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:5px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box14974_67d478-70 .kt-infobox-textcontent .kt-blocks-info-box-text{color:#000000;}.wp-block-kadence-infobox.kt-info-box14974_67d478-70 .kt-blocks-info-box-text{font-weight:400;}.kt-info-box14974_67d478-70 .kt-blocks-info-box-learnmore{background:transparent;border-width:0px 0px 0px 0px;padding-top:4px;padding-right:8px;padding-bottom:4px;padding-left:8px;margin-top:10px;margin-right:0px;margin-bottom:10px;margin-left:0px;}@media all and (max-width: 1024px){.kt-info-box14974_67d478-70 .kt-blocks-info-box-link-wrap{border-top:3px solid #ffffff;border-right:3px solid #ffffff;border-bottom:3px solid #ffffff;border-left:3px solid #ffffff;}}@media all and (max-width: 767px){.kt-info-box14974_67d478-70 .kt-blocks-info-box-link-wrap{border-top:3px solid #ffffff;border-right:3px solid #ffffff;border-bottom:3px solid #ffffff;border-left:3px solid #ffffff;}}<\/style>\n<div class=\"wp-block-kadence-infobox kt-info-box14974_67d478-70 feature-box-light\"><span class=\"kt-blocks-info-box-link-wrap info-box-link kt-blocks-info-box-media-align-left kt-info-halign-left kb-info-box-vertical-media-align-top\"><div class=\"kt-blocks-info-box-media-container\"><div class=\"kt-blocks-info-box-media kt-info-media-animate-none\"><div class=\"kadence-info-box-icon-container kt-info-icon-animate-none\"><div class=\"kadence-info-box-icon-inner-container\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_info-circle kt-info-svg-icon\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.043 8 8 119.083 8 256c0 136.997 111.043 248 248 248s248-111.003 248-248C504 119.083 392.957 8 256 8zm0 110c23.196 0 42 18.804 42 42s-18.804 42-42 42-42-18.804-42-42 18.804-42 42-42zm56 254c0 6.627-5.373 12-12 12h-88c-6.627 0-12-5.373-12-12v-24c0-6.627 5.373-12 12-12h12v-64h-12c-6.627 0-12-5.373-12-12v-24c0-6.627 5.373-12 12-12h64c6.627 0 12 5.373 12 12v100h12c6.627 0 12 5.373 12 12v24z\"\/><\/svg><\/span><\/div><\/div><\/div><\/div><div class=\"kt-infobox-textcontent\"><p class=\"kt-blocks-info-box-title\">DID YOU KNOW?<\/p><p class=\"kt-blocks-info-box-text\"><p>This program is eligible for G3 funding assistance!\u00a0<a href=\"https:\/\/www.virginiawestern.edu\/freecollege\/\">Click here for more information and to contact an advisor<\/a>.<\/p>\n<\/p><\/div><\/span><\/div>\n\n\n<!-- IT: Cyber Security -->\r\n  <div id=\"program-widget-48ea3f-wrapper\" style=\"height:100%\" >\r\n  <script type=\"text\/javascript\" src=\"https:\/\/widget.emsicc.com\/scripts.js\"><\/script>\r\n  <script> generateWidget({clientId:'virginiawestern',hasAllLocations:'false',hasCareerList:'true',hasEmployment:'true',hasImages:'true',hasJobOpenings:'true',hasNationalData:'true',hasOutlook:'true',hasSkills:'false',hasVisitButton:'true',hasWages:'true',id:'program-widget-48ea3f',isHourlyWage:'true',labelSet:'default',locationName:'Roanoke%2C%20VA',orderCareersBy:'None',primaryColor:'%2318284a',programs:'vw0051', \r\n  title:'virginiawestern widget',visitButtonColor:'%230053a5',headingText:'Potential%20Careers%20and%20Labor%20Market%20Info'})\r\n  <\/script>\r\n  <\/div>\n<\/div><\/div>\n\n<\/div><\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber Security CSC will provide you with the knowledge and skills needed to secure servers and network infrastructures. Learn how to develop security infrastructure and recognize threats and vulnerabilities&nbsp;to&nbsp;networks and servers. These skills are essential for&nbsp;maintaining&nbsp;the security of online networks used by private industries and government organizations.&nbsp;&nbsp; The Cyber Security CSC equips you with&hellip; <a class=\"continue\" href=\"https:\/\/www.virginiawestern.edu\/academics\/it\/it-cyber-security\/\">Continue Reading<span> IST: Cyber Security<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":14372,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-14974","page","type-page","status-publish","hentry"],"featured_image_src":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IST: Cyber Security - Programs &amp; Training at Virginia Western<\/title>\n<meta name=\"description\" content=\"The IT Cyber Security CSC at Virginia Western will provide you with the knowledge and skills needed to secure servers and network infrastructures. Learn how to develop security infrastructure and recognize threats and vulnerabilities to networks and servers. These skills are essential for maintaining the security of online networks used by private industries and government organizations.