{"id":437,"date":"2021-09-28T14:54:54","date_gmt":"2021-09-28T14:54:54","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=437"},"modified":"2022-10-04T15:00:06","modified_gmt":"2022-10-04T15:00:06","slug":"cybersecurity-programs-in-tennessee","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/listings\/tennessee\/","title":{"rendered":"Cybersecurity Programs in Tennessee"},"content":{"rendered":"<p>Raise your hand if you want to study cyber security in the Volunteer State. Good. To get started, click on the <a href=\"\/listings\/tennessee\/#school-listings-start\">list<\/a> of Tennessee schools with programs or read our full guide. It explains what the state offers students and graduates in terms of everything from scholarships to salaries.<\/p>\r\n\r\n\r\n\r\n<h2>Studying Cybersecurity in Tennessee<\/h2>\r\n\r\n\r\n\r\n<p>Tennessee has no shortage of good academic programs in cyber security. But some schools are more involved in propelling the field forward than others:<\/p>\r\n\r\n\r\n\r\n<ul><li>Jackson State Community College is the only two-year institution in the state recognized by the National Security Agency and the Department of Homeland Security as a Center of Academic Excellence in Cyber Defense Education. In addition to its academics, it\u2019s doing something a bit unusual for a community college: It\u2019s leading a National Science Foundation-funded&nbsp;<a href=\"https:\/\/www.memphis.edu\/cfia\/pbl-sec\/\" target=\"_blank\" rel=\"noreferrer noopener\">project<\/a>&nbsp;to incorporate \u201cpuzzle-based learning\u201d into classroom STEM learning.<\/li><li>That project is being coordinated with the&nbsp;<a href=\"https:\/\/www.memphis.edu\/cfia\/index.php\" target=\"_blank\" rel=\"noreferrer noopener\">Center for Information Assurance<\/a>&nbsp;at University of Memphis, whose researchers also won an NSA grant in 2015 to create an adaptive multi-factor authentication system incorporating passwords, biometric data and other features. Memphis is also a stopping point for middle and high schoolers to receive cyber hygiene training; it hosts free weeklong GenCyber Camps in the summer.<\/li><li>The&nbsp;<a href=\"https:\/\/www.utc.edu\/center-academic-excellence-cyber-defense\/\" target=\"_blank\" rel=\"noreferrer noopener\">University of Tennessee at Chattanooga InfoSec Center<\/a>&nbsp;is less focused on research than University of Memphis, which isn\u2019t to say it hasn\u2019t kept up with the latest developments \u2013 the Infosec Center\u2019s co-directors edit the International Journal of Information Security and Privacy.<\/li><li>Tennessee Tech is one of the most influential higher education actors in the state. It gave life to the&nbsp;<a href=\"https:\/\/www.wicys.org\/about\/\" target=\"_blank\" rel=\"noreferrer noopener\">Women in CyberSecurity (WiCyS) Initiative<\/a>&nbsp;in 2013 to increase female participation in the security workforce. WiCyS now runs an annual conference that moves to a new city each year. Tennessee Tech built then founded the&nbsp;<a href=\"https:\/\/www.tntech.edu\/ceroc\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Education, Research and Outreach Center (CEROC)<\/a>&nbsp;in 2015. In addition to managing WiCyS, CEROC runs Gen-Cyber Camps and dives into research. Some recent faculty-led projects have involved using graphs to detect potentially dangerous anomalies and creating energy meters that keep data private to protect homeowners from would-be burglars.<\/li><\/ul>\r\n\r\n\r\n\r\n  <section\n    class=\"relative py-3 md:py-16 my-10\"\n    data-preamp=\"editorial-listings\"\n    data-options=\n    data-tracking=\n    data-cy=\"editorial-listings-grid\"\n    \n  >\n    <div class=\"bg-full-width absolute border-t border-b border-gray-100 top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n\n    \n        <h2 class=\"text-center mb-8\">Top Online Programs<\/h2>\n    \n        <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    \n    <sonic-editorial-listings\n      \n      \n      \n      limit=\"4\"\n      layout=\"stacked\"\n    ><\/sonic-editorial-listings>\n\n  <\/section>\n\n\r\n\r\n\r\n\r\n<h2>Online Cybersecurity Programs in Tennessee<\/h2>\r\n\r\n\r\n\r\n<p>Tennessee\u2019s bounty of on-campus cyber security programs have yet to move to an online format. The sole exception is a baccalaureate from an NSA\/DHS-recognized university, Fountainhead College of Technology.