{"id":450,"date":"2022-03-01T22:08:15","date_gmt":"2022-03-01T22:08:15","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=450"},"modified":"2022-10-27T20:34:55","modified_gmt":"2022-10-27T20:34:55","slug":"cybersecurity-programs-in-texas","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/listings\/texas\/","title":{"rendered":"Cybersecurity Programs in Texas"},"content":{"rendered":"<p>Although overshadowed by Silicon Valley, Texas has been a tech innovation hub for even longer. If you doubt it, ask NASA. And the state\u2019s cybersecurity degrees \u2014 both public and private \u2014&nbsp;are proof it\u2019s on an upward trajectory. Already planning on lifting off to Houston or one of the state\u2019s other tech hotspots?&nbsp;Skip ahead to our <a href=\"\/listings\/texas\/#school-listings-start\">list<\/a> of Texas schools with cybersecurity programs. If not, keep reading.<\/p>\r\n\r\n\r\n\r\n<ul><li>A lot of Texas\u2019 cybersecurity activity is clustered in San Antonio. The Department of Homeland Security tapped the University of Texas at San Antonio to lead its&nbsp;<a rel=\"noreferrer noopener\" href=\"http:\/\/www.utsa.edu\/today\/2015\/09\/dhsgrant.html\" target=\"_blank\">Information Sharing and Analysis Organizations (ISAO) Standards Organization<\/a>. In this role, UTSA is responsible for developing a standardized system for private companies and the government to share cybersecurity info. As if that\u2019s not enough, the U.S. Army Reserve named UTSA a member of the the Army Reserve Cyber Private Public Partnership Program, or&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.govtech.com\/education\/higher-ed\/University-of-Texas-at-San-Antonio-Army-Launch-Cyber-Warriors-Program-.html\" target=\"_blank\">Cyber P3 initiative<\/a>, along with only five other universities. It will be responsible for training reserve soldiers in cybersecurity.<\/li><li>The University of Texas at Dallas is another major player. It set the goal of becoming a national leader in cybersecurity&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.dallasnews.com\/business\/business\/2012\/06\/09\/utd-looks-to-become-a-leader-in-cybersecurity\" target=\"_blank\">back in 2012<\/a>. Its latest effort is to narrow the gender gap among cybersecurity specialists;&nbsp;in 2016, it formed the&nbsp;<a rel=\"noreferrer noopener\" href=\"http:\/\/cs.utdallas.edu\/center-for-engaging-women-in-cyber-security\/\" target=\"_blank\">Center for Engaging Women in Cybersecurity<\/a>.<\/li><li>In 2015, the University of Texas at Austin opened the Center for Identity, which looks at identity theft, fraud and privacy in both the virtual and physical realms. It quickly partnered with Equifax, a Fortune 1000 company that sells products designed to keep consumers\u2019 online identity \u2014 and, therefore, credit \u2014 secure. The Texas Cybersecurity, Education, and Economic Development Council&nbsp;<a rel=\"noreferrer noopener\" href=\"http:\/\/publishingext.dir.texas.gov\/portal\/internal\/resources\/DocumentLibrary\/Building%20a%20More%20Secure%20and%20Prosperous%20Texas.pdf\" target=\"_blank\">cited the center<\/a>&nbsp;as a model for schools looking to attract private and federal funding to expand cybersecurity programs.<\/li><li>Not one to be left behind, Southern Methodist University opened the Darwin Deason Institute for Cybersecurity in 2014 after receiving a gift from Deason for nearly $8 million dollars. The next year it announced a strategic partnership with defense technology giant Raytheon, which has two of its five business divisions based in Texas \u2014 one in McKinney and one in Austin.<\/li><li>And don\u2019t overlook Texas A&amp;M. As one of just 60 U.S. research universities invited for membership to the Association of American Universities (UT Austin and Rice University are the others in Texas), the school receives more than its fair share of research funding. It\u2019s beginning to spread that toward cybersecurity programs. In 2016, it gave out&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/tees.tamu.edu\/news\/2016\/01\/22\/tees-awards-seed-grant-funding-for-big-data-and-cybersecurity-research\/\" target=\"_blank\">$250,000 in seed grants<\/a>&nbsp;to five cybersecurity research teams.<\/li><\/ul>\r\n\r\n\r\n\r\n  <section\n    class=\"relative py-3 md:py-16 my-10\"\n    data-preamp=\"editorial-listings\"\n    data-options=\n    data-tracking=\n    data-cy=\"editorial-listings-grid\"\n    \n  >\n    <div class=\"bg-full-width absolute border-t border-b border-gray-100 top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n\n    \n        <h2 class=\"text-center mb-8\">Top Online Programs<\/h2>\n    \n        <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    \n    <sonic-editorial-listings\n      \n      \n      \n      limit=\"4\"\n      layout=\"stacked\"\n    ><\/sonic-editorial-listings>\n\n  <\/section>\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"all-texas-cybersecurity-programs\" id=\"all-texas-cybersecurity-programs\"><\/a>\n\n\r\n\r\n<h2 id=\"school-listings-start\">All Cybersecurity Programs in Texas<\/h2>\r\n\r\n\r\n\r\n<p>Below are all the matching programs we found in our directory, from 28 Texas schools.