{"id":173,"date":"2021-09-28T14:58:35","date_gmt":"2021-09-28T14:58:35","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=173"},"modified":"2023-05-16T21:09:24","modified_gmt":"2023-05-16T21:09:24","slug":"cybersecurity-programs-in-kansas","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/listings\/kansas\/","title":{"rendered":"Cybersecurity Programs in Kansas"},"content":{"rendered":"<p>Known for its placid prairie scenery, Kansas continues to diversify from its traditional reliance on agriculture. Major industries include trade and transportation, education and health services, and government.<\/p>\r\n\r\n<p>Kansas' technology industry has an outsized and positive impact on the state's economy. In 2022, the tech industry accounted for 6% of all economic activity in Kansas despite employing just 4.4% of its workforce, <a href=\"https:\/\/www.cyberstates.org\/#interactiveMap?geoid=20__kansas\" target=\"_blank\" rel=\"noopener\">according to Cyberstates<\/a>.<\/p>\r\n\r\n<p>This guide profiles Kansas as a destination for cybersecurity professionals. It examines key trends and statistics to help you decide whether Kansas matches your cybersecurity career goals.<\/p>\r\n\r\n<div class=\"bg-primary-50 px-5 py-1 rounded-lg\">\r\n<h2>Kansas at a Glance<\/h2>\r\n<ul>\r\n<li><strong>Average Wage for Computer and Mathematical Occupations:<\/strong> $81,800<\/li>\r\n<li><strong>% of Workforce in Tech:<\/strong> 4.4%<\/li>\r\n<li><strong>Economic Impact of Tech Industry:<\/strong> $10 billion<\/li>\r\n<li><strong>Number of Higher Learning Institutions:<\/strong> 60<\/li>\r\n<\/ul>\r\n<p class=\"text-sm\">Sources: <a href=\"https:\/\/www.cyberstates.org\/#interactiveMap?geoid=0__usa\" target=\"_blank\" rel=\"noopener\">Cyberstates<\/a>, <a href=\"https:\/\/nces.ed.gov\/programs\/digest\/d20\/tables\/dt20_317.20.asp\" target=\"_blank\" rel=\"noopener\">NCES<\/a>, <a href=\"https:\/\/www.bls.gov\/oes\/current\/oessrcst.htm\" target=\"_blank\" rel=\"noopener\">OEWS<\/a><\/p>\r\n<\/div>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"why-study-cybersecurity-in-kansas\" id=\"why-study-cybersecurity-in-kansas\"><\/a>\n\n\r\n<h2>Why Go to College for Cybersecurity in Kansas?<\/h2>\r\n\r\n<p>Kansas has 60 degree-granting institutions for a population of 2.9 million and lower than average tuition rates. According to the 2022 edition of CompTIA's annual Cyberstates review, tech professionals in Kansas earn <a href=\"https:\/\/www.cyberstates.org\/#interactiveMap?geoid=20__kansas\" target=\"_blank\" rel=\"noopener\">94% more<\/a> than the U.S. median wage. These factors combined make Kansas an appealing place to launch a cybersecurity career.<\/p>\r\n\r\n<p>Kansas schools offer <a href=\"\/listings\/most-diverse-cybersecurity-schools\/\">diverse cybersecurity learning opportunities<\/a> to students. Learners have access to everything from cybersecurity bootcamps, like the K-State cybersecurity bootcamps, to specialized graduate degrees.<\/p>\r\n\r\n<p>Students benefit from lower educational costs. Both public and private universities in Kansas charge tuition rates that tend to fall below national averages.<\/p>\r\n\r\n<p>In 2021, in-state tuition at a four-year Kansas public institution <a href=\"https:\/\/nces.ed.gov\/programs\/digest\/d21\/tables\/dt21_330.20.asp\" target=\"_blank\" rel=\"noopener\">averaged $9,081<\/a>, according to the National Center for Education Statistics (NCES). This was about 3.1% lower than the national average of $9,375.<\/p>\r\n\r\n<p>Students in private four-year Kansas colleges paid an average of $25,523 in tuition, which was 22.2% lower than the national average, the NCES also reports.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/states\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Find cybersecurity programs in other states<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<h3>Education Statistics for Kansas<\/h3>\r\n\r\n<p>Kansas has many two-year and four-year colleges for its population size. Students enroll in campus-based vs. online learning at high rates, making Kansas a good match for learners seeking a traditional college experience.