<\/p>\r\n\r\n\r\n\r\n<h3>Online Bachelor\u2019s Degrees in Cybersecurity<\/h3>\r\n\r\n\r\n\r\n<p>For-profit Fountainhead runs a Bachelor of Applied Science in Network Security &amp; Forensics. It\u2019s a completion degree, meaning that students should enter the program already holding an associate degree in a technical field. The curriculum will take it from there, covering a broad range of skills meant to prepare students for work either with a law enforcement agency or as specialists within an IT department.<\/p>\r\n\r\n\r\n\r\n<h2>Cybersecurity Scholarships in Tennessee<\/h2>\r\n\r\n\r\n\r\n<p>We uncovered a trio of scholarships available from three NSA\/DHS-recognized institutions, just by looking at departmental websites. Outside of departments, keep an eye on federal initiatives to promote cyber security education. For instance, students at University of Memphis and other National Centers of Academic Excellence may be eligible for the Department of Defense\u2019s <a href=\"https:\/\/www.memphis.edu\/cfia\/scholarships\/uploads\/application_background_and_requirements.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Information Assurance Scholarship Program<\/a>.<\/p>\r\n\r\n\r\n\r\n<h3>Jackson State Community College<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.jscc.edu\/about-jackson-state\/administration\/information-technology\/oit-scholarship.html\" target=\"_blank\">OIT Scholarship<\/a>: Jackson State\u2019s Office of Information Technology wants more students to take computer classes, making anyone majoring in Computer Information (including those with a concentration in Cyber Defense) eligible for $250 a semester. To claim funds, just register for a computer class and submit a personal statement and recommendation.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>Tennessee Technological University<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.tntech.edu\/ceroc\/education\/sfs\/\" target=\"_blank\">CyberCorps Scholarship for Service<\/a>: Roughly six of seven undergraduate upperclassmen in the Computer Science Cybersecurity track win this full scholarship every year. It comes with health insurance, professional development funds, a book allowance and, best of all a $22,500 living stipend that ratchets up to $34,000 when they enter grad school. Students will \u201cpay back\u201d the award by agreeing to work for a government agency after they graduate.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>The University of Tennessee at Chattanooga<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.utc.edu\/faculty\/li-yang\/sfs.php\" target=\"_blank\">CyberCorps Scholarship for Service<\/a>: UT Chattanooga receives the same funding Tennessee Tech does to offer this full scholarship. The benefits are the same, but the eligibility requirements are slightly different. The award is open to both undergraduates and graduates in a computing degree who are ninja-level programmers and love cyber security.<\/li><\/ul>\r\n\r\n\r\n\r\n<h2>Cybersecurity Events in Tennessee<\/h2>\r\n\r\n\r\n\r\n<h3>Cybersecurity Meetups &amp; Communities in Tennessee<\/h3>\r\n\r\n\r\n\r\n<p>A primary strength of Tennessee\u2019s cyber security scene is the vitality of its professional associations and hacker societies. Each of its four largest cities \u2013 Memphis, Nashville, Knoxville and Chattanooga \u2013 supports at least one group for students and\/or practitioners to join. Here\u2019s an overview of the most active ones:<\/p>\r\n\r\n\r\n\r\n<ul><li><a href=\"https:\/\/defcongroups.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">DEF CON<\/a>: DEF CON is an annual hacking conference held in Las Vegas, but some people can\u2019t wait to go. That\u2019s where DEF CON groups comes in. Tennessee\u2019s information security lovers gather via&nbsp;<a href=\"http:\/\/www.dc423.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">DC423<\/a>&nbsp;in Chattanooga the last Wednesday of each month. The website was clearly designed by someone who grew up running code on Commodores from the 1980s. Drive up I-75 to Knoxville to join&nbsp;<a href=\"http:\/\/www.dc865.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">DC865<\/a>&nbsp;the last Saturday of the month. The group is more focused on mentoring new entrants to the field than DC423, using informal discussions and Capture the Flag competitions to do so. Meanwhile, if you loved Zork as a kid,&nbsp;<a href=\"https:\/\/www.dc615.