<\/p>\r\n\r\n\r\n\r\n<table class=\"sonic-table\"><thead><tr><th>School Name<\/th><th>Programs<\/th><th>NSA<\/th><\/tr><\/thead><tbody><tr><td>Amarillo College<\/td><td>Amarillo, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.actx.edu\/cis\/\">A.A.S. in Computer Networking\/Cybesecurity<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.actx.edu\/cis\/\">Computer Cyber-Security Certificate<\/a><\/td><td><\/td><\/tr><tr><td>Angelo State University<\/td><td>San Angelo, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.angelo.edu\/content\/profiles\/2749-cybersecurity-certificate\/Templates\/profiles-graduate-programs.php\">Online Cybersecurity Certificate<\/a><\/td><td><\/td><\/tr><tr><td>Brookhaven College<\/td><td>Farmers Branch, Texas<br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.dcccd.edu\/cd\/dcc\/comps\/cit\/pages\/degrees.aspx\">Information Security Certificate<\/a><\/td><td><\/td><\/tr><tr><td>Central Texas College<\/td><td>Killeen, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.ctcd.edu\/academics\/programs-of-study\/associate-of-applied-science-degrees-and-certificates\/\">Associate of Science in Cyberdefense-Information Assurance<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.ctcd.edu\/academics\/programs-of-study\/associate-of-applied-science-degrees-and-certificates\/\">Certificate of Completion in Cyberdefense-Information Assurance<\/a><\/td><td><\/td><\/tr><tr><td>Dallas County Community College District<\/td><td>Dallas, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.dcccd.edu\/cd\/credit\/cyber-security\/pages\/degrees-cert.aspx\">AAS in Cybersecurity \u2013 Cyber Defense<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.dcccd.edu\/cd\/credit\/cyber-security\/pages\/degrees-cert.aspx\">AAS in Cybersecurity \u2013 Digital Forensics<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.dcccd.edu\/cd\/credit\/cyber-security\/pages\/degrees-cert.aspx\">AAS in Cybersecurity \u2013 Information Assurance<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.dcccd.edu\/cd\/credit\/cyber-security\/pages\/degrees-cert.aspx\">AAS in Cybersecurity \u2013 Network Security Administration<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.dcccd.edu\/cd\/credit\/cyber-security\/pages\/degrees-cert.aspx\">AAS in Cybersecurity \u2013 System Security Administration<\/a><\/td><td><\/td><\/tr><tr><td>El Paso Community College<\/td><td>El Paso, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.epcc.edu\/Academics\/InformationTechnologySystems\">Associate of Applied Science in Information Technology Systems \u2013 Information Security and Assurance<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>Houston Baptist University<\/td><td>Houston, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/hbu.edu\/college-of-engineering\/engineering-programs\/ug-major-cyber-engineering-bs\/\">Bachelor of Science in Cyber Engineering<\/a><\/td><td><\/td><\/tr><tr><td>Houston Community College<\/td><td>Houston, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.hccs.edu\/finder\/programs\/computer-systems-networking---cyber-security-certificate-level-1\/\">Network Systems and Cybersecurity \u2013 Certificate level I<\/a><\/td><td><\/td><\/tr><tr><td>Laredo Community College<\/td><td>Laredo, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.laredo.edu\/cms\/LCC\/Instruction\/Divisions\/Workforce_Education\/Computer_Technology\/Cyber_Center\/Degrees___Certificates\/\">Associate in Applied Science in Computer Information Systems \u2013 Network and Cybersecurity Technology<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.laredo.edu\/cms\/LCC\/Instruction\/Divisions\/Workforce_Education\/Computer_Technology\/Cyber_Center\/Degrees___Certificates\/\">Certificate in Network and Data Security<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>Mountain View College<\/td><td>Dallas, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.dcccd.edu\/cd\/dcc\/comps\/cit\/pages\/degrees.aspx\">Associate in Applied Sciences \u2013 Computer Information Technology (Networking Security Awards)<\/a><\/td><td><\/td><\/tr><tr><td>Our Lady of the Lake University<\/td><td>San Antonio, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.ollusa.edu\/s\/1190\/hybrid\/18\/wide-hybrid-ollu.aspx?sid=1190&amp;gid=1&amp;pgid=7804\">BA in Computer Information Systems and Security \u2013 Security Track<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.ollusa.edu\/s\/1190\/hybrid\/18\/wide-hybrid-ollu.aspx?sid=1190&amp;gid=1&amp;pgid=7901\">Master of Science in Information Systems and Security (MS-ISS)<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>Richland College<\/td><td>Dallas, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.dcccd.edu\/cd\/credit\/cyber-security\/pages\/degrees-cert.aspx\">AAS in Cybersecurity<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.dcccd.edu\/cd\/credit\/cyber-security\/pages\/degrees-cert.aspx\">Digital Forensic Analyst Advanced Technical Certificate<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>Sam Houston State University<\/td><td>Huntsville, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.shsu.edu\/programs\/bachelor-of-science-in-digital-and-cyber-forensic-engineering-technology\/\">Bachelor of Science in Digital and Cyber Forensic Engineering Technology<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.shsu.edu\/programs\/graduate-certificate-in-cyber-security\/\">Graduate Certificate in Cybersecurity<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.shsu.edu\/programs\/graduate-certificate-in-data-assurance\/\">Graduate Certificate in Data Assurance<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.shsu.edu\/programs\/graduate-certificate-in-digital-investigation\/\">Graduate Certificate in Digital Investigation<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.shsu.edu\/programs\/graduate\/digital-forensics\/\">Master of Science in Digital Forensics<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.shsu.edu\/programs\/graduate\/information-assurance-and-security\/\">Master of Science in Information Assurance and Security<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.shsu.edu\/programs\/doctorate\/digital-and-cyber-forensic-science\/\">Ph.D. in Digital and Cyber Forensic Science<\/a><\/td><td><\/td><\/tr><tr><td>San Antonio College<\/td><td>San