<\/p>\r\n\r\n<table class=\"sonic-table rounded shadow\">\r\n<caption>Kansas vs. National Education Statistics<\/caption>\r\n<thead>\r\n<tr>\r\n<th scope=\"col\">Higher Education Statistics<\/th>\r\n<th scope=\"col\">Kansas Data<\/th>\r\n<th scope=\"col\">National Data<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<th scope=\"row\">Four-Year Colleges<\/th>\r\n<td data-title=\"Kansas\">24<\/td>\r\n<td data-title=\"National\">2,679<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">Two-Year Colleges<\/th>\r\n<td data-title=\"Kansas\">26<\/td>\r\n<td data-title=\"National\">1,303<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">Students Enrolled in Distance Education<\/th>\r\n<td data-title=\"Kansas\">51.3%<\/td>\r\n<td data-title=\"National\">72.8%<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align:right\" class=\"text-sm\">Sources: <a href=\"https:\/\/nces.ed.gov\/programs\/digest\/d20\/tables\/dt20_317.20.asp\" target=\"_blank\" rel=\"noopener\">NCES<\/a><\/p>\r\n\r\n<h3>Accreditation for Kansas Schools<\/h3>\r\n\r\n<p>Learners seeking cybersecurity degrees should only consider accredited schools. Accreditation signals that schools meet academic standards. It also ensures that employers and other institutions will recognize your credentials.<\/p>\r\n\r\n<p>Students can now consider any school accredited by the <a href=\"https:\/\/www.hlcommission.org\/\" target=\"_blank\" rel=\"noopener\">Higher Learning Commission<\/a> or <a href=\"https:\/\/www.chea.org\/regional-accrediting-organizations\" target=\"_blank\" rel=\"noopener\">Council for Higher Education Accreditation<\/a> (CHEA). In addition to CHEA-backed accreditors, students can also consider programs <a href=\"https:\/\/www.abet.org\/\" target=\"_blank\" rel=\"noopener\">endorsed by ABET<\/a> or schools recognized among the <a href=\"https:\/\/www.nsa.gov\/Academics\/Centers-of-Academic-Excellence\/\" target=\"_blank\" rel=\"noopener\">National Centers of Academic Excellence in Cybersecurity<\/a>.<\/p>\r\n\r\n<h2>Considerations for a Cybersecurity Degree in Kansas<\/h2>\r\n\r\n<p>One of the key decisions when choosing a program is learning format. In-person and online learning both offer pros and cons that you must carefully consider.<\/p>\r\n\r\n<p>Campus-based courses and programs generally offer more opportunities to interact and network with faculty and peers. Some students also prefer the traditional classroom experience.<\/p>\r\n\r\n<p>Online courses offer scheduling flexibility and opportunities to save on costs. Students balancing school with outside commitments, such as work or family, may choose online programs.<\/p>\r\n\r\n<p>Hybrid programs blend on-campus and online options. While hybrid learning allows students to enjoy the benefits of in-person and remote learning, they also require campus attendance. This program type often works best for students located in close physical proximity to the school where they study.<\/p>\r\n\r\n<div id=\"everviz-IXf5FIIW6\" class=\"everviz-IXf5FIIW6\"><script src=\"https:\/\/app.everviz.com\/inject\/IXf5FIIW6\/?v=3\" defer=\"defer\"><\/script><\/div>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-accent\">\n    <div class=\"container content\">\n        \r\n<h3 class=\"text-center\">Explore rankings for top cybersecurity programs around the country:<\/h3>\r\n  \n\n  <section class=\"cards pt-2 pb-12 lg:pt-16 lg:pb-20 relative text-center text-gray-700 \" data-cy=\"cards\">\n    <div class=\"bg-full-width absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1187635203-425x230-c-default.jpg\"\n        alt=\"Associate Degree Programs in Cybersecurity\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Associate Degree Programs in Cybersecurity<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/associate-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-961044020-425x230-c-default.jpg\"\n        alt=\"Best Online Bachelor's in Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Best Online Bachelor's in Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/best-online-cyber-security-bachelors-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-589090389-425x230-c-default.jpg\"\n        alt=\"Best Online Master's in Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Best Online Master's in Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/top-online-masters-in-cyber-security-programs\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-619503664-425x230-c-default.jpg\"\n        alt=\"Top Doctoral Degree Programs in Cybersecurity\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Top Doctoral Degree Programs in Cybersecurity<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/doctoral-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664376746\/CyberDegrees.org\/Most_Diverse_Programs_22_3805f36b1\/Most_Diverse_Programs_22_3805f36b1.jpg?