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">DC615<\/a>&nbsp;in Nashville is on tap for the last Thursday of the month, where in addition to hacking wifi, members make their own vintage gaming consoles.<\/li><li><a href=\"https:\/\/www.issa.org\/default.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">Information Systems Security Association (ISSA)<\/a>: ISSA is a professional organization that charges dues, but students are admitted for next to nothing. The group has two active chapters in the Volunteer State. The&nbsp;<a href=\"http:\/\/chattanooga.issa.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Chattanooga Chapter<\/a>&nbsp;meets quarterly for presentations from area practitioners. The&nbsp;<a href=\"https:\/\/issa-midtn.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Middle Tennessee Chapter<\/a>, meanwhile, gathers&nbsp;<em>monthly<\/em>&nbsp;for similarly constructed presentations. Expect to hear talks with titles such as \u201cAnalyzing User Behavior in Mobile Security\u201d and \u201cApplication Security as a Business Driver.\u201d<\/li><li><a href=\"https:\/\/www.isaca.org\/pages\/default.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">ISACA<\/a>: ISACA is now just an acronym, but it used to stand for Information Systems Audit and Control Association. This professional organization has vibrant chapters in&nbsp;<a href=\"http:\/\/www.isacamemphis.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Memphis<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.isaca.org\/chapters1\/middle-tennessee\/Pages\/default.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">Middle Tennessee<\/a>. The former gathers monthly at the Crescent Club for guest talks that veer toward organizational and management practices. The latter interweaves networking breakfasts and chapter meetings with training events and certification review courses.<\/li><li><a href=\"https:\/\/www.isc2midtn.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">(ISC)2 Middle Tennessee Chapter<\/a>: Have an advanced technical certification? Want one? (ISC)2 members in Nashville meet monthly for guest speakers. They also receive discounts on seminars from&nbsp;<a href=\"https:\/\/clearwatercompliance.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Clearwater Compliance<\/a>, a local training group.<\/li><li><a href=\"https:\/\/www.meetup.com\/NashSec\/\" target=\"_blank\" rel=\"noreferrer noopener\">NashSec<\/a>: Not in the mood to pay dues to ISSA, ISACA or (ISC)2? Mosey on over to share a drink with fellow InfoSec practitioners at Two Bits on the third Thursday of the month. Don\u2019t ask for an agenda \u2013 there isn\u2019t one.<\/li><li><a href=\"http:\/\/www.nashville2600.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nashville 2600<\/a>: Nashville 2600 has been promoting technical literacy since the 1990s. Members meet at Emma Bistro (with or without computers) the first Friday of each month to discuss cyber security advances, or lack thereof, in a casual environment. 2600 groups are an international thing, with unofficial groups popping up elsewhere.&nbsp;<a href=\"https:\/\/www.2600.com\/meetings\/mtg.html\" target=\"_blank\" rel=\"noreferrer noopener\">Knoxville<\/a>&nbsp;has its own group that meets the same time and date at the West Town Mall food court.<\/li><li><a href=\"https:\/\/www.owasp.org\/index.php\/Knoxville\" target=\"_blank\" rel=\"noreferrer noopener\">OWASP Knoxville Chapter<\/a>: The people behind the Open Web Application Security Project want to make software safer. Knoxville OWASP members pay no membership fees for their quarterly meetings at the Blue Coast Grill &amp; Bar (though they will be expected to buy their own drinks). Meetings take various formats, from presentations on DevOps to hacking demonstrations to good old fashioned Capture the Flag competitions.<\/li><\/ul>\r\n\r\n\r\n\r\n<p>Note that OWASP and ISSA both have outlets in other Tennessee cities that have been inactive for a few years. OWASP has members in <a href=\"https:\/\/www.owasp.org\/index.php\/Chattanooga\" target=\"_blank\" rel=\"noreferrer noopener\">Chattanooga<\/a> and <a href=\"https:\/\/www.owasp.org\/index.php\/Nashville\" target=\"_blank\" rel=\"noreferrer noopener\">Nashville<\/a>, and ISSA has a <a href=\"https:\/\/www.issa.org\/general\/custom.asp?page=chapterNorthAmerica\" target=\"_blank\" rel=\"noreferrer noopener\">Memphis branch<\/a>. Use the contact info on their homepage to get the band back together!