Antonio, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.alamo.edu\/sac\/academics\/program-index\/science-and-technology\/information-security\/\">Associate of Applied Science in Information Assurance and Cybersecurity<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.alamo.edu\/sac\/academics\/program-index\/science-and-technology\/information-security\/\">Certificate, Information Security and Assurance<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.alamo.edu\/sac\/academics\/program-index\/science-and-technology\/information-security\/\">Cyber First Responders Certificate<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.alamo.edu\/sac\/academics\/program-index\/science-and-technology\/information-security\/\">Information Technology and Security Academy (ITSA) Certificate<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>Southern Methodist University<\/td><td>Dallas, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.smu.edu\/Lyle\/Departments\/CSE\">Bachelor of Science \u2013 Computer Science \u2013 Security Track<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.smu.edu\/Lyle\/Departments\/CSE\">Master of Science with a Major in Computer Science \u2013 Concentration in Security<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.smu.edu\/Lyle\/Departments\/CSE\/DegreePrograms\/MS_SEC\">Master of Science with a Major in Security Engineering<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.smu.edu\/Pro\/Online-Masters\/masters-in-cybersecurity\">Online Master's in Cybersecurity<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>St Philip\u2019s College<\/td><td>San Antonio, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.alamo.edu\/sac\/academics\/program-index\/science-and-technology\/information-security\/\">AAS in Information Assurance and Cybersecurity<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.alamo.edu\/spc\/academics\/programs\/science-and-technology\/information-technology-cybersecurity-specialist\/\">Information Security and Assurance Certificate<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.alamo.edu\/spc\/academics\/programs\/science-and-technology\/information-technology-cybersecurity-specialist\/\">Information Technology Cybersecurity Specialist, AAS<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>Texas A &amp; M University-College Station<\/td><td>College Station, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/cybersecurity.tamu.edu\/education\/undergraduate\/\">Cybersecurity Undergraduate Minor<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/engineering.tamu.edu\/academics\/degrees\/mse-cybersecurity\/index.html\">Master of Engineering in Engineering \u2013 Cybersecurity specialization<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>Texas A &amp; M University-Corpus Christi<\/td><td>Corpus Christi, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/sci.tamucc.edu\/CSCI\/COSC\/undergrad.html\">BS in CIS in Cybersecurity and Infrastructure<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/gradcollege.tamucc.edu\/degrees\/science\/computer_science.html\">MS in Computer Science \u2013 Networking and Security<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>Texas A&amp;M University San Antonio<\/td><td>San Antonio, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.tamusa.edu\/academics\/documents\/degree-plans\/Bachelor-of-Applied-Arts-and-sciences-Information-Technology-Concentration.pdf\">Bachelor of Applied Arts and Sciences Information Technology\/Information Assurance and Security Concentration<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>Texas State Technical College-System<\/td><td>Waco, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.tstc.edu\/programs\/CyberSecurity\">Advanced Technical Certificate \u2013 Digital Forensics Specialist<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.waco.tstc.edu\/programs\/ComputerNetworkingSecurityTechnology\">Associate of Applied Science \u2013 Computer Networking and Security Technology<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.waco.tstc.edu\/programs\/CyberSecurity\">Associate of Applied Science \u2013 Cybersecurity<\/a> <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.tstc.edu\/programs\/CyberSecurity\">Certificate in Cybersecurity<\/a><\/td><td><\/td><\/tr><tr><td>The University of Texas at Austin<\/td><td>Austin, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.cs.utexas.edu\/concentrations\/cybersecurity\">Bachelor of Science in Computer Science \u2013 Cybersecurity<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>The University of Texas at Dallas<\/td><td>Richardson, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/jindal.utdallas.edu\/information-systems-programs\/certificate-programs\/\">Certificate in Cybersecurity Systems (CCSS)<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/cs.utdallas.edu\/education\/graduate\/certificates\/\">Graduate Certificate in Information Assurance<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/cs.utdallas.edu\/education\/degrees\/\">Minor in Information Assurance<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/cs.utdallas.edu\/education\/degrees\/\">MS in Computer Science \u2013 Information Assurance Concentration<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/cs.utdallas.edu\/education\/graduate\/certificates\/\">Undergraduate Certificate in Information Assurance<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>The University of Texas at El Paso<\/td><td>El Paso, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.utep.edu\/cs\/graduate\/index.html\">Graduate Certificate in Cybersecurity<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.utep.edu\/cs\/graduate\/index.html\">Graduate Certificate in Cybersecurity<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.utep.edu\/extendeduniversity\/utepconnect\/online-programs\/bachelor-programs\/bachelor-of-arts-in-security-studies.html\">Online