_i=AA\"\n        alt=\"Most Diverse Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Most Diverse Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/most-diverse-cybersecurity-schools\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664377167\/CyberDegrees.org\/Cyber_Listings_HBCU_441690b71\/Cyber_Listings_HBCU_441690b71.jpg?_i=AA\"\n        alt=\"HBCUs With the Best Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">HBCUs With the Best Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/best-hbcu-programs\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\n\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h3>Cybersecurity Concentrations and Similar Degrees<\/h3>\r\n\r\n<p>According to CompTIA's Cyberstates 2022 report, cybersecurity is the <a href=\"https:\/\/www.cyberstates.org\/#interactiveMap?geoid=20__kansas\" target=\"_blank\" rel=\"noopener\">fourth-leading tech occupation<\/a> in Kansas. The other three tech sectors include:<\/p>\r\n\r\n<ul>\r\n<li>Software<\/li>\r\n<li>Information technology support<\/li>\r\n<li>Network engineering<\/li>\r\n<\/ul>\r\n\r\n<p>Cybersecurity students in Kansas may also want to consider the following technology concentrations:<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-3 gap-5 my-8\"> \n  \r\n<div class=\"bg-tertiary-50 px-5 rounded\">\r\n<h4><a href=\"\/listings\/software-engineering\/best-programs\/\">Software Development<\/a><\/h4>\r\n<p>Software development and software engineering programs teach specialized skills for careers in desktop and mobile application development.<\/p>\r\n<\/div>\r\n\r\n<div class=\"bg-tertiary-50 px-5 rounded\">\r\n<h3><a href=\"\/listings\/best-online-bachelors-in-information-technology-programs\/\">Information Technology<\/a><\/h3>\r\n<p>Information technology (IT) programs cover general topics in computer technology, such as data science, cloud computing, and management. These versatile degrees lead to careers in networking, information security, web development, technology management, and more.<\/p>\r\n<\/div>\r\n\r\n<div class=\"bg-tertiary-50 px-5 rounded\">\r\n<h3>Network Engineering<\/h3>\r\n\r\n<p>Network engineering programs teach information security, data management, and <a href=\"\/listings\/computer-engineering\/best-programs\/\">computer engineering<\/a> topics. Network engineers design, build, update, and maintain computing networks and databases.<\/p>\r\n<\/div>\r\n\n<\/div>\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<h2>Popular Online Programs<\/h2>\r\n<p>Learn about start dates, transferring credits, availability of financial aid, and more by contacting the universities below.<\/p>\r\n<sonic-editorial-listings limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h3>Paying for Your Cybersecurity Degree<\/h3>\r\n\r\n<p>Kansas offers favorable higher education costs. With the exception of public two-year colleges, tuition rates in Kansas fall well below national averages in every school category.<\/p>\r\n\r\n<p>The <a href=\"https:\/\/www.kansasregents.org\/students\/student_financial_aid\/scholarships_and_grants\" target=\"_blank\" rel=\"noopener\">Kansas Board of Regents<\/a> offers ongoing scholarships. In early 2023, Kansas state legislators began working on a proposal to increase the availability of need-based scholarships.<\/p>\r\n\r\n<p>However, many students still need to <a href=\"\/resources\/how-to-pay-for-a-degree\/\">finance their cybersecurity degrees<\/a> even after exhausting scholarships. Other financial aid options include federal aid in the form of loans and grants, along with private loans.<\/p>\r\n\r\n<div id=\"everviz-V480_ZHSj\" class=\"everviz-V480_ZHSj\"><script src=\"https:\/\/app.everviz.com\/inject\/V480_ZHSj\/?v=3\" defer=\"defer\"><\/script><\/div>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"in-state-vs-out-of-state-tuition\" id=\"in-state-vs-out-of-state-tuition\"><\/a>\n\n\r\n<h4>In-State Versus Out-of-State Tuition<\/h4>\r\n\r\n<p>Public schools usually charge nonresidents higher tuition rates. In Kansas, nonresidents pay less than they do in most other states. Even so, they face significantly higher costs than in-state students.