<\/p>\r\n\r\n\r\n\r\n<h3>Cybersecurity Conferences &amp; Workshops in Tennessee<\/h3>\r\n\r\n\r\n\r\n<p>Memphis and Nashville are the 24th and 25th most populous cities in the US, respectively, so it\u2019s only natural that big trainings (e.g., <a rel=\"noreferrer noopener\" href=\"https:\/\/www.sans.org\/event\/security-awareness-summit-2019\/\" target=\"_blank\">SANS Institute Security Awareness Summit<\/a> in 2017) or tech expos (<a rel=\"noreferrer noopener\" href=\"https:\/\/dataconnectors.com\/\" target=\"_blank\">Data Connectors Tech-Security Conferences<\/a>) would periodically hit the state. But there are plenty of events that come back year after year, and they\u2019re not limited to the two biggest cities:<\/p>\r\n\r\n\r\n\r\n<ul><li><a href=\"https:\/\/bsidesknoxville.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">BSides Knoxville<\/a>: BSides Knoxville came onto the scene in May 2015. A daylong conference that showcases homegrown InfoSec thinkers, BSides inundates attendees with presentations on application security, attacker strategy, defender strategy, digital forensics, pen testing and reverse engineering. The cost is cheaper than a UT football game ticket.<\/li><li><a href=\"https:\/\/bsidesnash.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">BSides Nashville<\/a>: Nashville\u2019s take on BSides maintains the grassroots feel of Knoxville\u2019s event but spices things up with multiple tracks. The tech talks in the Blue Track are about, naturally, defensive tactics, while Red Track talks get pretty offensive. Not following the whole concept of red teams and blue teams? Take the Green Track for InfoSec newcomers.<\/li><li><a href=\"https:\/\/edgesecurityconference.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">EDGE Security Conference<\/a>: Sword &amp; Shield Enterprise Security, based in Knoxville, puts on this two-day October affair in the Marble City. The inaugural 2016 conference featured a keynote from the former White House CIO and multi-track presentations and panels with business executives and government officials. Student attendees receive a discount.<\/li><li><a href=\"https:\/\/www.phreaknic.info\/\" target=\"_blank\" rel=\"noreferrer noopener\">PhreakNIC<\/a>: Since 1997, Nashville 2600 has put on PhreakNIC. The locally organized two-day hacker convention has since evolved to embrace a litany of geeky obsessions, but it\u2019s still an InfoSec con at heart. So in between seminars on nootropics and games of Settlers of Catan, you\u2019ll have lots of quirky presentations on cryptography, social engineering and how to use Legos to teach technology.<\/li><li><a href=\"http:\/\/www.skydogcon.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">SkyDogCon<\/a>: Hackers and makers with an information security infatuation convene in Nashville every October for three days. Like PhreakNIC, SkyDogCon keeps it fun, inserting a Capture the Flag competition, Lockpick Village and Hacker Jeopardy alongside presentations delivered by hackers from a couch.<\/li><\/ul>\r\n\r\n\r\n\r\n<h2>Cybersecurity Jobs in Tennessee<\/h2>\r\n\r\n\r\n\r\n<p>Nashville\u2019s tech market had the <a href=\"https:\/\/www.cbre.us\/people%20and%20offices\/corporate%20offices\/colorado\" target=\"_blank\" rel=\"noreferrer noopener\">second-highest rate of growth<\/a> in the nation from 2010 to 2015, second only to Charlotte. Cyber security was a part of that growth, with <a href=\"http:\/\/www.burning-glass.comhttps:\/\/res.cloudinary.com\/highereducation\/image\/upload\/f_auto,fl_lossy,q_auto\/v1\/CyberDegrees.org\/Cybersecurity_Jobs_Report_2015.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">job postings doubling<\/a> over roughly the same time period. Yet Tennessee still has far <a href=\"https:\/\/www.cyberseek.org\/heatmap.html\" target=\"_blank\" rel=\"noreferrer noopener\">too few cyber security positions<\/a> given the size of its population; job demand concentration is half the national average. One group working to change that is the <a href=\"https:\/\/www.cyberinfosec.org\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber &amp; Information Security Consortium<\/a>. Its members include the Oak Ridge National Laboratory and University of Tennessee along with some of the bigger names in the state\u2019s cyber security atmosphere, such as Sword &amp; Shield Enterprise Security (sponsors of the EDGE Security Conference). The Consortium seeks to expand R&amp;D around cyber security in the state and produce a \u201cpipeline of talented cyber security professionals\u201d for its members.