Bachelor of Arts in Security Studies<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>The University of Texas at San Antonio<\/td><td>San Antonio, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/business.utsa.edu\/programs\/cyber-security\/\">Bachelor of Business Administration Degree in Cybersecurity<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/business.utsa.edu\/programs\/cyber-security\/\">Bachelor of Business Administration Degree in Cybersecurity<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/business.utsa.edu\/programs\/ms-information-technology\/\">Master of Science Degree in Information Technology \u2013 Cybersecurity Concentration<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>University of Dallas<\/td><td>Irving, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/udallas.edu\/cob\/academics\/graduate_certificates\/cybersecurity_certificate.php\">Graduate Certificate in Cybersecurity<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/udallas.edu\/cob\/academics\/mba\/\">Master of Business Administration \u2013 Cybersecurity Concentration<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/udallas.edu\/cob\/academics\/ms\/cybersecurity\/index.php\">Master of Science (MS) in Cybersecurity<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>University of Houston<\/td><td>Houston, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.uh.edu\/technology\/departments\/ilt\/graduate\/iss\/\">Master of Science in Information System Security<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>University of North Texas<\/td><td>Denton, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/cics.unt.edu\/node\/105\">Cybersecurity Certificate<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>University of St Thomas<\/td><td>Houston, Texas <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/techlearning.stthom.edu\/\">Certificate in Cybersecurity Analysis<\/a><\/td><\/tr><\/tbody><\/table>\r\n\r\n<h2>Studying Cybersecurity in Texas<\/h2>\r\n\r\n\r\n\r\n<p>If you\u2019re not looking to the Lone Star State for a cybersecurity degree, you\u2019re not looking. The number one stopping point is the University of Texas at San Antonio. Experts <a rel=\"noreferrer noopener\" href=\"https:\/\/www.computerworld.com\/article\/2487907\/it-skills-training\/it-pros-rank-university-of-texas-san-antonio-best-school-for-cybersecurity.html\" target=\"_blank\">ranked<\/a> it the nation\u2019s top school for cybersecurity in 2014. But there are strong university-based research and academic programs all over the map, and six of the state\u2019s universities (University of Houston, University of North Texas, University of Texas, UTD, UTEP and UTSA) receive <a rel=\"noreferrer noopener\" href=\"https:\/\/www.sfs.opm.gov\/ContactsPI.aspx#Institute67\" target=\"_blank\">CyberCorps Scholarship<\/a> funding from the National Science Foundation. Students there are eligible for free tuition plus attractive stipends. Here are a few of the other happenings on Texas campuses:<\/p>\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"online-cybersecurity-programs-in-texas\" id=\"online-cybersecurity-programs-in-texas\"><\/a>\n\n\r\n\r\n<h2>Online Cybersecurity Programs in Texas<\/h2>\r\n\r\n\r\n\r\n<p>The state of cybersecurity education in Texas is strong. Whereas Silicon Valley is known generally as the tech capital of the world, Texas has made a name for itself by carving out a niche in cybersecurity, with UTSA leading the way. Thanks to Texas\u2019 foresight in 2011, when it created the <a rel=\"noreferrer noopener\" href=\"https:\/\/dir.texas.gov\/View-About-DIR\/Information-Security\/Pages\/Content.aspx?id=133\" target=\"_blank\">Texas Cybersecurity, Education, and Economic Development Council<\/a> (TCEEDC), other state schools aren\u2019t far behind. Now degrees and certificates in cybesecurity are popping up across the state\u2019s whopping six public university systems, not to mention state-run technical and community colleges and private universities. Not all of them are available online, but many are.<\/p>\r\n\r\n\r\n\r\n<p>Here\u2019s an overview of the distance ed cybersecurity programs you\u2019ll find in college catalogs:<\/p>\r\n\r\n\r\n\r\n<h3>Online Associate Degrees in Cybersecurity<\/h3>\r\n\r\n\r\n\r\n<p>Many Texas two-year schools have cybersecurity associate programs, but as of 2016, most (including Del Mar College, Alamo College and the schools within the Texas State Technical College system) weren\u2019t online. That isn\u2019t to say individual courses toward a cybersecurity&nbsp;degree aren\u2019t available via distance learning.<\/p>\r\n\r\n\r\n\r\n<p>For a purely online program, look to the AAS in Information Security from Central Texas College. It\u2019s designed for future security managers and includes an internship, so it\u2019s ideal for students with limited technical&nbsp;experience.&nbsp;Four-year institutions are geared toward baccalaureates and above, but a few offer online associate degrees. South Texas College, for instance, has online Computer Science and Computer Information System associate degrees. However, these basically cover general education and programming, laying the foundation for students to specialize in cybersecurity later.<\/p>\r\n\r\n\r\n\r\n<h3>Online Bachelor\u2019s Degrees in Cybersecurity<\/h3>\r\n\r\n\r\n\r\n<p>None of the state\u2019s major schools run online cybersecurity baccalaureate programs. Instead, students&nbsp;can enroll in a campus-based program and take any courses toward the degree that are offered online.