<\/p>\r\n\r\n<p>However, some relief is available. Kansas participates in the 12-state <a href=\"https:\/\/www.mhec.org\/\" target=\"_blank\" rel=\"noopener\">Midwestern Higher Education Compact<\/a> (MHEC). The MHEC extends <a href=\"https:\/\/www.kansasregents.org\/academic_affairs\/sara\" target=\"_blank\" rel=\"noopener\">in-state tuition rates<\/a> to students hailing from other participating states.<\/p>\r\n\r\n<h4>Kansas's Cost of Living<\/h4>\r\n\r\n<p>Kansas offers a big advantage in terms of cost of living. As of March 2023, Kansas ranks as the second-cheapest destination in the United States with an <a href=\"https:\/\/worldpopulationreview.com\/state-rankings\/cost-of-living-index-by-state\" target=\"_blank\" rel=\"noopener\">overall score of 86.5<\/a>. This means Kansas is 13.5% cheaper than the typical U.S. state.<\/p>\r\n\r\n<p>Cost of living has a major impact on non-tuition costs including housing, food, utilities, and transportation. The cost of living index uses 100 as a baseline national average, then assigns each state a relative score.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-3 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/scholarships-military-veterans\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore cybersecurity scholarships for military and veterans<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/cybersecurity-resources-for-underrepresented-populations\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Find resources and organizations for underrepresented populations<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/lgbtq-scholarships\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover scholarships for LGBTQIA+ students<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"cybersecurity-careers-in-kansas\" id=\"cybersecurity-careers-in-kansas\"><\/a>\n\n\r\n<h2>Careers for Cybersecurity Graduates in Kansas<\/h2>\r\n\r\n<p>The U.S. tech industry continues to need qualified cybersecurity specialists, which also translates to the Kansas economy. Top industries in Kansas with advanced cybersecurity needs due to a high volume of sensitive data include education, healthcare, and financial services.<\/p>\r\n\r\n<p>Labor market experts also anticipate strong growth rates for several technology specializations in Kansas during the 2020-2030 period:<\/p>\r\n\r\n<ul>\r\n<li>Information security analysts (<a href=\"https:\/\/projectionscentral.org\/Projections\/LongTerm?AreaName=&amp;AreaNameSelect%5B%5D=20&amp;Name=&amp;items_per_page=1000\" target=\"_blank\" rel=\"noopener\">growth projection of +38.7%<\/a>)<\/li>\r\n<li>Software developers, quality assurance analysts, and testers (<a href=\"https:\/\/projectionscentral.org\/Projections\/LongTerm?AreaName=&amp;AreaNameSelect%5B%5D=20&amp;Name=&amp;items_per_page=1000\" target=\"_blank\" rel=\"noopener\">growth projection of +25.4%<\/a>)<\/li>\r\n<li>Computer and information research scientists (growth projection of <a href=\"https:\/\/projectionscentral.org\/Projections\/LongTerm?AreaName=&amp;AreaNameSelect%5B%5D=20&amp;Name=&amp;items_per_page=1000\" target=\"_blank\" rel=\"noopener\">+23.1%<\/a>)<\/li>\r\n<\/ul>\r\n\r\n<h3>Select Cybersecurity Careers in Kansas<\/h3>\r\n\r\n<h4><a href=\"\/jobs\/security-analyst\/\">Information Security Analyst<\/a> <sonic-icon icon=\"lock-closed\" size=\"small\" type=\"solid\" color=\"#1222B6\"><\/sonic-icon><\/h4>\r\n\r\n<p>Information security (infosec) analysts design and implement organizational security strategies to protect both digital and offline data. Experts predict very strong labor market growth for this role in Kansas over the course of the 2020s.<\/p>\r\n\r\n<ul>\r\n<li><strong>Salary for [Career]s in Kansas: <\/strong><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm\" target=\"_blank\" rel=\"noopener\">$91,940<\/a><\/li>\r\n<li><strong>Job Outlook in Kansas (2020-30): <\/strong><a href=\"https:\/\/projectionscentral.org\/Projections\/LongTerm?AreaName=&amp;AreaNameSelect%5B%5D=20&amp;Name=&amp;items_per_page=1000\" target=\"_blank\" rel=\"noopener\">+38.7%<\/a><\/li>\r\n<\/ul>\r\n\r\n<h4>Computer and Information Research Scientist <sonic-icon icon=\"search-circle\" size=\"small\" type=\"solid\" color=\"#1222B6\"><\/sonic-icon><\/h4>\r\n\r\n<p>Computer and information research scientists develop new applications for established and emerging technologies. Those focused on cybersecurity develop new protective tools and build strategies based on evolving trends.