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IST: Cyber Security - Programs &amp; Training at Virginia Western\" \/>\n<meta property=\"og:description\" content=\"The IT Cyber Security CSC at Virginia Western will provide you with the knowledge and skills needed to secure servers and network infrastructures. Learn how to develop security infrastructure and recognize threats and vulnerabilities to networks and servers. These skills are essential for maintaining the security of online networks used by private industries and government organizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.virginiawestern.edu\/academics\/it\/it-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Programs &amp; Training at Virginia Western\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-26T19:36:17+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/it\\\/it-cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/it\\\/it-cyber-security\\\/\",\"name\":\"IST: Cyber Security - Programs &amp; Training at Virginia Western\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/#website\"},\"datePublished\":\"2025-01-23T17:18:22+00:00\",\"dateModified\":\"2026-02-26T19:36:17+00:00\",\"description\":\"The IT Cyber Security CSC at Virginia Western will provide you with the knowledge and skills needed to secure servers and network infrastructures. Learn how to develop security infrastructure and recognize threats and vulnerabilities to networks and servers. These skills are essential for maintaining the security of online networks used by private industries and government organizations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/it\\\/it-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/it\\\/it-cyber-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/it\\\/it-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer &amp; Information Technology\",\"item\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IST: Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/#website\",\"url\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/\",\"name\":\"Programs &amp; Training at Virginia Western\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.virginiawestern.edu\\\/academics\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IST: Cyber Security - Programs &amp; Training at Virginia Western","description":"The IT Cyber Security CSC at Virginia Western will provide you with the knowledge and skills needed to secure servers and network infrastructures. Learn how to develop security infrastructure and recognize threats and vulnerabilities to networks and servers. These skills are essential for maintaining the security of online networks used by private industries and government organizations.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"IST: Cyber Security - Programs &amp; Training at Virginia Western","og_description":"The IT Cyber Security CSC at Virginia Western will provide you with the knowledge and skills needed to secure servers and network infrastructures. Learn how to develop security infrastructure and recognize threats and vulnerabilities to networks and servers. These skills are essential for maintaining the security of online networks used by private industries and government organizations.","og_url":"https:\/\/www.virginiawestern.edu\/academics\/it\/it-cyber-security\/","og_site_name":"Programs &amp; Training at Virginia Western","article_modified_time":"2026-02-26T19:36:17+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.virginiawestern.edu\/academics\/it\/it-cyber-security\/","url":"https:\/\/www.virginiawestern.edu\/academics\/it\/it-cyber-security\/","name":"IST: Cyber Security - Programs &amp; Training at Virginia Western","isPartOf":{"@id":"https:\/\/www.virginiawestern.edu\/academics\/#website"},"datePublished":"2025-01-23T17:18:22+00:00","dateModified":"2026-02-26T19:36:17+00:00","description":"The IT Cyber Security CSC at Virginia Western will provide you with the knowledge and skills needed to secure servers and network infrastructures. Learn how to develop security infrastructure and recognize threats and vulnerabilities to networks and servers. These skills are essential for maintaining the security of online networks used by private industries and government organizations.","breadcrumb":{"@id":"https:\/\/www.virginiawestern.edu\/academics\/it\/it-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.virginiawestern.edu\/academics\/it\/it-cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.virginiawestern.edu\/academics\/it\/it-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.virginiawestern.edu\/academics\/"},{"@type":"ListItem","position":2,"name":"Computer &amp; Information Technology","item":"https:\/\/www.virginiawestern.edu\/academics\/it\/"},{"@type":"ListItem","position":3,"name":"IST: Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.virginiawestern.edu\/academics\/#website","url":"https:\/\/www.virginiawestern.edu\/academics\/","name":"Programs &amp; Training at Virginia Western","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.virginiawestern.edu\/academics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/pages\/14974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/comments?post=14974"}],"version-history":[{"count":0,"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/pages\/14974\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/pages\/14372"}],"wp:attachment":[{"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/media?parent=14974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/categories?post=14974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virginiawestern.edu\/academics\/wp-json\/wp\/v2\/tags?post=14974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}