Program Fact Sheet

  • Email
  • Share in Twitter
  • Share in Linkedin
  • Share in Facebook
  • Print

Program Fact Sheet

GTC Logo

Associate Degree

What is Cybersecurity?
Cybersecurity is a career that has the responsibility to protect the Information assets of the entity that employs them. Cyber Technicians perform different functions in this effort. These functions include detecting and preventing cyber-attacks, monitoring network activity to prevent internal attacks, encryption techniques, disaster and incident recovery, auditing, and system testing.

Degrees & Certificates
Cybersecurity, AAS
Cybersecurity Diploma
Cyber Crime Specialist Certificate
Cybersecurity Certificate

Prerequisite Courses
Diploma level proficiency in English, Reading and Math;
CIST1001, CIST 1401

Length of Program

Degree/Diploma: 5 semesters

Semester Program Begins
Every Semester

Application Process
Apply to Gwinnett Technical College at and submit all transcripts from high school and previous college work, and take the ACCUPLACER test if required.

Program Deadlines
You may enter in the Fall, Spring, or Summer Terms



(this data was compiled from the U.S. Bureau of Labor Statistics)


Quick Facts: Cybersecurity

2014 Median Pay $90,120 per year / $43.33 hour
Entry level Education Associate's degree
Number of jobs, 2014 82,900
Job Growth, 2014-24 18% (much faster than average)

Nature of the Work

Monitor their organization’s networks for security breaches and investigate a violation when one occurs. Install and use software, such as firewalls and data encryption programs, to protect sensitive information. Prepare reports that document security breaches and the extent of the damage caused by the breaches. Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited. Research the latest information technology (IT) security trends. Help plan and carry out an organization’s way of handling security. Develop security standards and best practices for their organization. Recommend security enhancements to management or senior IT staff. Help computer users when they need to install or learn about new security products and procedures

Work Environment

Most information security analysts work full time. Information security analysts sometimes have to be on call outside of normal business hours in case of an emergency at their organization. While there are some work for home jobs, most are on-site in an office, Network Operations Center, or Security Operations Center. About 1 in 4 worked more than 40 hours per week in 2014.


Employment of information security analysts is projected to grow 18 percent from 2014 to 2024, much faster than the average for all occupations. Demand for information security analysts is expected to be very high. Cyberattacks have grown in frequency, and analysts will be needed to come up with innovative solutions to prevent hackers from stealing critical information or creating problems for computer networks. The federal government is expected to greatly increase its use of information security analysts to protect the nation’s critical information technology (IT) systems. In addition, as the healthcare industry expands its use of electronic medical records, ensuring patients’ privacy and protecting personal data are becoming more important. More information security analysts are likely to be needed to create the safeguards that will satisfy patients’ concerns. Employment of information security analysts is projected to grow 36 percent in computer systems design and related services from 2014 to 2024. The increasing adoption of cloud services by small- and medium-sized businesses that do not have their own dedicated IT departments could increase the employment of information security analysts in those establishments.


Median annual wages nationally of cybersecurity professionals were $90,120 in May 2015. The bottom 10 percent earned less than $51,280 and the top 10 percent earned more than $143,770.

Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, 2016-17 Edition, Information Security Analysts, on the Internet (visited April 29, 2016).