<\/p>\r\n\r\n<ul>\r\n<li><strong>Salary for [Career]s in Kansas: <\/strong><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151221.htm\" target=\"_blank\" rel=\"noopener\">$90,560<\/a><\/li>\r\n<li><strong>Job Outlook in Kansas (2020-30): <\/strong><a href=\"https:\/\/projectionscentral.org\/Projections\/LongTerm?AreaName=&amp;AreaNameSelect%5B%5D=20&amp;Name=&amp;items_per_page=1000\" target=\"_blank\" rel=\"noopener\">+23.1%<\/a><\/li>\r\n<\/ul>\r\n\r\n<h4><a href=\"\/jobs\/security-manager\/\">Computer and Information Systems Manager<\/a> <sonic-icon icon=\"user-group\" size=\"small\" type=\"solid\" color=\"#1222B6\"><\/sonic-icon><\/h4>\r\n\r\n<p>Computer and information systems managers consider cybersecurity in the context of other organizational needs. Also known as IT managers, these professionals analyze organizational technology needs, choose and design solutions, and oversee their setup and maintenance.<\/p>\r\n\r\n<ul>\r\n<li><strong>Salary for [Career]s in Kansas: <\/strong><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes113021.htm\" target=\"_blank\" rel=\"noopener\">$132,640<\/a><\/li>\r\n<li><strong>Job Outlook in Kansas (2020-30): <\/strong><a href=\"https:\/\/projectionscentral.org\/Projections\/LongTerm?AreaName=&amp;AreaNameSelect%5B%5D=20&amp;Name=&amp;items_per_page=1000\" target=\"_blank\" rel=\"noopener\">+14.6%<\/a><\/li>\r\n<\/ul>\r\n\r\n<p>The following tables offer a detailed data-based snapshot of additional Kansas-specific technology employment trends and opportunities.<\/p>\r\n\r\n<h3>Kansas Employment Trends<\/h3>\r\n\r\n<table class=\"sonic-table rounded shadow\">\r\n<caption>Projected Job Growth for Computer Hardware Engineers, Computer Network Architects, and Software Developers and Software Quality Assurance Analysts and Testers<\/caption>\r\n<thead>\r\n<tr>\r\n<th col>Year<\/th>\r\n<th col>State<\/th>\r\n<th col>National<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr class=\"bg-accent\">\r\n<td colspan=\"3\">Computer Hardware Engineers<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2020 Employment<\/td>\r\n<td data-title=\"State\">260<\/td>\r\n<td data-title=\"National\">66,200<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2030 Projected Employment<\/td>\r\n<td data-title=\"State\">270<\/td>\r\n<td data-title=\"National\">67,300<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">Projected Job Growth, 2020-2030<\/td>\r\n<td data-title=\"State\">+3.8%<\/td>\r\n<td data-title=\"National\">+1.7%<\/td>\r\n<\/tr>\r\n<tr class=\"bg-accent\">\r\n<td colspan=\"3\">Computer Network Architects<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2018 Employment<\/td>\r\n<td data-title=\"State\">2,250<\/td>\r\n<td data-title=\"National\">165,200<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2030 Projected Employment<\/td>\r\n<td data-title=\"State\">2,430<\/td>\r\n<td data-title=\"National\">174,200<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">Projected Job Growth, 2018-2028<\/td>\r\n<td data-title=\"State\">+8.0%<\/td>\r\n<td data-title=\"National\">+5.4%<\/td>\r\n<\/tr>\r\n<tr class=\"bg-accent\">\r\n<td colspan=\"3\">Software Developers and Software Quality Assurance Analysts and Testers<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2020 Employment<\/td>\r\n<td data-title=\"State\">14,940<\/td>\r\n<td data-title=\"National\">1,847,900<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2030 Projected Employment<\/td>\r\n<td data-title=\"State\">18,740<\/td>\r\n<td data-title=\"National\">2,257,400<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">Projected Job Growth, 2020-2030<\/td>\r\n<td data-title=\"State\">+25.4%<\/td>\r\n<td data-title=\"National\">+22%<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align:right\" class=\"text-sm\">Source: <a href=\"https:\/\/projectionscentral.com\/Projections\/LongTerm\" target=\"_blank\" rel=\"noopener\">Projections Central<\/a><\/p>\r\n\r\n<table class=\"sonic-table rounded shadow\">\r\n<caption>Salaries for Cybersecurity and Related Careers, May 2021<\/caption>\r\n<thead>\r\n<tr>\r\n<th scope=\"col\">Career<\/th>\r\n<th scope=\"col\">Kansas Employment<\/th>\r\n<th scope=\"col\">Kansas Annual Mean Wage<\/th>\r\n<th scope=\"col\">National Median Annual Wage<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<td data-title=\"Career\">Computer