Keystone logo
Clover Park Technical College BACHELOR OF APPLIED SCIENCE IN CYBERSECURITY
Clover Park Technical College

Clover Park Technical College

BACHELOR OF APPLIED SCIENCE IN CYBERSECURITY

Lakewood, USA

Bachelor's degree

English

Sep 2026

On-Campus

Key Summary

    About: The Bachelor of Applied Science in Cybersecurity focuses on developing essential skills to protect information systems from cyber threats. Students will engage in coursework that covers various aspects of cybersecurity, including network security, risk management, and incident response. This hands-on program prepares graduates to tackle real-world challenges in the field of cybersecurity.
    Career Outcomes: Graduates of this program can pursue careers as cybersecurity analysts, network administrators, information security specialists, or IT security consultants. The skills gained will equip them to work in diverse sectors, protecting organizations against evolving cyber threats.

Why Choose the Bachelor of Applied Science in Cybersecurity?

CPTC’s Bachelor of Applied Science in Cybersecurity (BAS-C) degree has been designed to meet the needs of students who want to become cybersecurity practitioners. Graduates would be candidates for positions as an Information System Security Officer, Penetration Tester, or Security Analyst.

In the BAS-C program, the approach to learning cybersecurity uses hands-on tools in a realistic, practical context. Students will graduate with a practical understanding of cybersecurity concepts as well as experience with a current set of tools.

This degree is offered in a hybrid format with evening and weekend meetings to accommodate working adults.

Upon successful completion of the Bachelor of Applied Science in Cybersecurity, students will be able to:

  • Assess the cyber risk of an information system and recommend mitigation.
  • Analyze identified malicious activity in order to mitigate effects and recommend security improvements.
  • Create a cybersecurity vulnerability assessment of a small to medium business.
  • Evaluate the security practices of an application/ IT project development team at any point in the system lifecycle
  • Implement security software or hardware.
  • Research offensive and defensive cybersecurity trends and tools.
  • Evaluate cloud security in public, private, and hybrid environments.