<\/p>\r\n\r\n\r\n\r\n<p>As it stands, Knoxville-based graduates could do far worse than working for the Oak Ridge National Laboratory, which houses a Cyber &amp; Information Security Research Group comprised of more than 30 of the country\u2019s best thinkers on cyber warfare and security infrastructure. Moving west into Nashville, graduates might also target jobs with a couple of members of the Cybersecurity 500, a list of top firms in the industry. Kroll, in the top 100, has a global reach to complement its big office in the Music City, and does just about everything from policy reviews to pen testing. A homegrown company, <a href=\"https:\/\/clearwatercompliance.com\" target=\"_blank\" rel=\"noreferrer noopener\">Clearwater Compliance<\/a>, ranks just outside the top 10. It handles risk management in the healthcare sector. Speaking of healthcare, the Hospital Corporation of America operates facilities throughout the US and UK from its Nashville headquarters, and needs security engineers to keep them running smoothly. It\u2019s been on the Fortune 500 for more than two decades.<\/p>\r\n\r\n\r\n\r\n<p>Over in Memphis, the big employer is FedEx, another Fortune 500 company. It needs information security analysts and advisors to oversee its massive delivery infrastructure, and freight shippers U.S. Xpress Enterprises need a similar workforce in their Chattanooga headquarters.<\/p>\r\n\r\n\r\n\r\n<h2>Cybersecurity Salaries in Tennessee<\/h2>\r\n\r\n\r\n\r\n<p>Tennessee tech workers do well wage-wise. Data from <a href=\"https:\/\/www.indeed.com\/salaries\/Cyber-Security-Salaries,-Tennessee\" target=\"_blank\" rel=\"noreferrer noopener\">Indeed.com<\/a> shows that security engineers ($95-100K) and information security analysts ($80-85K) make around the national average for their positions, as do IT security specialists ($105-115K) in Nashville and Oak Ridge. Official numbers from the U.S. Bureau of Labor Statistics, which tracks information security analyst postings, tell a slightly different story. The BLS places median 2016 wages at $76,000 compared to over $92,000 nationally. But with a cost of living over 10 percent lower than the rest of the country, Tennesseeans can likely live with the lower salaries. After all, Nashville is nowhere near as expensive as New York.<\/p>\r\n\r\n\r\n\r\n<h2 id=\"school-listings-start\">All Cybersecurity Programs in Tennessee<\/h2>\r\n\r\n\r\n\r\n<p>Below are all the matching programs we found in our directory, from 10 Tennessee schools.<\/p>\r\n\r\n\r\n\r\n<table class=\"sonic-table\"><thead><tr><th>School Name<\/th><th>Programs<\/th><th>NSA<\/th><\/tr><\/thead><tbody><tr><td>Fountainhead College of Technology<\/td><td>Knoxville, Tennessee <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.fountainheadcollege.edu\/network-security-and-forensics\/\">Bachelor of Applied Science in Network Security &amp; Forensics<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>Jackson State Community College<\/td><td>Jackson, Tennessee <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.jscc.edu\/academics\/divisions\/cis\/programs-of-study\/cyber-defense.html\">Associate of Applied Science in Computer Information Systems: Cyber Defense Concentration<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>Lipscomb University<\/td><td>Nashville, Tennessee <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.lipscomb.edu\/academics\/programs\/information-security\">Bachelor of Science in Information Security<\/a><\/td><td><\/td><\/tr><tr><td>Middle Tennessee State University<\/td><td>Murfreesboro, Tennessee <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.mtsu.edu\/programs\/information-systems-ms\/index.php\">Master of Science in Information Systems with a concentration in Information Security and Assurance<\/a><\/td><td><\/td><\/tr><tr><td>Motlow State Community College<\/td><td>Tullahoma, Tennessee <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.mscc.edu\/programs\/cyber-defense.aspx\">A.A.S. in Computer Information Technology \u2013 Cyber Defense Concentration<\/a><\/td><td><\/td><\/tr><tr><td>Nashville State Community College<\/td><td>Nashville, Tennessee <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.nscc.edu\/academics\/degrees-certificates\/information-security-technical-certificate\">Information Security Technical Certificate<\/a><\/td><td><\/td><\/tr><tr><td>Tennessee Technological University<\/td><td>Cookeville, Tennessee <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.tntech.edu\/engineering\/programs\/csc\/cybersecurity-concentration.php\">Bachelor of Science in Computer Science \u2013 Cyber Security<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>The University of Tennessee at Chattanooga<\/td><td>Chattanooga, Tennessee <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.utc.edu\/center-academic-excellence-cyber-defense\/academic-offerings.php\">Advanced Information Systems Security Certificate<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.utc.edu\/center-academic-excellence-cyber-defense\/academic-offerings.php\">Bachelor of Science in Computer Scinece: Cyber Security<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.utc.edu\/center-academic-excellence-cyber-defense\/academic-offerings.php\">Certificate in Advanced Information Systems Security<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.utc.edu\/center-academic-excellence-cyber-defense\/academic-offerings.php\">Certificate in Information Systems Security<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.utc.edu\/center-academic-excellence-cyber-defense\/academic-offerings.php\">Master of Science in Computer Science \u2013 Information Security and Assurance Concentration<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>The University of Tennessee<\/td><td>Knoxville, Tennessee <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/artsci.utk.edu\/dialogue\/cyber-security\/\">Cybersecurity Minor<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.eecs.utk.edu\/academics\/graduate\/\">Master of Science in Computer Engineering \u2013 Cybersecurity<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.eecs.utk.edu\/academics\/graduate\/\">Master of Science in Computer Science \u2013 Cybersecurity<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.eecs.utk.edu\/academics\/graduate\/\">PhD in Computer Engineering \u2013 Cybersecurity<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.eecs.utk.edu\/academics\/graduate\/\">PhD in Computer Science \u2013 Cybersecurity<\/a><\/td><td><\/td><\/tr><tr><td>University of Memphis<\/td><td>Memphis, Tennessee <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.memphis.edu\/cs\/programs\/bs_conc_cyber_security.php\">Bachelor of Science in Computer Science \u2013 Cyber Security Concentration<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.memphis.edu\/cs\/programs\/grad_cert.php\">Graduate Certificate in Information Assurance<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.memphis.edu\/bitm\/programs\/bia.php\">Graduate Certificate Program in Business Information Assurance<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.memphis.edu\/bitm\/programs\/msbacourses.php\">Master of Science in Information Systems<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><\/tbody><\/table>","protected":false},"excerpt":{"rendered":"Raise your hand if you want to study cyber security in the Volunteer State. Good. To get started, click on the of Tennessee schools with programs or read our full&#8230;","protected":false},"author":5,"featured_media":2121,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[24],"resources-overview":[],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-437","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","states-t"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=437"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/437\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/2121"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=437"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=437"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=437"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=437"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=437"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}