and Information Systems Managers<\/td>\r\n<td data-title=\"KS Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes113021.htm#st\" target=\"_blank\" rel=\"noopener\">3,260<\/a><\/td>\r\n<td data-title=\"KS Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes113021.htm#st\" target=\"_blank\" rel=\"noopener\">$132,640<\/a><\/td>\r\n<td data-title=\"National Wage\">$159,010<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Hardware Engineers<\/td>\r\n<td data-title=\"KS Employment\">N\/A<\/td>\r\n<td data-title=\"KS Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes172061.htm#st\" target=\"_blank\" rel=\"noopener\">$86,560<\/a><\/td>\r\n<td data-title=\"National Wage\">$128,170<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Network Architects<\/td>\r\n<td data-title=\"KS Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes172061.htm#st\" target=\"_blank\" rel=\"noopener\">3,090<\/a><\/td>\r\n<td data-title=\"KS Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes172061.htm#st\" target=\"_blank\" rel=\"noopener\">$84,130<\/a><\/td>\r\n<td data-title=\"National Wage\">$120,520<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Network Support Specialists<\/td>\r\n<td data-title=\"KS Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151231.htm\" target=\"_blank\" rel=\"noopener\">260<\/a><\/td>\r\n<td data-title=\"KS Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151231.htm\" target=\"_blank\" rel=\"noopener\">$60,220<\/a><\/td>\r\n<td data-title=\"National Wage\">$62,760<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Programmers<\/td>\r\n<td data-title=\"KS Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151251.htm#st\" target=\"_blank\" rel=\"noopener\">1,160<\/a><\/td>\r\n<td data-title=\"KS Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151251.htm#st\" target=\"_blank\" rel=\"noopener\">$86,850<\/a><\/td>\r\n<td data-title=\"National Wage\">$93,000<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Systems Analysts<\/td>\r\n<td data-title=\"KS Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151211.htm#st\" target=\"_blank\" rel=\"noopener\">4,960<\/a><\/td>\r\n<td data-title=\"KS Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151211.htm#st\" target=\"_blank\" rel=\"noopener\">$81,650<\/a><\/td>\r\n<td data-title=\"National Wage\">$99,270<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Information Security Analysts<\/td>\r\n<td data-title=\"KS Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm#st\" target=\"_blank\" rel=\"noopener\">960<\/a><\/td>\r\n<td data-title=\"KS Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm#st\" target=\"_blank\" rel=\"noopener\">$91,940<\/a><\/td>\r\n<td data-title=\"National Wage\">$102,600<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Network and Computer Systems Administrators<\/td>\r\n<td data-title=\"KS Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm#st\" target=\"_blank\" rel=\"noopener\">2,740<\/a><\/td>\r\n<td data-title=\"KS Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm#st\" target=\"_blank\" rel=\"noopener\">$80,920<\/a><\/td>\r\n<td data-title=\"National Wage\">$80,600<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Software Developers<\/td>\r\n<td data-title=\"KS Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151252.htm\" target=\"_blank\" rel=\"noopener\">10,580<\/a><\/td>\r\n<td data-title=\"KS Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151252.htm\" target=\"_blank\" rel=\"noopener\">$99,380<\/a><\/td>\r\n<td data-title=\"National Wage\">$109,020<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Web Developers<\/td>\r\n<td data-title=\"KS Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151254.htm#st\" target=\"_blank\" rel=\"noopener\">660<\/a><\/td>\r\n<td data-title=\"KS Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151254.htm#st\" target=\"_blank\" rel=\"noopener\">$66,690<\/a><\/td>\r\n<td data-title=\"National Wage\">$78,300<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align:right\" class=\"text-sm\">Source: <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes_stru.htm\" target=\"_blank\" rel=\"noopener\">BLS OEWS<\/a><\/p>\r\n\r\n<p>In Kansas, the demand for specialized tech professionals generally reflects national trends. Salaries tend to rank below national averages, but it's also important to remember that Kansas has some of the lowest living costs in the United States. Employers may adjust their salary ranges to match living costs and other local economic conditions.