<\/p>\r\n\r\n\r\n\r\n<h3>Online Master\u2019s Degrees in Cybersecurity<\/h3>\r\n\r\n\r\n\r\n<p>The master\u2019s degree level is where online programs start becoming more plentiful. That\u2019s where two of the major university systems, Texas A&amp;M and University of Texas, have focused their distance learning efforts. Unfortunately, they haven\u2019t put their <a href=\"\/listings\/california\/\">cybersecurity programs<\/a> online yet.<\/p>\r\n\r\n\r\n\r\n<p>One public school with strong online offerings is Sam Houston State University. Its MS in Information Assurance and Security takes students with strong technical backgrounds and gives them the skills to become security pros for businesses or government agencies. And its MS in Digital Forensics is for computer science or criminal justice majors who want to synthesize the knowledge from those two fields into one degree.<\/p>\r\n\r\n\r\n\r\n<p>The private universities are really leading the way in terms of <a href=\"\/listings\/top-online-masters-in-information-technology-programs\/\">online cybersecurity graduate programs<\/a>. SMU is a highly regarded school with online master\u2019s degrees in the discipline \u2014 two of them. Students can choose between an MS in Computer Science (Security Concentration) and an MS in Security Engineering. The former is for high-level programmers. Students admitted to the latter can\u2019t be slouches in this regard, but considering the title, their&nbsp;coursework is&nbsp;much narrower in focus than the CS degree.<\/p>\r\n\r\n\r\n\r\n<p>The Master of Science in Information Systems and Security (MS-ISS) at Our Lady of the Lake University is a one-year program that gives students tons of practice with database management, systems analysis, network security and information assurance. The short timeframe for completion is ideal for current IT pros looking to move into a security role at their organization, and the program is designed to give students an edge when applying to posts with federal agencies. Students who have a bachelor\u2019s in a degree outside the computer science sphere can apply as well, but they must first complete a semester-long <a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-cyber-security-bootcamps\/\">cybersecurity bootcamp<\/a>, which covers programming, networks, databases, systems design and basic security concepts.<\/p>\r\n\r\n\r\n\r\n<h3>Online Certificate Programs in Cybersecurity<\/h3>\r\n\r\n\r\n\r\n<p>Certificates come in both undergraduate and graduate forms. And Texas students have strong options thanks to a proliferation of online programs at a few public schools.<\/p>\r\n\r\n\r\n\r\n<p>For undergraduate certificates, Central Texas College is the best place to look, as it has one of the most comprehensive catalogs of exclusively online certificate programs in the state. Students can <a href=\"\/jobs\/security-specialist\/\">become an Information Security Specialist<\/a> in less than a year, with the undergrad program preparing them for CompTIA Security+ and CompTIA Network+ exams.<\/p>\r\n\r\n\r\n\r\n<p>For graduate certificates, Sam Houston has the most offerings. Its cybercecurity certificate is for IT&nbsp;professionals in charge of critical infrastructure. The Data Assurance certificate explores security concerns relevant to database administrators. And its certificate in Digital Investigation is meant for criminal justice workers with a background in computer science.<\/p>\r\n\r\n  <section\n    class=\"relative py-3 md:py-16 my-10\"\n    data-preamp=\"editorial-listings\"\n    data-options=\n    data-tracking=\n    data-cy=\"editorial-listings-grid\"\n    \n  >\n    <div class=\"bg-full-width absolute border-t border-b border-gray-100 top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n\n    \n        <h2 class=\"text-center mb-8\">Top Online Programs<\/h2>\n    \n        <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    \n    <sonic-editorial-listings\n      \n      \n      \n      limit=\"4\"\n      layout=\"stacked\"\n    ><\/sonic-editorial-listings>\n\n  <\/section>\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"scholarships-for-students\" id=\"scholarships-for-students\"><\/a>\n\n\r\n<h2>Cybersecurity Scholarships in Texas<\/h2>\r\n\r\n\r\n\r\n<p>Cybersecurity falls under the group of disciplines known as STEM \u2014 science, technology, engineering and mathematics. It\u2019s a major focus for schools and state governments looking to recruit and retain a highly skilled workforce. Recruitment&nbsp;starts with scholarships. The Texas Higher Education Coordinating Board, for instance, provides community and technical colleges with funding for the <a rel=\"noreferrer noopener\" href=\"http:\/\/www.thecb.state.tx.us\/index.cfm?objectid=50BE9090-1E3B-11E8-BC500050560100A9\" target=\"_blank\">Texas Science, Technology, Engineering, and Math (T-STEM) Challenge Scholarship<\/a>. It\u2019s intended for STEM majors who graduated high school with a 3.0 or better and continue that mark during college.<\/p>\r\n\r\n\r\n\r\n<p>Here are some school-based awards that are more specific to cybersecurity, or at least to computer science:<\/p>\r\n\r\n\r\n\r\n<h3>Sam Houston State University<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.shsu.edu\/dept\/financial-aid\/scholarships\/scholarship_blocks\/sci.html#COMPUTERSCI\" target=\"_blank\">Mohamed Ahmed Noman Endowment<\/a>: Cybersecurity students with a 3.0 GPA or higher are automatically considered for this award, which varies depending on available funds.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>San Antonio College<\/h3>\r\n\r\n\r\n\r\n<ul><li><a href=\"https:\/\/www.alamo.edu\/sac\/admissions-aid\/pay-for-college\/scholarships\/sac-departmental-scholarships\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cheryl Sanchez Scholarship<\/a>: Computer Science and IT majors from Bexar or its surrounding counties have their own scholarship. To qualify, they must earn a 2.5 GPA.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>Southern Methodist University<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.smu.edu\/Lyle\/Undergraduate\/Parents\/FinancialAid\" target=\"_blank\">Lyle School of Engineering scholarships<\/a>: The Lyle School of Engineering gives&nbsp;scholarships to Computer Science majors who apply for admission by January 15th. Awards go to first-year students with impressive&nbsp;high school credentials and can be renewed each year provided the recipient maintains a 3.0 GPA.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>Texas A&amp;M University-Corpus Christi<\/h3>\r\n\r\n\r\n\r\n<ul><li><a href=\"http:\/\/scholarships.tamucc.edu\/assets\/15-16%20COSE%20Table.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Evening Post Publishing Company-KRIS TV Scholarship<\/a>: This is a nonrenewable scholarship for computer science students at the College of Science and Engineering.<\/li><li><a href=\"http:\/\/scholarships.tamucc.edu\/assets\/15-16%20COSE%20Table.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">John D. Fernandez Endowed Scholarship in Computer Science<\/a>: There are multiple criteria for this award: Students must attend full time, earn a 3.5 GPA, graduate in the 96th percentile of their high school class, have financial need, and be a first-generation student from Nueces, San Patricio, Bee, Live Oak, Jim Wells, Refugio, Aransas or Kleberg.<\/li><li><a href=\"http:\/\/scholarships.tamucc.edu\/assets\/15-16%20COSE%20Table.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Carl Douglas Wyatt Memorial Scholarship<\/a>: Undergrads pursuing a degree with a Computer Information Science emphasis can apply for this one-time award.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>The University of Texas at Austin<\/h3>\r\n\r\n\r\n\r\n<ul><li><a href=\"https:\/\/www.cs.utexas.edu\/undergraduate\/academics\/scholarship-service\" target=\"_blank\" rel=\"noreferrer noopener\">INFOSEC Scholarship for Service (SFS)<\/a>: Enrollees in UT\u2019s Certificate in Information Security program can get a full scholarship plus stipend. They\u2019ll have some obligations to the federal government, which funds the award, but it\u2019s worth it because they\u2019ll transition into a government internship after graduation.<\/li><li><a href=\"https:\/\/www.cs.utexas.edu\/undergraduate-program\/student-engagement-and-support\/scholarships\" target=\"_blank\" rel=\"noreferrer noopener\">University of Texas Computer Science Scholarship<\/a>: UT\u2019s Department of Computer Sciences gives out several hundred thousand dollars in scholarships each year to full-time undergraduates with strong academic credentials, exceptional extracurricular participation and demonstrable financial need.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>The University of Texas at Dallas<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/engineering.utdallas.edu\/academics\/undergraduate-majors\/scholarships\/\" target=\"_blank\">Jonsson School Distinguished Alumnus, Niyi \u201cJohn\u201d Olajide\u201904 Honorary Scholarship<\/a>:&nbsp;The Olajide Scholarship is earmarked for full-time undergrads majoring in Computer Science, which includes students with a cybersecurity minor. It\u2019s worth $2,000.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/engineering.utdallas.edu\/academics\/graduate-education\/fellowships\/\" target=\"_blank\">Lars Magnus Ericsson Graduate Fellowship<\/a>: Full-time graduate students in a computer science discipline with 9 credits under their belt can compete for a $2,000 fellowship, which is awarded based on GPA, research and the quality of coursework.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.utdallas.edu\/~ksarac\/SFS\/index.html\" target=\"_blank\">UTD Cybersecurity Scholarship<\/a>: Senior undergraduates, grad students and PhD candidates can apply for full tuition and stipends to attend cybersecurity and information assurance programs.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>The University of Texas at El Paso<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"http:\/\/www.cs.utep.edu\/utep-sfs-program\/\" target=\"_blank\">UTEP CyberCorps Scholarship for Service<\/a>: Students enrolled in the MS in Software Engineering or PhD-level computer science programs should apply for the full scholarship and stipend that come along with the CyberCorps program. After graduation, they\u2019ll be expected to work for a <a href=\"https:\/\/www.cyberdegrees.org\/resources\/government-cyber-security-careers\/\">government agency in a cybersecurity<\/a> role.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>The University of Texas at San Antonio<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"http:\/\/engineering.utsa.edu\/scholarships\/boeing-scholarship\/\" target=\"_blank\">Boeing Scholarship<\/a>: Though any undergrads or graduates from the College of Business can apply, Boeing prefers to give this award to students interested in aerospace, defense and\/or cybersecurity. Awards go to full-time students who overcome economic disadvantages to excel academically.<\/li><li><a rel=\"noreferrer noopener\" href=\"http:\/\/engineering.utsa.edu\/scholarships\/boeing-scholarship\/\" target=\"_blank\">Enterprise Architecture Scholarship in the College of Business:<\/a>&nbsp;Undergrad and graduate Information Systems and Infrastructure Assurance majors with at least two years of higher education completed can apply for the Enterprise Architecture Scholarship, provided they are enrolled full time, have a 3.0 and show financial need.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/cs.utsa.edu\/scholarships\/nsf-sfs\" target=\"_blank\">NSF Scholarship for Service<\/a>: Full-time undergrads and graduates doing cybersecurity coursework can get two years of full funding (plus considerable stipends) to complete their program. Recipients must work after graduation for a government agency.