<\/p>\r\n\r\n<p>Many of the popular tech careers in Kansas require or prefer at least a four-year college degree, especially for advancement. Technical training through a cybersecurity bootcamp may also help a candidate land their first job. However, a bachelor's or another advanced degree can offer higher salaries and more career advancement opportunities.<\/p>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-accent\">\n    <div class=\"container content\">\n        \r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/jobs\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover more cybersecurity jobs<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/government-cyber-security-careers\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Consider a cybersecurity career in government<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/careers-for-vets\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Which cybersecurity careers are best for veterans?<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/transitioning-from-general-it\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Transition From IT into cybersecurity<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h3>Cybersecurity Employers in Kansas<\/h3>\r\n\r\n<p>Small businesses form the backbone of Kansas' economy. Many of these businesses require cybersecurity assistance, and they usually source it from a third-party provider. IT and information security consulting firms employ many Kansas-based cybersecurity professionals.<\/p>\r\n\r\n<p>Consider other organizations with advanced cybersecurity needs:<\/p>\r\n\r\n<p><strong><a href=\"https:\/\/ksmedcenter.com\/\" target=\"_blank\" rel=\"noopener\">Kansas Medical Center<\/a>:<\/strong> This physician-owned hospital network ranks among the state's largest healthcare providers. Healthcare institutions routinely employ cybersecurity professionals to safeguard high-value patient data.<\/p>\r\n\r\n<p><strong><a href=\"https:\/\/portal.kansas.gov\/\" target=\"_blank\" rel=\"noopener\">Government of Kansas<\/a>:<\/strong> According to the BLS, the government ranks as the second-largest employment sector in Kansas.<\/p>\r\n\r\n<p><strong><a href=\"https:\/\/www.capfed.com\/\" target=\"_blank\" rel=\"noopener\">Capitol Federal Savings Bank<\/a>:<\/strong> Capitol Federal Savings Bank, commonly known as CapFed, ranks among the leading financial services institutions in Kansas. Banks rank among the <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener\">largest employers of cybersecurity professionals<\/a> in the United States, reports the BLS.<\/p>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"professional-organizations\" id=\"professional-organizations\"><\/a>\n\n\r\n<h3>Professional Cybersecurity Organizations in Kansas<\/h3>\r\n\r\n<p>Professional organizations can be good networking, professional development, and employment resources. Consider becoming active in these cybersecurity organizations in Kansas:<\/p>\r\n\r\n<div class=\"pl-4\" style=\"border-left:3px solid #1271E4\">\r\n<h4><a href=\"https:\/\/ebit.ks.gov\/kiso\/services\" target=\"_blank\" rel=\"noopener\">Kansas Information Security Office<\/a> (KISO)<\/h4>\r\n<p>KISO delivers cybersecurity services to organizations affiliated with the Kansas state government. It also hosts events such as the <a href=\"https:\/\/ebit.ks.gov\/kiso\/cybersummit\" target=\"_blank\" rel=\"noopener\">Kansas Cyber Summit<\/a>.<\/p>\r\n<\/div>\r\n<div class=\"pl-4\" style=\"border-left:3px solid #1271E4\">\r\n<h4><a href=\"https:\/\/www.gmis.org\/page\/kansas\" target=\"_blank\" rel=\"noopener\">Government Management of Information Science (GMIS) International<\/a> (Kansas State Chapter)<\/h4>\r\n<p>GMIS International operates throughout the world and consists of IT professionals working in Windows, Linux, UNIX, and Novell. GMIS International distributes an informational newsletter and offers career training, employment, and in-person events.