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>University of Dallas<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/udallas.edu\/admissions\/undergrad\/departmentalscholarships\/compsci-scholar.php\" target=\"_blank\">Computer Science Departmental Scholarship<\/a>: Incoming students can get $1,000 to $5,000 for a degree from the school\u2019s CS department.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>University of Houston<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"http:\/\/sfs.cs.uh.edu\/?q=SFS-2015\" target=\"_blank\">Scholarship for Service for Graduates<\/a>: MS and PhD students focusing on cybersecurity can apply for a full scholarship, thanks to generous National Science Foundation funding.<\/li><li><a rel=\"noreferrer noopener\" href=\"http:\/\/sfs.cs.uh.edu\/?q=S-stem2015\" target=\"_blank\">S-STEM Scholarships for Undergraduates<\/a>: The Department of Computer Science distributes several $10,000 awards to computer science students with a 3.0 GPA and financial need.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>University of North Texas<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/cics.unt.edu\/sfs-phd-program\" target=\"_blank\">PhD Scholarships for Cybersecurity and Information Assurance<\/a>: PhD students concentrating in Information Assurance are eligible for Scholarship for Service funding. The school awards two renewable full scholarships with stipends each year.<\/li><\/ul>\r\n\r\n\r\n\r\n<h2>Cybersecurity Events in Texas<\/h2>\r\n\r\n\r\n\r\n<h3>Cybersecurity Meetups and Communities in Texas<\/h3>\r\n\r\n\r\n\r\n<p>After spending so much time in front of a screen, it can be nice to meet peers in the real world. Texas cybersecurity pros and hackers have several places to grab a beer and talk shop after work or class. Here are six communities from across the state:<\/p>\r\n\r\n\r\n\r\n<ol><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.meetup.com\/cyberdefdojo\/\" target=\"_blank\">CyberDef Dojo<\/a>: Hackers, tech entrepreneurs and security enthusiasts in San Antonio gather regularly for in-person talks and skill sessions.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.meetup.com\/NCCOpenForumATX\/\" target=\"_blank\">NCC Group Security Open Forum \u2013 Austin<\/a>: NCC is a quarterly forum for Austin area engineers and technical managers to hear the latest research on topics such as reversing, secure development and cryptography.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.meetup.com\/NTXCSG\/\" target=\"_blank\">North Texas Cybersecurity Group<\/a>: Dallas area professionals meet monthly to listen to speakers discuss the latest offensive and defensive cybersecurity techniques.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.owasp.org\/index.php\/Dallas\" target=\"_blank\">Open Web Application Security Project (OWASP) Dallas<\/a>: Software security aficionados and amateurs alike gather every month to learn about software security, covering everything from pen testing to passwords to mobile payments.<\/li><\/ol>\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"professional-conferences-and-workshops\" id=\"professional-conferences-and-workshops\"><\/a>\n\n\r\n\r\n<h3>Cybersecurity Conferences and Workshops in Texas<\/h3>\r\n\r\n\r\n\r\n<p>You can increase your knowledge and skills year-round in Texas. Three of SANS Institute\u2019s favorite training spots are in Texas: It holds <a rel=\"noreferrer noopener\" href=\"https:\/\/www.sans.org\/find-training\/index\/9255702\/search\/#results\" target=\"_blank\">cybersecurity workshops<\/a> on different topics throughout the year in Austin, Dallas and Houston. Texas is also a popular stopping point for big conferences. Recent events include <a rel=\"noreferrer noopener\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity16\" target=\"_blank\">USENIX Security Symposium 2016<\/a> in Austin and the 2017 ISSA International Conference in Dallas. And some conferences remain&nbsp;in the Lone Star State year after year, including:<\/p>\r\n\r\n\r\n\r\n<ol><li><a rel=\"noreferrer noopener\" href=\"http:\/\/www.cs4ca.com\/usa\/\" target=\"_blank\">Cybersecurity for Critical Assets USA<\/a>: Academics and energy, water and aerospace industry leaders meet in Houston for two days to discuss how to avoid supply chain and infrastructure risks posed by security vulnerabilities.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/oilandgascybersecurity.iqpc.com\/\" target=\"_blank\">Cybersecurity for Oil and Gas Summit<\/a>: Notice a trend? Also in Houston, the Annual Cybersecurity for Oil and Gas Summit convenes the industry\u2019s IT staff for a series of workshops on protecting company data and physical infrastructure.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.texascybersummit.org\/\" target=\"_blank\">Texas Cyber Summit<\/a>: the 2019 conference, to be held in October in San Antonio, features program tracks geared to attendees with different levels of cybersecurity knowledge. It will also feature \u201cHacker\u2019s Haven,\u201d with capture the flag contests and other goodies.<\/li><li><a rel=\"noreferrer noopener\" href=\"http:\/\/2016.infosecsouthwest.com\" target=\"_blank\">InfoSec Southwest<\/a>: Austin\u2019s annual information security and hacking conference is open to anyone who wants to learn more about industry issues. To keep it fun and keep you networking, event organizers schedule pub crawls, scavenger hunts and capture the flag competitions.<\/li><li><a rel=\"noreferrer noopener\" href=\"http:\/\/www.bsidesdfw.com\" target=\"_blank\">Security BSidesDFW<\/a>: Kind of like TedX for cybersecurity, BSides is a locally organized \u201cunconference\u201d that attracts information security professionals who want to discover and discuss security issues that aren\u2019t yet on anyone\u2019s radar. This one\u2019s in Dallas-Fort Worth.<\/li><\/ol>\r\n\r\n  <section\n    class=\"relative py-3 md:py-16 my-10\"\n    data-preamp=\"editorial-listings\"\n    data-options=\n    data-tracking=\n    data-cy=\"editorial-listings-grid\"\n    \n  >\n    <div class=\"bg-full-width absolute border-t border-b border-gray-100 top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n\n    \n        <h2 class=\"text-center mb-8\">Top Online Programs<\/h2>\n    \n        <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    \n    <sonic-editorial-listings\n      \n      \n      \n      limit=\"4\"\n      layout=\"stacked\"\n    ><\/sonic-editorial-listings>\n\n  <\/section>\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"cybersecurity-jobs-in-texas\" id=\"cybersecurity-jobs-in-texas\"><\/a>\n\n\r\n\r\n<h2>Cybersecurity Jobs in Texas<\/h2>\r\n\r\n\r\n\r\n<p>Once you\u2019ve graduated from a Texas college, are there enough jobs to keep you there? Yes, according to the <a rel=\"noreferrer noopener\" href=\"https:\/\/pellcenter.org\/?s=state+of+the+states+report\" target=\"_blank\">Pell Center for International Relations and Public Policy<\/a>. As of 2015, it was one of just six states with a cybersecurity workforce development plan in place.<\/p>\r\n\r\n\r\n\r\n<p>The Bureau of Labor Statistics notes&nbsp;that the market for cybersecurity experts isn\u2019t saturated, even though it already has the third most jobs in the field of any state. It <a rel=\"noreferrer noopener\" href=\"http:\/\/www.projectionscentral.com\/Projections\/LongTerm\" target=\"_blank\">ranks Texas ninth<\/a> in terms of projected job growth for information security analysts, with 320 new jobs expected to open up every year. A&nbsp;<a rel=\"noreferrer noopener\" href=\"http:\/\/www.burning-glass.comhttps:\/\/res.cloudinary.com\/highereducation\/image\/upload\/f_auto,fl_lossy,q_auto\/v1\/CyberDegrees.org\/Cybersecurity_Jobs_Report_2015.pdf\" target=\"_blank\">report from Burning Glass<\/a>&nbsp;got more specific. It&nbsp;ranked Dallas fifth in the country in 2014 with 8,694 cybersecurity <a class=\"wpil_keyword_link \" href=\"http:\/\/www.cyberdegrees.org\/jobs\/\" title=\"job\" data-wpil-keyword-link=\"linked\">job<\/a> postings. Though well behind with 2,937 posts, Austin ranked first in the country for job growth in the sector from 2010 to 2014, more than doubling its cybersecurity workforce in that period.<\/p>\r\n\r\n\r\n\r\n<p>What&nbsp;industries&nbsp;might graduates land in? With San Antonio earning both the Cyber City USA and Military City USA monikers, it\u2019s a good bet they can find work in defense industry. The military has located cybersecurity units in San Antonio&nbsp;to scoop up local civilian graduates. The Air Force Cyber Command, Air Force Intelligence, Surveillance and Reconnaissance Agency, Joint Information Operations Warfare Center, Air Force Electronic Warfare School, and Air Force Cryptologic Systems Group are all <a rel=\"noreferrer noopener\" href=\"https:\/\/therivardreport.com\/want-cybersecurity-job-try-cyber-city-san-antonio\/\" target=\"_blank\">based in the city<\/a>.<\/p>\r\n\r\n\r\n\r\n<p>Want something more corporate? Texas has the second most Fortune 500 companies of any state with 54, and even companies headquartered elsewhere (like Hewlett Packard and Lockheed Martin) employ <a rel=\"noreferrer noopener\" href=\"https:\/\/www.careerinfonet.org\/oview6.asp?stfips=48\" target=\"_blank\">large workforces<\/a> in the state. One of the biggest names in Texas business is telecommunications behemoth AT&amp;T, but remember that oil companies, including Irving-based Exxon, are warming to cybersecurity projects. Last, American Airlines and Southwest Airlines keep more than hangars in the state \u2014 their operations are based there. With most airlines now <a rel=\"noreferrer noopener\" href=\"https:\/\/www.mro-network.com\/emerging-technology\/airlines-look-invest-cyber-security\" target=\"_blank\">investing heavily in cybersecurity<\/a>, the presence of two aerial giants bodes well for new graduates.<\/p>\r\n\r\n\r\n\r\n<h2>Cybersecurity Salaries in Texas<\/h2>\r\n\r\n\r\n\r\n<p>Texas is a great place to land for work. Dallas ($117,890 in 2016) and Austin ($110,190) rank <a href=\"https:\/\/www.indeed.com\/lead\/where-are-highest-paying-cyber-security-jobs\" target=\"_blank\" rel=\"noreferrer noopener\">fourth and seventh<\/a>, respectively, for information security specialist salaries (adjusted for cost of living). But don\u2019t neglect jobs elsewhere in Texas. The state\u2019s cost of living is considerably lower than the national average, in part because of cheap oil prices and the lack of a state income tax.<\/p>","protected":false},"excerpt":{"rendered":"Although overshadowed by Silicon Valley, Texas has been a tech innovation hub for even longer. If you doubt it, ask NASA. And the state\u2019s cybersecurity degrees \u2014 both public and&#8230;","protected":false},"author":5,"featured_media":2147,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[24],"resources-overview":[],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-450","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","states-t"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=450"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/450\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/2147"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=450"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=450"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=450"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=450"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=450"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}