<\/p>\r\n<\/div>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"top-kansas-schools\" id=\"top-kansas-schools\"><\/a>\n\n\r\n<h2>Schools With Cybersecurity Degrees in Kansas<\/h2>\r\n\r\n<ul>\r\n<div class=\"grid md:grid-cols-2 gap-5 md:gap-12 items-baseline -pt-2\">\r\n<div>\r\n<li><a href=\"https:\/\/www.butlercc.edu\/info\/201151\/cyber-security\" target=\"_blank\" rel=\"nofollow noopener\">Butler Community College<\/a><\/li>\r\n<li><a href=\"https:\/\/www.emporia.edu\/school-business\/academics-programs\/undergraduate-programs-minors\/bachelor-science-computer-science\/\" target=\"_blank\" rel=\"nofollow noopener\">Emporia State University<\/a><\/li>\r\n<li><a href=\"https:\/\/www.fhsu.edu\/informatics\/academic-programs\/cyber-security\" target=\"_blank\" rel=\"nofollow noopener\">Fort Hays State University<\/a><\/li>\r\n<li><a href=\"https:\/\/www.franklin.edu\/degrees\/bachelors\/cybersecurity\" target=\"_blank\" rel=\"nofollow noopener\">Franklin University<\/a><\/li>\r\n<li><a href=\"https:\/\/www.friends.edu\/adult-undergraduate\/cyber-security-adult-undergraduate\/\" target=\"_blank\" rel=\"nofollow noopener\">Friends University<\/a><\/li>\r\n<\/div>\r\n<div>\r\n<li><a href=\"https:\/\/www.kckcc.edu\/academics\/degrees-and-certificates\/as\/cybersecurity-as.html\" target=\"_blank\" rel=\"nofollow noopener\">Kansas City Kansas Community College<\/a><\/li>\r\n<li><a href=\"https:\/\/cs.k-state.edu\/academics\/undergraduate\/cybersecurity\/\" target=\"_blank\" rel=\"nofollow noopener\">Kansas State University<\/a><\/li>\r\n<li><a href=\"https:\/\/online.stmary.edu\/bs-cybersecurity\" target=\"_blank\" rel=\"nofollow noopener\">University of Saint Mary<\/a><\/li>\r\n<li><a href=\"https:\/\/www.wichita.edu\/academics\/engineering\/cybersecurity\/index.php\" target=\"_blank\" rel=\"nofollow noopener\">Wichita State University<\/a><\/li>\r\n<\/div>\r\n<\/div>\r\n<\/ul>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n\r\n<h2>Questions About Cybersecurity in Kansas<\/h2>\r\n\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Can I get a cybersecurity degree in Kansas?<\/h3>\r\n\r\n<p>Yes. Kansas schools offer cybersecurity study opportunities at all levels. Examples include everything from cybersecurity bootcamps to specialized master's degree programs. Learners can study online, on campus, or both.<\/p>\r\n<\/div>\r\n\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Are the best cybersecurity schools in Kansas expensive?<\/h3>\r\n\r\n<p>Yes, schools in Kansas are less expensive than in other states. <a href=\"https:\/\/nces.ed.gov\/programs\/digest\/d21\/tables\/dt21_330.20.asp\" target=\"_blank\" rel=\"noopener\">NCES data<\/a> indicates that average tuition rates in Kansas fall well below national averages for four-year and two-year colleges.<\/p>\r\n<\/div>\r\n\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Is cybersecurity a good career in Kansas?<\/h3>\r\n\r\n<p>In 2022, cybersecurity ranked fourth among the leading technology occupations in Kansas. Multiple cybersecurity specializations, including information security analysts, are projected to have very strong growth in Kansas from 2020-2030.<\/p>\r\n<\/div>\r\n\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Is the K-State (Kansa State University) cybersecurity bootcamp for beginners?<\/h3>\r\n\r\n<p>K-State cybersecurity bootcamps are suitable for learners of all skill levels. They offer beginners and career-changers an accelerated path to pursue entry-level jobs. These programs also help seasoned professionals advance their skills.<\/p>\r\n<\/div>","protected":false},"excerpt":{"rendered":"Ready to study cybersecurity in Kansas? Start with our list of campus and online programs, and learn about cybersecurity jobs and scholarships in KS.","protected":false},"author":5,"featured_media":2201,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[16],"resources-overview":[],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-173","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","states-k"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=173"}],"version-history":[{"count":2,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/173\/revisions"}],"predecessor-version":[{"id":7712,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/173\/revisions\/7712"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/2201"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=173"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=173"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=173"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=173"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=173"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}